Aruba Central - OpenRoaming with RadSec
Configure RadSec (RADIUS over TLS) on Aruba Central to enable secure OpenRoaming authentication with IronWifi. This guide covers certificate management, RadSec server configuration, and Hotspot 2.0 deployment for Aruba access points managed through Aruba Central cloud platform.
Prerequisites
In Aruba Central:
- Aruba Central account with managed access points
- Aruba access points with Hotspot 2.0 support
- Administrator access
In IronWifi Console (complete these first):
- Create a Network and enable OpenRoaming
- Enable RadSec on the network
- Download the certificate bundle containing:
iw-rsa-root-ca.cert.pem- Root CAiw-rsa-radsec-signing-ca.cert.pem- Intermediate CAclient.cert.pem- Client certificateclient.key.pem- Private key
RadSec Server Details
| Setting | Value |
|---|---|
| Server | radsec.ironwifi.com |
| Port | 2083 |
| Protocol | TLS |
Quick Start
- Upload certificates to Aruba Central (Global Settings → Security)
- Create RadSec authentication server with
radsec.ironwifi.com:2083 - Create WLAN with WPA2-Enterprise and assign the RadSec server
- Enable Hotspot 2.0 with OpenRoaming OIs:
5A03BA0000,5A03BA0200,004096 - Configure NAI realm:
ironwifi.com - Deploy to access points
Aruba Central Configuration
Step 1: Upload Certificates
- Log in to Aruba Central (central.arubanetworks.com)
- Navigate to Global Settings > Security > Certificates
- Click Add Certificate
- Upload CA certificates:
- Upload
iw-rsa-root-ca.cert.pemas Root CA - Upload
iw-rsa-radsec-signing-ca.cert.pemas Intermediate CA
- Upload
- Upload client certificate and key:
- Upload
client.cert.pemas client certificate - Upload
client.key.pemas private key - Enter passphrase if required
- Upload
Step 2: Create RadSec Authentication Server
- Navigate to your Group > WLANs
- Go to Security > Authentication Servers
- Click Add Authentication Server
- Configure:
- Type: RadSec
- Name: IronWifi-RadSec
- Host:
radsec.ironwifi.com - Port: 2083
- RadSec CA Certificate: Select uploaded CA chain
- RadSec Client Certificate: Select uploaded client certificate
- RadSec Client Key: Select uploaded private key
- Click Save
Step 3: Create Server Group
- Go to Server Groups
- Click Add Server Group
- Configure:
- Name: IronWifi-RadSec-Group
- Add Server: IronWifi-RadSec
- Click Save
Step 4: Create WLAN with Passpoint
- Navigate to WLANs > Add WLAN
- Configure basic settings:
- Name/SSID: OpenRoaming
- Type: Employee
- Broadcast: Enabled
Step 5: Configure Security
In WLAN settings:
- Go to Security tab
- Configure:
- Security Level: Enterprise
- Key Management: WPA2-Enterprise
- Authentication Server: IronWifi-RadSec-Group
Step 6: Enable Hotspot 2.0
- In WLAN settings, go to Hotspot 2.0 section
- Enable Hotspot 2.0
- Configure:
Network Information:
- Internet Access: Enabled
- Network Type: Free public network
- Network Authentication: Online signup not required
Venue Information:
- Venue Group: Business
- Venue Type: Unspecified
- Venue Name: Your Location
Step 7: Configure Domain and Operator
Domain Names:
ironwifi.net
openroaming.org
Operator Information:
- Operator Friendly Name: IronWifi
- Language Code: eng
Step 8: Configure Roaming Consortium
Add Roaming Consortium OIs:
| OI | Description |
|---|---|
| 5A03BA0000 | WBA OpenRoaming (Settled) |
| 5A03BA0200 | WBA OpenRoaming (Settlement-free) |
| 004096 | Cisco OpenRoaming |
Step 9: Configure NAI Realm
- Add NAI Realm configuration:
- Realm:
ironwifi.com - EAP Method: EAP-TTLS
- Inner Authentication: PAP, MSCHAPv2
- Credential Type: Username/Password
- Realm:
Step 10: Deploy Configuration
- Review all settings
- Click Save to save WLAN
- Configuration automatically pushes to managed APs
Complete Configuration Summary
WLAN Settings
| Setting | Value |
|---|---|
| SSID | OpenRoaming |
| Security | WPA2-Enterprise |
| Authentication | RadSec |
| RadSec Server | radsec.ironwifi.com:2083 |
Hotspot 2.0 Settings
| Setting | Value |
|---|---|
| Internet | Enabled |
| Network Type | Free public |
| Domain | ironwifi.net |
| Roaming OIs | 5A03BA0000, 5A03BA0200, 004096 |
| NAI Realm | ironwifi.com (EAP-TTLS) |
Group vs Site Configuration
Group-Level (Recommended)
Configure RadSec and Hotspot 2.0 at the group level for consistent deployment across all sites in the group.
Site-Level Override
For site-specific configurations:
- Navigate to specific Site
- Override group settings as needed
- Upload site-specific certificates if required
Verification
Check WLAN Status
- Go to Dashboard > Network Health
- Verify WLAN is active on APs
- Check for configuration errors
Monitor RadSec Connectivity
- Navigate to Monitor > Security
- Check RADIUS/RadSec connection status
- Look for successful TLS handshakes
Test Client Connection
- Connect Passpoint-enabled device
- Verify automatic Passpoint connection
- Check authentication in:
- Aruba Central Client Monitor
- IronWifi Console Authentication Logs
Troubleshooting
Certificate Issues
-
Certificate Upload Failed
- Verify certificate format (PEM)
- Check certificate chain completeness
- Ensure private key matches certificate
-
TLS Handshake Failure
- Verify CA certificates are correctly installed
- Check certificate expiration dates
- Ensure server name matches certificate CN/SAN
RadSec Connection Problems
-
Connection Timeout
- Verify port 2083 is open outbound
- Check firewall rules
- Test connectivity to radsec.ironwifi.com
-
Authentication Rejected
- Verify client certificate is valid
- Check NAI realm configuration
- Review IronWifi console logs
Hotspot 2.0 Issues
-
Network Not Discovered
- Verify Hotspot 2.0 is enabled on WLAN
- Check roaming consortium OIs
- Ensure client device supports Passpoint
-
ANQP Query Failures
- Review AP logs for GAS/ANQP errors
- Verify domain and realm configuration
- Check client Passpoint settings
Debug in Aruba Central
- Go to Troubleshooting > Logs
- Filter by AP or client
- Look for RADIUS/RadSec events
- Check authentication success/failure reasons
Common Errors
| Error | Cause | Solution |
|---|---|---|
| TLS handshake failed | Certificate issue | Re-upload certificates |
| Connection refused | Port blocked | Open port 2083 |
| Certificate expired | Outdated cert | Download new bundle |
| Unknown CA | Trust not configured | Install CA chain |
| Auth rejected | Wrong realm | Check NAI realm config |
Best Practices
- Group Configuration: Use group-level settings for consistency
- Certificate Management: Track expiration dates, plan renewal
- Monitoring: Set up alerts for RadSec failures
- Testing: Verify with multiple device types
- Documentation: Record all configuration settings
- Backup: Export configuration before changes