Juniper Mist - OpenRoaming with RadSec
Configure RadSec (RADIUS over TLS) on Juniper Mist access points for secure OpenRoaming authentication with IronWifi. This guide covers certificate upload to Mist cloud, RadSec authentication server configuration, WLAN creation, and Hotspot 2.0 deployment through the Mist Dashboard.
Quick Start
- Enable RadSec and OpenRoaming in IronWifi Console
- Download certificate bundle
- Upload certificates to Mist Dashboard (Organization > Settings)
- Create RadSec authentication with
radsec.ironwifi.com:2083 - Create WLAN with Hotspot 2.0 and OpenRoaming OIs
- Deploy to sites
Prerequisites
In Juniper Mist:
- Juniper Mist organization with access points deployed
- Mist firmware supporting RadSec
- Access to Organization Settings for certificate management
In IronWifi Console (complete these first):
- Create or select a Network in the IronWifi Console
- Enable OpenRoaming from the dropdown menu
- Enable RadSec from the dropdown menu
- Download the certificate bundle (ZIP file containing Root CA, Intermediate CA, client certificate, and private key)
Mist Dashboard Configuration
Step 1: Upload Certificates
- Log in to Mist Dashboard (manage.mist.com)
- Navigate to Organization > Settings
- Find Certificates section
- Upload the following certificates:
- Root CA certificate (
iw-rsa-root-ca.cert.pem) - Intermediate CA certificate (
iw-rsa-radsec-signing-ca.cert.pem) - Client certificate (
client.cert.pem)
- Root CA certificate (
- Upload private key (
client.key.pem)
Step 2: Create RadSec Configuration
- Navigate to Organization > WLAN Templates (or Site WLANs)
- Go to RADIUS configuration
- Select RadSec as the authentication method
Step 3: Configure RadSec Server
In RADIUS settings:
- Authentication Type: RadSec
- Click Add Server
- Configure:
- Server Name:
radsec.ironwifi.com - Port: 2083
- Certificate: Select uploaded client certificate
- CA Certificate: Select uploaded CA chain
- Server Name:
Step 4: Configure WLAN with Passpoint
- Go to WLANs
- Create new WLAN or edit existing
- Configure:
- SSID: OpenRoaming
- Security: WPA2-Enterprise
- RADIUS: Select RadSec configuration
Step 5: Enable Hotspot 2.0
- In WLAN settings, find Hotspot 2.0 section
- Enable Hotspot 2.0
- Configure:
Network Information:
- Internet Access: Yes
- Network Type: Free public network
Venue Information:
- Venue Group: Business
- Venue Type: Unspecified
Domain Name:
- Add:
ironwifi.net
Roaming Consortium:
- Add:
5A03BA0000(WBA OpenRoaming Settled) - Add:
5A03BA0200(WBA OpenRoaming Settlement-free) - Add:
004096(Cisco OpenRoaming)
NAI Realm:
- Realm:
ironwifi.com - EAP Type: TTLS
Step 6: Advanced Settings
In Hotspot 2.0 Advanced Settings:
Operator Information:
- Friendly Name: Your Organization
- Language: eng
Domain Names:
ironwifi.net
openroaming.org
Complete Configuration Summary
WLAN Settings
| Setting | Value |
|---|---|
| SSID | OpenRoaming |
| Security | WPA2-Enterprise |
| Authentication | RadSec |
| RadSec Server | radsec.ironwifi.com:2083 |
Hotspot 2.0 Settings
| Setting | Value |
|---|---|
| Internet | Yes |
| Network Type | Free public |
| Domain | ironwifi.net |
| Roaming OIs | 5A03BA0000, 5A03BA0200, 004096 |
| NAI Realm | ironwifi.com (EAP-TTLS) |
Site-Level Configuration
For per-site RadSec configuration:
- Navigate to Site > WLANs
- Create site-specific WLAN
- Configure RadSec with site-specific certificates if needed
- Override organization settings as required
Verification
Check WLAN Status
- Go to Site > WLANs
- Verify WLAN is active
- Check for any configuration errors
Monitor RadSec Connectivity
- Go to Insights > Events
- Filter for RADIUS events
- Look for successful RadSec connections
Test Client Connection
- Connect Passpoint-enabled device
- Verify automatic connection
- Check authentication in:
- Mist Dashboard (Client events)
- IronWifi Console (Authentication logs)
Troubleshooting
RadSec Connection Issues
-
Certificate Problems
- Verify all certificates uploaded correctly
- Check certificate validity dates
- Ensure CA chain is complete
-
Network Connectivity
- Verify AP can reach radsec.ironwifi.com
- Check port 2083 is allowed outbound
- Test TLS connectivity
-
Configuration Issues
- Verify RadSec server address
- Check certificate selection
- Review WLAN configuration
Authentication Failures
-
Check NAI Realm
- Verify realm matches IronWifi configuration
- Check EAP method is correct
-
Review Logs
- Mist Dashboard > Insights > Events
- IronWifi Console > Logs > Authentication
-
Verify Passpoint Settings
- Check roaming consortium OIs
- Verify domain names
Debug Steps
- Go to Site > Access Points
- Select affected AP
- View Events for detailed logs
- Check for RadSec or RADIUS errors
Common Errors
| Error | Cause | Solution |
|---|---|---|
| "TLS handshake failed" | Certificate issue | Re-upload certificates |
| "Connection timeout" | Network/firewall | Check port 2083 access |
| "Authentication rejected" | Wrong realm/config | Verify NAI realm settings |
| "Certificate expired" | Outdated cert | Download new certificates |
Best Practices
- Use Organization Templates: For consistent multi-site deployment
- Certificate Management: Track expiration dates
- Monitor Regularly: Check RadSec connectivity
- Test Thoroughly: Verify with multiple device types
- Document Configuration: For support and audit
Related Topics
- OpenRoaming Overview - Main OpenRoaming configuration guide
- RadSec Overview - Understanding RadSec technology
- Mist Passpoint - Passpoint configuration details
- Passpoint Overview - Understanding Passpoint technology