Aerohive (Extreme) - Passpoint Configuration
Configure Passpoint (Hotspot 2.0) on Aerohive/Extreme Networks access points to enable automatic WiFi authentication through IronWifi's cloud RADIUS service. This eliminates manual network selection and provides WPA2/WPA3-Enterprise security without splash pages.
Overview
Aerohive Networks (now part of Extreme Networks) supports Hotspot 2.0/Passpoint through:
- ExtremeCloud IQ - Cloud-managed platform
- HiveManager NG - On-premises management
- ExtremeCloud IQ - Site Engine - Enterprise management
Prerequisites
In Aerohive/Extreme:
- Aerohive/Extreme access points with Hotspot 2.0 support
- HiveOS 10.x or later
- ExtremeCloud IQ account or HiveManager NG
In IronWifi Console (complete these first):
- Log in to IronWifi Management Console
- Navigate to Networks > select your network
- Enable Passpoint from dropdown
- Note configuration details:
- RADIUS Server IP
- RADIUS Secret
- Authentication Port: 1812
- Accounting Port: 1813
- NAI Realm:
ironwifi.com
ExtremeCloud IQ Configuration
Step 1: Configure RADIUS Server
- Log in to ExtremeCloud IQ (extremecloudiq.com)
- Navigate to Configure > Common Objects > Authentication
- Click RADIUS Server > Add
- Configure:
- Name: IronWifi-RADIUS
- Server IP/Hostname: Your IronWifi RADIUS IP
- Authentication Port: 1812
- Accounting Port: 1813
- Shared Secret: Your RADIUS secret
- Confirm Secret: Re-enter secret
- Click Save
Step 2: Create RADIUS Server Group
- Go to RADIUS Server Group > Add
- Configure:
- Name: IronWifi-Group
- Server Selection: By sequence
- Add IronWifi-RADIUS server to group
- Click Save
Step 3: Create AAA Profile
- Go to AAA Client Settings > Add
- Configure:
- Name: IronWifi-AAA
- RADIUS Server Group: IronWifi-Group
- Authentication Method: 802.1X
- Click Save
Step 4: Configure Hotspot 2.0 Profile
- Navigate to Configure > Common Objects > Wireless
- Click Hotspot 2.0 > Add
- Configure General Settings:
Network Information:
- Profile Name: IronWifi-Passpoint
- Internet Access: Yes
- Network Type: Free public network
- Authentication Type: Terms and conditions acceptance
Venue Information:
- Venue Group: Business
- Venue Type: Unspecified
- Venue Name: Your Location Name
Step 5: Configure Domain and Operator
In the same Hotspot 2.0 profile:
Domain Names:
ironwifi.net
openroaming.org
Operator Information:
- Friendly Name: IronWifi
- Language Code: eng
Step 6: Configure Roaming Consortium
Add Roaming Consortium OIs:
| OI | Description |
|---|---|
| 5A03BA0000 | OpenRoaming Settled |
| 004096 | OpenRoaming Settlement-Free |
| AA146B0000 | Cityroam (if applicable) |
Step 7: Configure NAI Realm
- In Hotspot 2.0 profile, find NAI Realm section
- Add realm configuration:
- Realm:
ironwifi.com - EAP Method: EAP-TTLS
- Inner Authentication: PAP, MSCHAPv2
- Credential Type: Username/Password
- Realm:
Step 8: Create Network Policy
- Navigate to Configure > Network Policies
- Click Add Network Policy
- Configure:
- Policy Name: Passpoint-Policy
- SSID: OpenRoaming (or your preferred name)
- SSID Broadcast: Enabled
Step 9: Configure SSID Security
In the Network Policy:
- Go to Wireless section
- Configure:
- Authentication: WPA2-Enterprise
- Key Management: 802.1X
- Encryption: AES-CCMP
Step 10: Assign Hotspot 2.0 Profile
- In Network Policy, find Hotspot 2.0 section
- Select IronWifi-Passpoint profile
- Enable Hotspot 2.0
Step 11: Deploy Configuration
- Navigate to Configure > Devices
- Select target access points
- Click Update Device > Upload and Activate
- Wait for configuration to apply
HiveManager NG Configuration
Configure RADIUS
- Log in to HiveManager NG
- Go to Configuration > Authentication > RADIUS Servers
- Click Add
- Configure:
- Name: IronWifi
- IP Address: IronWifi RADIUS IP
- Auth Port: 1812
- Accounting Port: 1813
- Shared Secret: Your secret
Configure Hotspot 2.0
- Go to Configuration > Wireless > Hotspot 2.0
- Click Add Profile
- Configure all Hotspot 2.0 settings similar to ExtremeCloud IQ
Create SSID Profile
- Go to Configuration > Wireless > SSIDs
- Create new SSID with:
- WPA2-Enterprise security
- RADIUS authentication
- Hotspot 2.0 profile assigned
CLI Configuration (Advanced)
For advanced users, use HiveOS CLI:
RADIUS Configuration
radius-server IronWifi
server-address 1.2.3.4
server-port 1812
accounting-port 1813
shared-secret encrypted your-secret-here
RADIUS Group
radius-server-group IronWifi-Group
member IronWifi
selection-method sequential
AAA Profile
aaa-profile IronWifi-AAA
radius-server-group IronWifi-Group
authentication-method dot1x
Hotspot 2.0 Profile
hotspot20-profile IronWifi-Passpoint
internet-access enable
network-type free-public
venue-group business
venue-type unspecified
domain-name ironwifi.net
domain-name openroaming.org
operator-name eng "IronWifi"
roaming-consortium-oi 5A03BA0000
roaming-consortium-oi 004096
nai-realm ironwifi.com
eap-method eap-ttls
inner-auth pap
inner-auth mschapv2
SSID Profile
ssid-profile Passpoint-SSID
ssid OpenRoaming
security wpa2-enterprise
aaa-profile IronWifi-AAA
hotspot20-profile IronWifi-Passpoint
Apply to Interface
interface wifi0
ssid-profile Passpoint-SSID
Verification
ExtremeCloud IQ
- Go to Monitor > Devices
- Select access point
- Check Wireless status
- Verify SSID is broadcasting
- Check client connections
Check Hotspot 2.0 Status
- Go to Monitor > Clients
- Filter by SSID
- Verify Passpoint client connections
CLI Verification
# Show RADIUS status
show radius-server-status
# Show Hotspot 2.0 config
show hotspot20-profile
# Show wireless status
show interface wifi0
# Show connected clients
show station
Test Connection
Device Requirements
- Passpoint-capable device (iOS 7+, Android 6+, Windows 10+)
- Passpoint profile installed or OpenRoaming profile
Connection Process
- Ensure device Passpoint is enabled
- Device discovers Passpoint network via ANQP
- Automatic connection based on credentials
- Verify in IronWifi Console > Logs
Troubleshooting
Network Not Discovered
- Verify Hotspot 2.0 enabled on SSID
- Check ANQP responses:
show hotspot20-anqp-stats - Verify beacon frames include Interworking IE
- Test with different client devices
Authentication Failures
-
Test RADIUS connectivity:
test radius server IronWifi username testuser -
Check RADIUS server status:
show radius-server-status -
Review authentication logs in ExtremeCloud IQ
-
Verify NAI realm matches IronWifi configuration
Connection Drops
- Check signal strength - Ensure adequate coverage
- Review AP logs for disconnection reasons
- Verify VLAN configuration - Ensure proper network access
- Check session timeout settings
Common Errors
| Error | Cause | Solution |
|---|---|---|
| RADIUS timeout | Network issue | Check firewall, verify IP |
| Auth rejected | Wrong credentials | Verify realm, check user |
| No ANQP response | HS2.0 disabled | Enable Hotspot 2.0 on SSID |
| Certificate error | TLS mismatch | Update AP firmware |
Best Practices
- Firmware Updates: Keep HiveOS updated for best Passpoint support
- Testing: Verify with multiple device types before production
- Monitoring: Use ExtremeCloud IQ dashboards for visibility
- Redundancy: Configure backup RADIUS servers
- Documentation: Record all configuration settings
- Security: Use strong RADIUS secrets, enable accounting