Cisco Meraki - Passpoint Configuration
Configure Passpoint (Hotspot 2.0) on Cisco Meraki MR access points to enable automatic WiFi authentication through IronWifi's cloud RADIUS service. This provides seamless WPA2/WPA3-Enterprise connections without manual network selection or splash pages.
Prerequisites
- Meraki MR series access points
- Meraki Dashboard access with appropriate permissions
- Enterprise license for Hotspot 2.0 features
- IronWifi account with Passpoint enabled
Supported Hardware
Passpoint is supported on:
- Meraki MR series access points (MR20, MR33, MR42, MR46, MR52, MR56, etc.)
- Meraki MX with integrated wireless (limited support)
IronWifi Console Setup
- Log in to IronWifi Management Console
- Go to Networks > select your network
- Enable Passpoint
- Configure Passpoint settings:
- Realm: Your authentication realm
- Domain Name:
ironwifi.net - Operator Name: Your organization
- Note RADIUS server details
Meraki Dashboard Configuration
Step 1: Configure RADIUS
- Log in to Meraki Dashboard
- Navigate to Wireless > Configure > Access Control
- Select your SSID (or create new)
- Under RADIUS servers, add:
- Host: IronWifi RADIUS IP
- Port: 1812
- Secret: Your RADIUS shared secret
- Enable RADIUS accounting
- Add accounting server with port 1813
Step 2: Create Hotspot 2.0 SSID
- Go to Wireless > Configure > SSIDs
- Enable an SSID and configure:
- Name: Your Passpoint network name
- Association requirements: Enterprise with my RADIUS server
Step 3: Enable Hotspot 2.0
- In the SSID configuration, find Hotspot 2.0
- Enable Hotspot 2.0
- Configure:
General Settings
- Access Network Type: Public network with fee
- Internet: Available
- Authentication Type: Online signup supported
Venue Information
- Venue Group: Business
- Venue Type: Unspecified Business
Operator Information
- Operator Name: Your organization name
- Domain Name:
ironwifi.net
Roaming Consortium
Add OIs:
5A03BA0000
004096
NAI Realms
- Realm:
ironwifi.com - EAP Method: EAP-TTLS with PAP/MSCHAPv2
- EAP Method: EAP-TLS
- Click Save Changes
API Configuration
For programmatic configuration via Meraki API:
import requests
api_key = "YOUR_MERAKI_API_KEY"
network_id = "YOUR_NETWORK_ID"
headers = {
"X-Cisco-Meraki-API-Key": api_key,
"Content-Type": "application/json"
}
# Configure SSID with Hotspot 2.0
ssid_config = {
"name": "Passpoint-Network",
"enabled": True,
"authMode": "8021x-radius",
"radiusServers": [
{
"host": "us-east1.ironwifi.com",
"port": 1812,
"secret": "your-secret"
}
],
"radiusAccountingEnabled": True,
"dot11r": {
"enabled": True
}
}
response = requests.put(
f"https://api.meraki.com/api/v1/networks/{network_id}/wireless/ssids/0",
headers=headers,
json=ssid_config
)
OpenRoaming Configuration
Enable OpenRoaming
- In Hotspot 2.0 settings, add OpenRoaming consortium OIs
- Configure NAI realm for OpenRoaming
- Enable OpenRoaming in IronWifi console
Cisco OpenID Integration
Meraki supports Cisco OpenID for OpenRoaming:
- Go to Wireless > Configure > Hotspot 2.0
- Enable Cisco OpenRoaming
- This automatically configures:
- Cisco consortium OIs
- Default NAI realms
- RADIUS proxy settings
Testing
Verify Configuration
In Meraki Dashboard:
- Go to Wireless > Monitor > Clients
- Look for Passpoint-authenticated clients
- Check client details for authentication method
Client Testing
iOS:
- Install Passpoint profile
- Observe automatic connection
- Verify in Settings > Wi-Fi
Android:
- Enable Wi-Fi
- Device should auto-discover network
- Check Wi-Fi connection details
Troubleshooting Tools
In Meraki Dashboard:
- Wireless > Monitor > Event Log - Authentication events
- Wireless > Monitor > Clients - Client details
- Organization > Monitor > Summary - Overall health
Troubleshooting
Passpoint Network Not Visible
- Verify Hotspot 2.0 is enabled
- Check AP firmware is current
- Ensure client supports Passpoint
- Verify SSID is not hidden
Authentication Failures
- Check RADIUS server connectivity (Dashboard > RADIUS test)
- Verify shared secret
- Review IronWifi authentication logs
- Check NAI realm configuration
Intermittent Connections
- Check for coverage gaps
- Review channel utilization
- Verify RADIUS timeout settings
- Check for firmware updates
OpenRoaming Not Working
- Verify consortium OIs are correct
- Check OpenRoaming is enabled in IronWifi
- Ensure client has valid OpenRoaming credentials
- Review roaming logs
Best Practices
- Use dedicated SSID - Separate Passpoint from regular WPA2-PSK networks
- Enable 802.11r - Improves roaming performance
- Test with multiple devices - iOS, Android, Windows
- Monitor authentication logs - Track success rates
- Keep firmware updated - Latest AP firmware