Proxim Wireless Configuration
This vendor's wireless products have been discontinued or are no longer widely deployed. This guide is maintained for reference but may not reflect current firmware versions. For modern alternatives, see our Configuration Guides.
This guide explains how to configure Proxim Wireless access points and controllers to work with IronWiFi for RADIUS authentication and captive portal.
Overview
Proxim Wireless (now part of ADTRAN) provides enterprise wireless solutions including:
- ORiNOCO Access Points - Enterprise-grade APs
- ProximVision - Centralized management platform
- Tsunami - Point-to-point/multipoint bridges
Prerequisites
In IronWiFi Console (complete these first):
- Log in to IronWiFi Management Console
- Navigate to Networks
- Click Create Network or select existing
- Note RADIUS details:
- RADIUS Server IP
- Authentication Port: Customer Authentication Port
- Accounting Port: Customer Accounting Port
- Shared Secret
- Navigate to Captive Portals
- Click Create Captive Portal
- Configure:
- Network: Select your network
- Vendor: Generic or Proxim
- Note the Splash Page URL
- Copy the Walled Garden domains
In Proxim Wireless:
- Proxim Wireless access point or controller
- Administrative access to device or ProximVision management platform
- Network connectivity to IronWiFi RADIUS servers
ORiNOCO Access Point Configuration
Access Web Interface
- Connect to the AP network or via Ethernet
- Open browser and navigate to AP management IP
- Log in with admin credentials
Configure RADIUS Server
-
Navigate to Security > RADIUS
-
Click Add Server or edit existing
-
Configure Authentication Server:
- Server Name: IronWiFi
- IP Address: Your IronWiFi RADIUS IP
- Port: Customer Authentication Port
- Shared Secret: Your RADIUS secret
- Timeout: 5 seconds
- Retries: 3
-
Configure Accounting Server:
- IP Address: Same as authentication
- Port: Customer Accounting Port
- Shared Secret: Same secret
-
Click Apply
Create Enterprise WLAN
-
Navigate to Wireless > SSIDs
-
Click Add SSID
-
Configure Basic Settings:
- SSID Name: Your network name
- SSID Broadcast: Enabled
-
Configure Security:
- Security Mode: WPA2-Enterprise
- Authentication: 802.1X
- RADIUS Server: IronWiFi
- Encryption: AES
-
Click Apply
Configure Guest WLAN with Captive Portal
-
Navigate to Wireless > SSIDs
-
Click Add SSID
-
Configure Basic Settings:
- SSID Name: Guest WiFi
- SSID Broadcast: Enabled
-
Configure Security:
- Security Mode: Open (or WPA2-Personal)
- Captive Portal: Enable
-
Configure Captive Portal:
- Portal Type: External
- External URL: Your IronWiFi Splash Page URL
- Authentication: RADIUS
- RADIUS Server: IronWiFi
-
Click Apply
Configure Walled Garden
- Navigate to Security > Captive Portal or Access Control
- Find Walled Garden or Pre-Authentication Access List
- Add IronWiFi domains:
Required for IronWiFi:
Authentication Provider Domains:
If using social login providers, add the following domains to your walled garden:
| Provider | Required Entries |
|---|---|
| |
| |
| |
| |
| Microsoft | |
- Click Apply
ProximVision Configuration
Access ProximVision
- Log in to ProximVision management console
- Navigate to your network/site
Configure RADIUS Profile
-
Go to Configuration > Security > RADIUS
-
Click Add Profile
-
Configure:
- Profile Name: IronWiFi-RADIUS
- Primary Server IP: IronWiFi RADIUS IP
- Primary Port: Customer Authentication Port
- Primary Secret: Your shared secret
- Accounting Server: Same IP, port
{ACCT_PORT}
-
Click Save
Create WLAN Template
- Go to Configuration > Wireless > WLAN Templates
- Click Create Template
- Configure SSID and security settings
- Assign RADIUS profile
- Deploy to access points
Deploy Configuration
- Select target access points
- Click Deploy or Push Configuration
- Wait for configuration sync
CLI Configuration
For advanced users, access AP via SSH/Telnet:
Configure RADIUS
Configure WLAN
Configure Captive Portal
Configuration Summary
RADIUS Settings
| Setting | Value |
|---|---|
| Server IP | IronWiFi RADIUS IP |
| Auth Port | |
| Acct Port | |
| Secret | Your shared secret |
| Timeout | 5 seconds |
Enterprise WLAN
| Setting | Value |
|---|---|
| Security | WPA2-Enterprise |
| Authentication | 802.1X |
| RADIUS | IronWiFi |
Guest WLAN
| Setting | Value |
|---|---|
| Portal Type | External |
| Portal URL | IronWiFi Splash Page |
| Authentication | RADIUS |
Verification
Check AP Status
- Navigate to Status > System
- Verify AP is operational
- Check WLAN status
Check RADIUS Connectivity
- Navigate to Status > RADIUS or Security
- Verify server status
- Check for connectivity errors
Test Authentication
- Connect client to configured SSID
- For Enterprise: Enter credentials
- For Guest: Complete captive portal
- Verify in IronWiFi Console logs
Troubleshooting
| Issue | Possible Cause | Solution |
|---|---|---|
| RADIUS timeout | Network connectivity issue | Verify AP can reach IronWiFi RADIUS; check firewall rules allow UDP ports |
| Authentication rejected | Wrong shared secret | Verify shared secret matches exactly in both IronWiFi Console and device configuration |
| Portal not redirecting | Portal disabled or URL wrong | Verify captive portal is enabled; check external URL is correct; ensure DNS resolution works |
| Cannot complete authentication | Missing walled garden entries | Verify walled garden includes all required domains; check RADIUS communication |
| SSL error | Certificate issue | Add authentication provider domains to walled garden |
Additional Troubleshooting Steps
-
Verify RADIUS Configuration
- Check server IP is correct
- Verify shared secret matches exactly
- Ensure ports /
{AUTH_PORT}are correct{ACCT_PORT}
-
Check Network Connectivity
- Verify AP can reach IronWiFi RADIUS
- Check firewall rules
- Test with ping/traceroute
-
Review Logs
- Check AP system logs
- Review IronWiFi authentication logs
-
Captive Portal Issues
- Clear browser cache and retry
- Test with different devices/browsers
Best Practices
- Firmware Updates: Keep AP firmware current
- Strong Secrets: Use complex RADIUS shared secrets
- Monitoring: Check AP status regularly
- Backup Config: Save configuration before changes
- Documentation: Record all settings
- Testing: Verify changes before production
Related Topics
Shared configuration
Was this page helpful?