Skip to main contentSkip to search
Skip to main content

Proxim Wireless Configuration

Legacy Hardware

This vendor's wireless products have been discontinued or are no longer widely deployed. This guide is maintained for reference but may not reflect current firmware versions. For modern alternatives, see our Configuration Guides.

This guide explains how to configure Proxim Wireless access points and controllers to work with IronWiFi for RADIUS authentication and captive portal.

Overview

Proxim Wireless (now part of ADTRAN) provides enterprise wireless solutions including:

  • ORiNOCO Access Points - Enterprise-grade APs
  • ProximVision - Centralized management platform
  • Tsunami - Point-to-point/multipoint bridges

Prerequisites

In IronWiFi Console (complete these first):

  1. Log in to IronWiFi Management Console
  2. Navigate to Networks
  3. Click Create Network or select existing
  4. Note RADIUS details:
    • RADIUS Server IP
    • Authentication Port: Customer Authentication Port
    • Accounting Port: Customer Accounting Port
    • Shared Secret
  5. Navigate to Captive Portals
  6. Click Create Captive Portal
  7. Configure:
    • Network: Select your network
    • Vendor: Generic or Proxim
  8. Note the Splash Page URL
  9. Copy the Walled Garden domains

In Proxim Wireless:

  • Proxim Wireless access point or controller
  • Administrative access to device or ProximVision management platform
  • Network connectivity to IronWiFi RADIUS servers

ORiNOCO Access Point Configuration

Access Web Interface

  1. Connect to the AP network or via Ethernet
  2. Open browser and navigate to AP management IP
  3. Log in with admin credentials

Configure RADIUS Server

  1. Navigate to Security > RADIUS

  2. Click Add Server or edit existing

  3. Configure Authentication Server:

    • Server Name: IronWiFi
    • IP Address: Your IronWiFi RADIUS IP
    • Port: Customer Authentication Port
    • Shared Secret: Your RADIUS secret
    • Timeout: 5 seconds
    • Retries: 3
  4. Configure Accounting Server:

    • IP Address: Same as authentication
    • Port: Customer Accounting Port
    • Shared Secret: Same secret
  5. Click Apply

Create Enterprise WLAN

  1. Navigate to Wireless > SSIDs

  2. Click Add SSID

  3. Configure Basic Settings:

    • SSID Name: Your network name
    • SSID Broadcast: Enabled
  4. Configure Security:

    • Security Mode: WPA2-Enterprise
    • Authentication: 802.1X
    • RADIUS Server: IronWiFi
    • Encryption: AES
  5. Click Apply

Configure Guest WLAN with Captive Portal

  1. Navigate to Wireless > SSIDs

  2. Click Add SSID

  3. Configure Basic Settings:

    • SSID Name: Guest WiFi
    • SSID Broadcast: Enabled
  4. Configure Security:

    • Security Mode: Open (or WPA2-Personal)
    • Captive Portal: Enable
  5. Configure Captive Portal:

    • Portal Type: External
    • External URL: Your IronWiFi Splash Page URL
    • Authentication: RADIUS
    • RADIUS Server: IronWiFi
  6. Click Apply

Configure Walled Garden

  1. Navigate to Security > Captive Portal or Access Control
  2. Find Walled Garden or Pre-Authentication Access List
  3. Add IronWiFi domains:

Required for IronWiFi:

Authentication Provider Domains:

If using social login providers, add the following domains to your walled garden:

ProviderRequired Entries
Google
*.google.com
,
*.googleapis.com
,
*.gstatic.com
,
accounts.google.com
Facebook
*.facebook.com
,
*.fbcdn.net
,
connect.facebook.net
,
facebook.com
Twitter
*.twitter.com
,
*.twimg.com
,
twitter.com
LinkedIn
*.linkedin.com
,
*.licdn.com
Microsoft
*.microsoft.com
,
*.microsoftonline.com
,
*.live.com
,
login.live.com
  1. Click Apply

ProximVision Configuration

Access ProximVision

  1. Log in to ProximVision management console
  2. Navigate to your network/site

Configure RADIUS Profile

  1. Go to Configuration > Security > RADIUS

  2. Click Add Profile

  3. Configure:

    • Profile Name: IronWiFi-RADIUS
    • Primary Server IP: IronWiFi RADIUS IP
    • Primary Port: Customer Authentication Port
    • Primary Secret: Your shared secret
    • Accounting Server: Same IP, port
      {ACCT_PORT}
  4. Click Save

Create WLAN Template

  1. Go to Configuration > Wireless > WLAN Templates
  2. Click Create Template
  3. Configure SSID and security settings
  4. Assign RADIUS profile
  5. Deploy to access points

Deploy Configuration

  1. Select target access points
  2. Click Deploy or Push Configuration
  3. Wait for configuration sync

CLI Configuration

For advanced users, access AP via SSH/Telnet:

Configure RADIUS

Configure WLAN

Configure Captive Portal


Configuration Summary

RADIUS Settings

SettingValue
Server IPIronWiFi RADIUS IP
Auth Port
{AUTH_PORT}
Acct Port
{ACCT_PORT}
SecretYour shared secret
Timeout5 seconds

Enterprise WLAN

SettingValue
SecurityWPA2-Enterprise
Authentication802.1X
RADIUSIronWiFi

Guest WLAN

SettingValue
Portal TypeExternal
Portal URLIronWiFi Splash Page
AuthenticationRADIUS

Verification

Check AP Status

  1. Navigate to Status > System
  2. Verify AP is operational
  3. Check WLAN status

Check RADIUS Connectivity

  1. Navigate to Status > RADIUS or Security
  2. Verify server status
  3. Check for connectivity errors

Test Authentication

  1. Connect client to configured SSID
  2. For Enterprise: Enter credentials
  3. For Guest: Complete captive portal
  4. Verify in IronWiFi Console logs

Troubleshooting

IssuePossible CauseSolution
RADIUS timeoutNetwork connectivity issueVerify AP can reach IronWiFi RADIUS; check firewall rules allow UDP ports
{AUTH_PORT}
/
{ACCT_PORT}
; test with ping/traceroute
Authentication rejectedWrong shared secretVerify shared secret matches exactly in both IronWiFi Console and device configuration
Portal not redirectingPortal disabled or URL wrongVerify captive portal is enabled; check external URL is correct; ensure DNS resolution works
Cannot complete authenticationMissing walled garden entriesVerify walled garden includes all required domains; check RADIUS communication
SSL errorCertificate issueAdd authentication provider domains to walled garden

Additional Troubleshooting Steps

  1. Verify RADIUS Configuration

    • Check server IP is correct
    • Verify shared secret matches exactly
    • Ensure ports
      {AUTH_PORT}
      /
      {ACCT_PORT}
      are correct
  2. Check Network Connectivity

    • Verify AP can reach IronWiFi RADIUS
    • Check firewall rules
    • Test with ping/traceroute
  3. Review Logs

    • Check AP system logs
    • Review IronWiFi authentication logs
  4. Captive Portal Issues

    • Clear browser cache and retry
    • Test with different devices/browsers

Best Practices

  1. Firmware Updates: Keep AP firmware current
  2. Strong Secrets: Use complex RADIUS shared secrets
  3. Monitoring: Check AP status regularly
  4. Backup Config: Save configuration before changes
  5. Documentation: Record all settings
  6. Testing: Verify changes before production

Shared configuration

Was this page helpful?