WatchGuard Configuration
WatchGuard WiFi Cloud, WatchGuard Cloud-managed WiFi 6 access points, and Firebox wireless authenticate WiFi clients against IronWiFi cloud RADIUS using WPA2-Enterprise (802.1X), with an optional external captive portal (External Splash Page) for guest networks. RADIUS and splash page settings are applied per SSID profile in WatchGuard WiFi Cloud or WatchGuard Cloud.
Supported Platforms
- WatchGuard WiFi Cloud - Cloud-managed access points (AP120, AP125, AP225W, AP320, AP322, AP325, AP327X, AP420)
- WatchGuard WiFi 6 in WatchGuard Cloud - AP130, AP230W, AP330, AP430CR, AP432
- WatchGuard Firebox - With wireless capabilities
- WatchGuard AP - Standalone access points
Prerequisites
In IronWiFi Console (complete these first):
- Log in to IronWiFi Management Console
- Navigate to Networks
- Click Create Network or select existing
- Note RADIUS details:
- RADIUS Server IP
- Authentication Port: Customer Authentication Port
- Accounting Port: Customer Accounting Port
- Shared Secret
- Navigate to Captive Portals
- Click Create Captive Portal
- Configure:
- Network: Select your network
- Vendor: WatchGuard or Generic
- Note the Splash Page URL
- Copy the Walled Garden domains
In WatchGuard:
- WatchGuard WiFi Cloud or WatchGuard Cloud account
- Compatible WatchGuard access points or Firebox device
- Administrative access to management portal
- Network connectivity to IronWiFi RADIUS servers
WiFi Cloud Configuration
Access WiFi Cloud
- Log in to WatchGuard WiFi Cloud portal
- Navigate to your organization and site
- Select Configure > WiFi
Configure RADIUS Settings
-
Go to Configure > WiFi > RADIUS
-
Click Add RADIUS Server
-
Configure Authentication Server:
- Name: IronWiFi-Auth
- IP Address: Your IronWiFi RADIUS IP
- Port: Customer Authentication Port
- Shared Secret: Your RADIUS secret
- Confirm Secret: Re-enter secret
-
Configure Accounting Server:
- Name: IronWiFi-Acct
- IP Address: Same as authentication
- Port: Customer Accounting Port
- Shared Secret: Same secret
-
Click Save
Create SSID with External Captive Portal
-
Go to Configure > WiFi > SSIDs
-
Click Add SSID
-
Configure Basic Settings:
- SSID Name: Guest WiFi
- Security Mode: Open
- VLAN: Configure as needed
-
Configure Captive Portal:
- Splash Page Type: Third-Party Hosted with RADIUS
- Portal URL: Your IronWiFi Splash Page URL
- Portal Shared Secret: Portal secret from IronWiFi
- RADIUS Server: IronWiFi-Auth
- Accounting Server: IronWiFi-Acct
- Accounting Interval: 5 minutes
-
Configure Redirect Settings:
- Success Redirect: Original URL or custom page
- Session Timeout: As configured in IronWiFi
-
Click Save
Configure Walled Garden
- In SSID settings, find Walled Garden section
- Add IronWiFi domains:
Required for IronWiFi:
Authentication Provider Domains:
If using social login providers, add the following domains to your walled garden:
| Provider | Required Entries |
|---|---|
| |
| |
| |
| |
| Microsoft | |
- Click Save
Create WPA2-Enterprise SSID
-
Go to Configure > WiFi > SSIDs
-
Click Add SSID
-
Configure:
- SSID Name: Secure WiFi
- Security Mode: WPA2-Enterprise
- RADIUS Server: IronWiFi-Auth
- Accounting Server: IronWiFi-Acct
-
Click Save
WatchGuard Cloud (WiFi 6) Configuration
For WiFi 6 access points managed through WatchGuard Cloud:
Configure Authentication
- Log in to WatchGuard Cloud
- Navigate to Configure > Devices > Access Points
- Select your site
- Go to Authentication > RADIUS Servers
Add RADIUS Server
-
Click Add
-
Configure:
- Name: IronWiFi
- Server Address: IronWiFi RADIUS IP
- Authentication Port: Customer Authentication Port
- Accounting Port: Customer Accounting Port
- Shared Secret: Your secret
-
Click Save
Configure SSID
- Go to SSIDs
- Create or edit SSID
- Configure security and captive portal as needed
- Assign RADIUS server
Firebox Wireless Configuration
Access Firebox
- Log in to Firebox System Manager or Web UI
- Navigate to wireless settings
Configure RADIUS
- Go to Setup > Authentication > Servers
- Click Add
- Configure:
- Server Type: RADIUS
- Name: IronWiFi
- IP Address: IronWiFi RADIUS IP
- Auth Port: Customer Authentication Port
- Acct Port: Customer Accounting Port
- Shared Secret: Your secret
Configure Wireless Guest Network
- Go to Network > Wireless
- Create or edit wireless network
- Configure:
- SSID: Guest WiFi
- Security: Open with Captive Portal
- Authentication Server: IronWiFi
Password Encoding for Captive Portal
WatchGuard uses a specific password encoding process for external captive portals:
- Convert the parameter from hex to bytes
challenge - Generate key using MD5 of the portal shared secret
- XOR the password with the repeated key
- Convert result to hexadecimal
- Append encoded password to login URL
IronWiFi handles this encoding automatically when configured with WatchGuard vendor.
Configuration Summary
RADIUS Settings
| Setting | Value |
|---|---|
| Server IP | IronWiFi RADIUS IP |
| Auth Port | |
| Acct Port | |
| Secret | Your shared secret |
| Timeout | 5 seconds |
Captive Portal Settings
| Setting | Value |
|---|---|
| Portal Type | Third-Party Hosted with RADIUS |
| Portal URL | IronWiFi Splash Page URL |
| Portal Secret | From IronWiFi Console |
Walled Garden
| Domain/IP |
|---|
| 107.178.250.42 |
| *.ironwifi.com |
| *.ironwifi.net |
Verification
Check AP Status
- In WiFi Cloud, go to Monitor > Access Points
- Verify APs are online
- Check configuration sync status
Check RADIUS Connectivity
- Go to Monitor > Events
- Filter for authentication events
- Look for successful RADIUS responses
Test Guest Portal
- Connect device to guest SSID
- Open browser - should redirect to splash page
- Complete authentication
- Verify in IronWiFi Console logs
Troubleshooting
| Issue | Possible Cause | Solution |
|---|---|---|
| RADIUS timeout | Network connectivity issue | Verify AP can reach IronWiFi RADIUS; check firewall rules allow outbound UDP |
| Authentication rejected | Wrong shared secret | Verify shared secret matches exactly (case-sensitive) in both IronWiFi Console and WatchGuard configuration |
| Portal not redirecting | Portal disabled or URL wrong | Verify captive portal is enabled on SSID; check portal URL is correct; ensure DNS is working for clients; verify walled garden includes portal domain |
| Authentication fails after portal | Portal secret mismatch or encoding issue | Check portal shared secret matches; verify password encoding is correct; review RADIUS response in logs |
| Social login not working | Missing provider domains | Add all social provider domains to walled garden; verify OAuth is configured in IronWiFi |
| SSL error | Certificate issue | Install valid SSL certificate on AP/controller; add authentication provider domains to walled garden |
| Encoding error | Wrong portal secret | Verify portal shared secret matches in both systems |
Additional Troubleshooting Steps
-
Verify RADIUS Configuration
- Check server IP address is correct
- Verify shared secret matches exactly (case-sensitive)
- Ensure ports /
{AUTH_PORT}are correct{ACCT_PORT}
-
Check Network Connectivity
- Verify AP can reach IronWiFi RADIUS
- Check firewall rules allow outbound UDP /
{AUTH_PORT}{ACCT_PORT} - Test connectivity from WiFi Cloud diagnostics
-
Review Logs
- Check WiFi Cloud event logs
- Review IronWiFi authentication logs
- Look for timeout or rejection messages
-
SSL Certificate Issues
- Install a valid SSL certificate on your AP/controller to avoid authentication issues with HTTPS portals
Best Practices
- Use Strong Secrets: Generate complex RADIUS and portal shared secrets
- Enable Accounting: Track usage and session data
- Configure Timeouts: Set appropriate session and idle timeouts
- Monitor Regularly: Check WiFi Cloud dashboard for issues
- Firmware Updates: Keep APs updated for security and compatibility
- Test Changes: Verify configuration in lab before production
- SSL Certificates: Install valid certificates to avoid client warnings
Related Topics
Shared configuration
Was this page helpful?