Migration Guide
This guide walks you through migrating from an existing RADIUS solution to IronWiFi. Whether you are moving from Cisco ISE, FreeRADIUS, Microsoft NPS, or another RADIUS server, the process follows the same pattern: export your current data, set up IronWiFi, import users, test in parallel, and cut over.
Migration Overview
Typical migration timeline:
| Phase | Duration | Activities |
|---|---|---|
| Assessment | 1-2 days | Document current setup, export data |
| IronWiFi setup | 1-2 days | Create Networks, configure policies |
| User import | 1 day | Import users, verify attributes |
| Parallel testing | 3-7 days | Run both systems, validate |
| Cutover | 1-2 hours | Switch access points to IronWiFi |
Phase 1: Assess Your Current Environment
Before migrating, document what you have today.
Inventory checklist
Gather this information from your current RADIUS deployment:
- User accounts -- Total count, usernames, email addresses, group memberships
- Authentication methods -- PEAP-MSCHAPv2, EAP-TLS, PAP, MAC auth, etc.
- RADIUS policies -- Bandwidth limits, session timeouts, VLAN assignments, time restrictions
- Network equipment -- Access point models, controllers, switch configurations
- Certificates -- CA certificates, server certificates, client certificates (for EAP-TLS)
- Identity provider integrations -- Active Directory, LDAP, Azure AD, Okta
- Captive portals -- Splash pages, customizations, authentication providers
- Accounting/reporting -- Data retention requirements, compliance needs
Export your user data
From Cisco ISE
Export users from Cisco ISE's internal identity store:
- Navigate to Administration > Identity Management > Identities > Users
- Click Export to download the user list as CSV
- Note group memberships under Identity Groups
- Document authorization policies under Policy > Policy Sets
Key fields to capture:
From FreeRADIUS
Export users from the FreeRADIUS database:
From Microsoft NPS
Export NPS configuration and user data:
- Open Network Policy Server console
- Right-click NPS (Local) > Export Configuration to save as XML
- For user accounts stored in Active Directory, export with PowerShell:
- Document Network Policies under Policies > Network Policies -- note conditions, constraints, and RADIUS attributes for each policy
Map your policies
Create a mapping table between your current RADIUS policies and IronWiFi equivalents:
| Current Policy | Current Setting | IronWiFi Equivalent |
|---|---|---|
| Bandwidth limit | | Group reply attribute: |
| Session timeout | | Group reply attribute: |
| VLAN assignment | | Group reply attributes: |
| Time restriction | | User check attribute: |
| Concurrent sessions | | User check attribute: |
IronWiFi uses standard RADIUS attributes, so most policies translate directly. See Attributes for the complete attribute reference.
Phase 2: Set Up IronWiFi
Create your account and Networks
- Register at console.ironwifi.com/register
- Create a Network for each region where you have access points
- Note the RADIUS server IPs, ports, and shared secret for each Network
See the Quick Start Guide for detailed setup instructions.
Configure Groups and Policies
Recreate your existing policies as IronWiFi Groups:
- Navigate to Users > Groups
- Create groups matching your current policy structure
- Add the corresponding RADIUS attributes to each group
Example: Recreating a "Standard Employee" policy:
- Create a group named "Standard Employee"
- Add reply attributes:
- (8-hour session limit)
Session-Timeout := 28800 - (10 Mbps download)
WISPr-Bandwidth-Max-Down := 10000000 - (5 Mbps upload)
WISPr-Bandwidth-Max-Up := 5000000 Tunnel-Type := VLANTunnel-Medium-Type := IEEE-802Tunnel-Private-Group-ID := 100
See Groups for complete configuration options.
Set Up Identity Provider Integration
If your current RADIUS server authenticates against an external identity provider, configure the equivalent in IronWiFi:
| Current Integration | IronWiFi Solution |
|---|---|
| Active Directory (on-premises) | Connector for AD sync |
| Microsoft Entra ID (Azure AD) | SCIM provisioning or Connector |
| Google Workspace | Connector for Google sync |
| Okta | SCIM provisioning or Connector |
| LDAP | Connector for LDAP sync |
If you currently authenticate against Active Directory using PEAP-MSCHAPv2, you can continue the same authentication flow with IronWiFi. Set up a Connector to sync AD users, and they will authenticate with their existing AD credentials.
Configure Captive Portals (if applicable)
If you are migrating a guest WiFi deployment with a captive portal:
- Navigate to Captive Portals in the IronWiFi Console
- Create a new captive portal linked to your Network
- Configure authentication methods (email, social login, vouchers)
- Customize the splash page to match your current branding
- Note the splash page URL and walled garden settings
See the Quick Start Guide for captive portal setup.
Phase 3: Import Users
Preparing your user data
Format your exported user data into a CSV file with these columns:
If your current system stores only password hashes (NT-Password, MD5, etc.), you cannot migrate the plaintext passwords. Users will need to set new passwords, or you should connect IronWiFi to the same identity provider (AD, LDAP) so passwords continue to work.
Importing via the Console
For smaller deployments (under 100 users):
- Navigate to Users
- Click Add User for each user
- Enter username, email, and password
- Assign the appropriate group
- Click Save
Importing via the API
For larger deployments, use the REST API to automate user creation:
Example batch import script:
The API has a rate limit of 100 requests per minute. Add a brief delay between requests for large imports. See Rate Limiting for details.
Using Identity Provider Sync
If you are connecting to an identity provider instead of importing users manually, the sync handles user creation automatically:
- Configure the Connector or SCIM provisioning
- Run the initial sync
- Verify users appear in the IronWiFi Console
- Assign groups to synced users
Phase 4: Parallel Testing
Run IronWiFi alongside your existing RADIUS server before cutting over. This lets you validate that authentication works correctly without disrupting production.
Test strategy
- Reconfigure a test access point to point to IronWiFi's RADIUS servers
- Connect test devices and verify:
- Authentication succeeds with correct credentials
- Authentication fails with incorrect credentials
- VLAN assignment works correctly
- Bandwidth limits are applied
- Session timeouts behave as expected
- Captive portal redirects work (if applicable)
- Compare results between IronWiFi and your current system
Validation checklist
| Test | Expected Result | Pass? |
|---|---|---|
| Valid user authenticates | Access-Accept | |
| Invalid password rejected | Access-Reject | |
| Disabled user rejected | Access-Reject | |
| VLAN assigned correctly | Correct | |
| Bandwidth limit applied | Rate limiting active after authentication | |
| Session timeout enforced | Session ends after configured duration | |
| Accounting data recorded | Sessions appear in IronWiFi Reports | |
| Captive portal redirects | Splash page loads correctly | |
| EAP-TLS with client cert | Certificate authentication succeeds |
Extending the parallel run
If initial tests pass, expand gradually:
- Add more access points to IronWiFi over several days
- Monitor Reports for unexpected rejections
- Set up monitoring for the IronWiFi RADIUS servers
- Keep your old RADIUS server running as a fallback
Phase 5: Cutover
Pre-cutover checklist
- All users imported or synced to IronWiFi
- Groups and policies recreated and tested
- Parallel testing completed successfully for at least 3 days
- Monitoring configured for IronWiFi RADIUS servers
- Rollback plan documented (old RADIUS server details saved)
- Maintenance window communicated to users
Cutover procedure
- Schedule during low-usage hours -- Early morning or weekend
- Reconfigure all access points to use IronWiFi RADIUS servers:
- Update Primary RADIUS server IP and port
- Update Backup RADIUS server IP and port
- Update shared secret
- Keep accounting configuration updated too
- Verify authentication -- Connect a test device from each location
- Monitor reports -- Watch for rejections in the IronWiFi Console for the first hour
- Confirm success -- All users connecting without issues
Rollback plan
If critical issues arise during cutover:
- Revert access point RADIUS settings to the old server
- Investigate failures in IronWiFi authentication reports
- Resolve the issue and schedule another cutover attempt
Keep your old RADIUS server running and accessible for at least 2 weeks after cutover. This gives you a fast rollback option while you validate the new setup in production.
Source-Specific Notes
Migrating from Cisco ISE
- ISE authorization policies map to IronWiFi Groups with reply attributes
- ISE identity groups map to IronWiFi Groups
- ISE profiling policies (device type detection) can be replicated using MAC-based attributes
- ISE guest portals map to IronWiFi Captive Portals
- ISE posture assessment is not available in IronWiFi -- evaluate whether you need it
Migrating from FreeRADIUS
- FreeRADIUS and
radchecktables map directly to IronWiFi user check and reply attributesradreply - FreeRADIUS and
radgroupcheckmap to IronWiFi Group attributesradgroupreply - Custom FreeRADIUS modules (e.g., ,
rlm_python) need to be replaced with IronWiFi API integrations or webhooksrlm_perl - FreeRADIUS policies need to be recreated as IronWiFi attribute-based rules
unlang
Migrating from Microsoft NPS
- NPS Network Policies map to IronWiFi Groups
- NPS Connection Request Policies are handled automatically by IronWiFi's RADIUS infrastructure
- If NPS authenticates against Active Directory, set up an IronWiFi Connector for AD sync
- NPS RADIUS client configurations (access points) need to be updated to point to IronWiFi
- NPS accounting logs are replaced by IronWiFi Reports
Post-Migration Tasks
After a successful cutover:
- Monitor closely for 2 weeks -- Check authentication reports daily for unexpected rejections
- Update documentation -- Record IronWiFi RADIUS server details in your network documentation
- Set up long-term monitoring -- Configure monitoring and alerting
- Decommission old server -- After 2-4 weeks of stable operation, decommission the old RADIUS server
- Train your team -- Ensure network administrators know how to manage users and policies in the IronWiFi Console
Related Topics
- Quick Start Guide -- Initial IronWiFi setup
- Deployment Planning -- Architecture and capacity planning
- Networks -- RADIUS server configuration
- Groups -- Access policies and attributes
- Connectors -- Identity provider integration
- REST API -- Programmatic user management
- Configuration Guides -- AP-specific setup instructions
Was this page helpful?