Skip to main content
Skip to main content

Quick Start: WPA2/WPA3-Enterprise

Deploy secure enterprise WiFi with 802.1X authentication using IronWiFi as your cloud RADIUS server. This guide gets you from zero to a working WPA2-Enterprise or WPA3-Enterprise network in under 30 minutes.

What You'll Build

802.1X authentication flow:

  1. User connects to the SSID and enters credentials (or presents a certificate)
  2. The access point forwards the credentials to IronWiFi's RADIUS server
  3. IronWiFi verifies the credentials and returns Accept or Reject
  4. On Accept, the access point grants network access (optionally assigning a VLAN)

Prerequisites

  • An IronWiFi account (register here)
  • Access points or a wireless controller that supports WPA2-Enterprise (802.1X)
  • Administrative access to your network equipment
  • Client devices (Windows, macOS, iOS, Android, ChromeOS)

Step 1: Create a Network (~2 min)

  1. Log in to the IronWiFi Console
  2. Navigate to Networks
  3. Click Create Network
  4. Select a Region closest to your access points
  5. Click Save

After creation, note these values -- you will need them for your access point configuration:

SettingWhere to Find
Primary RADIUS IPNetworks page
Backup RADIUS IPNetworks page
Authentication PortNetworks page
Accounting PortNetworks page
Shared SecretNetworks page
tip

Copy the shared secret immediately. You will enter it on your access points exactly as shown -- character for character.

Step 2: Create User Groups (~3 min)

Groups define the policies applied after successful authentication (bandwidth limits, VLAN assignment, session timeouts).

Employee group

  1. Navigate to Users > Groups
  2. Click Add Group
  3. Name:
    Employees
  4. Add reply attributes:
  1. Click Save

VLAN assignment (optional)

To assign authenticated users to a specific VLAN, add these reply attributes to the group:

See Attributes for the full list of available RADIUS attributes.

Step 3: Add Users (~3 min)

Option A: Create users manually

  1. Navigate to Users
  2. Click Add User
  3. Enter:
    • Username -- e.g.,
      john.doe
      or
      john@company.com
    • Email -- User's email address
    • Password -- Set a secure password
  4. Assign the user to the Employees group
  5. Click Save

Option B: Sync from an identity provider

For larger deployments, sync users automatically from your existing directory:

note

With identity provider sync, users authenticate with their existing directory credentials. No separate passwords need to be managed in IronWiFi.

Step 4: Configure Your Access Points (~5 min)

Configure your access points or wireless controller to use IronWiFi for 802.1X authentication.

General settings

On your access point, create or edit the SSID for enterprise WiFi:

SettingValue
SSID NameYour desired network name (e.g.,
CorpWiFi
)
SecurityWPA2-Enterprise (or WPA3-Enterprise)
RADIUS Server IPPrimary RADIUS IP from IronWiFi
RADIUS PortAuthentication port from IronWiFi
RADIUS SecretShared secret from IronWiFi
Accounting ServerSame IP, accounting port, same secret

Add the backup RADIUS server

Configure the backup RADIUS server as a secondary/fallback:

SettingValue
Backup RADIUS IPBackup IP from IronWiFi
Backup PortSame authentication port
Backup SecretSame shared secret

Vendor-specific guides

For step-by-step instructions specific to your hardware:

See the complete list of Configuration Guides for your specific vendor.

Step 5: Configure Client Devices (~5 min)

Windows

  1. Connect to the new SSID
  2. Windows prompts for credentials
  3. Enter the username and password from IronWiFi
  4. If prompted about the server certificate, accept it

For managed deployments, push WiFi profiles via Group Policy or Intune. See the Windows client configuration guide for details.

macOS and iOS

  1. Connect to the SSID
  2. Enter username and password when prompted
  3. Accept the certificate trust prompt

For managed devices, deploy WiFi profiles via MDM. See the macOS/iOS client configuration guide.

Android

  1. Connect to the SSID
  2. Configure:
    • EAP method: PEAP
    • Phase 2 authentication: MSCHAPv2
    • Identity: Your IronWiFi username
    • Password: Your IronWiFi password
  3. For CA certificate, select "Do not validate" or install the IronWiFi CA certificate
warning

On Android, disable Randomized MAC (Privacy > Use Device MAC) for the enterprise SSID. Randomized MACs can cause authentication issues with RADIUS.

ChromeOS

  1. Connect to the SSID
  2. Configure:
    • EAP method: PEAP
    • EAP Phase 2 authentication: MSCHAPv2
    • Server CA certificate: Default or install CA cert
    • Identity: Your IronWiFi username
    • Password: Your IronWiFi password

See the ChromeOS configuration guide for managed Chromebook deployment.

Step 6: Test and Verify (~5 min)

Test authentication

  1. Connect a test device to the enterprise SSID
  2. Enter valid credentials
  3. Verify the device connects and receives an IP address
  4. Open a browser and confirm internet access

Verify in the IronWiFi Console

  1. Navigate to Reports > Authentication
  2. Confirm you see an
    Access-Accept
    for your test user
  3. Navigate to Reports > Sessions
  4. Confirm an active session appears

Test failure cases

  1. Enter an incorrect password -- Should be rejected
  2. Disable the test user in the Console -- Should be rejected on next connection attempt
  3. Block the primary RADIUS IP in your firewall -- Verify failover to the backup server

Choosing Between WPA2-Enterprise and WPA3-Enterprise

FeatureWPA2-EnterpriseWPA3-Enterprise
EncryptionAES-128 (CCMP)AES-256 (GCMP-256)
Key exchange4-way handshakeSAE (Simultaneous Authentication of Equals)
Forward secrecyNoYes
Client supportAll modern devicesNewer devices (2020+)
RecommendationBroad compatibilityMaximum security
tip

If you need to support older devices, use WPA2-Enterprise. For environments where all devices support WPA3, use WPA3-Enterprise for stronger security. Many access points support a transitional mode (WPA2/WPA3 mixed) that accommodates both. See the WPA3-Enterprise guide for details.

Authentication Methods

IronWiFi supports multiple 802.1X authentication methods:

MethodUse CaseClient Needs
PEAP-MSCHAPv2Username/password authenticationBuilt-in on all major OSes
EAP-TLSCertificate-based authenticationClient certificate installed
EAP-TTLS/PAPLegacy or special-purpose authSupplicant configuration

PEAP-MSCHAPv2 is the most common choice for enterprise deployments because it works on all platforms without installing client certificates.

EAP-TLS provides the highest security by using client certificates instead of passwords, eliminating the risk of credential theft. See the EAP-TLS guides for Windows, macOS/iOS, and ChromeOS.

Next Steps

Once your enterprise WiFi is running:

Troubleshooting

ProblemSolution
"Authentication failed"Verify username and password in the IronWiFi Console. Check Reports > Authentication for the reject reason.
No RADIUS responseConfirm RADIUS IP, port, and shared secret match exactly. Check firewall allows outbound UDP to IronWiFi.
Certificate trust errorAccept the certificate prompt, or deploy the IronWiFi CA certificate via MDM.
VLAN not assignedVerify
Tunnel-Type
,
Tunnel-Medium-Type
, and
Tunnel-Private-Group-ID
attributes are set on the group.
Intermittent disconnectionsCheck signal strength, enable RADIUS caching on the AP, and verify both primary and backup servers are configured.

For detailed troubleshooting, see the Troubleshooting Guide.

Was this page helpful?