MikroTik ROS v7 OpenRoaming with RadSec
Configure OpenRoaming on MikroTik devices running RouterOS v7 with IronWiFi RadSec authentication. This guide covers certificate import and trust configuration, RadSec RADIUS setup, wireless security profiles, interworking (802.11u) configuration, and Hotspot 2.0 deployment for global WiFi roaming.
Quick Start
- Enable OpenRoaming and RadSec in IronWiFi Console
- Download and import certificate bundle to MikroTik
- Create RadSec RADIUS profile pointing to
radsec.ironwifi.com:2083 - Create security profile with WPA2-EAP
- Configure interworking profile with OIs: ,
5A03BA0000,5A03BA0200004096 - Apply profiles to wireless interface
Prerequisites
In MikroTik:
- MikroTik device with wireless capability
- RouterOS 7.x (7.1+ recommended)
- Wireless interface configured and operational
In IronWiFi Console (complete these first):
- Create or select a Network in the IronWiFi Console
- Enable OpenRoaming from the dropdown menu
- Enable RadSec from the dropdown menu
- Download the certificate bundle (contains Root CA, Intermediate CA, client certificate, and private key)
Upload Certificates to MikroTik
Upload the certificates to your MikroTik device:
Via WinBox/WebFig
- Go to Files
- Upload all 4 certificate files from the bundle
Via CLI
Import Certificates
The certificate bundle contains:
- - Root CA certificate
iw-rsa-root-ca.cert.pem - - Intermediate CA certificate
iw-rsa-radsec-signing-ca.cert.pem - - Client certificate
client.cert.pem - - Private key
client.key.pem
Verify certificates:
/certificate print
Configure RadSec
Replace
radsec.ironwifi.com
Wireless Security Profile
Interworking Profile (802.11u)
Hotspot 2.0 Profile
NAI Realm Configuration
Add additional realms for OpenRoaming identity providers:
Roaming Consortium OIs
Add OpenRoaming Organization Identifiers:
OI descriptions:
- - WBA OpenRoaming Settlement-free
5A03BA0000 - - WBA OpenRoaming Settled
BAA2D00000 - - Cisco OpenRoaming
004096
Apply Configuration to Wireless Interface
Complete Configuration Script
Verification
Check RadSec connection:
/radius print stats
Check wireless status:
/interface wireless print detail where name=wlan1
Check connected clients:
/interface wireless registration-table print
Troubleshooting
RadSec Connection Failed
- Verify certificates are correctly imported
- Check certificate validity dates
- Ensure port 2083 is not blocked
- Verify RadSec server hostname
Clients Don't Connect
- Verify 802.11u settings
- Check roaming consortium OIs
- Ensure client has valid OpenRoaming credentials
- Test with manual EAP configuration first
Authentication Fails
- Check IronWiFi authentication logs
- Verify NAI realm configuration
- Ensure user exists or auto-creation is enabled
Related Topics
Same vendor
Standards & reference
Was this page helpful?