MikroTik ROS v7 - OpenRoaming with RadSec
Configure RadSec (RADIUS over TLS) on MikroTik RouterOS v7 for secure OpenRoaming authentication with IronWiFi. This guide provides detailed instructions for certificate installation, RadSec RADIUS configuration with TLS encryption, wireless security profiles, and Hotspot 2.0 interworking setup.
Quick Start
- Enable RadSec and OpenRoaming in IronWiFi Console
- Download certificate bundle (4 files)
- Upload and import certificates to MikroTik, mark CAs as trusted
- Create RadSec RADIUS with
radsec.ironwifi.com:2083 - Create security and interworking profiles
- Apply to wireless interface with Hotspot 2.0 enabled
Prerequisites
In MikroTik:
- MikroTik device with RouterOS 7.x
- Device supports 802.11u/Hotspot 2.0
- Wireless interface configured and operational
In IronWiFi Console (complete these first):
- Create or select a Network in the IronWiFi Console
- Enable OpenRoaming from the dropdown menu
- Enable RadSec from the dropdown menu
- Download the certificate bundle (ZIP file containing 4 files: Root CA, Intermediate CA, client certificate, and private key)
Certificate Installation
Upload Certificates to MikroTik
- Connect to MikroTik via WinBox or web interface
- Go to Files
- Upload all 4 files from the certificate bundle:
iw-rsa-root-ca.cert.pemiw-rsa-radsec-signing-ca.cert.pemclient.cert.pemclient.key.pem
Import Certificates
Via WinBox/WebFig:
- Go to System > Certificates
- Click Import
- Import :
iw-rsa-root-ca.cert.pem- Select file
- Click Import
- Mark as Trusted
- Import :
iw-rsa-radsec-signing-ca.cert.pem- Select file
- Click Import
- Mark as Trusted
- Import :
client.cert.pem- Select file
- Click Import
- Import :
client.key.pem- Select file
- Passphrase: (leave empty or enter if set)
- Click Import
- This associates the key with the client certificate
Via CLI:
Set Certificates as Trusted
Verify Certificates
/certificate print
You should see all certificates with the client certificate showing
KT
RadSec Configuration
Create RadSec RADIUS Profile
Via CLI:
Key Parameters:
- : IronWiFi RadSec server
address - : Your client certificate name (check exact name with
certificate)/certificate print - : Must be
protocolradsec - : Empty for RadSec (uses certificates)
secret
Configure AAA
/radius incoming set accept=yes
Wireless Configuration
Create Security Profile
Create Interworking Profile (802.11u)
Configure Hotspot 2.0 (Passpoint)
Create Wireless Interface
Complete Configuration Example
Here's a complete CLI configuration:
Verification
Check RadSec Connection
Check Certificate Status
/certificate print detail
Enable Debug Logging
/system logging add topics=radius,debug,packet
View logs:
/log print where topics~"radius"
Test Authentication
- Connect a Passpoint-enabled device
- Check authentication in IronWiFi Console
- Monitor MikroTik logs for RADIUS exchanges
Troubleshooting
RadSec Connection Failed
-
Verify certificates imported correctly
/certificate printClient cert should show
flagsKT -
Check certificate trust
/certificate print detail where trusted=yes -
Verify network connectivity
/tool ping radsec.ironwifi.com -
Check port 2083 is open
Authentication Failures
-
Check RADIUS configuration
/radius print -
Review debug logs
/log print where topics~"radius" -
Verify interworking profile
/interface wireless interworking-profiles print
Common Errors
| Error | Cause | Solution |
|---|---|---|
| "certificate verify failed" | CA not trusted | Set CA certificates as trusted |
| "connection refused" | Port blocked | Check firewall for port 2083 |
| "no suitable certificate" | Wrong cert name | Verify certificate name in RADIUS config |
| "TLS handshake failed" | Certificate mismatch | Re-download and import certificates |
Best Practices
- Use RouterOS 7.x - Required for proper RadSec support
- Keep certificates secure - Protect private key
- Monitor expiration - Certificates expire, plan renewal
- Test thoroughly - Verify with multiple devices
- Enable logging - For troubleshooting during setup
- Backup configuration - Save working config
Related Topics
Same vendor
Standards & reference
Was this page helpful?