OpenRoaming Troubleshooting
Overview
This guide covers common issues with OpenRoaming deployments using IronWiFi, including federation connectivity, RadSec certificate problems, roaming failures across providers, and device-specific behavior. OpenRoaming builds on Passpoint, so issues may span both layers.
Quick Reference
| Symptom | Likely Cause | Section |
|---|---|---|
| RadSec connection fails | Certificate or firewall issue | RadSec Connectivity Issues |
| Device does not auto-connect | Roaming consortium OI mismatch | Roaming Failures |
| Authentication rejected during roaming | Federation routing or credential issue | Federation Authentication Errors |
| Intermittent roaming drops | RadSec timeout or DNS resolution | Intermittent Connectivity |
| Certificate errors in logs | Expired or untrusted RadSec certificate | Certificate Issues |
| ANQP query failures | AP configuration incomplete | AP Configuration Issues |
RadSec Connectivity Issues
RadSec Connection Refused
Symptoms: The access point or RADIUS proxy cannot establish a RadSec (RADIUS over TLS) connection to IronWiFi.
Diagnostic Steps:
- Verify network connectivity:
- Check firewall rules:
| Direction | Protocol | Port | Destination |
|---|---|---|---|
| Outbound | TCP | 2083 | |
| Outbound | TCP | 443 | |
- Verify DNS resolution:
Some corporate firewalls perform TLS inspection (MITM) that breaks RadSec mutual authentication. Exclude
radsec.ironwifi.com
RadSec TLS Handshake Failure
Symptoms: TCP connection succeeds but the TLS handshake fails with errors like
ssl_error_handshake_failure
certificate_unknown
Resolution:
-
Check client certificate:
- The RadSec client (your AP or RADIUS proxy) must present a valid client certificate
- The certificate must be signed by a CA that IronWiFi trusts
- Download the correct client certificate from the IronWiFi Console: Navigate to Networks > select network > RadSec tab
-
Verify certificate chain:
-
Check TLS version compatibility:
- IronWiFi requires TLS 1.2 or higher
- Older equipment may default to TLS 1.0/1.1 which is rejected
-
Verify the server certificate trust:
- Your RadSec client must trust the IronWiFi RadSec server certificate
- Install the IronWiFi CA certificate in your client's trust store
RadSec Connection Drops
Symptoms: RadSec connection establishes successfully but drops periodically, causing authentication failures.
Causes and Solutions:
| Cause | Solution |
|---|---|
| TCP keepalive not configured | Enable TCP keepalive on the RadSec client (interval: 30 seconds) |
| Firewall idle timeout | Set firewall idle timeout for port 2083 to at least 300 seconds |
| NAT session expiry | Ensure NAT devices maintain the session; use keepalive to prevent expiry |
| Client certificate expiring soon | Check certificate validity and renew before expiration |
| Network instability | Implement RadSec reconnection logic with exponential backoff |
Configure both primary and secondary RadSec endpoints on your access point or RADIUS proxy for redundancy. If the primary connection drops, the client should automatically fail over to the secondary.
Roaming Failures
Device Does Not Discover OpenRoaming Network
Symptoms: A user with valid OpenRoaming credentials from their home provider does not see or auto-connect to your OpenRoaming-enabled network.
Diagnostic Checklist:
-
Verify Passpoint/Hotspot 2.0 is enabled on the AP:
- Log in to your AP controller
- Confirm Hotspot 2.0 is enabled on the SSID
- Check that the SSID broadcasts ANQP advertisements
-
Verify Roaming Consortium OI:
- The AP must advertise the correct OpenRoaming OI
- Standard OpenRoaming OIs: (settled),
5A03BA0000(unsettled)004096 - Verify in the AP configuration that these OIs are included
-
Verify NAI realm configuration:
- The NAI realm must include the correct EAP methods
- For OpenRoaming: and/or
EAP-TLSEAP-TTLS
-
Check ANQP response:
- Use a WiFi analyzer to verify the AP responds to ANQP queries
- Verify the domain name list includes your authorized domain
Roaming User Fails to Authenticate
Symptoms: A roaming user's device discovers the network and attempts to connect, but authentication is rejected.
Resolution:
-
Check the federation routing in IronWiFi:
- Navigate to Networks > select network > OpenRoaming tab
- Verify that OpenRoaming federation is enabled
- Confirm the RadSec connection to the OpenRoaming hub is active
-
Review authentication logs:
- Navigate to Logs > Authentication Logs
- Filter by the time range when the roaming attempt occurred
- Look for the roaming user's realm (the domain after in their identity)
@
-
Common federation routing errors:
| Error | Cause | Fix |
|---|---|---|
| Incoming realm not routed | Verify OpenRoaming federation is active in network settings |
| Home IdP unreachable | Issue is with the user's home identity provider; nothing to fix on your side |
| Home IdP rejected credentials | The user needs to verify credentials with their home provider |
| RadSec cert not in federation trust | Verify your RadSec certificate is issued by a WBA-trusted CA |
- Verify WBA (Wireless Broadband Alliance) federation status:
- Your IronWiFi account must be registered with the WBA OpenRoaming federation
- Contact IronWiFi support to verify your federation enrollment status
Local Users Cannot Connect After OpenRoaming Enabled
Symptoms: Enabling OpenRoaming on a network causes existing local users to lose connectivity.
Resolution:
- Verify the SSID configuration supports both local and roaming users:
- The SSID should accept both local RADIUS authentication and federated OpenRoaming authentication
- Check that the NAI realm includes your local realm in addition to OpenRoaming realms
- Verify the RADIUS server configuration has not been overwritten by RadSec settings:
- Local users should still authenticate via standard RADIUS
- Roaming users authenticate via RadSec/federation
Federation Authentication Errors
Realm Routing Failures
Symptoms: Authentication logs show realm-based routing errors for roaming users.
Understanding Realm Routing:
Common Issues:
-
Realm not found in federation:
- The user's home provider may not be part of the OpenRoaming federation
- The user should contact their home provider to verify OpenRoaming participation
-
Realm routing loop:
- Check that your network is not routing requests for your own realm through the federation
- Local realm requests should be handled locally, not proxied
-
Timeout waiting for home IdP:
- The home identity provider is slow or unreachable
- IronWiFi's RADIUS proxy has a federation timeout (default: 10 seconds)
- If timeouts are frequent for a specific realm, the issue is on the home IdP side
Attribute Filtering Issues
Symptoms: Roaming user connects but does not receive expected VLAN, bandwidth, or session attributes.
Resolution:
-
Understand attribute precedence for roaming users:
- The home IdP may send reply attributes in the Access-Accept
- Your local network policy may also define attributes
- Local policy attributes typically override home IdP attributes
-
Configure local policies for roaming users:
- Create a group in IronWiFi specifically for OpenRoaming users
- Assign bandwidth limits, VLAN, and session attributes to this group
- This ensures consistent policy regardless of what the home IdP sends
Certificate Issues
RadSec Certificate Expired
Symptoms: RadSec connections fail with
certificate has expired
Resolution:
- Check the certificate expiration date:
- Generate a new certificate request or download a renewed certificate:
- Navigate to Networks > select network > RadSec tab
- Download the new client certificate
- Install it on your AP or RADIUS proxy
- Restart the RadSec service
Set a calendar reminder to renew RadSec certificates at least 30 days before expiration. An expired certificate immediately stops all authentication for the affected network.
Certificate Chain Incomplete
Symptoms: TLS handshake fails with
unable to verify certificate chain
unknown CA
Resolution:
-
Ensure the full certificate chain is installed on the RadSec client:
- Client certificate
- Intermediate CA certificate(s)
- Root CA certificate (in the trust store)
-
Verify the chain:
- Some APs require the chain to be in a single PEM file. Concatenate in order:
WBA Trust Anchor Issues
Symptoms: Your RadSec certificate is valid but the OpenRoaming hub rejects it because it is not issued by a WBA-trusted Certificate Authority.
Resolution:
- OpenRoaming requires certificates issued by a WBA-approved CA
- Self-signed or internally-issued certificates are not accepted in the federation
- Contact IronWiFi support to obtain a properly issued RadSec certificate for OpenRoaming
- Verify your certificate includes the correct Extended Key Usage (EKU) for RadSec:
- for server certificates
id-kp-serverAuth - for client certificates
id-kp-clientAuth
Intermittent Connectivity
Periodic Authentication Failures for Roaming Users
Symptoms: Roaming users experience periodic failures (every few minutes/hours) followed by successful reconnection.
Causes and Solutions:
| Cause | Solution |
|---|---|
| RadSec connection flapping | Check network stability; enable TCP keepalive |
| DNS TTL too short | Use a stable DNS resolver; increase TTL for RadSec endpoints |
| Session-Timeout causing re-auth | Increase |
| OCSP/CRL lookup delays | Cache CRL locally; use OCSP stapling if available |
| Home IdP intermittent failures | Out of your control; ensure retry logic is in place |
Slow Roaming Between APs
Symptoms: Device takes a long time to roam between access points on the same OpenRoaming network, causing brief connectivity gaps.
Resolution:
- Enable 802.11r (Fast BSS Transition) on your APs if supported
- Enable 802.11k (Neighbor Reports) to help devices make better roaming decisions
- Ensure all APs in the roaming domain use the same RADIUS configuration
- Verify the PMK (Pairwise Master Key) caching is configured on the AP controller
- Reduce RADIUS re-authentication on roam by enabling session caching
AP Configuration Issues
ANQP Configuration Errors
Symptoms: Devices do not discover the network as OpenRoaming-capable.
Vendor-Specific ANQP Verification:
Refer to the vendor-specific OpenRoaming guides for detailed configuration:
| Vendor | Guide |
|---|---|
| Cisco Meraki | Meraki OpenRoaming |
| Ubiquiti UniFi | UniFi OpenRoaming |
| Aruba | Aruba RadSec |
| Ruckus | Ruckus RadSec |
| MikroTik | MikroTik OpenRoaming |
| Cambium | Cambium OpenRoaming |
| TP-Link Omada | TP-Link OpenRoaming |
| Teltonika | Teltonika OpenRoaming |
| Mist (Juniper) | Mist RadSec |
| FortiGate | FortiGate RadSec |
Common ANQP Configuration Mistakes:
- Missing Roaming Consortium OI -- The OpenRoaming OI must be advertised. Without it, devices cannot identify the network as OpenRoaming-capable.
- Wrong NAI Realm EAP methods -- The realm must list the EAP methods you actually support.
- Domain Name mismatch -- The domain name in ANQP must match your registered OpenRoaming domain.
- Venue Info missing -- While optional, missing venue info may cause issues with some device implementations.
RADIUS and RadSec Dual Configuration
Symptoms: AP needs to handle both local RADIUS authentication and federated RadSec for OpenRoaming.
Recommended Architecture:
Some APs support dual configuration natively (RADIUS for local, RadSec for federation). Others require a RADIUS proxy. Check your AP vendor documentation for the recommended approach.
Diagnostic Commands
Verifying RadSec Connectivity
Checking OpenRoaming AP Advertisement
Use a WiFi scanning tool to verify the AP broadcasts the correct information:
- Roaming Consortium OIs -- Should include and/or
5A03BA0000004096 - NAI Realm -- Should list supported EAP methods
- Domain Name -- Should match your registered OpenRoaming domain
- Hotspot 2.0 Indication -- Must be present in the beacon/probe response
IronWiFi Console Diagnostics
- Authentication Logs: Navigate to Logs > Authentication Logs -- filter by realm to see federation traffic
- RadSec Status: Navigate to Networks > select network > RadSec tab -- view connection status
- Federation Status: Check whether the OpenRoaming hub connection is active
Related Topics
- OpenRoaming Overview -- OpenRoaming concepts and setup
- RadSec Configuration -- RadSec setup and certificates
- Passpoint Troubleshooting -- Passpoint-layer issues
- Troubleshooting -- General IronWiFi troubleshooting
- Certificate Revocation -- Certificate management
- Certificate Lifecycle Management -- Certificate renewal and rotation
Was this page helpful?