Teltonika Router - Passpoint Configuration
Configure Passpoint (Hotspot 2.0) on Teltonika RUTX and RUT series industrial routers to enable automatic WiFi authentication through IronWiFi's cloud RADIUS service. This provides WPA2/WPA3-Enterprise security for IoT and M2M applications without manual network selection.
Supported Devices
- RUTX Series - RUTX08, RUTX09, RUTX10, RUTX11, RUTX12, RUTX14, RUTX50
- RUT Series - RUT950, RUT955, RUT956 (with Hotspot 2.0 support)
Prerequisites
In Teltonika:
- Teltonika router with RutOS 7.x or later
- Firmware with Hotspot 2.0 / 802.11u support
- Network connectivity to IronWiFi RADIUS servers
In IronWiFi Console (complete these first):
- Log in to IronWiFi Management Console
- Navigate to Networks > select your network
- Enable Passpoint
- Note the following details:
- Primary RADIUS Server IP
- Secondary RADIUS Server IP
- RADIUS Secret
- NAI Realm (e.g., )
ironwifi.com - Roaming Consortium OIs
RutOS Web Interface Configuration
Step 1: Configure RADIUS Server
- Log in to Teltonika router web interface
- Navigate to Services > Hotspot > RADIUS
- Configure Authentication Server:
- Server Address: IronWiFi RADIUS IP
- Server Port: Customer Authentication Port
- Shared Secret: Your RADIUS secret
- Configure Accounting Server:
- Server Address: IronWiFi RADIUS IP
- Server Port: Customer Accounting Port
- Shared Secret: Your RADIUS secret
- Click Save
Step 2: Create Wireless Interface
- Navigate to Network > Wireless
- Click Add to create new interface
- Configure basic settings:
- SSID: Passpoint
- Mode: Access Point
- Encryption: WPA2-Enterprise (WPA2-EAP)
- In Security settings:
- Authentication: RADIUS
- RADIUS Profile: Select configured profile
Step 3: Enable Hotspot 2.0
- In wireless interface settings, find Advanced Settings
- Locate Hotspot 2.0 or 802.11u section
- Enable Hotspot 2.0
- Enable Interworking (802.11u)
Step 4: Configure 802.11u Settings
Interworking:
- Access Network Type: Free public network
- Internet Access: Enabled
- ASRA: Disabled
- ESR: Disabled
Venue Information:
- Venue Group: Business
- Venue Type: Unspecified Business
- Venue Name: Your Location Name
Step 5: Configure Domain Name
- Find Domain Name setting
- Enter:
ironwifi.net
Step 6: Configure Roaming Consortium
- Find Roaming Consortium section
- Add Organization Identifiers:
- (OpenRoaming Settlement-free)
5A03BA0000 - (Cisco OpenRoaming)
004096
Step 7: Configure NAI Realm
- Find NAI Realm section
- Add realm configuration:
- Realm:
ironwifi.com - EAP Method: EAP-TTLS
- Inner Authentication: PAP
- Realm:
Step 8: Apply Configuration
- Click Save & Apply
- Wait for wireless interface to restart
CLI Configuration
SSH Access
Connect via SSH to configure via command line:
UCI Configuration
OpenRoaming Configuration
Enable OpenRoaming
For full OpenRoaming support:
-
Configure Roaming Consortium OIs:
- - OpenRoaming Settlement-free
5A03BA0000 - - Cisco OpenRoaming
004096
-
Configure domain names:
-
Configure NAI realms:
UCI Commands for OpenRoaming
Advanced Settings
WAN Metrics
Configure WAN link information:
Connection Capability
Define available services:
Operator Name
Set operator friendly name:
3GPP Cellular Information
For carrier offload:
RMS (Remote Management System) Configuration
If using Teltonika RMS for fleet management:
Configure via RMS
- Log in to RMS
- Select device or device group
- Navigate to Services > Hotspot
- Configure RADIUS and Hotspot 2.0 settings
- Push configuration to devices
Template Configuration
Create configuration template for multiple devices:
- In RMS, go to Management > Configuration Templates
- Create new template with Passpoint settings
- Apply template to device groups
- Schedule configuration push
Troubleshooting
Network Not Discovered
-
Verify Hotspot 2.0 Enabled
-
Check Firmware Version
- Ensure RutOS version supports HS2.0
- Update firmware if needed
-
Verify Wireless Driver
Authentication Failures
-
Test RADIUS Connectivity
-
Check Logs
-
Verify Secret
- Confirm RADIUS secret matches IronWiFi configuration
Debug Commands
Common Issues
| Issue | Solution |
|---|---|
| HS2.0 option not visible | Update firmware to latest version |
| RADIUS timeout | Check firewall, verify server reachable |
| Clients don't auto-connect | Verify OI and NAI realm configuration |
| Intermittent failures | Check for interference, verify signal |
Best Practices
- Firmware Updates: Keep RutOS updated for best HS2.0 support
- Use RMS: Centrally manage multiple devices
- Test Thoroughly: Verify with multiple Passpoint clients
- Monitor: Set up alerts for authentication failures
- Documentation: Document your configuration
- Backup: Export configuration before changes
Related Topics
Same vendor
Standards & reference
Was this page helpful?