Home > Wireless LAN > Encryption and Authentication > Eduroam Authentication Integration with MR Access Points

Eduroam Authentication Integration with MR Access Points

Table of contents
No headers

Eduroam is a worldwide roaming service to allow students, researchers and staff from participating institutions to seamlessly roam on the networks of other participating member campuses.  Cisco Meraki is fully compatible with this form of authentication.  The client will connect to the MR using 802.1x RADIUS authentication.  The RADIUS authentication request will be sent from the MR to a local Eduroam federation-level RADIUS server.  The RADIUS server will then forward the request to the clients home institution for authentication.  

In this example, the local Eduroam federation-level RDAIUS server, will have an IP address of 10.50.2.7.  The MR's will need to be defined on the RADIUS server as RADIUS clients (consult RADIUS server documentation to complete this step).  In the Dashboard, from Configure > Access control, select the SSID that Eduroam users will use to connect.  Make sure to select WPA2-Enterprise with my RADIUS server under Association requirements.



Next, add the Eduroam federation-level RADIUS server under RADIUS servers.  The IP address, RADIUS port (1812 is the RFC standard port number), and shared secret of the Eduroam proxy server will need to be defined.

The Test button can be used to confirm that the MR is able to authenticate against the RADIUS server.  Once the test is successful Eduroam clients should be able to connect to the Eduroam SSID.

You must to post a comment.
Last modified
13:53, 21 Jul 2017

Tags

This page has no custom tags.

Classifications

This page has no classifications.

Article ID

ID: 1834

Contact Support

Most questions can be answered by reviewing our documentation, but if you need more help, Cisco Meraki Support is ready to work with you.

Open a Case