LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page
  • Prepare certificates
  • Option 1: Using the SCEPman PKI
  • Option 2: Using other PKIs
  • MikroTik Configuration

Was this helpful?

  1. Configuration
  2. Access Point Setup
  3. RadSec

MikroTik

Last updated 6 months ago

Was this helpful?

Prepare certificates

To establish a valid RadSec connection, the MikroTik Access Points must trust the RADIUS Server Certificate and your RADIUS server must trust the RadSec Client Certificate. To achieve this, follow below steps:

Option 1: Using the SCEPman PKI

  1. Download the root certificate of the CA that has issued your active RADIUS Server Certificate as described . Since you are using SCEPman, that might be your SCEPman Root CA certfiicate.

  2. Log on to your MikroTik device, then upload the certificate from step 1 above to the MikroTik device using the Files menu on the left.

  3. Once uploaded, switch to your Terminal tab on the top right and execute the following command to import this certificate to MikroTik's certificate store:

/certificate import file-name="scepman-root.cer"
  1. Generate a RadSec Client Certificate using SCEPman Certificate Master by navigating to the menu:

Ensure to monitor the expiry of your RadSec Client Certificate and renew it in due time to prevent service interruptions.

  1. Once the RadSec Client Certificate is downloaded, extract the private key, e.g. using OpenSSL, as this will have to be imported to the access point separately:

openssl pkey -in yourfile.pem -out private.key
  1. Upload both files, the certificate and the private key via the Files menu. Then import the certificate first and then the private key. During the import process the private key will merge with the certificate indicated by a letter 'K' as shown below.

Option 2: Using other PKIs

Use this section if you want to create a root CA on your Mikrotik AP and generate a RadSec Client Certificate from this root. Please note that all of these steps can be completed either in GUI or terminal.

  1. Log on to your MikroTik device, then upload the certificate from step 1 above to the MikroTik device using the Files menu on the left.

  2. Once uploaded, switch to your Terminal tab on the top right and execute the following command to import this certificate to MikroTik's certificate store:

/certificate import file-name="RADIUS Customer CA - Contoso.cer"

Ensure to monitor the expiry of your RadSec Client Certificate and renew it in due time to prevent service interruptions.

Example:

/certificate add name=myCa common-name=myCa key-usage=key-cert-sign,crl-sign
/certificate add name=mikrotik-client common-name=mikrotik-client
/certificate sign mikrotik-client ca=myCa name=mikrotik-client

In the above example, the first line creates a root CA called myCa. The second line generates a client certificate for the MikroTik device, and the third line uses myCa (CA) to sign the mikrotik-client certificate generated in step 2. If all went well, you would end up with three certificates as shown below. Please ensure your MikroTik device trusts the relevant certificates (T flag in the green section). If that is not the case yet, set the flag using below command:

/certificate
set myCa trusted=yes
set "RADIUS Customer CA - Contoso.cer" trusted=yes
  1. Export the root CA certificate (myCa) that has issued your RadSec Client Certificate above:

/certificate export-certificate myCa

MikroTik Configuration

Please note that the below configuration was tested with RouterOS 6.47.4 and 6.49.11

  1. Switch back to your WebFig, add a new RADIUS profile and enter the following information:

Parameter
Value

Address

Protocol

radsec

Secret

"radsec"

Authentication Port

2083

Accounting Port

2083

Timeout

4000 ms

Certificate

  1. Go to Wireless, add a new Security Profile and enter the following information:

Parameter
Value

Name

Name of the RADIUS security profile

Mode

dynamic keys

EAP Methods

passthrough

TLS Mode

verify certificate

TLS Certificate

  1. Switch to your Wi-Fi Interfaces and assign your Security Profile to the interface.

Download the root certificate of the CA that has issued your active RADIUS Server Certificate as described .

If you have not already generated RadSec Client Certificate for MikroTik AP, generate one as per the below example. For more information about creating certificates, click .

Download it from the Files menu and then upload the file to your RADIUSaaS instance as described and select RadSec under Use for. Once completed, continue configuring your MikroTik AP as per and use Option 1 for certificates.

Use the IP address from your page.

: SCEPman Issued (RadSec) Client Certificate (generated in step 4). : RadSec Client Certificate issued by MikroTik's built-in CA (generated in step 4).

: SCEPman Root CA certificate. : RADIUSaaS Customer-CA certificate.

here
Server Settings
Option 1
Option 2
Option 1
Option 2
Client Certificate
below
here
here
here
Configuring RADIUS / RadSec profile