Como configurar o Hotspot 2.0 Wi-Fi no controlador Omada
Conteúdo
Vantagens do recurso Hotspot 2.0:
Topologia típica de rede Hotspot 2.0
Processo de conexão Wi-Fi Hotspot 2.0
Explicações sobre a terminologia relacionada
Estabelecendo o ambiente de rede Hotspot 2.0
Configuração do Hotspot Wi-Fi 2.0
Objetivo
Este artigo apresenta o Hotspot 2.0 Wi-Fi e fornece um guia passo a passo sobre como configurar o Hotspot 2.0 no Controlador Omada.
Requisitos
- Controlador Omada v5.15.24 e superior
- EAP
Introdução
Fundo
Na verdade, os clientes geralmente precisam selecionar e autenticar manualmente para acessar a internet. As operadoras buscam um roaming contínuo entre redes celulares e redes Wi-Fi, onde os clientes se conectam automaticamente à rede Wi-Fi apropriada com base no ambiente de rede atual, sem a necessidade de autenticação manual. Para atender a essa necessidade, a Wi-Fi Alliance e a Wireless Broadband Alliance desenvolveram o protocolo Hotspot 2.0, baseado no padrão 802.11u. Esse protocolo permite que os clientes descubram, registrem-se e se associem automaticamente a redes Wi-Fi que possuem acordos de roaming com suas operadoras de telefonia celular. Ele facilita a troca automática entre redes de dados celulares e redes Wi-Fi, proporcionando uma experiência de usuário comparável à das redes celulares.
Vantagens do recurso Hotspot 2.0:
Para provedores de serviços de internet:
• O tráfego do usuário pode ser transportado por redes 2G/3G/4G ou descarregado para redes Wi-Fi.
• Permite que os usuários acessem redes Wi-Fi via roaming.
• Amplia as opções de acesso à rede para os usuários, incentivando o uso da rede.
Para usuários finais:
• Pode conectar-se a redes Wi-Fi de forma automática e fácil.
• Os usuários finais precisam apenas de um conjunto de credenciais para acessar várias redes Wi-Fi, eliminando a necessidade de contas separadas para cada rede.
• As redes Hotspot 2.0 utilizam autenticação 802.1X, melhorando significativamente a segurança online do usuário.
Topologia típica de rede Hotspot 2.0:
O diagrama a seguir ilustra uma topologia de rede Hotspot 2.0 típica :
• Dispositivos sem fio (celulares, computadores, etc.): compatíveis com a funcionalidade Hotspot 2.0
• Dispositivos AP: suportam a funcionalidade Hotspot 2.0
• Operador de Hotspot 2.0 : Fornecer configuração de rede (incluindo AP/Controlador/Servidor RADIUS local/Rede móvel) e configuração dos parâmetros necessários.
• O operador deve fornecer o servidor RADIUS conforme especificado pelo protocolo e o servidor OSU (Servidor de Configuração Online) utilizando o protocolo SOAP XML (SPP) para configuração online. O recurso de hotspot EAP 2.0 não suporta configuração online.

|
Dispositivos |
Descrição |
|
Cliente |
Precisa suportar um cliente 802.1X e descobrir redes Passpoint através de frames ANQP. Portanto, também é chamado de cliente ANQP. |
|
AP |
Wireless access point, needs to support the Passpoint protocol and WPA2-802.1X access. It can send information to the client through ANQP. |
|
Controller |
Used for batch management and configuration of APs, needs to support 802.1X authentication. |
|
AAA Server |
Authentication, Authorization, and Accounting server. Supports 802.1X authentication and EAP-SIM/AKA/TLS/TTLS methods. It can obtain authentication vectors and WI-FI subscriber information from the HLR. |
|
HLR |
Database in cellular networks used to store user information, including subscriber data, mobile station location information, MSISDN, IMSI, etc. |
|
BOSS |
Operation support platform that handles customer service, rating, billing, accounting, and dunning (payment collection) tasks. |
Hotspot 2.0 Wi-Fi Connection Process:

- Wireless Scanning
The STA (Station) discovers available Hotspot 2.0 networks in its vicinity through either active scanning or passive scanning.
Active Scanning
- The STA periodically broadcasts Probe Request frames that include information about the desired network type.
- Upon receiving a Probe Request, the AP (Access Point) verifies whether the requested network type matches the one it provides. If so, it responds with a Probe Response frame containing elements such as the Hotspot 2.0 indication, BSS Load, network type, and Service Provider Identifier.
- After receiving the Probe Response, the STA detects Hotspot 2.0 support from the indication element and parses the Roaming Consortium element to obtain the Organization Identifier (OI) of the service provider. Based on this information, the STA determines whether it can access the network and may also use the BSS Load information to select an AP with lower utilization for association.
Passive Scanning
- The AP periodically transmits Beacon frames containing the Hotspot 2.0 indication, BSS Load, network type, and service provider information.
- Upon receiving a Beacon frame, the STA recognizes Hotspot 2.0 support from the indication element and parses the Roaming Consortium element to obtain the service provider OI. It then determines whether the network is suitable for access and may use the BSS Load data to choose the AP with the lightest load.
- GAS interaction
In a roaming scenario, the STA (Station) can obtain additional network information by sending a GAS Initial Request message.
This message allows the STA to retrieve details such as the list of available service providers, supported authentication methods, network operators, IP address and port information, as well as wired interface traffic statistics.
The AP (Access Point) responds with a GAS Initial Response message that contains the corresponding ANQP (Access Network Query Protocol) parameters.
If the GAS Initial Response exceeds the allowable frame size limit, the AP first sends a GAS Initial Response indicating that the STA should wait for a specified Comeback Delay period. After this interval, the STA issues a GAS Comeback Request to continue retrieving the Hotspot 2.0 parameters. The AP then returns a GAS Comeback Response carrying the remaining Hotspot 2.0 information.
- Online Set up
The online set up process is only supported by Version 2 clients. When a client first connects to a Hotspot 2.0 wireless network, after completing the GAS interaction, it must obtain a client certificate or authentication information from the online set up server. The client can then use this certificate or authentication information to automatically select and connect to Hotspot 2.0 wireless networks in subsequent sessions without requiring re-authentication.
Please note that Omada EAP Hotspot 2.0 only supports release 1 and does not support online set up. EAP supports 802.1X authentication.
- 802.1X Authentication
Based on acquired network information (such as domain name, authentication method, etc.) and the preconfigured Network Access Identifier (NAI) along with corresponding access credentials on the STA, the STA automatically selects a Wi-Fi network for access. The STA sends an Association Request carrying a Hotspot2.0 indicator, specifying AES encryption and 802.1X authentication. The AP responds with an Association Response to the STA.
The STA sends an 802.1X authentication request. The AP forwards the authentication packet to the AAA server for verification. The STA also reports the NAI information. The AAA server routes the request based on the NAI field to the authentication server of the user's home provider for verification. Upon successful authentication, the STA connects to the Wi-Fi network.

-
- Upon receiving the authentication request message, the device sends an Identity-type request message (EAP-Request/Identity) to prompt the user's client program to submit the entered username.
- The client program responds to the device's request by sending the username information to the device via an Identity-type response message (EAP-Response/Identity).
- The device encapsulates the EAP message from the client's response within a RADIUS message (RADIUS Access-Request) and sends it to the authentication server for processing.
- Upon receiving the forwarded username information, the RADIUS server compares it against the username list in its database. It locates the corresponding password entry, encrypts the password using a randomly generated MD5 Challenge, and sends this MD5 Challenge to the device via a RADIUS Access-Challenge message.
- The device forwards the MD5 Challenge received from the RADIUS server to the client.
- Upon receiving the MD5 Challenge from the device, the client encrypts the password portion using this Challenge, generates an EAP-Response/MD5 Challenge message, and sends it to the device.
- The device encapsulates this EAP-Response/MD5 Challenge message within a RADIUS message (RADIUS Access-Request) and sends it to the RADIUS server.
- The RADIUS server compares the received encrypted password with the locally encrypted password. If they match, the user is deemed legitimate, and the server sends an authentication success message (RADIUS Access-Accept) to the device.
- Upon receiving the authentication success message, the device sends an authentication success message (EAP-Success) to the client and changes the port to an authorized state, allowing the user to access the network through that port.
Authentication Process
Authentication Methods
The Hotspot 2.0 protocol specifies the following authentication methods supported by the network, as shown in the table below.

- SIM/USIM Card
Among them, the EAP-SIM, EAP-AKA, and EAP-AKA' authentication methods primarily target clients equipped with SIM/USIM cards.
Their network topology is illustrated in the figure below, with the specific process as follows:
- Client scans for wireless networks bearing the Hotspot 2.0 identifier.
- Client initiates the ANQP (Access Network Query Protocol) process to obtain specific Hotspot 2.0 information.
- Client verifies network PLMN ID matches SIM card and initiates authentication association.
- After association, client authenticates with AAA server using corresponding method.
- AAA server then interacts with 3GPP core network HLR via MAP interface to complete authentication.
Note:
- The HLR (Home Location Register) stores basic user information such as your SIM card number, mobile phone number, and contract details, along with dynamic information like your current location and whether the device is powered off.
- Mobile devices equipped with a SIM or USIM certificate send GAS/ANQP queries for 3GPP cellular network information and compare the response with the PLMD ID stored on their SIM or USIM to determine whether they can access the network of their home cellular SP via a Passpoint AP.

- without a SIM/USIM card
For clients without a SIM/USIM card, the credentials used during 802.1x authentication are the username/password and certificate. Network operators distribute configuration credentials/certificates to clients through methods such as web downloads, in-app link downloads, and online set up. Please note that EAP hotspot 2.0 only supports release 1 and does not support online set up. The Operator should provide the RADIUS server as specified by the protocol, and provide the online set up server utilizing the SOAP XML (SPP) protocol for online set up.

The network discovery and authentication process is as follows:
-
- The STA detects the AP's support for Hotspot 2.0 in its beacon frames.
- The STA queries the ANQP server for the Network Access Identifier (NAI), Realm, and Roaming Alliance OI.
- The STA matches the received NAI and OI against its credentials and preferred network list.
- The STA automatically associates with the Passpoint AP.
- The STA performs 802.1X authentication with the Home AAA server using EAP-TLS or EAP-TTLS with MS-CHAPv2.
Omada EAP Hotspot 2.0
|
Features |
Omada |
Description |
|
Passpoint,aka Hotspot2.0 |
Supported |
Omada APs and controller v5.15.24 support Hotsopt 2.0 release 1 |
|
802.1x with RADIUS |
Supported |
Support WPA2-enterprise and WPA-3 Enterprise |
|
RadSec, aka RADIUS over TLS |
Supported |
Omada Controller v6.1 support Radsec Omada Controller v5.15.24 doesn’t support Radsec |
Related Terminology Explanations
- Passpoint / Hotspot2.0
Passpoint is the Wi-Fi Alliance certification program corresponding to Hotspot 2.0.
A device that has obtained Passpoint certification is compliant with the Hotspot 2.0 standard, meaning it supports automatic and secure Wi-Fi network discovery and authentication.
Most vendors now use “Passpoint” in product documentation and configuration interfaces to indicate Hotspot 2.0 capability.
- GAS (Generic Advertisement Service)
A mechanism defined in IEEE 802.11u that allows a STA (Station) to obtain network information from the network side through Request and Response message exchanges.
GAS serves as a transport layer for higher-level information discovery protocols such as ANQP.
- ANQP (Access Network Query Protocol)
A network query protocol carried over GAS, used by a STA to retrieve access-related information from an AP before association.
Through ANQP, a STA can learn details such as roaming consortiums, service providers, authentication methods, IP address availability, and other network parameters.
- OSU (Online Sign-Up)
The Online Sign-Up process allows a user to register for network access through an OSU Server provided by the AP or service provider.
During OSU, the AP advertises available service providers and directs the STA to a secure onboarding portal for subscription or credential provisioning.
- SP (Service Provider)
The Service Provider is the entity offering network access services.
It is represented within Passpoint/Hotspot 2.0 through identifiers such as:
- NAI Realm (Network Access Identifier)
- 3GPP Cellular Network information
- Roaming Consortium ANQP elements
- T&C (Terms and Conditions) Information
In Hotspot 2.0 Release 3, a STA must explicitly accept the Terms and Conditions before being granted network access.
The T&C information defines the contractual or policy requirements for connecting to the Passpoint network.
- Subscription Remediation
A process used to resolve subscription-related issues with the Service Provider (SP).
It corrects problems involving user credentials, provisioning data, or the subscription itself (for example, overdue payments or expired certificates).
- FQDN (Fully Qualified Domain Name)
A Fully Qualified Domain Name represents the complete domain path of a host within the DNS hierarchy.
It consists of the hostname and the domain name (FQDN = Hostname + DomainName).
An FQDN uniquely identifies the host’s position in the domain tree, and DNS resolves it into an IP address during access.
Configuration
Establishing the Hotspot 2.0 network environment
The key to establishing a network environment lies in connecting to the authentication servers of operators providing corresponding services. Enterprises operating such networks may include public Wi-Fi providers or cellular network operators. Notable public Wi-Fi providers include Canary Wharf, Clair Global, Presidio, Boingo, and GlobalReach. Additionally, initiatives like OpenRoaming and Orion Wi-Fi propose building global public Wi-Fi networks based on Hotspot 2.0.
Configuration of Radius profile
Radius Profile configuration is divided into whether RadSec is required. If your APs does not support RadSec and the server does not enforce RadSec, please proceed directly to step 6.
The following is a RADIUS profile configuration that require the Radsec feature.
Step 1. Go to Global View > Settings > Certificate Profile, Add Certificates.

Step 2. Uplode CA certificate.

Step 3. Upload Client Certificate.

Click Apply to successfully upload all the certification.

Step 4. Go to Site View > Network Config > Profile > Radius Profile, Create New Radius Profile.

Step 5. Create new Radius Profile
- Give the profile a Name, such as Orion
- Enable VLAN Assignment (disabled by default).
- Add an Authentication Server Server IP/URL, port 2083, secret radsec
- Select the CA certificate and Client certificate you just uploaded.
- Enable Radius Accounting
- Add an Accounting Server IP/URL, port 2083, secret radsec.
- Enable Interim Update and set Interim Update Interval to 300 Seconds (5 minutes)
- Click ‘Save’ to complete the radius sever profile setting

Note: RadSec is applicable only when the device supports the feature. To make this feature work properly, it is recommended to upgrade your devices to the latest firmware version. If there are old devices in the device list that do not support this feature, it is recommended to configure a backup server that is not enabled with this feature.
The following is a RADIUS profile configuration that does not require the Radsec feature.
Step 6. Create new Radius Profile, enable VLAN Assignment. Please enter your Radius Authentication Sever IP/URL and Radius Accounting IP/URL.

Configuration of Hotspot 2.0 Wi-Fi
Step 1. Go to Site View > Network Config > Network Settings > WLAN > SSID, click Create New Wireless Network.
Step 2. Enter Network Name, select WPA2-Enterprise as Security, and select the Radius Profile with the above configuration or click Create New Radius Profile.

Step 3. Apply the above RADIUS settings to your ‘!!!hotspot 2.0’ SSID for both Authentication and Accounting. Go to Advanced Settings > WPA Mode, select WPA2-Enterprise/AES or WPA3-Enterprise.
Step 4. Under Advanced Settings, there is a dropdown menu for Hotspot 2.0, enable Hotspot 2.0 and configure related parameters.

Hotspot 2.0 Configuration Parameters
|
Parameter |
Description |
Explanation |
|
Network Type |
Configure the 802.11u access network type |
Identifies whether the network is public, private, guest, etc. |
|
PLMN ID (Public Land Mobile Network) |
Configure 802.11u 3GPP cellular network information (PLMN = MCC + MNC) |
Mobile Country Code (MCC) is a 3-digit decimal number. Mobile Network Code (MNC) is a 2- or 3-digit decimal number. The AP informs the terminal of the Hotspot 2.0 operator info via PLMN so the terminal can decide whether to use this Hotspot 2.0 network for cellular access. |
|
Roaming Consortium Oi |
802.11u roaming organization identifier list |
When the Hotspot 2.0 network has roaming agreements with other operators, the roaming consortium list can be configured with Oi. After connecting, the user terminal can roam to other operators’ networks while staying online. |
|
Operator Domain Name |
Hotspot 2.0 operator’s domain name |
Configured on the AP; terminals can query this via ANQP and use it to decide network selection. |
|
Operator Friendly Name |
Operator’s friendly name for the hotspot |
Can define names in different languages to help users select the network. Currently only English format input is supported. |
|
DGAF (Downstream Group-Addressed Forwarding) |
DGAF Disabled mode: AP does not forward downstream multicast-addressed frames |
Broadcast traffic uses the same GTK key, which poses risks. AP discards ARP/multicast frames to prevent attackers from exploiting the same GTK within a BSS. Note: Disabled by default. Enabling it may break certain multicast services. |
|
HESSID (Homogeneous Extended Service Set Identifier) |
Identifies a homogeneous ESS network. |
Must match one of the AP BSSIDs in the zone. Helps terminals distinguish service providers in overlapping hotspots where SSIDs are not unique. |
|
Internet |
Indica a disponibilidade da Internet. |
Especifica se a rede permite acesso à Internet. |
|
Disponibilidade de rede (IPv4) |
Indica o tipo de disponibilidade de endereço IPv4 |
O ponto de acesso (AP) pode transmitir informações sobre a disponibilidade de endereços IPv4 para os terminais via ANQP, para que os usuários saibam o tipo de endereço IP que obterão após a conexão. |
|
Disponibilidade de rede (IPv6) |
Indica o tipo de disponibilidade de endereço IPv6 |
Semelhante ao IPv4, mas para disponibilidade de endereços IPv6. |
|
Informações sobre o local |
Grupo e tipo de estabelecimento (de acordo com as normas internacionais de construção) |
O ponto de acesso (AP) fornece informações sobre o tipo de local aos terminais durante o acesso ao Hotspot 2.0, ajudando os usuários a escolher uma rede. |
|
Nome do local |
Informações sobre o nome do local |
Identifica a localização física da rede. |
|
Lista de reinos NAI |
Domínios do Identificador de Acesso à Rede (NAI) acessíveis através do ponto de acesso (AP), incluindo nome de domínio, método de autenticação e parâmetros de autenticação. |
Nome do domínio: geralmente o nome de domínio do provedor. Codificação: 0 = formatado em RFC 4282; 1 = string UTF-8 não compatível com RFC 4282. Método EAP: métodos de autenticação EAP suportados. Parâmetro de autenticação: parâmetros e identificadores EAP. |
Passo 5. Clique em Aplicar para concluir a configuração do Wi-Fi.
Conclusão
Seguindo os passos acima, você configurou com sucesso a rede Hotspot 2.0 no Controlador Omada.
QA
P1 : Como entender o Hotspot 2.0 e o Passpoint?
A1: Passpoint é o programa de certificação da Wi-Fi Alliance correspondente ao Hotspot 2.0. A certificação Passpoint indica o suporte robusto de um dispositivo ao Hotspot 2.0. Atualmente, a maioria das descrições de produtos e configurações de dispositivos dos fabricantes podem ser identificadas usando o Passpoint.
P2: O controlador Omada é compatível com Radsec? O Hotspot 2.0 e o Radsec exigem suporte de firmware no dispositivo?
A2:
- O controlador Omada v6.1 é compatível com Radsec.
- O controlador Omada V5.15.24 suporta apenas o Hotspot 2.0, mas não o Radsec.
- Tanto o Hotspot 2.0 quanto o RADIUS exigem suporte de firmware no dispositivo para funcionar.
P3: O controlador Omada e os EAPs suportam configuração online?
A3:
Para clientes sem cartão SIM/USIM, as credenciais durante a autenticação 802.1x são o nome de usuário/senha e o certificado configurados online. Atualmente, o hotspot EAP 2.0 suporta apenas a versão 1 e não oferece suporte à funcionalidade de configuração online.
Para obter mais detalhes sobre cada função e configuração, acesse a Central de Downloads e baixe o manual do seu produto.