Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/network-mobile/data-only-guides/data-only-aruba.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'
- Aruba system has AP(s) linked to the Mobility Controller.
- Aruba system has basic traffic routing working with existing SSID(s).
- An Intel-based host is required in the network to run the
[RadSecProxy](https://github.com/novalabsxyz/radsec-proxy) container.
[RadSecProxy](https://github.com/helium/radsec-proxy) container.

# High Level Steps

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'

#### RadSecProxy Container Deployment

1. Un-zip and untar the [`Helium_RadSec_Docker.tar.gz`](https://github.com/novalabsxyz/radsec-proxy)
1. Un-zip and untar the [`Helium_RadSec_Docker.tar.gz`](https://github.com/helium/radsec-proxy)
file into the directory of your choice on the host machine.

```shell
Expand Down
2 changes: 1 addition & 1 deletion docs/network-mobile/data-only-guides/data-only-meraki.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'
- Meraki system has AP(s) linked to the MX Controller.
- Meraki system has basic traffic routing working with existing SSID(s).
- An Intel-based host is required in the network to run the
[RadSecProxy](https://github.com/novalabsxyz/radsec-proxy) container.
[RadSecProxy](https://github.com/helium/radsec-proxy) container.

# High Level Steps

Expand Down
4 changes: 2 additions & 2 deletions docs/network-mobile/data-only-guides/data-only-mikrotik.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'
## Prerequisites

- **RouterOS v7** device running CAPsMAN 2 (tested on **7.18.1**)
- [RadSecProxy](https://github.com/novalabsxyz/radsec-proxy) container running in your network.
- [RadSecProxy](https://github.com/helium/radsec-proxy) container running in your network.
- For self-serve, CLI wallet prepared for onboarding:
[https://docs.helium.com/mobile/data-only-onboarding/](https://docs.helium.com/mobile/data-only-onboarding/)
- For Helium Plus, certificates ( `ca.pem`, `cert.pem`, `key.pem` ) supplied by the Helium Plus team
Expand All @@ -32,7 +32,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'
### 1. Deploy RadSecProxy

At time of writing, RouterOS does not support RadSec natively, download the
[RadSecProxy](https://github.com/novalabsxyz/radsec-proxy) container and run it in a Docker.
[RadSecProxy](https://github.com/helium/radsec-proxy) container and run it in a Docker.

1. Un-zip and untar the `Helium_RadSec_Docker.tar.gz` file into the directory of your choice on the
host machine. This will unpack the following items:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ also supports TLS (RadSec)
The project can be found at [https://radsecproxy.github.io/](https://radsecproxy.github.io/)

Helium makes a preconfigured and containerized version of this project available at
[https://github.com/novalabsxyz/radsec-proxy](https://github.com/novalabsxyz/radsec-proxy)
[https://github.com/helium/radsec-proxy](https://github.com/helium/radsec-proxy)

## Hardware Requirements

Expand Down