[go: up one dir, main page]

0% found this document useful (0 votes)
19 views298 pages

Smartzone 100

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 298

SmartZone 100 and Virtual SmartZone

Essentials

Administrator Guide for Release 3.5.1

Part Number: 800-71511-001


Published: 04 September 2017
Contents
Copyright Notice and Proprietary Information
Document Conventions
Documentation Feedback
Online Training Resources

1 Navigating the Dashboard


Setting Up the Controller for the First Time..................................................................14
Logging On to the Web Interface.................................................................................14
Web Interface Features...............................................................................................15
Changing the Administrator Password.........................................................................17
Logging Off the Controller...........................................................................................17
Configuring Global Filters.............................................................................................18
Warnings and Notifications..........................................................................................19
Warnings...........................................................................................................19
Setting Global Notifications................................................................................20
Health and Maps.........................................................................................................20
Understanding Cluster and AP Health Icons......................................................21
Customizing Health Status Thresholds..............................................................21
Using the Health Dashboard Map......................................................................23
Traffic Analysis............................................................................................................24
Customizing Traffic Analysis..............................................................................24
Configuring Traffic Analysis Display for APs.......................................................24
Configuring Traffic Analysis Display for WLANs..................................................26
Configuring Traffic Analysis Display for Top Clients............................................26

2 Configuring System Settings


Configuring General Settings.......................................................................................28
Viewing System Settings...................................................................................28
Configuring System Time...................................................................................28
Configuring the Remote Syslog Server..............................................................29
Configuring SCI Settings....................................................................................31
Setting the Northbound Portal Password...........................................................31
Enabling Global SNMP Notifications..................................................................31
Configuring SMTP Server Settings.....................................................................35

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
2
Configuring FTP Server Settings........................................................................35
Configuring the SMS Gateway Server................................................................36
Configuring AP Settings..............................................................................................36
Approving APs..................................................................................................36
Working with AP Registration Rules...................................................................37
Creating vSZ-D Zone Affinity..............................................................................38
Tagging Critical APs..........................................................................................38
Configuring the Tunnel UDP Port.......................................................................39
Setting the Country Code..................................................................................39
Viewing the System Cluster Overview..........................................................................39
Control Planes and Data Planes........................................................................40
Interface and Routing........................................................................................41
Displaying the Chassis View of Cluster Nodes...................................................42
Enabling Cluster Redundancy............................................................................42
Configuring the Control Plane............................................................................44
Monitoring Cluster Settings................................................................................50
Working with Maps......................................................................................................51
Importing a Floorplan Map.................................................................................51
Monitoring APs Using the Map View..................................................................54
Certificates..................................................................................................................55
Importing New Certificates.................................................................................55
Assigning Certificates to Services......................................................................56
Generating Certificate Signing Request (CSR)....................................................56
Managing AP Certificates..................................................................................57
Importing Trusted CA Certificates......................................................................58
Configuring Templates................................................................................................59
Working with Zone Templates...........................................................................59
Working with WLAN Templates.........................................................................65

3 Working With Access Points


Understanding the System, Zones and AP Groups......................................................67
Hierarchy Overview............................................................................................67
Working with AP Zones.....................................................................................68
Working with AP Groups...................................................................................76
Monitoring Zones and AP Groups......................................................................86
Viewing Modes............................................................................................................89
AP Status....................................................................................................................89
Configuring Access Points...........................................................................................89

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
3
Managing Access Points.............................................................................................94
Overview of Access Point Configuration............................................................94
Viewing Managed Access Points.......................................................................94
Downloading the Support Log from an Access Point.........................................95
Provisioning and Swapping Access Points........................................................95
Editing Swap Configuration...............................................................................97
Moving a Single Access Point to a Different AP Zone.........................................97
Monitoring Access Points..................................................................................98

4 Working with WLANs and WLAN Groups


Zones, AP Groups, and WLANs................................................................................100
Viewing Modes..........................................................................................................100
WLAN Groups...........................................................................................................101
Creating a WLAN Group..................................................................................101
Creating a WLAN Configuration.................................................................................102
802.11 Fast BSS Transition.............................................................................118
802.11w MFP..................................................................................................118
Band Balancing...............................................................................................118
Bypassing Apple CNA.....................................................................................118
Client Admission Control.................................................................................119
Client Load Balancing......................................................................................119
Mobility Domain ID...........................................................................................120
Portal-based WLANs.......................................................................................120
Rate Limiting Ranges for Policies.....................................................................121
Working with WLAN Schedule Profiles.............................................................122
Managing WLANs.....................................................................................................123
Extracting a WLAN Template...........................................................................124
Applying a WLAN Template.............................................................................124
Changing the Zone's AP Firmware Version......................................................125
Rehoming Managed APs.................................................................................125

5 Managing Clients
Working with Wireless Clients....................................................................................126
Viewing a Summary of Wireless Clients............................................................126
Viewing Information about a Wireless Client.....................................................128
Deauthorizing a Wireless Client........................................................................128
Blocking a Wireless Client................................................................................129
Unblocking a Wireless Client............................................................................129

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
4
Disconnecting a Wireless Client.......................................................................129
Working with Wired Clients........................................................................................130
Viewing a Summary of Wired Clients...............................................................130
Viewing Information about a Wired Client.........................................................130
Deauthorizing a Wired Client............................................................................131
Working with Users and Roles...................................................................................131
Creating a User Role.......................................................................................131
Creating a User Role with Active Directory Authentication................................132
Creating a User Role with 802.1x Authentication.............................................133
Applying Role Policies to Users........................................................................133
Creating a Local User......................................................................................134
Creating a Subscription Package.....................................................................136
Working with Guest Passes.......................................................................................137
Generating Guest Passes................................................................................137
Creating a Guest Pass Template.....................................................................141
Creating a Guest Instruction SMS Template....................................................142
Exporting the Guest Pass to CSV....................................................................144
Generating Guest Passes from an Imported CSV............................................145
Printing the Guest Pass...................................................................................147
Sending the Guest Pass via Email....................................................................148
Sending the Guest Pass via SMS....................................................................149
Working with Dynamic PSKs.....................................................................................149
Viewing Dynamic PSKs....................................................................................151
Generating Dynamic PSKs..............................................................................151
Importing Dynamic PSKs.................................................................................152
Creating an External DPSK Over RADIUS WLAN.............................................154

6 Application Recognition and Control


Monitoring Applications.............................................................................................155

7 Services and Profiles


Working with Hotspots and Portals...........................................................................158
Creating a Guest Access Portal.......................................................................158
Working with Hotspot (WISPr) Services...........................................................160
Creating a Web Authentication Portal..............................................................162
Creating a WeChat Portal................................................................................164
Working with Hotspot 2.0 Services..................................................................165
Creating a UA Blacklist Profile..........................................................................171

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
5
Configuring Access Control.......................................................................................173
Creating a User Traffic Profile..........................................................................173
Creating OS Policy Service..............................................................................176
Creating a VLAN Pooling Profile.......................................................................178
Create Precedence Profile...............................................................................180
Creating an L2 Access Control Service............................................................181
Creating Blocked Clients.................................................................................182
Creating a Client Isolation Whitelist..................................................................183
Creating Time Schedules.................................................................................184
Creating a DNS Server Profile..........................................................................185
Configuring Application Controls...............................................................................186
Creating an Application Control Policy.............................................................187
Implementing an Application Control Policy.....................................................188
Creating a User Defined Application................................................................190
Creating an Application Control Policy.............................................................191
Working with Application Signature Package...................................................192
Authentication...........................................................................................................194
Creating Non-Proxy Authentication AAA servers..............................................194
Creating Proxy AAA Servers............................................................................196
Authentication Support Matrix.........................................................................202
Accounting................................................................................................................211
Creating Non-Proxy Accounting AAA Servers..................................................211
Creating Proxy Accounting AAA Servers..........................................................212
Bonjour.....................................................................................................................213
Bonjour Gateway.............................................................................................214
Bonjour Fencing..............................................................................................216
Working with Tunnels and Ports................................................................................219
Creating a Ruckus GRE Profile........................................................................219
Creating a Soft GRE Profile..............................................................................220
Creating an IPsec Profile..................................................................................221
Creating an Ethernet Port Profile......................................................................224
Creating a Tunnel DiffServ Profile.....................................................................227
DHCP Relay....................................................................................................228
Enabling Flexi VPN..........................................................................................228
Enabling L3 Roaming Criteria for vDPs............................................................229
Tunnel Encryption............................................................................................231
Forwarding Multicast Packets..........................................................................231
Location Services......................................................................................................232
DHCP........................................................................................................................234

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
6
Creating a DHCP Pool.....................................................................................235
Configuring DHCP Service Settings.................................................................237

8 Working with Reports


Types of Reports.......................................................................................................241
Client Number Report......................................................................................241
Client Number vs Airtime Report......................................................................241
Continuously Disconnected APs Report..........................................................241
Failed Client Associations Report.....................................................................241
New Client Associations Report.......................................................................241
System Resource Utilization Report.................................................................242
TX/RX Bytes Report.........................................................................................242
Managing Report Generation.....................................................................................242
Creating Reports.............................................................................................242
Generating Reports.........................................................................................244
Rogue Access Points................................................................................................245
Viewing Rogue Access Points.........................................................................245
Marking Rogue Access Points.........................................................................245
Viewing AP Client Statistics.......................................................................................246
Ruckus AP Tunnel Stats............................................................................................247
Viewing Statistics for Ruckus GRE Tunnels......................................................247
Viewing Statistics for SoftGRE Tunnels............................................................248
Viewing Statistics for SoftGRE IPsec Tunnels..................................................250

9 Troubleshooting
Troubleshooting Client Connections..........................................................................252
Troubleshooting through Spectrum Analysis..............................................................254

10 Administering the Controller


Managing Administrator and Roles............................................................................256
Creating User Groups......................................................................................256
Creating Administrator Accounts.....................................................................257
Creating a RADIUS Server for Administrator Authentication.............................258
Enabling the Access Control List.....................................................................259
Backing Up and Restoring Clusters...........................................................................260
Creating a Cluster Backup...............................................................................260

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
7
Backing Up and Restoring the Controller's Network Configuration from an FTP
Server.........................................................................................................262
Backing up Cluster Configuration....................................................................268
Upgrading the Controller...........................................................................................271
Performing the Upgrade..................................................................................272
Verifying the Upgrade......................................................................................273
Rolling Back to a Previous Software Version....................................................273
Uploading an AP Patch File.............................................................................274
Upgrading the Data Plane................................................................................274
Managing Licenses...................................................................................................276
Viewing Installed Licenses...............................................................................276
Configuring the License Server........................................................................278
Configuring License Bandwidth.......................................................................278
ZoneDirector to SmartZone Migration........................................................................279
Monitoring Administrator Activities.............................................................................279

11 Managing Events and Alarms


Viewing Events..........................................................................................................281
Sending SNMP Traps and Email Notifications for Events...........................................281
Configuring Event Threshold......................................................................................282
Configuring Alarms....................................................................................................283
Clearing Alarms...............................................................................................283
Acknowledging Alarms....................................................................................283
Applying Filters................................................................................................284

12 Diagnostics
Applying Scripts........................................................................................................285
Applying AP CLI Scripts............................................................................................285
Viewing and Downloading Logs.................................................................................286
Available System Logs for SZ100....................................................................287
Viewing RADIUS Proxy Settings................................................................................288

Appendix A: Ports to Open for AP-SCG/SZ/vSZ/vSZ-D


Communication

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
8
9

Copyright Notice and Proprietary Information


Copyright 2017. Ruckus Wireless, Inc. All rights reserved.
No part of this documentation may be used, reproduced, transmitted, or translated, in any form
or by any means, electronic, mechanical, manual, optical, or otherwise, without prior written
permission of Ruckus Wireless, Inc. (“Ruckus”), or as expressly provided by under license from
Ruckus.

Destination Control Statement


Technical data contained in this publication may be subject to the export control laws of the
United States of America. Disclosure to nationals of other countries contrary to United States
law is prohibited. It is the reader’s responsibility to determine the applicable regulations and to
comply with them.

Disclaimer
THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN (“MATERIAL”) IS
PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. RUCKUS AND ITS LICENSORS
MAKE NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THE
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE,
OR THAT THE MATERIAL IS ERROR-FREE, ACCURATE OR RELIABLE. RUCKUS RESERVES
THE RIGHT TO MAKE CHANGES OR UPDATES TO THE MATERIAL AT ANY TIME.

Limitation of Liability
IN NO EVENT SHALL RUCKUS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL
OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA
OR USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT
OR TORT, ARISING FROM YOUR ACCESS TO, OR USE OF, THE MATERIAL.

Trademarks
Ruckus Wireless, Ruckus, the bark logo, BeamFlex, ChannelFly, Dynamic PSK, FlexMaster,
Simply Better Wireless, SmartCell, SmartMesh, SmartZone, Unleashed, ZoneDirector and
ZoneFlex are trademarks of Ruckus Wireless, Inc. in the United States and other countries. All
other product or company names may be trademarks of their respective owners.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
9
Document Conventions

Document Conventions
Table 1: Text conventions on page 10 and Table 2: Notice conventions on page 10 list the text
and notice conventions that are used throughout this guide.

Table 1: Text conventions

Convention Description Example


message phrase Represents messages [Device Name] >
displayed in response to a
command or a status
user input Represents information that you [Device Name] > set
enter ipaddr 10.0.0.12
user interface controls Keyboard keys, software Click Create New
buttons, and field names
Start > All Programs Represents a series of Select Start > All Programs
commands, or menus and
submenus
ctrl+V Represents keyboard keys Press ctrl+V to paste the text
pressed in combination from the clipboard.
screen or page names Click Advanced Settings. The
Advanced Settings page
appears.
command name Represents CLI commands
parameter name Represents a parameter in a
CLI command or UI feature
variable name Represents variable data {ZoneDirectorID}
filepath Represents file names or URI http://ruckuswireless.com
strings

Table 2: Notice conventions

Notice type Description


Information that describes important features
NOTE:
or instructions
Information that alerts you to potential loss of
CAUTION:
data or potential damage to an application,
system, or device

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
10
Document Conventions

Notice type Description


Information that alerts you to potential personal
WARNING:
injury

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
11
Documentation Feedback

Documentation Feedback
Ruckus Wireless is interested in improving its documentation and welcomes your comments
and suggestions.
You can email your comments to Ruckus Wireless at: docs@ruckuswireless.com
When contacting us, please include the following information:
• Document title
• Document part number (on the cover page)
• Page number (if appropriate)

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
12
13

Online Training Resources


To access a variety of online Ruckus Wireless training modules, including free introductory
courses to wireless networking essentials, site surveys, and Ruckus Wireless products, visit the
Ruckus Wireless Training Portal at:
https://training.ruckuswireless.com.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
13
Navigating the Dashboard
Setting Up the Controller for the First Time

Navigating the Dashboard 1


In this chapter:

• Setting Up the Controller for the First Time


• Logging On to the Web Interface
• Web Interface Features
• Changing the Administrator Password
• Logging Off the Controller
• Configuring Global Filters
• Warnings and Notifications
• Health and Maps
• Traffic Analysis

Setting Up the Controller for the First Time


NOTE: Before continuing, make sure that you have already set up the controller on the network
as described in the Getting Started Guide or Quick Setup Guide for your controller platform.

For information for the first time, including instructions for running and completing the controller's
Setup Wizard, see the Getting Started Guide or Quick Setup Guide for your controller platform.

NOTE: While deploying vSZ, iSCSI must be used for block storage and make the hosts see
everything as Direct-attached storage (DAS) for real-time database access/synchronisation as
it requires lower latency and a high number of r/w transactions. Due to higher r/w latency, SAN
and NAS might not be suitable for vSZ deployment.

Some of the new features (for example, location based services, rogue AP detection, force
DHCP, and others) that this guide describes may not be visible on the controller web interface
if the AP firmware deployed to the zone you are configuring is earlier than this release. To ensure
that you can view and configure all new features that are available in this release, Ruckus Wireless
recommends upgrading the AP firmware to the latest version.

Logging On to the Web Interface


Before you can log on to the controller web interface, you must have the IP address that you
assigned to the Management (Web) interface when you set up the controller on the network
using the Setup Wizard.
Once you have this IP address, you can access the web interface on any computer that can
reach the Management (Web) interface on the IP network.
Follow these steps to log on to the controller web interface.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
14
Navigating the Dashboard
Web Interface Features

1. On a computer that is on the same subnet as the Management (Web) interface, start a web
browser.
Supported web browsers include:
• Google Chrome 47 and later (recommended)
• Safari 7 and later (Mac OS)
• Mozilla Firefox 44 and later
• Internet Explorer 11 and later
• Microsoft Edge
2. In the address bar, type the IP address that you assigned to the Management (Web) interface,
and then append a colon and 8443 (the controller's management port number) at the end
of the address.
For example, if the IP address that you assigned to the Management (Web) interface is
10.10.101.1, then you should enter: https://10.10.101.1:8443

NOTE: The controller web interface requires an HTTPS connection. You must append https
(not http) to the Management interface IP address to connect to the web interface. If a
browser security warning appears, this is because the default SSL certificate (or security
certificate) that the controller is using for HTTPS communication is signed by Ruckus Wireless
and is not recognized by most web browsers.

The controller web interface logon page appears.


3. Log on to the controller web interface using the following logon details:
• User Name: admin
• Password: {the password that you set when you ran the Setup Wizard}
4. Click Log On.
The web interface refreshes, and then displays the Dashboard, which indicates that you
have logged on successfully.

Web Interface Features


The web interface is the primary graphical front end for the controller and is the primary interface
that you will use to:
• Manage access points and WLANs
• Create and manage users and roles
• Monitor wireless clients, managed devices, and rogue access points
• View alarms, events, and administrator activity
• Generate reports
• Perform administrative tasks, including backing up and restoring system configuration,
upgrading the cluster, downloading support , performing system diagnostic tests, viewing
the status of controller processes, and uploading additional licenses (among others)
Figure 1: Controller Web Interface Features

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
15
Navigating the Dashboard
Web Interface Features

The following table describes the web interface features.

Table 3: Controller Web Interface Features

Feature Description Action


Main Menu Lists the menus for Select the required menu and sub-menu.
administrative task.
Tab Page Displays the options specific Select the required tab page.
to the selected menu.
Content Area Displays tables, forms, and View the tables, forms and information
information specific to the specific to the selected menu, sub-menu
selected menu and tab page. and tab page.
Header Bar Displays information specific Select the required option (from left to
to the web interface. right):
• Warning—Lists the critical issues to be
resolved.
• System Date and time—Displays the
current system date and time.
• Refresh—Refreshes the web page.
• Global filter—Allows you to set the
preferred system filter.
• My Account link—Allows you to:
• Change password
• Set session preference
• Log off

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
16
Navigating the Dashboard
Changing the Administrator Password

Feature Description Action


• Online Help—Allows access to web
help.

Changing the Administrator Password


Follow these steps to change the administrator password.
1. From the Header bar, click admin and select Change Password. The Figure 2: Change
Password Form on page 17 appears.
Figure 2: Change Password Form

2. Enter:
• Old Password—Your current password.
• New Password—Your new password.
• Confirm Password—Your new password.
3. Click Change, your new password is updated.

Logging Off the Controller


You must be aware of how to log off from the controller through CLI and from the web interface.
1. From the Header bar, click admin and select Log off.
The following message appears: Are you sure you want to log off?
2. Click Yes.
The controller logs you off the web interface and the logon page appears.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
17
Navigating the Dashboard
Configuring Global Filters

You have completed logging off the web interface.


You can also use CLI commands to shutdown the controller.
To shutdown the controller gracefully, use the following command: ruckus# shutdown
<seconds>, where seconds indicates the number of seconds before controller shutdowns.
To shutdown the controller immediately, use the following command: ruckus# shutdown
now. The controller would shutdown in 30 seconds.

Configuring Global Filters


The Global filter setting allows you to set your preferred system filter.
Global filters allow the administrator to define a system scope or system context that applies to
all pages of the system as they navigate to different menus. For example, if your system includes
5 zones, but you want to view Zone1 and Zone2 only, you can create and apply such a filter.
As you navigate throughout the system, the view will be restricted to show only the data, objects,
and profiles contained within Zones 1 and 2.
To set the global filter:
1. From the Header bar, click Filter setting . The below figure appears.
Figure 3: Global Filter Form

2. Select or clear the required system filters and click


• Save—To save the filter settings with the default group.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
18
Navigating the Dashboard
Warnings and Notifications

• Save As—To save the filter settings as a new group. The below figure appears. Enter a
new name for the group and click OK.
Figure 4: New Name Form

NOTE: You can delete the filter setting. To do so, click the Filter setting button. The Global
Filter form appears, click Delete.

Warnings and Notifications


This section explains about warnings and notifications.

Warnings
Warnings are displayed in the Miscellaneous bar. They are issues which are critical in nature.
Warnings cannot be removed or acknowledged unless the critical issue is resolved.
Figure 5: Sample Warning Message

A list of warning messages that appear are as follows:


• Default 90-day support expiring soon
• System support expiring soon
• System support has expired
• Default 90-day AP license expiring soon
• Default AP license has expired
• Default 90-day RTU license expiring soon
• RTU has expired

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
19
Navigating the Dashboard
Health and Maps

• AP Certificate Expiration
• Node Out of Service
• Cluster Out of Service
• VM Resource Mismatch
• Suggested AP Limit Exceeded

Setting Global Notifications


Notifications are integrated with existing alarms. Hence, they are displayed only when a notification
alarm exists and which is not acknowledged by the administrator. Notifications can be viewed
from the Content area. Administrators can acknowledge the notification by either:
• Clear the alarm
• Acknowledge the Alarm
For more information, refer Managing Events and Alarms on page 281.
Alarm severity are of three types:
• Minor
• Major
• Critical
The adminstrator can change the alarm severity shown on the dashboard. To do so:
1. From the Notifications area, Click the Setting button. The Settings - Global Notification
form appears.
2. From the Lowest alarm severity drop-dpown, select the required severity level.
3. Click OK. Notifications corresponding to the selected alarm severity and severity above it are
displayed in the Notification area of the Dashboard.

Health and Maps


The Health dashboard gives you a very high-level overview of cluster, AP and client information.
It also displays a world map view using Google Maps, which provides a global view of your
SmartZone-controlled wireless network deployments.
The status bar at the top of the Health dashboard contains an iconic representation of the total
Cluster, AP and Client counts for the entire system. This information can be filtered to display a
single zone, AP group, or venue using the drop-down filter menu. You can also customize the
dashboard layout and threshold settings using the Settings (gear) icon.
For more information on customizing the information displayed on the Health dashboard, see
Customizing Health Status Thresholds on page 21.
Figure 6: Health Workspace area

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
20
Navigating the Dashboard
Health and Maps

Understanding Cluster and AP Health Icons


The Health dashboard status bar displays the following Cluster and AP information using three
colored icons to denote the number of APs/clusters currently in that state.
The icons for both Cluster and AP status overviews are represented by the following color coding
scheme:
• (Green): Online

(Orange): Flagged
• (Red): Offline
Online and Offline status are self-explanatory. "Flagged" status is user-defined. You can customize
the thresholds at which an AP or cluster enters "flagged" state using the Settings (gear) icon in
the status bar. For more information, see Customizing Health Status Thresholds on page 21.

Customizing Health Status Thresholds


You can customize the way SmartZone categorizes and displays clusters and APs as "Flagged"
in the status bar.
To customize the Health dashboard, click the Settings (gear) icon. In the Settings - Health
Dashboard form, click the Cluster Status or AP Status tab, and configure the following:
• Cluster Status: Configure CPU, hard disk and memory usage percentages above which the
cluster will be marked as flagged status.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
21
Navigating the Dashboard
Health and Maps

• AP Status: Configure the criteria upon which APs will be flagged. For more information, see
Customizing AP Flagged Status Thresholds.
Figure 7: Setting Cluster Health Status

The
rsho
dls

Customizing AP Flagged Status Thresholds


Use the following procedure to customize when APs will be marked as "flagged" on the Health
dashboard status bar.
1. Click the Gear icon on the Health dashboard.
2. The Settings - Health Dashboard form appears. Click the AP Status tab.
3. Select the behavior of flagging policies when applying changes to parent or child groups:
• Apply the change to all child groups
• Apply the change if child group settings already match the parent group

4. Configure thresholds above which APs will be marked as "flagged" for the following criteria:
• Latency
• Airtime Utilization
• Connection Failures
• Total connected clients

5. Configure the radio (2.4 / 5 GHz) from the drop-down menu and select the level (system,
zone, AP group) at which you want to apply the policy, and configure the Sensitivity control
for the threshold (Low, Medium, High). Setting the Sensitivity level to Low means that an AP
must remain above the threshold for a longer period of time before it will appear in the flagged
category, while a High sensitivity means that APs will more quickly alternate between flagged
and non-flagged status.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
22
Navigating the Dashboard
Health and Maps

6. Click OK to save your changes.


Figure 8: Configuring AP flagged status thresholds

Using the Health Dashboard Map


Use the Google Maps view just as you would normally use Google Maps - including zoom,
satellite view, rotate and even street view icons. You can customize the AP icon information
displayed on the map using the tools in the upper-right hand corner.
Use the AP Status pull-down menu to configure which AP health parameters will be displayed
on the AP icons on the map. Use the Display menu to display the client count or radio channel
in use.
Use the Settings (gear) icon to configure the information displayed in tooltips when hovering
over an AP on the map. You can also change the view mode altogether, from map view to
Groups, Control Planes or Data Planes view mode using the settings menu.
Figure 9: Configuring map

sen
tigs

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
23
Navigating the Dashboard
Traffic Analysis

NOTE: In order for your venues to appear on the world map, you must first import a map of your
site floorplan, as described in Working with Maps.

Traffic Analysis
You can analyze network traffic for APs, WLANs and clients.
From the traffic analysis tab, you can choose to analyze data using the following filters:
• Channel Range
• Total
• 2.4GHz
• 5GHz
• Throughput
• TX+RX—Number of bytes sent and received
• TX—Number of bytes sent
• RX—Number of bytes received
• Group

Customizing Traffic Analysis


You can customize the traffic analysis page to display specific traffic information.
1. From Dashboard > Traffic Analysis, click the settings button. The Settings - Traffic
Analysis form appears.
2. In the Refresh every drop-down, select the refresh interval.
3. Select the required check boxes from the following options:
• Traffic Trend
• Client Trend
• Access Points
• WLANs
• Clients
4. Click OK. You have customized the traffic analysis page.

Configuring Traffic Analysis Display for APs


Using traffic analysis you can measure the total volume of traffic sent or received by an Access
Point (AP). You can view historical and real-time data of the AP. Throughput and the number of
clients connected to the AP are displayed in a bar chart. You must configure the AP settings to
view its traffic analysis.
To configure the AP settings:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
24
Navigating the Dashboard
Traffic Analysis

1. From the Access Points area, click settings . Figure 10: AP Settings Form on page 25
appears.
Figure 10: AP Settings Form

2. In Show top, enter the number of APs for which the traffic must be analyzed. Range: 5
through 20.
3. Select the Type of display you want to view. For example, Chart or Table.
4. Select the required AP identification option to be displayed. For example, Name, MAC or
IP.
5. From the drop-down, select the required display layout. For example, Horizontal Layout or
Vertical Layout.
6. Select or clear the required options that must be displayed in the Content area.
• Topology—To view the location map.
• Bytes—To view the throughput.
• Clients—To view the client details.
7. Select the following mouse-scroll behavior when you point the mouse over a map:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
25
Navigating the Dashboard
Traffic Analysis

• Zoom
• Scroll
8. Click OK.

Configuring Traffic Analysis Display for WLANs


Using traffic analysis you can measure the total volume of traffic sent or received by WLANs.
You can view historical and real-time data of the WLANs. Throughput and the number of clients
connected to the WLANs are displayed in a bar chart. You must configure the WLAN settings
to view its traffic analysis.
To configure the WLAN settings:
1. From the WLAN area, click settings . Figure 11: WLAN Settings Form on page 26 appears.
Figure 11: WLAN Settings Form

2. In Show top, enter the number of WLANs for which the traffic must be analyzed. Range: 5
through 20.
3. Select the Type of display you want to view. For example, Chart or Table.
4. Select the required WLAN identification option to be displayed. For example, Name or SSID.
5. Click OK.

Configuring Traffic Analysis Display for Top Clients


Using traffic analysis you can measure the total volume of traffic sent or received by Clients. You
can view historical and real-time data of the Clients. The chart displays:
• Bytes—Frequency and number of clients connected to the AP
• OS Type—Types of OS the associated clients are using
• Application—Throughput the applications use
You must configure the Client settings to view its traffic analysis.
To configure the Client settings:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
26
Navigating the Dashboard
Traffic Analysis

• From the Clients area, click settings . Figure 12: Client Setting Form on page 27 appears.
Figure 12: Client Setting Form

• In Show top, enter the number of Clients for which the traffic must be analyzed. Range: 5
through 20.
• Select the Type of display you want to view. For example, Chart or Table.
• Select the required Client identification option to be displayed. For example, Name, MAC
or IP.
• Click OK.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
27
Configuring System Settings
Configuring General Settings

Configuring System Settings 2


In this chapter:

• Configuring General Settings


• Configuring AP Settings
• Viewing the System Cluster Overview
• Working with Maps
• Certificates
• Configuring Templates

Configuring General Settings


Viewing System Settings
You can view the system settings.
To view the system settings, from the left pane, select Systems. Figure 13: General System
Settings on page 28 appears.
Figure 13: General System Settings

Configuring System Time


The controller uses an external network time protocol (NTP) server to synchronize the times
across cluster nodes and managed access points.
To edit the system time:
1. Go to System > General Settings > Time.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
28
Configuring System Settings
Configuring General Settings

2. Enter the NTP Server address that you want to use. The default NTP server address is
ntp.ruckuswireless.com.
3. Click Sync Server to enable an AP to join the controller and automatically synchronize its
time every day.
4. Select the System Time Zone, from the drop-down that you want the controller to use. The
default time zone is (GMT +0:00) UTC.
5. Click OK.

Configuring the Remote Syslog Server


The controller maintains an internal log file of current events and alarms, but this internal log file
has a fixed capacity. Configure the log settings so you can keep copies of the logs that the
controller generates.
At a certain point, the controller will start deleting the oldest entries in log file to make room for
newer entries. If you want to keep a permanent record of all alarms and events that the controller
generated, you can configure the controller to send the log contents to a syslog server on the
network.
Follow these steps to configure the remote syslog server:
1. Go to System > General Settings > Syslog.
2. Select the Enable logging to remote syslog server check box.
3. Configure the settings as explained in Table 4: Syslog Server Configuration Settings on page
29.
4. Click OK.

Table 4: Syslog Server Configuration Settings

Field Description Your Action


Primary Syslog Server Indicates the syslog server on 1. Enter the server address.
Address the network. 2. Enter the Port number.
3. Choose the Protocol type.
4. Click Ping Syslog Server.
If the syslog server is
reachable, a flashing green
circle and the message
Success appears after the
button.

Secondary Syslog Server Indicates the backup syslog 1. Enter the server address.
Address server on the network, if any, 2. Enter the Port number.
in case the primary syslog 3. Choose the Protocol type.
server is unavailable. 4. Click Ping Syslog Server.
If the syslog server is
reachable, a flashing green
circle and the message
Success appears after the
button.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
29
Configuring System Settings
Configuring General Settings

Field Description Your Action


Facility for Application Logs Indicates the facility for Select the option from the
application logs. drop-down. Range: 0 through
7.
Facility for Administrator Indicates the facility for Select the option from the
Activity Logs administrator logs. drop-down. Range: 0 through
7.
Facility for Events Indicates the facility for event Select the option from the
logs. drop-down. Range: 0 through
7.
Event Filter Indicates the type of event Choose the required option:
that must be sent to the
• All events — Send all
syslog server.
controller events to the
syslog server.
• All events except client
association /
disassociation events —
Send all controller events
(except client association
and disassociation events)
to the syslog server.
• All events above a
severity — Send all
controller events that are
above the event severity to
the syslog server.

Event Filter Severity applies Indicates the lowest severity Select the option from the
to Event Filter > All events level. Events above this drop-down.
above a severity severity level will be sent to
the syslog server.
Priority Indicates the event severity to Choose the syslog priority
syslog priority mapping in the among Error, Warning, Info
controller. and Debug, for the following
event severities:
• Critical
• Major
• Minor
• Warning
• Informational
• Debug

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
30
Configuring System Settings
Configuring General Settings

Configuring SCI Settings


SmartCell Insight uses data from the controller to analyse performance and generate reports
about the WiFi network. Configuring the SCI settings in the controller enables data transfer from
the controller to the SCI server using the MQTT protocol.
Follow these steps to configure the SCI server settings:
1. Go to System > General Settings > SCI.
2. Select the Enable SCI check-box to configure the SCI server settings.
3. Click Create, the Create SCI Profile form appears.
4. Enter the following details:
• Name—Profile name.
• Server Host—IP address to the SCI host server.
• Server Port—Port number over which the SCI server and controller can communicate
and transfer data.
• User—Name for the user.
• Password—password for the respective user.
• System ID—ID of the SCI system that should be accessed.
5. Click OK.

NOTE: You can also edit or delete an SCI profile. To do so, select the SCI profile from the list
and click Configure or Delete as required.

Setting the Northbound Portal Password


Third-party applications use the northbound portal intrface to authenticate users and to retrieve
user information during the UE association.
Follow these steps to configure the northbound portal interface:
1. Go to System > General Settings > Northbound Interface.
2. Select Enable Northbound Interface Support, and enter the User Name and Password.
3. Click OK.

Enabling Global SNMP Notifications


The controller supports the Simple Network Management Protocol (SNMP v2 and v3), which
allows you to query controller information, such as system status, AP list, etc., and to set a
number of system settings using a Network Management System (NMS) or SNMP MIB browser.
You can also enable SNMP traps to receive immediate notifications for possible AP and system
issues.
The procedure for enabling the internal SNMP agents depends on whether your network is using
SNMPv2 or SNMPv3. SNMPv3 mainly provides security enhancements over the earlier version,
and therefore requires you to enter authorization passwords and encryption settings, instead of
simple clear text community strings.
Both SNMPv2 and SNMPv3 can be enabled at the same time. The SNMPv3 framework provides
backward compatibility for SNMPv1 and SNMPv2c management applications so that existing
management applications can still be used to manage the controller with SNMPv3 enabled.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
31
Configuring System Settings
Configuring General Settings

Configuring SNMP v2 Agent


To configure SNMP v2 Agent settings:
1. Go to System > General Settings > SNMP Agent.
2. Select the Enable SNMP Notifications Globally check box to send out notification messages.
3. To configure the SNMPv2 Agent, click Create and update the details as explained in the
following table.

Table 5: SNMP v2 Agent Settings

Field Description Your Action


Community Indicates that applications Enter a name.
which send SNMP
Get-Requests to the controller
(to retrieve information) will
need to send this string along
with the request before they
will be allowed access.
Privilege Indicates the privileges Select the required privileges:
granted to this community.
• Read—Privilege only to
read.
• Write—Privilege only to
read and write.
• Notification—Privilege to:
• Trap—Choose this
option to send SNMP
trap notification.
• Inform—Choose this
option to send SNMP
notification.
1. Enter the Target IP
address.
2. Enter the Target Port
number.
3. Click Add.

NOTE: You can also edit or delete an SNMPv2 agent. To do so, select the SNMPv2 agent
from the list and click Configure or Delete respectively.

4. Click OK.

Configuring SNMP v3 Agent


1. Go to System > General Settings > SNMP Agent.
2. Select the Enable SNMP Notifications Globally check box to send out notification messages.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
32
Configuring System Settings
Configuring General Settings

3. To configure the SNMPv3 Agent, click Create and update the details as explained in the
follwoing table.

Table 6: SNMPv3 Agent Settings

Field Description Your Action


Community Indicates that applications Enter a name.
which send SNMP
Get-Requests to the controller
(to retrieve information) will
need to send this string along
with the request before they
will be allowed access.
Authentication Indicates the authentication Choose the required option:
method.
• None—Use no
authentication.
• SHA—Secure Hash
Algorithm, message hash
function with 160-bit
output.
1. Enter the Auth Pass
Phrase.
2. Choose the Privacy
option.
• None: Use no
privacy method.
• DES: Data
Encryption
Standard, data block
cipher.
• AES: Advanced
Encryption
Standard, data block
cipher.
3. Enter a Privacy
Phrase, 8 through 32
characters.
• MD5—Message-Digest
algorithm 5, message hash
function with 128-bit
output.
1. Enter the Auth Pass
Phrase.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
33
Configuring System Settings
Configuring General Settings

Field Description Your Action


2. Choose the Privacy
option.
• None: Use no
privacy method.
• DES: Data
Encryption
Standard, data block
cipher.
• AES: Advanced
Encryption
Standard, data block
cipher.
3. Enter a Privacy
Phrase, 8 through 32
characters.

Privilege Indicates the privileges Select the required privileges:


granted to this community.
• Read—Privilege only to
read.
• Write—Privilege only to
read and write.
• Notification—Privilege to:
• Trap—Choose this
option to send SNMP
trap notification.
• Inform—Choose this
option to send SNMP
notification.
1. Enter the Target IP
address.
2. Enter the Target Port
number.
3. Click Add.

NOTE: You can also edit or delete an SNMPv3 agent. To do so, select the SNMPv3 agent
from the list and click Configure or Delete respectively.

4. Click OK.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
34
Configuring System Settings
Configuring General Settings

Configuring SMTP Server Settings


If you want to receive copies of the reports that the controller generates or to email guest passes
to users, you need to configure the SMTP server settings and the email address from which the
controller will send the reports.
Follow these steps to configure the SMTP server settings:
1. Go to System > General Settings > SMTP.
2. Select Enable SMTP Server.
3. Enter the Logon Name or user name provided by your ISP or mail administrator. This might
be just the part of your email address before the @ symbol, or it might be your complete email
address. If you are using a free email service (such as Hotmail™ or Gmail™), you typically
have to type your complete email address.
4. Enter the associated Password.
5. For SMTP Server Host, enter the full name of the server provided by your ISP or mail
administrator. Typically, the SMTP server name is in the format smtp.company.com.
6. For SMTP Server Port, enter the SMTP port number provided by your ISP or mail
administrator. Often, the SMTP port number is 25 or 587. The default SMTP port value is
25.
7. For Mail From, enter the source email address from which the controller sends email
notifications.
8. For Mail To, enter the recipient email address to which the controller sends alarm messages.
You can send alarm messages to a single email address.
9. Select the Encryption Options, if your mail server uses encryption.
• TLS
• STARTTLS
Check with your ISP or mail administrator for the correct encryption settings that you need
to set.
10. Click Test, to verify if the SMTP server settings are correct. The test completed successfully
form appears, click OK.
11. Click OK.

Configuring FTP Server Settings


The controller enables you to automatically back up statistics files, reports, and system
configuration backups to an external FTP server.
However, before you can do this, you must add at least one FTP server to the controller.
Follow these steps to add an FTP server to which the controller will export data automatically:
1. Go to System > General Settings > FTP.
2. Click Create, the Create FTP Server from appears.
3. Enter an FTP Name that you want to assign to the FTP server that you are adding.
4. Select the required Protocol; FTP or SFTP (Secure FTP) protocol.
5. Enter the FTP Host, IP address of the FTP server.
6. Enter the FTP Port, number. The default FTP port number is 21.
7. Enter a User Name for the FTP account that you want to use.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
35
Configuring System Settings
Configuring AP Settings

8. Enter a Password that is associated with the FTP user name.


9. For Remote Directory, enter the remote FTP server path to which data will be exported from
the controller. The path must start with a forward slash (/)
10. To verify that the FTP server settings and logon information are correct, click Test. If the
server and logon settings are correct, a confirmation message stating, "FTP server connection
established successfully" appears.
11. Click OK.

NOTE: You can edit or delete an existing FTP setting. To do so, select the FTP setting from the
list and click Configure or Delete respectively.

Configuring the SMS Gateway Server


You can define the external gateway services used to distribute guest pass credentials to guests.
To configure an external SMS gateway for the controller:
1. Go to System > General Settings > SMS.
2. Select the Enable Twilio SMS Server check box to use an existing Twilio account for SMS
delivery.
3. Enter the following Twilio Account Information:
• Server Name
• Account SID
• Auth Token
• From (phone number)
4. Click OK.

Configuring AP Settings
Approving APs
APs must be approved to join the system.
To approve an AP:
1. Go to System > AP Settings > Approval.
2. To approve each newly discovered APs
• automatically, select the Automatically approve all join requests from APs check box.
• manually, clear the Automatically approve all join requests from APs check box. This
option enhances wireless security.
3. Click OK.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
36
Configuring System Settings
Configuring AP Settings

Working with AP Registration Rules


Registration rules enable the controller to assign an AP to an AP zone automatically based on
the rule that the AP matches.

NOTE: A registration rule is only applied to an AP the first time it joins the controller. If an AP’s
MAC address already exists on the controller database (whether it is in connected on
disconnected state and whether it belongs to the Staging Zone or any other zone), the controller
will assign the AP to its last known AP zone.

This section describes the following tasks:

Creating an AP Registration Rule


You must create rules to register an AP.
To create an AP registration rule:
1. Go to System > AP Settings > AP Registration.
2. Click Create, the AP Registration Rule form appears.
3. Enter a Rule Description.
4. Select the Zone Name to which this rule applies.
5. In Rule Type, click the basis upon which you want to create the rule. Options include:

NOTE: The format of the IP address or addresses that you need to enter here depends on
the AP IP mode that you selected when you created the AP zone to which this rule will be
assigned. If you selected IPv4 Only, enter an IPv4 address. If you selected IPv6 Only, enter
an IPv6 address.

• IP Address Range: If you select this option, enter the From (starting) and To (ending) IP
address that you want to use.
• Subnet: If you select this option, enter the IP address and subnet mask pair to use for
matching.
• GPS Coordinates: If you select this option, type the GPS coordinates to use for matching.
Access points that have been assigned the same GPS coordinates will be automatically
assigned to the AP zone that you will choose in the next step.
You can choose the Rule Type as GPS coordinates, wherein you must provide information
about the latitude, longitude and distance to determine if the AP is within the defined area.
• Provision Tag: If the access points that are joining the controller have been configured
with provision tags, click the Provision Tag option, and then type a tag name in the Provision
Tag box. Access points with matching tags will be automatically assigned to the AP zone
that you will choose in the next step.

NOTE: Provision tags can be configured on a per-AP basis from the access point’s
command line interface.

6. Click OK.
When the process is complete, the page refreshes, and then registration rule that you created
appears on the AP Registration Rules page.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
37
Configuring System Settings
Configuring AP Settings

To create another registration rule, repeat the preceding steps. You can create as many
registration rules as you need to manage the APs on the network.

NOTE: You can also edit, delete or clone an AP registration rule. To do so, select the rule profile
from the list and click Configure, Delete or Clone respectively.

Configuring Registration Rule Priorities


The controller applies registration rules in the same order as they appear in the AP Registration
Rules table (highest to lowest priority).
If you want a particular registration rule to have higher priority, you must move it up the table.
Once an AP matches a registration rule, the controller assigns the AP to the zone specified in
the rule and stops processing the remaining rules.
Follow these steps to configure the registration rule priorities.
1. Go to System > AP Settings > AP Registration.
2. Select the rule from the list and click.
• Up—To give a rule higher priority, move it up the table
• Down—To give a rule lower priority, move it down the table
3. Click Update Priorities to save your changes.

Creating vSZ-D Zone Affinity


To create a zone affinity:

NOTE: This feature is applicable only to vSZ-E platform.

1. Go to System > AP Settings > vSZ-D Zone Affinity.


2. Click Create, the Create New vSZ-D Zone Affinity form appears.
3. Enter a Name and Description for the zone affinity.
4. Click Create, the Add vSZ-D form appears.
5. Choose the zone from the drop-down.
6. Click OK.

Tagging Critical APs


A critical AP is an AP that exceeds the daily traffic threshold (sum of uplink and downlink) data
bytes configured on the controller web interface.
Follow these steps to tag critical APs (APs that exceed the data traffic threshold that you have
defined) automatically:
1. Go to System > AP Settings > Critical AP Tagging.
2. Select the Enable Auto Tagging Critical APs check box.
3. For Auto Tagging Rules, select Daily Traffic Bytes Exceeds Threshold.
4. For Rule Threshold:
• In the first box, enter the value that you want to set as the traffic threshold. This value will
be applied in conjunction with the data unit that you select in the second box.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
38
Configuring System Settings
Viewing the System Cluster Overview

• In the second box, select the data unit for the threshold – MB for megabytes or GB for
gigabytes.
5. Click OK.
APs that exceed the daily traffic threshold that you specified will appear highlighted on the Access
Points page and the Access Point details page. Additionally, the controller will send an SNMP
trap to alert you that that an AP has been disconnected.

Configuring the Tunnel UDP Port


The tunnel UDP port is used by all GRE+UDP type tunnels.
To configuring the tunnel UDP port:
1. Go to System > AP Settings > Tunnel UDP Port.
2. Enter the Tunnel UDP Port number.
3. Click OK.

Setting the Country Code


Different countries follow different regulations for radio channel usage.
To ensure that the APs use authorized radio channels:
1. Go to System > AP Settings > Country Code.
2. Select the Country Code for your location from the drop-down.
3. Click OK.

Viewing the System Cluster Overview


The system cluster overview provides summary information of the controller cluster.
To view the cluster settings:
• From the left pane of the application, click System > Cluster. The Cluster page appears as
shown in Figure 14: System Cluster Overview on page 39.
Figure 14: System Cluster Overview

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
39
Configuring System Settings
Viewing the System Cluster Overview

Control Planes and Data Planes


Control planes and data planes are used to control traffic.
The control plane manages and exchanges routing table information. The control plane packets
are processed by the router to update the routing table information. The data plane forwards
the traffic along the path according to the logic of the control plane.
You can view historical and real time traffic of the nodes. To view the traffic:
1. From the Controller page, select the node.
2. Click the Traffic & Health from the lower end of the page.
3. Select the option from the drop-down:
• Historical Data, and enter the timeframe for which you want.
• Real Time Data, enter the duration in minutes and click Start.

Figure 15: Cluster Node Traffic and Health. on page 40 appears.


Figure 15: Cluster Node Traffic and Health.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
40
Configuring System Settings
Viewing the System Cluster Overview

Interface and Routing


To configure a cluster node, you must define interface and routing information.
Interface
You can only create one user defined interface, and it must be for a hotspot service and must
use the control interface as its physical interface.The control plane and the UDI must be on
different subnets. If the control plane and UDI are on the same subnet, and assigned with the
same IP address, APs will be unable to communicate with the control plane. If the control plane
and UDI are on the same subnet and assigned different IP addresses, hotspot clients will not
be redirected to the logon URL for user authentication.

NOTE: The user defined interface (UDI) is unavailable in Virtual SmartZone (High-Scale and
Essentials).

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
41
Configuring System Settings
Viewing the System Cluster Overview

Static Routing
Static routing is used to manually configure routing entry. Static routes are fixed and do not
change if the network is changed or reconfigured. Static routing are usually used to maximize
efficiency and to provide backups in the event that dynamic routing information fails to be
exchanged.

Displaying the Chassis View of Cluster Nodes


The chassis view provides a graphical representation of the control panel (on the front panel of
the controller), including the LEDs.
Use the LEDs to check the status of the ports and power supplies on the controller. Fan status
is also displayed on the chassis view.
To view the chassis of the cluster node:
1. From the Cluster page, select the node.
2. From the lower-left side of the page, click the Chassis tab. Figure 16: Cluster Node Chassis
on page 42 appears.
Figure 16: Cluster Node Chassis

Enabling Cluster Redundancy


If you have multiple clusters on the network, you can configure cluster redundancy to enable
APs managed by a particular cluster to fail over automatically to another cluster if their parent
cluster goes out of service or becomes unavailable.
Before you configure cluster redundancy, take note of the following:
• Cluster redundancy is disabled by default.
• Only super administrators have the capability to configure the cluster redundancy settings.
• To configure cluster redundancy, you will need to retrieve the IP addresses assigned to the
control interfaces of all nodes on clusters that you want to configure.
Figure 17: Cluster Redundancy

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
42
Configuring System Settings
Viewing the System Cluster Overview

Follow these steps to enable cluster redundancy:


1. Go to System > Cluster. The Cluster page appears.
2. Select the cluster, scroll down and click the Configuration tab.
3. On the right side of the Configuration area, click Configure. The Edit Clustr page appears.
4. In the Cluster Redundancy area, select the Enable Cluster Redundancy check box.
5. To add the cluster control IP, click Create. The Cluster Redundancy form appears.
6. Enter a Name.
7. Enter the Control IP and click ADD. The control IP is added to the list.
8. Click OK. You have enabled cluster redundancy.

NOTE: After configuring redundancy for a cluster, Ruckus Wireless strongly recommends backing
up the controller configuration.

How Cluster Redundancy Works


The following simplified scenario describes how cluster redundancy works and how managed
APs fail over from one controller cluster to another.
1. After you enable and configure cluster redundancy on the controller, managed APs obtain
the updated configuration (which now includes the failover settings) from the controller. If you
have two clusters, for example, managed APs will obtain a failover list similar to the following:
{"Cluster A":[ "IP_A1", "IP_A2, "IP_A3", "IP_A4"], "Cluster
B":["IP_B1", "IP_B2, "IP_B3", "IP_B4"]}.
2. If Cluster A goes out of service or becomes unavailable, APs managed by Cluster A will
attempt to connect to the IP addresses (one node at a time) specified for Cluster A.
3. If managed APs are unable to connect to the IP addresses specified for Cluster A, they will
attempt to connect to the IP addresses (one node at a time) specified for Cluster B.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
43
Configuring System Settings
Viewing the System Cluster Overview

4. If managed APs are able to connect to one of the IP address specified for Cluster B, they fail
over to Cluster B. Then, they apply the registration rules that have been configured for Cluster
B and renew their certificates.

NOTE: The second cluster to which APs fail over must have sufficient license seats to
accommodate the new APs that it will be managing. If the second cluster has insufficient license
seats, the failover will be unsuccessful.

Configuring the Control Plane


Control Plane configuration includes defining the physical interface, user defined interface and
static routes.
To configure a control plane:
1. Go to System > Cluster > Control Planes.
2. Select the control plane from the list and click Configure. The Edit Control Plane Network
Settings form appears.
3. Configure the settings as explained in Table 7: Configuring Control Plane on page 44.
4. Click OK.

NOTE: You must configure the Control interface, IPv4 Cluster interface, andManagement
interface to be on three different subnets. Failure to do so may result in loss of access to the
web interface or failure of system functions and services.

Table 7: Configuring Control Plane

Field Description Your Action


Physical Interfaces
IPv4-Control Interface Indicates the management Select the IP Mode:
and IP control settings.
• Static
(recommended)—To
manually assign an IP
address to this interface
manually.
• Enter the IP Address.
• Enter Subnet Mask.
• Enter the Gateway
router address.
• Enter Control NAT IP
address.
• DHCP—To automatically
obtain an IP address from
a DHCP server on the
network.
• Enter Control NAT IP.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
44
Configuring System Settings
Viewing the System Cluster Overview

Field Description Your Action


IPv4-Cluster Interface Indicates the IPv4 cluster Select the IP Mode:
interface settings
• Static
(recommended)—To
manually assign an IP
address to this interface
manually.
• Enter the IP Address.
• Enter Subnet Mask.
• Enter the Gateway
router address.
• DHCP—To automatically
obtain an IP address from
a DHCP server on the
network.

IPv4-Management Interface Indicates the IPv4 Select the IP Mode:


management interface
• Static
settings
(recommended)—To
manually assign an IP
address to this interface
manually.
• Enter the IP Address.
• Enter Subnet Mask.
• Enter the Gateway
router address.
• DHCP—To automatically
obtain an IP address from
a DHCP server on the
network.

IPv6-Control Interface (This Indicates the IPv6 control Select the IP Mode:
feature is supported only for interface settings
• Static
SZ300 controllers)
(recommended)—To
manually assign an IP
address to this interface
manually.
• Enter the IPv6 IP
Address (global only)
with a prefix length (for
example,
1234::5678:0:C12/123)
is required. Link-local

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
45
Configuring System Settings
Viewing the System Cluster Overview

Field Description Your Action


addresses are
unsupported.
• Enter the IPv6 Gateway
address (global or
link-local) without a
prefix length. For
example,
1234::5678:0:C12
(global address without
a prefix length) and
fe80::5678:0:C12
(link-local address
without a prefix length).
• Auto—To automatically
obtain an IP address from
Router Advertisements
(RAs) or from a DHCPv6
server on the network.

IPv6-Management Interface Indicates the IPv6 Select the IP Mode:


(This feature is supported only management interface
• Static
for SZ300 controllers) settings
(recommended)—To
manually assign an IP
address to this interface
manually.
• Enter the IPv6 IP
Address (global only)
with a prefix length (for
example,
1234::5678:0:C12/123)
is required. Link-local
addresses are
unsupported.
• Enter the IPv6 Gateway
address (global or
link-local) without a
prefix length. For
example,
1234::5678:0:C12
(global address without
a prefix length) and
fe80::5678:0:C12
(link-local address
without a prefix length).

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
46
Configuring System Settings
Viewing the System Cluster Overview

Field Description Your Action


• Auto—To automatically
obtain an IP address from
Router Advertisements
(RAs) or from a DHCPv6
server on the network.

Access & Core Separation Indicates that the Select the Enable check box.
management interface (core
side) to be the system default
gateway and the control
interface (access side) to be
used only for access traffic.
IPv4 Default Gateway & Indicates the IPv4 gateway 1. Default
DNS that you want to use - Gateway—Choose the
Control, Cluster, and Interface for which you
Management. want to assign the default
gateway setting.
NOTE: When Access & Core 2. Primary DNS
Separation is enabled, the Server—Enter the server
Default Gateway field is details.
hidden. 3. Secondary DNS
Server—Enter the server
details.

IPv6 Default Gateway & Indicates the IPv6 gateway 1. Default


DNS (This feature is that you want to use - Gateway—Choose the
supported only for SZ300 Control, Cluster, and Interface for which you
controllers) Management. want to assign the default
gateway setting.
NOTE: When Access & Core 2. Primary DNS
Separation is enabled, the Server—Enter the server
Default Gateway field is details.
hidden. 3. Secondary DNS
Server—Enter the server
details.

User Defined Interfaces

NOTE: The control plane and the UDI must be on different subnets. If the control plane and
UDI are on the same subnet, and assigned the same IP address, APs will be unable to
communicate with the control plane. If the control plane and UDI are on the same subnet
and assigned different IP addresses, hotspot clients will not be redirected to the logon URL
for user authentication.

Name Indicates the name of the Enter a name.


interface.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
47
Configuring System Settings
Viewing the System Cluster Overview

Field Description Your Action


Physical Interfaces Indicates the physical Select Control Interface.
interface.
Service Indicates the service. Select Hotspot, the hotspot
must uses the control
interface as its physical
interface.
IP Address Indicates the IP address that Enter the IP address.
you want to assign to this
interface.
Subnet Mask Indicates the subnet mask for Enter the subnet mask.
the IP address.
Gateway Indicates the IP address of the Enter the gateway IP address.
gateway router.
VLAN Indicates the VLAN ID that Enter the VLAN ID.
you want to assign to this
interface.
Add Adds the interface settings. Click Add.
Static Routes
Network Address Indicates the destination IP Enter the IP address.
address of this route.
Subnet Mask Indicates a subnet mask for Enter the subnet mask.
the IP address.
Gateway Indicates the IP address of the Enter the IP address of the
gateway router. gateway router.
Interface Indicates the physical Select the interface.
interface to use for this route.
Metric Represents the number of Enter the number of routers.
routers between the network
and the destination.
Add Adds the static route settings. Click Add.

NOTE: You can also delete or restart a control plane. To do so, select the control plane from
the list and click Delete or Restart respectively.

Rebalancing APs
AP rebalancing helps distribute the AP load across nodes that exist within a cluster.
When a multi-node cluster is upgraded, the node that reboots the last typically does not have
any APs associated with it.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
48
Configuring System Settings
Viewing the System Cluster Overview

When you click Rebalance APs, the following process is triggered:


1. The controller calculates the average AP count based on the number of available control
planes and data planes.
2. The controller calculates how many APs and which specific APs must be moved to other
nodes to distribute the AP load.
3. The controller regenerates the AP configuration settings based on the calculation result.
4. The web interface displays a message to inform the administrator that the controller has
completed its calculations for rebalancing APs.
5. Each AP that needs to be moved to a different node retrieves the updated AP configuration
from the controller, reads the control planes and data planes to which it must connect, and
then connects to them.
When the AP rebalancing process is complete, which typically takes 15 minutes, one of the
following events is generated:
• Event 770: Generate ApConfig for plane load rebalance succeeded.
• Event 771: Generate ApConfig for plane load rebalance failed.

NOTE:
• APs may recreate the Ruckus-GRE tunnel to a different data plane.
• Devices associated with an AP that uses the Ruckus-GRE tunnel may temporarily lose network
connection for a short period of time (typically, around five minutes) during the AP rebalancing
process.
• When node affinity is enabled, AP rebalancing is disallowed on those nodes.
• When data plane grouping is enabled, AP rebalancing is disallowed on those data planes.
• AP rebalancing only supports APs running release 3.2 firmware. APs running on legacy
firmware will not be rebalanced.

To rebalance APs across the nodes:


1. Go to System > Cluster > Control Planes > More > Rebalance APs.
Figure 18: AP Rebalancing Form

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
49
Configuring System Settings
Viewing the System Cluster Overview

2. Click Yes, the controller rebalances AP connections across the nodes over the next 15
minutes.

NOTE: If you want to repeat this procedure, you must wait 30 minutes before the controller
will allow you to rebalance APs again.

Monitoring Cluster Settings


This section provides information on how to view the status of the cluster settings.
You can select the following tabs for more information:
• Summary—Details such as Name, model, IP details, memory usage, disk usage.
• Network Settings—Details such as control interface, cluster interface, management interface,
DNS Server, Routes.
• Configuration—Details such as physical interfaces, User defined interfaces, Static Routes
Interface.
• Traffic & Health—Details such as CPU usage, memory usage, disk usage, interface, port
usage.
• Alarm—Details of alarms generated. You can Clear Alarm or Acknowledge Alarm that are
generated.
• Event—Details of events that are genrated.

Clearing or Acknowledging Alarms


You can clear or acknowledge an alarm..
To Clear an alarm:
1. From the Alarm tab, select the alarm form the list.
2. Click Clear Alarm, the Clear Alarm form appears.
3. Enter a comment and click Apply.
To acknowledge an alarm:
1. From the Alarm tab, select the alarm form the list.
2. Click Acknowledge Alarm, the Are you sure you want to acknowledge the selected form
appears.
3. Click Yes.
For more information, refer ../EventandAlarms/m-ManagingEventsAndAlarms.ditamap.

Filtering Events
You can view a list of events by severity or date and time.
To apply filters:
1. From the Event tab, select the icon. The Apply Filters form appears.
2. Select any or both the following criteria:
• Severity: Select the severity level by which you want to filter the list of events.
• Date and Time: Select the events by their Start and End dates.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
50
Configuring System Settings
Working with Maps

NOTE: You can filter events that generated in the last seven days.

3. Click OK, all the events that meet the filter criteria are displayed on the Event page.
For more information, refer ../EventandAlarms/m-ManagingEventsAndAlarms.ditamap.

Working with Maps


Importing floorplan maps into SmartZone allows you to further customize the information displayed
on the Dashboard and Access Points pages, and monitor your APs, zones, groups, clients and
traffic statistics all within the world map view on the Dashboard.
Additionally, you can use the maps to quickly locate more specific information on a venue or
zone, and drag and drop APs onto the floor plan map to represent their locations in physical
space in your venue.
Once a map is imported and GPS coordinates are entered, an icon representing the venue
appears on the world map on the Dashboard. The icon displays the current number of APs
(Online, Flagged and Offline). You can hover over the icon for more information.
Double-click the map icon or click Zoom into this map to view the imported map in the
Dashboard.
Figure 19: Once a floorplan map has been imported (with GPS coordinates), it is displayed
on the world map on the Dashboard. Hover over the local map icon for more

nio
fm
ra
oitn.

Importing a Floorplan Map


SmartZone provides a user-friendly workflow for importing a map of your venue floorplan, placing
APs in their respective physical locations on the map, and scaling the map to match the actual
dimensions of your venue.
Floorplan maps allow you to view site/venue/floor-specific details such as:
• AP status, performance, and health conditions

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
51
Configuring System Settings
Working with Maps

• Client connections to an AP
• Location-specific trouble spots related to AP or client connectivity
To import a floorplan map:
1. Go to System > Maps.
2. From the System tree hierarchy, select the location where you want to create a map and click
the add button. The Add Map form appears.
3. On the Details tab, enter a Name and optionally a Description to identify the map.
4. Enter a Location for the map.
5. For GPS Coordinates, enter the Latitude and Longitude values.
Figure 20: The Add Map

m
o
rf

6. To add a Map Image, click Browse and select a site, venue, or floor map in jpg, jpeg, png,
bmp or svg file formats.

NOTE:
The maximum file size per indoor map is 5MB.

7. Click Next, the Scale Map tab appears.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
52
Configuring System Settings
Working with Maps

8. Click two points on the map between which you know the distance. Blue dots appear to
show the points you selected.
Figure 21: Click two points on the map to define the map's

es
c
a
l

9. Enter the Physical Distance between the two points and select the unit of measurement
(mm, cm, m, ft, yard).
10. Click Save & Next. The Place APs tab appears.
11. From the Available list, drag the APs and place them in their physical locations on the map.
Click the Placed tab to see the list of placed APs.
Figure 22: Drag and drop to place APs onto your

o
a
o
p
n
lrf

12. Once you are happy with the placement of your APs on the map, click OK to save your map.
Your venue now appears as an icon on the world map on the Dashboard, located at your venue's
actual physical location (if you entered the GPS coordinates correctly). The Dashboard icon that
represents your venue provides an overview of the number of APs in the venue and their status.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
53
Configuring System Settings
Working with Maps

Hover over the icon to view more details, or click one of the links to zoom in to the venue floorplan
map you imported.
Figure 23: The imported venue map icon appears at the GPS coordinates you

con
gifue
rd

NOTE: You can also edit or delete a map. To do so, select the map from the list and click the
Edit or Delete buttons respectively.

Monitoring APs Using the Map View


Use the Map view on the Access Points page to monitor APs in relation to your venue's floorplan.
1. Go to Access Points.
2. In View Mode, click the Map button. The map view is displayed with your placed APs.
3. Hover over an AP to view the following AP-specific details:
• AP Name: The name of the AP, if configured. If not, the default AP name is "RuckusAP."
• IP Address: The current IPv4 or IPv6 address assigned to the AP.
• Channel: Displays the channel (2.4 GHz / 5 GHz) in use, along with the channel width in
parentheses.
• Clients: The number of currently connected wireless clients.
• Traffic: The total traffic volume over the last 1 hour.
• Latency: The average time delay between AP and connected clients.
• Airtime Utilization: Percent of airtime utilized, by radio.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
54
Configuring System Settings
Certificates

• Connection Failure: Percent of client connection attempt failures.


Figure 24: Hover over an AP to view

sd
la
eit

4. To view more specific details on the AP, click the See this AP in AP page link.

Certificates
All the security certificates that the controller uses for its web interface, AP portal, and hotspots
are managed from a central storage.
By default, a Ruckus Wireless-signed SSL certificate (or security certificate) exists in the controller.
However, because this default certificate is signed by Ruckus Wireless and is not recognized
by most web browsers, a security warning appears whenever you connect to the web interface
or users connect to the AP portal or a hotspot. To prevent these security warnings from appearing,
you can import an SSL certificate that is issued by a recognized certificate authority.
If you are implementing Hotspot 2.0 on the network and you want to support anonymous
authentication using OSU Server-Only Authenticated L2 Encryption Network (OSEN), you will
need to import a trust root certificate, server or intermediate certificate and private key.

Importing New Certificates


When you have an SSL certificate issued by an SSL certificate provider, you can import it into
the controller and use it for HTTPS communication.
To complete this procedure, you will need the following:
• The signed server certificate
• The intermediate CA certificate (at least one)
• The private key file

NOTE: The file size of each signed certificate and intermediate certificate must not exceed 8192
bytes. If a certificate exceeds 8192 bytes, you will be unable to import it into the controller.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
55
Configuring System Settings
Certificates

Follow these steps to import a signed server certificate:


1. Copy the signed certificate file, intermediate CA certificate file, and private key file to a location
(either on the local drive or a network share) that you can access from the controller web
interface.
2. From the application select, System > Certificates > Installed Certs.
3. Click Import, the Import Certificate form appears.
4. Enter a Name to identify the certificate.
5. Enter a Description about the certificate.
6. For Service Certificates, click Browse and select the location where the certificate is saved.
7. For Intermediate CA certificates, click Browse and select the location where the certificate
is saved. If you need to upload additional intermediate CA certificates to establish a chain of
trust to the signed certificate, you can select up to four certificates.
8. If you are using this SSL certificate for a Hotspot 2.0 configuration, you must also import a
root CA certificate. To import Root CA Certificate, click Browse and select the location
where the certificate is saved.
9. You can import the Private Key file either by
• uploading file—choose Upload and click Browse to select the location.
• using CSR—choose Using CSR and select the CSR that you generated earlier.
10. Enter the Key Passphrase that has been assigned to the private key file.
11. Click OK.

NOTE: You can also edit or delete a certificate by selecting the options Configure or
Delete respectively.

Assigning Certificates to Services


You can map certificates to services
To specify the certificate that each secure service will use:
1. From the application select, System > Certificates > Service Certs.
2. Select the certificate that you want to use for each of the following services:
• Management Web—Used by Web UI and Public API traffic.
• AP Portal—Used by Web Auth WLAN and Guest Access WLAN control traffic.
• Hotspot (WISPr)—Used by WISPr WLAN control (Northbound Interface, Captive Portal,
and Internal Subscriber Portal) traffic.
• Communicator—Used by AP control traffic.
3. To view the public key, click View Public Key, the Certificate Public Key form appears with
the public key.
4. Click OK.

Generating Certificate Signing Request (CSR)


If you do not have an SSL certificate, you will need to create a certificate signing request (CSR)
file and send it to an SSL certificate provider to purchase an SSL certificate.
To create a CSR file:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
56
Configuring System Settings
Certificates

1. From the application select, System > Certificates > CSR.


2. Click Generate, the Generate CSR form appears.
3. Enter the following details:
• Name—A name for this CSR.
• Description— A short description for this CSR.
• Common Name—A fully qualified domain name of your Web server. This must be an
exact match (for example, www.ruckuswireless.com).
• Email—An email address (for example, joe@ruckuswireless.com).
• Organization—Complete legal name of your organization (for example, Ruckus
Wireless, Inc.). Do not abbreviate your organization name.
• Organization Unit—Name of the division, department, or section in your organization that
manages network security (for example, Network Management).
• Locality/City—City where your organization is legally located (for example, Sunnyvale).
• State/Province—State or province where your organization is legally located (for example,
California) Do not abbreviate the state or province name.
4. Select the Country
5. Click OK, the controller generates the certificate request. When the certificate request file is
ready, your web browser automatically downloads it.
6. Go to the default download folder of your Web browser and locate the certificate request file.
The file name is myreq.zip.
7. Use a text editor (for example, Notepad) to open the certificate request file.
8. Go to the website of your preferred SSL certificate provider, and then follow the instructions
for purchasing an SSL certificate.
9. When you are prompted for the certificate signing request, copy and paste the entire content
of myreq.csr, and then complete the purchase.
10. After the SSL certificate provider approves your CSR, you will receive the signed certificate
via email.
11. Copy the content of the signed certificate, and then paste it into a text file.
12. Save the file.

NOTE: You can also edit, clone, download or delete a CSR by selecting the options Configure,
Clone, Download or Delete respectively.

Managing AP Certificates
AP certificates are valid for a period of time and have to be replaced when they expire.
You must get AP Certificate Replacement before your AP certificate expires. The system generates
an apCertificateExpireSystem alarm and event when an AP certificate expires.
To get an AP Certificate replacement:
1. From the application select, System > Certificates > AP Certificate Replacement.
2. In the AP Request List area, those APs with the Need Export column marked Yes needs
certificate replacement. Those marked with No means that the certificate request has already
been exported.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
57
Configuring System Settings
Certificates

NOTE: Use the Search terms option to look for APs by name, model, serial number, or
description.

3. Click Export and select one of the following options:


• Export All APs Certificate Request—Exports the certificates for all the AP
• New APs—Exports the certificates for new APs or APs that need to regenerate their
certificates.

NOTE: All exported AP Certificate request (.req) files generated from a cluster include it's
name. To manage multiple export request files, change the file name before uploading it to
uniquely identify the file.
For example: cert-scg-cluster5f6433ef-711b-4f44-b38a-ddd485ee2c37-R500.req

4. Login https://support.ruckuswireless.com/ with your credentials.


5. From the right pane go to Tools > Certificate Renewal. The Certificate Renewal Requests
page appears.
6. Click Browse to select the .req file exported from Certificate Refresh page.
7. Enter the Email address for communication.
8. Click Upload, you will receive an e-mail acknowledgment from Ruckus Wireless.
9. From the Certificate Renewal Request page, check the Status column of your request. After
the request is processed, you will receive the response from Ruckus Wireless, with a link to
the .res response file for Import on the Certificate Refresh page.
10. From the AP Certificate Replacement page of the application, click Import AP certificate
Response (.res) file. The Import AP certificate for replacement form appears.
11. Click Browse and select the file.
12. Click OK.

NOTE: All APs included in the imported response (.res) file reboot after their certificate is
refreshed.

13. From the Certificate Status area, check the Status column of the AP. If the status is:
• Updating—Controller is in the process of updating the certificate.
• Update Failed—Controller failed to update the certificate.

NOTE: The AP reports to the controller at 15-minute intervals. As a result, it may take up to
15 minutes for the AP to update its certificate status on the web interface.

14. Click Reset Update Failed AP, to reset the status of the APs for which certification update
failed. The status of the AP will change.

Importing Trusted CA Certificates


When a controller receives a server's certificate, it matchs the server's CA against the list of
trusted CAs it has. If there is no match, the controller sends an error.
To import a CA certificate:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
58
Configuring System Settings
Configuring Templates

1. From the application select, System > Certificates > Trusted CA Certs (Chain).
2. Click Import, the Import CA Certs (Chain) form appears.
3. Enter a Name.
4. Enter a Description of the certificate.
5. For Intermediate CA Certificates, click Browse and select the file. If you need to upload
additional intermediate CA certificates to establish a chain of trust to the signed certificate,
you can select up to four certificates.
6. For Root CA Certificate, click Browse and select the file.
7. Click OK.

NOTE: You can also edit or delete a CA certificate by selecting the options Configure or
Delete respectively.

Configuring Templates
Working with Zone Templates
You can create, configure, and clone zone templates

Creating Zone Templates


To create a zone template:
1. From the application select, System > Templates > Zone Templates.
2. Click Create, the Create Zone Template form appears.
3. Enter the template details as explained in Table 8: Zone Template Details on page 59.
4. Click OK.

Table 8: Zone Template Details

Field Description Your Action


General Options
Zone Name Indicates a name for the Zone. Enter a name.
Description Indicates a short description. Enter a brief description
AP Firmware Indicates the firmware to which Select the firmware.
it applies.
Country Code Indicates the country code to Select the country code.
ensure that this zone uses
authorized radio channels.
Location Indicates generic location. Enter the location.
Location Additional Indicates detailed location. Enter additional location
Information information.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
59
Configuring System Settings
Configuring Templates

Field Description Your Action


GPS Coordinates Indicates the geographical Enter the following coordinates in
location. meters or floor:
• Longitude
• Latitude
• Altitude

AP Admin Logon Indicates the admin logon Enter the Logon ID and Password.
credentials.
Time Zone Indicates the time zone that Select the option:
applies.
• System Defined: Select the
time zone.
• User defined:
1. Enter the Time Zone
Abbreviation.
2. Choose the GMT Offset
time.
3. Select Daylight Saving
Time.

AP IP Mode Indicates the IP version that Select the option:


applies.
• IPv4 only
• Dual

Radio Options
Channel Range Indicates that you want to Select Select Channel Range
override the 2.4GHz channel (2.4G) check boxes for the
range that has been configured channels on which you want the
for the zone. 2.4GHz radios to operate. Channel
options include channels 1 to 11.
By default, all channels are
selected.
DFS Channels Allows ZoneFlex APs to use Select the check box.
DFS channels.
Channel Range (5G) Indicates for what channels Select the check boxes.
Indoor want the 5GHz radios to
operate.
Channel Range (5G) Indicates for what channels Select the check boxes.
Outdoor want the 5GHz radios to
operate.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
60
Configuring System Settings
Configuring Templates

Field Description Your Action


Radio Options b/g/n (2.4 Indicates the radio option 2.4 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20 or 40
(MHz), or select Auto to set it
automatic.
• Channel—Select the channel to
use for the b/g/n (2.4GHz) radio,
or select Auto to set it
automatic.
• TX Power Adjustment—Select
the preferred TX power, if you
want to manually configure the
transmit power on the 2.4GHz
radio. By default, TX power is set
to Full/Auto on the 2.4GHz
radio

Radio Options a/n/ac (5 Indicates the radio option 5 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20, 40, 80,
80+80 or select Auto.
• Channel—For Indoor and
Outdoor, select the channel to
use for the a/n/c (5GHz) radio,
or select Auto.
• TX Power Adjustment—Select
the preferred TX power, if you
want to manually configure the
transmit power on the 5GHz
radio. By default, TX power is set
to Full/Auto on the 5GHz radio.

AP GRE Tunnel Options


Tunnel Type Indicates the support for NAT. Select the required option.
GRE Tunnel Profile Indicates the tunnel profile. Select the required option or click
Create and enter the following
details:
• Name
• Description
• Ruckus Tunnel Mode
• Tunnel Encryption

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
61
Configuring System Settings
Configuring Templates

Field Description Your Action


• WLAN Interface MTU

Syslog Options
Enable external syslog Indicates if an external syslog Select the check box and update
server for Aps server is enabled. the following details:
• Server Address
• Port
• Facility for Event
• Priority

AP SNMP Options
Enable AP SNMP Indicates if the AP SNMP Select the check box.
option is enabled.
SNMPv2 Agent Indicates SNMPv2 Agent is 1. Click Create and enter
applied. Community.
2. Select the required Privilege:
Read or Write.
3. Click OK.

SNMPv3 Agent Indicates SNMPv3 Agent is 1. Click Create and enter User.
applied. 2. Select the required
Authentication:
• None
• SHA
1. Enter the Auth Pass
Phrase
2. Select the Privacy option.
For DES and AES
options, Enter the Privacy
Phrase.
• MD5
1. Enter the Auth Pass
Phrase
2. Select the Privacy option.
For DES and AES
options, Enter the Privacy
Phrase.

3. Select the required Privilege:


Read or Write.
4. Click OK.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
62
Configuring System Settings
Configuring Templates

Field Description Your Action


Advanced Options
Channel Mode Indicates if location-based Select the check box and choose
service is enabled. the option.
Auto Channel Selection Indicates auto-channel Select the required check boxes
settings. and choose the option.
Background Scan Runs a background scan. Select the respective check boxes
and enter the duration in seconds.
Smart Monitor Indicates AP interval check and Select the check box and enter the
retry threshold settings. duration and threshold.
AP Management VLAN Indicates the AP management Choose the option. If you select
VLAN settings. VLAN ID, enter the VLAN ID that
you want to assign (valid range is
from 1 to 4094). To keep the same
management VLAN ID that has
been configured on the AP, click
Keep AP's settings
Rogue AP Detection Indicates rogue AP settings. 1. Select the check box and
choose the options:
• Enable events and alarms
for all rogue devices
• Enable events and alarms
for only malicious rogue
devices of selected types
and choose the Rogue Type:
• SSID Spoofing
• Same Network
• MAC Spoofing
• Select the Protect the
network from malicious
rogue access points check
box.

DoS Protection Indicates settings for blocking Select the check box and enter the:
a client.
• duration in seconds to Block a
client for
• number of repeat
authentication failures
• duration in seconds to be
blocked for every repeat
authentication failures.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
63
Configuring System Settings
Configuring Templates

Field Description Your Action


Client Load Balancing Balances the number of clients Select the check box and enter the
across APs. threshold.
Band Balancing Balances the bandwidth of the Select the check box and enter the
clients. percentage.
Location Based Service To disable the LBS service for Select the check box and choose
this AP group, clear the Enable the options.
LBS service check box. To use
a different LBS server for this
AP group, select the Enable
LBS service check box, and
then select the LBS server that
you want to use from the
drop-down list.
Client Admission Control Indicates the load thresholds Select the Enable check box 2.4
on the AP at which it will stop GHz Radio or 5GHz Radio and
accepting new clients. update the following details:
• Min Client Count
NOTE: Client admission cannot
be enabled when client load • Max Radio Load
balancing or band balancing is • Min Client Throughput
enabled.

AP Reboot Timeout Indicates AP reboot settings. Choose the required option for:
• Reboot AP if it cannot reach
default gateway after
• Reboot AP if it cannot reach
the controller after

NOTE: You can select a zone from the list and edit, clone or delete its template by selecting the
options Configure, Clone or Delete respectively.

Applying Zone Templates


To apply a zone template:
1. From the application select, System > Templates > Zone Templates.
2. From the list, select the zone template that you want to apply and click Apply. The Apply
Zone Templates form appears.
3. From Select AP Zone, select the required zone.
4. Click Apply.

Exporting Zone Templates


You can export a zone template.
To export a zone template:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
64
Configuring System Settings
Configuring Templates

1. From the application select, System > Templates > Zone Templates.
2. Select the zone template that you want to export and click Export Template.
3. A pop-up appears prompting you to Open or Save the zone template file with .bak extension.
Click:
• Open—To view the template file
• Save—Select the destination folder where you want to save the template file and then
click Open to view it.

Importing Zone Templates


You can import zone templates and upload them to the system.

NOTE: Configuration references to global services or profiles cannot be imported, manually


configure it after importing.

To import a zone template:


1. From the application select, System > Templates > Zone Templates.
2. Click Import, the Import Zone Templates form appears.
3. Click Browse and select the template file.
4. Click Upload.

Working with WLAN Templates


You can create, configure and clone a WLAN template.

Creating WLAN Templates


To create a WLAN template:
1. From the application select, System > Templates > WLAN Templates.
2. Click Create, the Create WLAN Template form appears.
3. Enter a Template Name.
4. Enter a Description.
5. Select the Template Firmware.
6. Choose the AP IP Mode.
7. Select AP SoftGRE Tunnel to enable all WLANs defined in this template to tunnel traffic to
SoftGRE through the AP.
8. Click OK.

NOTE: You can select a WLAN and edit, clone or delete its template by selecting the
options Configure, Clone or Delete respectively.

Applying a WLAN Template


To Apply a WLAN template to a zone:
1. From the application select, System > Templates > WLAN Templates.
2. From the list, select the WLAN template that you want to apply and click Apply. The Apply
WLAN Template to selected zones form appears.
3. From Select AP Zone, select the required zone.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
65
Configuring System Settings
Configuring Templates

4. Click Apply.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
66
67

Working With Access Points 3


In this chapter:

• Understanding the System, Zones and AP Groups


• Viewing Modes
• AP Status
• Configuring Access Points
• Managing Access Points

The following image gives you an understanding of the Access Points home page.
Figure 25: Access Points

Understanding the System, Zones and AP Groups


Hierarchy Overview
The hierarchy helps in specifying which AP groups or APs provide which WLAN services.
You can virtually split them using the following hierarchy:
• System—Highest order that comprises of multiple zones
• Zones—Comprises of multiple AP groups
• AP groups—Comprises of multiple APs
• APs—Individual access points.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
67
Working With Access Points
Understanding the System, Zones and AP Groups

Working with AP Zones


An AP zone functions as a way of grouping Ruckus Wireless APs and applying a particular set
of settings (including WLANs and their settings) to thise group of Ruckus Wireless APs. Each
AP zone can include up to 27 WLAN services.
By default, an AP zone named Staging Zone exists. Any AP that registers with the controller that
is not assigned a specific zone is automatically assigned to the Staging Zone. This section
describes how to use AP zones to manage devices.

NOTE: When an AP is assigned or moved to the Staging Zone, the cluster name becomes its
user name and password after the AP shows up-to-date state. If you need to log on to the AP,
use the cluster name for the user name and password.

Before creating an AP zone, Ruckus Wireless recommends that you first set the default system
time zone on the General Settings page. This will help ensure that each new AP zone will use
the correct country. For information on how to set the default system time zone, see Configuring
System Time on page 28.

NOTE: In vSZ-E and SZ100, when the system is upgraded to release 3.5, the new UI and
re-architected stats database will prevent the system from displaying AP and zone stats if the
AP/zone is operating on 3.4 or prior releases. In order to make full use of the UI introduced in
3.5, zones and APs should be updated to 3.5 as well. Operationally, the zones will still work,
but stats visibility will be impacted.

Creating an AP Zone
An AP zone (or zone) functions as a way of grouping Ruckus Wireless APs and applying settings
including WLANs to these groups of Ruckus Wireless APs. Each AP zone can include up to six
WLAN services.
To create an AP zone:
1. On the menu, click Access Points. The figure below appears.
Figure 26: Access Points

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
68
Working With Access Points
Understanding the System, Zones and AP Groups

2. From the System tree, select the location where you want to create the zone (for example,
System or Domain), and then click .
Figure 27: Create Groups

3. Configure the zone by completing the settings listed in the table below.
4. Click OK.

Table 9: AP Zone Details

Field Description Your Action


Name Indicates the name of the Enter a name.
zone/AP group.
Description Indicates the short description Enter a brief description
assigned to the zone or AP
group.
Type Indicates if you are creating a Appears by default. You can also
zone or an AP group. choose the option.
Parent Group Indicates the parent AP group. Appears by default.
Configuration > General Options
AP Firmware Indicates the firmware to which Select the firmware.
it applies.
Country Code Indicates the country code. Select the country code.
Using the correct country code
helps ensure that APs use only
authorized radio channels.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
69
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


Location Indicates the generic location Enter the location.
of the zone.
Location Additional Indicates detailed location. Enter additional location
Information information.
GPS Coordinates Indicates the geographical Enter the following coordinates:
location.
• Longitude
• Latitude
• Altitude

AP Admin Logon Indicates the admin logon Enter the Logon ID and Password.
credentials.
AP Time Zone Indicates the time zone that Select a time zone, and the enter
applies. the details as required.
AP IP Mode Indicates the IP version that Select the IP version.
applies.
Configuration > Mesh Options
Enable Mesh Indicates if mesh networking is Select the check box and enter the
Networking in this zone enabled. following:
• Mesh Name (ESSID)
• Mesh Passphrase

Configuration > Radio Options


Channel Range (2.4G) Indicates that you want to Select Select Channel Range
override the 2.4GHz channel (2.4G) check boxes for the
range that has been configured channels on which you want the
for the zone to which this AP 2.4GHz radios of managed APs to
group belong. operate. Channel options include
channels 1 to 11. By default, all
channels are selected.
DFS Channels Allows ZoneFlex APs to use Select the check box.
DFS channels.
Channel Range (5G) Indicates the channels on the Select the check boxes.
Indoor 5GHz radio that you want
managed indoor APs to
operate.
Channel Range (5G) Indicates the channels on the Select the check boxes.
Outdoor 5GHz radio that you want
managed outdoor APs to
operate.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
70
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


Radio Options b/g/n (2.4 Indicates the configuration Select the following options:
GHz) options for the 2.4 GHz radio.
• Channelization—Set the
channel width used during
transmission to either 20 or 40
(MHz), or select Auto to set it
automatically.
• Channel—Select the channel to
use for the b/g/n (2.4GHz) radio,
or select Auto to set it
automatically.
• TX Power Adjustment—Select
the preferred TX power, if you
want to manually configure the
transmit power on the 2.4GHz
radio. By default, TX power is set
to Full on the 2.4GHz radio

Radio Options a/n/ac (5 Indicates the configuration Select the following options:
GHz) options for the 5 GHz radio.
• Channelization—Set the
channel width used during
transmission to either 20, 40, 80,
80+80, 160 (MHz), or select
Auto to set it automatically.
• Channel—For Indoor and
Outdoor, select the channel to
use for the a/n/c (5GHz) radio,
or select Auto to set it
automatically.
• Secondary Channel
(80+80)—For Indoor and
Outdoor, the default secondary
channel to use for the a/n/c
(5GHz) radio, is set as Auto.
• TX Power Adjustment—Select
the preferred TX power, if you
want to manually configure the
transmit power on the 5GHz
radio. By default, TX power is set
to Full on the 5GHz radio.

Configuration > AP GRE Tunnel Options


Tunnel Type Indicates the supported tunnel Choose :
type (Ruckus GRE, SoftGRE
• Ruckus GRE and select the
and SoftGRE+IPsec)
GRE Tunnel Profile.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
71
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


• SoftGRE and select the GRE
NOTE: Zones configured with
Tunnel Profile.
IPv6 network address
configuration only support • SoftGRE+IPsec and select the
RuckusGRE tunnel type. IPSec Tunnel Profile.

Configuration > Syslog Options (Zone)


Enable external syslog Indicates if an external syslog Select the check box and enter the
server for APs server is enabled. following details:
• Server Address
• Port
• Facility for Event
• Priority

Configuration > AP SNMP Options


Enable AP SNMP Indicates if the AP SNMP Select the check box.
option is enabled.
SNMPv2 Agent Indicates if the SNMPv2 agent If the SNMPv2 agent is enabled,
is enabled. configure the community settings.
1. Click Create and enter
Community.
2. Select the required Privilege. If
you select Notification enter the
Target IP.
3. Click OK.

SNMPv3 Agent Indicates SNMPv3 Agent is If the SNMPv3 agent is enabled,


applied. configure the community settings.
1. Click Create and enter User.
2. Select the required
Authentication.
3. Enter the Auth Pass Phrase.
4. Select the Privacy option.
5. Select the required Privilege. If
you select Notification select
the option Trap or Inform and
enter the Target IP and Target
Port.
6. Click OK.

DHCP Service for Wi-Fi Clients


Enable DHCP Service in Enables the DHCP service for Select the check box.
this zone this zone.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
72
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


Configuration > Advanced Options
Channel Mode Indicates if location-based Select the Allow indoor channels
service is enabled. If you want check box.
to allow indoor APs that belong
to this zone to use wireless
channels that are Channel
Mode regulated as indoor-use
only.
Auto Channel Selection Indicates auto-channel Select the check box and choose
settings. the option.
Background Scan Runs a background scan. Select the respective check boxes
and enter the duration in seconds:
• Background
Scanning—Changes the AP
channel if there is interference.
• ChannelFly—Continuously
monitors potential throughput
and changes the AP channel to
minimize interference and
optimize throughput.

Smart Monitor Indicates AP interval check and Select the check box and enter the
retry threshold settings. duration and threshold.
AP Management VLAN Indicates the AP management Choose the option. Click VLAN ID,
VLAN settings. and then type the VLAN ID that you
want to assign (valid range is from
1 to 4094). To keep the same
management VLAN ID that has
been configured on the AP, click
Keep AP's settings
Rogue AP Detection Indicates rogue AP settings. Select the check box and choose
the options:
• Enable events and alarms for
all rogue devices
• Enable events and alarms for
only malicious rogue devices
of selected type and select the
Rogue Type:
• SSID Spoofing
• Same Network
• MAC Spoofing

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
73
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


• Protect the network from
malicious rogue access
points.

DoS Protection Indicates settings for blocking Select the check box and enter the
a client. duration in seconds.
Client Load Balancing Balances the number of clients Select the check box and enter the
across APs. threshold.
Band Balancing Balances the bandwidth of the Select the check box and enter the
clients. percentage.
Location Based Service Indicates that the location • Select the check box and
based service is enabled. choose the options.
• Click Create, In the Create LBS
Server form:
1. Enter the Venue Name.
2. Enter the Server Address.
3. Enter the Port number.
4. Enter the Password.

Client Admission Control Indicates the load thresholds Select the check box and update
on the AP at which it will stop the following settings:
accepting new clients.
• Min Client Count
• Max Radio Load
• Min Client Throughput

AP Reboot Timeout Indicates the AP reboot Choose the required option for:
settings.
• Reboot AP if it cannot reach
default gateway after
• Reboot AP if it cannot reach
the controller after

NOTE: You can also edit, clone or delete an AP Zone by selecting the options Configure ,
Clone or Delete respectively, from the Access Points page.

ChannelFly and Background Scanning


SmartZone controllers offer the ChannelFly and Background Scanning automatic channel selection
methods for spectrum utilization and performance optimization. While Background Scanning
must be enabled for rogue AP detection, AP location detection and radio power adjustment,
either can be used for automatic channel optimization.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
74
Working With Access Points
Understanding the System, Zones and AP Groups

The main difference between ChannelFly and Background Scanning is that ChannelFly determines
the optimal channel based on real-time statistical analysis of actual throughput measurements,
while Background Scanning uses channel measurement and other techniques to estimate the
impact of interference on Wi-Fi capacity based on progressive scans of all available channels.

NOTE: If you enable ChannelFly, Background Scanning can still be used for adjusting radio
power and rogue detection while ChannelFly manages the channel assignment. Both cannot
be used at the same time for channel management.

Benefits of ChannelFly
With ChannelFly, the AP intelligently samples different channels while using them for service.
ChannelFly assesses channel capacity every 15 seconds and changes channel when, based
on historical data, a different channel is likely to offer higher capacity than the current channel.
Each AP makes channel decisions based on this historical data and maintains an internal log of
channel performance individually.
When ChannelFly changes channels, it utilizes 802.11h channel change announcements to
seamlessly change channels with no packet loss and minimal impact to performance. The
802.11h channel change announcements affect both wireless clients and Ruckus mesh nodes
in the 2.4 GHz and/or 5 GHz bands.
Initially (in the first 30-60 minutes) there will be more frequent channel changes as ChannelFly
learns the environment. However, once an AP has learned about the environment and which
channels are most likely to offer the best throughput potential, channel changes will occur less
frequently unless a large measured drop in throughput occurs.
ChannelFly can react to large measured drops in throughput capacity in as little as 15 seconds,
while smaller drops in capacity may take longer to react to.
Disadvantages of ChannelFly
Compared to Background Scanning, ChannelFly takes considerably longer for the network to
settle down. If you will be adding and removing APs to your network frequently, Background
Scanning may be preferable. Additionally, if you have clients that do not support the 802.11h
standard, ChannelFly may cause significant connectivity issues during the initial capacity
assessment stage.
You can enable/disable ChannelFly per band. If you have 2.4 GHz clients that do not support
802.11h, Ruckus recommends disabling ChannelFly for 2.4 GHz but leaving it enabled for the
5 GHz band.
Background Scanning
Using Background Scanning, SmartZone controllers regularly samples the activity in all Access
Points to assess RF usage, to detect rogue APs and to determine which APs are near each
other for mesh optimization. These scans sample one channel at a time in each AP so as not
to interfere with network use. This information is then applied in AP Monitoring and other controller
monitoring features. You can, if you prefer, customize the automatic scanning of RF activity,
deactivate it if you feel it's not helpful, or adjust the frequency, if you want scans at greater or
fewer intervals.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
75
Working With Access Points
Understanding the System, Zones and AP Groups

NOTE: Background Scanning must be enabled for SmartZone controllers to detect rogue APs
on the network.

VLAN Pooling
When Wi-Fi is deployed in a high density environment (such as a stadium) or on a university
campus to provide access for students, the number of IP addresses required for client devices
can easily run into several thousands.
Allocating a single large subnet results in a high probability of degraded performance due to
factors like broadcast/multicast traffic.
To address this problem, VLAN pooling provides a method by which administrators can deploy
pools of multiple VLANs from which clients are assigned, thereby automatically segmenting large
groups of clients into smaller subgroups, even when connected to the same SSID.
As the client device joins the Wi-Fi network, the VLAN is assigned based on a hash of the client’s
MAC address (by default).

Working with AP Groups


AP (access point) groups can be used to define configuration options and apply them to groups
of APs at once, without having to individually modify each AP’s settings.
For each group, administrators can create a configuration profile that defines the channels, radio
settings, Ethernet ports and other configurable fields for all members of the group or for all APs
of a specific model in the group. AP groups are similar to WLAN groups (see Working with WLAN
Groups for more information). While WLAN groups can be used to specify which WLAN services
are served by which APs, AP groups are used for more specific fine-tuning of how the APs
themselves behave.

NOTE: AP group configuration settings can be overridden by individual AP settings. For example,
if you want to set the transmit power to a lower setting for only a few specific APs, leave the Tx
Power Adjustment at Auto in the AP group configuration page, then go to the individual AP
configuration page (Access Points > Access Points > Edit [AP MAC address]) and set the
Tx Power Adjustment to a lower setting.

Creating an AP Group
Creating an AP group means creating a configuration profile that defines the channels, radio
settings, Ethernet ports and other configurable fields for all members of the group or for all APs
of a specific model in the group.
Follow these steps to create an AP group.
1. From the left pane, select Access Points. The below figure appears.
Figure 28: Access Point

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
76
Working With Access Points
Understanding the System, Zones and AP Groups

2. From the System tree hierarchy, select the location (for example: System, Zone) and click
. The following figure appears.
Figure 29: Create Groups

3. Enter the details as explained in the follwoing table.


4. Click OK.

Table 10: AP Group Details

Field Description Your Action


Name Indicates a name for the Enter a name.
Zone/AP group.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
77
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


Description Indicates a short description. Enter a brief description
Type Indicates if you are creating a Appears by default. You can also
zone or an AP group. choose the option.
Parent Group Indicates the parent group that Appears by default.
this AP group belongs.
Configuration > General Options
Location Indicates generic location. Enter the location.
Location Additional Indicates detailed location. Enter additional location
Information information.
GPS Coordinates Indicates the geographical Enter the following coordinates in
location. meters or floor:
• Longitude
• Latitude
• Altitude

Configuration > Group Members


Members Displays the list of APs that Select the members from the list
belong to the group. and click Move to to assign them
to the required group.
Access Points Displays the list of APs that Select the Access Points from the
belong to the zone. list and click Add to Group.
Configuration > Radio Options
Channel Range (2.4G) Indicates that you want to Select Select Channel Range
override the 2.4GHz channel (2.4G) check boxes for the
range that has been configured channels on which you want the
for the zone to which this AP 2.4GHz radios of managed APs to
group belong. operate. Channel options include
channels 1 to 11. By default, all
channels are selected.
Channel Range (5G) Indicates for what channels Select the check boxes.
Indoor want the 5GHz radios of
managed indoor APs to
operate.
Channel Range (5G) Indicates for what channels Select the check boxes.
Outdoor want the 5GHz radios of
managed outdoor APs to
operate.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
78
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


Radio Options b/g/n (2.4 Indicates the radio option 2.4 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20 or 40
(MHz), or select Auto to set it
automatically.
• Channel—Select the channel to
use for the b/g/n (2.4GHz) radio,
or select Auto to set it
automatically.
• TX Power—Select the preferred
TX power, if you want to
manually configure the transmit
power on the 2.4GHz radio. By
default, TX power is set to Full
on the 2.4GHz radio
• WLAN Group—Specifies to
which WLAN group this AP
group belongs.

Radio Options a/n/ac (5 Indicates the radio option 5 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20, 40, 80,
80+80, 160 (MHz), or select
Auto to set it automatically.
• Channel—For Indoor and
Outdoor, select the channel to
use for the a/n/c (5GHz) radio,
or select Auto to set it
automatically.
• TX Power—Select the preferred
TX power, if you want to
manually configure the transmit
power on the 5GHz radio. By
default, TX power is set to Full
on the 5GHz radio.
• WLAN Group—Specify to which
WLAN group this AP group
belongs.

Configuration > AP SNMP Options


Override zone Indicates that the AP Group Select the check box.
configuration configuration overrides the
zone configuration.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
79
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


Enable AP SNMP Indicates if the AP SNMP Select the check box.
option is enabled.
SNMPv2 Agent Indicates SNMPv2 Agent is 1. Click Create and enter
applied. Community.
2. Select the required Privilege. If
you select Notification enter the
Target IP.
3. Click OK.

SNMPv3 Agent Indicates SNMPv3 Agent is 1. Click Create and enter User.
applied. 2. Select the required
Authentication.
3. Enter the Auth Pass Phrase.
4. Select the Privacy option.
5. Select the required Privilege. If
you select Notification select
the option Trap or Inform and
enter the Target IP and Target
Port.
6. Click OK.

Configuration > Model Specific Options

NOTE: Select the Override check box for that setting, and then configure the setting.

AP Model Indicate the AP model for Select the option.


which you are configuring.
Status LEDs Disable the status LED on the Select the option.
selected AP model.
LLDP Enables the Link Layer Select the option and enter the
Discovery Protocol (LLDP) on following details:
the selected AP model.
• Advertise Interval—Enter the
duration in seconds.
• Hold Time—Enter the duration
in seconds.
• Enable Management IP
TLV—Select the check box.

External Antenna (2.4 Enables the external 2.4 GHz Select the Enable external
GHz) antenna on the selected AP antenna check box, and then set
model. the gain value (between 0 and
90dBi) in the box provided.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
80
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


External Antenna (2.4 Enables the external 5 GHz Select the Enable external
GHz) antenna on the selected AP antenna check box, and then set
model. the gain value (between 0 and
90dBi) in the box provided.
Port Settings Indicates the port settings. Select the option and choose the
required LAN option.
PoE out port Enables PoE out mode. Select the Enable PoE out ports
(specific ZoneFlex AP models only)
check box.
PoE Operating Mode Indicates the PoE operating Choose the option.
mode of the selected AP model
NOTE: When this option is
selected, some AP features are
disabled to reduce power
consumption, such as the USB port
and one of the Ethernet ports.

Internal Heater Enables the heater that is built Select the Enable internal heaters
into the selected AP model (specific AP models only) check
box.
USB Port Disables the USB port. USB Select the Disable USB port check
ports are enabled by default. box.
Configuration > Advanced Options
Location Based Service Enables location-based service • Select the Override zone
for the AP group. configuration check box.
• Select the Enable LBS Service
check box.
• Select an LBS Server from the
drop-down.

Hotspot 2.0 Venue Indicates the hotspot profile Select the required option or click
Profile that you want to assign to the Create and update the following
group. details:
• Enter the Name.
• Enter the Description.
• Enter the Venue Names.
• Select the Venue Category.
• Select the Type.
• Enter the WLAN Metrics.

AP Management VLAN Indicates the AP management Choose the option. Click VLAN ID,
VLAN settings. and then type the VLAN ID that you

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
81
Working With Access Points
Understanding the System, Zones and AP Groups

Field Description Your Action


want to assign (valid range is from
1 to 4094). To keep the same
management VLAN ID that has
been configured on the AP, click
Keep AP's settings.
Auto Channel Selection Indicates auto-channel Select the check box and choose
settings. the option.
Client Admission Control Indicates the load thresholds Select the Override check box
on the AP at which it will stop respective to 2.4 GHz Radio or 5
accepting new clients. GHz Radio and update the
following details:
• Enable

NOTE: Client load balancing and


band balancing will be disabled
for this AP group.

• Min Client Count


• Max Radio Load
• Min Client Throughput

NOTE: You can also edit, clone or delete an AP Group by selecting the options Configure ,
Clone or Delete respectively, from the Access Points page.

Configuring Model-Based Settings


If you want to apply a set of settings to all APs of a particular model, use the Model-Based
Settings option.
Follow the steps to configure the model based settings.
1. From the left-pane, click Access Points. The Access Points page appears.
2. From the list, select the AP for which you want to apply the model-based settings and click
Configure. The Edit AP form appears.
3. Scroll down to Model Specific Options section, and then click the + icon to expand the
section.
4. In Model Specific Control, select the Override zone config check box. The settings available
for the AP model appear.
5. In the General Options section, configure the following settings:

NOTE: The options that appear in the General Options section depend on the AP model
that you select. Not all the options described in the table below will appear for every AP model.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
82
Working With Access Points
Understanding the System, Zones and AP Groups

Option Description
USB Port To disable the USB port on the selected AP model, select the
Disable USB port check box. USB ports are enabled by default.
Status LEDs To disable the status LED on the selected AP model, select the
Disable Status LEDs check box.
LLDP To enable the Link Layer Discovery Protocol (LLDP) on the
selected AP model, select the Enable Link Layer Discovery
Protocol check box.
• Enter the Advertise Interval duration in seconds
• Enter the Hold Time duration in seconds
• Select the Enable Management IP TLV check box

PoE Operating Mode Select the PoE operating mode of the selected AP model.
Available options include Auto (default), 802.3af, 802.3at, and
802.3at+ mode. If 802.3af PoE Operating Mode PoE is selected,
this AP model will operate in 802.3af mode and will consume
less power than in 802.3at mode. However, when this option
is selected, some AP features are disabled to reduce power
consumption, such as the USB port and one of the Ethernet
ports.
PoE out port To enable the PoE out port on the selected AP model, select
the Enable PoE out ports (specific ZoneFlex AP models
only) .

NOTE: If the controller country code is set to United Kingdom,


an additional Enable 5.8 GHz Channels option will be available
for outdoor 11n/11ac APs. Enabling this option allows the use
of restricted C-band channels. These channels are disabled by
default and should only be enabled by customers with a valid
license to operate on these restricted channels.

Internal Heater To enable the heater that is built into the selected AP model,
select the Enable internal heaters (specific AP models only)
check box.
External Antenna (2.4 To enable the external 2.4 GHz antenna on the selected AP
GHz) model, select the Enable external antenna check box, and
then set the gain value (between 0 and 90dBi) in the box
provided.
External Antenna (5 GHz) To enable the external 5 GHz antenna on the selected AP model,
select the Enable external antenna check box, and then set the
gain value (between 0 and 90dBi) in the box provided.

6. In the Port Settings section, configure the following options for each LAN port.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
83
Working With Access Points
Understanding the System, Zones and AP Groups

NOTE: The number of LAN ports that appear in this section correspond to the physical LAN
ports that exist on the selected AP model.

NOTE: When trunk port limitation is enabled, the controller does not validate the port settings
configured in the AP or the AP group with no members.

Option Description
Enable Use this option to enable and disable this LAN port on the
selected AP model. By default, this check box is selected. To
disable this LAN port, clear this check box.
Profile Use this option to select the Ethernet port profile that you want
this LAN port to use. Two default Ethernet port profile exist:
Default Trunk Port (selected by default) and Default Access
Port. If you created Ethernet port profiles (see Creating an
Ethernet Port Profile on page 224), these profiles will also appear
on the drop-down list.

NOTE: If you recently created an Ethernet port profile and it


does not appear on the drop-down menu, click Reload on the
drop-down menu to refresh the Ethernet port profile list.

Overwriter VLAN Select teh checck box and enter:


• Untag ID—Default: 1
• Members—Range: 1 through 4094.

7. Click OK.
Supported LLDP Attributes
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Layer 2 protocol that allows a
network device (for example, a Ruckus Wireless AP) to advertise its identity and capabilities on
the local network.
LLDP information is sent by devices from each of their interfaces at a fixed interval (default is 30
seconds), in the form of an Ethernet frame. Each LLDP Ethernet frame contains a sequence of
type-length-value (TLV) structures starting with Chassis ID, Port ID and Time to Live (TTL) TLV.
Table 2 lists the LLDP attributes supported by the controller.
LLDP information is sent by devices from each of their interfaces at a fixed interval (default is 30
seconds), in the form of an Ethernet frame. Each LLDP Ethernet frame contains a sequence of
type-length-value (TLV) structures starting with Chassis ID, Port ID and Time to Live (TTL) TLV.The
follwoing table lists the LLDP attributes supported by the controller.
Attribute (TLV) Description
Chassis ID Indicates the MAC address of the AP’s br0 interface
Port ID Identifies the port from which the LLDP packet was sent
Time to Live Same as LLDP Hold Time. Indicates the length of time (in seconds)
that a receiving device will hold the LLDP information sent by the

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
84
Working With Access Points
Understanding the System, Zones and AP Groups

Attribute (TLV) Description


selected AP model before discarding it. The default value is 120
seconds.
System Name Indicates the name assigned to the AP. The default name of Ruckus
Wireless APs is RuckusAP.
System Description Indicates the AP model plus software version
System Capabilities Indicates the AP’s capabilities (Bridge, WLAN AP, Router, Docsis),
and which capabilities are enabled
Management Address Indicates the management IP address of the AP
Port Description Indicates the description of the port in alphanumeric format

Configuring the Port Settings of a Particular AP Model


Use Port Settings in the AP Model-Specific Configuration section to configure the Ethernet ports
of a particular AP model.
Follow these steps to configure the port settings of a certain AP model.
1. All ports are enabled by default (the Enable check boxes are all selected). To disable a particular
port entirely, clear the Enable check box next to the port name (LAN1, LAN2, etc.)
2. For any enabled ports, you can choose whether the port will be used as a Trunk Port, Access
Port, or General Port.
The following restrictions apply:
• All APs must be configured with at least one Trunk Port.

NOTE: You cannot move an AP model to an AP group and configure the AP model to
use a trunk port at the same time, if general ports are enabled when trunk port limitation
is disabled. You must configure the selected AP model to use at least one trunk port, and
then move the AP model to the AP group.

• For single port APs, the single LAN port must be a trunk port and is therefore not
configurable.
• For ZoneFlex 7025/7055, the LAN5/Uplink port on the rear of the AP is defined as a Trunk
Port and is not configurable. The four front-facing LAN ports are configurable.
• For all other APs, you can configure each port individually as either a Trunk Port, Access
Port, or General Port. See Designating an Ethernet Port Type for more information.

Designating an Ethernet Port Type


Ethernet ports can be configured as access ports, trunk ports, or general ports.
Trunk links are required to pass VLAN information between switches. Access ports provide
access to the network and can be configured as members of specific VLANs, thereby separating
the traffic on these ports from traffic on other VLANs. General ports are user-defined ports that
can have any combination of up to 20 VLAN IDs assigned.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
85
Working With Access Points
Understanding the System, Zones and AP Groups

For most ZoneFlex APs, you can set which ports you want to be your Access, Trunk and General
Ports from the controller web interface, as long as at least one port on each AP is designated
as a Trunk Port.
By default, all ports are enabled as Trunk Ports with Untag VLAN set as 1 (except for ZoneFlex
7025, whose front ports are enabled as Access Ports by default). If configured as an Access
Port, all untagged ingress traffic is the configured Untag VLAN, and all egress traffic is untagged.
If configured as a Trunk Port, all untagged ingress traffic is the configured Untag VLAN (by default,
1), and all VLAN-tagged traffic on VLANs 1-4094 will be seen when present on the network.
The default Untag VLAN for each port is VLAN 1. Change the Untag VLAN to:
• Segment all ingress traffic on this Access Port to a specific VLAN.
• Redefine the native VLAN on this Trunk Port to match your network configuration.
When trunk port limitation is disabled using the eth-port-validate-one-trunk disable command,
validation checks are not performed for the VLAN members and the AP Management VLAN. If
the AP configuration for general ports and access ports does not include a member of an AP
management VLAN, or the VLAN of a WAN interface configured through CLI, the AP will
disconnect and the Ethernet port stops transmitting data. Make sure that you configure the
correct VLAN member in the ports (general/access) and the AP management VLAN.

NOTE: Ensure that at least one of the general port VLANs is the same as a Management VLAN
of the AP.

Configuring Client Admission Control


As an administrator, you can help maintain a positive user experience for wireless users on the
network by configuring the following client admission control settings:
• Minimum client count
• Maximum radio load
• Minimum client throughput
Client admission control is implemented on a per radio basis and is supported on 802.11n and
802.11ac APs.

Monitoring Zones and AP Groups


When you select a System, Zone, or AP Group from the hierarchy tree, respective contextual
tabs appear at the bottom of the page.
These tabs are used to monitor the selected group. The following table lists the tabs that appear
for System, Zone, and AP Groups.

Table 11: System, Zone, and AP Groups Monitoring Tabs

Tabs Description System Zone AP Groups


General Displays group information Yes Yes Yes
Configuration Displays group configuration Yes Yes Yes
information.
Health Displays historical health information. Yes Yes Yes

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
86
Working With Access Points
Understanding the System, Zones and AP Groups

Tabs Description System Zone AP Groups


Traffic Displays historical traffic information. Yes Yes Yes
Alarm Displays alarm information. Yes Yes Yes
Event Displays event information. Yes Yes Yes
Clients Displays client information. Yes Yes Yes
Wired Clients Displays information pertaining to Yes Yes Yes
wired clients.
WLANs Displays WLAN information. Yes Yes NA
Services Displays information on the list of Yes Yes NA
services.
Administrators Displays administrator account Yes NA NA
information.

Additionally, you can select System, Zone or AP Group and click More to perform the following
operations as required:
• Create New Zone from Template—Does not apply to Zone and AP group management.
• Extract Zone Template—Does not apply to System and AP group management.
• Apply one Template—Does not apply to System and AP group management.
• Change AP Firmware—Does not apply to System and AP group management.
• Switchover Cluster—Does not apply to System and AP group management.

Creating a New Zone From Template


Follow these steps to create a new zone using a template:
1. From the Access Points page, locate the zone from where you want to create a new zone.
2. Click More and select Create New Zone from Template, a dialog box appears.
3. In Zone Name, enter a name for the new AP zone.
4. Select the required template from the Template Name drop-down.
5. Click OK. The page refreshes and and the new zone is created.

Extracting a Zone Template


You can extract the current configuration of a zone and save it as a zone template.
Follow these steps to extract the configuration of a zone to a zone template:
1. From the Access Points page, locate the zone from where you want to extract the WLAN
template.
2. Click More and select Extract Zone Template, the Extract Zone Template dialog box
appears.
3. In Zone Template Name, enter a name for the Template.
4. Click OK, a message appears stating that the zone template was extracted successfully.
5. Click OK. You have completed extracting a zone template.
The extracted Zone template can be viewed under System > Templates > Zone Templates.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
87
Working With Access Points
Understanding the System, Zones and AP Groups

Applying a Zone Template


You can apply an AP zone configuration template to a zone.
Follow these steps to apply a zone template:
1. From the Access Points page, locate the zone where you want to apply the zone template.
2. Click More and select Apply Zone Template, the Import Zone Template dialog box appears.
3. From the Select a Zone template drop-down, select the template.
4. Click OK, a confirmation message appears asking to apply the zone template to the AP zone.
5. Click Yes. The zone template was applied successfully.
You have completed applying zone template to the AP zone.

Changing the Zone's AP Firmware Version


The controller supports multiple firmware version. You can manually upgrade or downgrade the
zone's AP firmware version.
Follow these steps to change the zone's AP firmware version:
1. From the Access Pointss page, locate the zone for which you want to upgrade the AP firmware
version.
2. Click More and select Change AP Firmware, the Change AP Firmware dialog box appears.
3. The Current AP Firmware version is displayed. Select the firmware version you need. If you
upgrade to a new firmware, a backup configuration file will be created. You can use this
backup file to downgrade to original firmware.
4. Click Yes, a confirmation message appears stating that the firmware version was updated
successfully.
5. Click OK. You have completed upgrading the zone's AP firmware version.

Rehoming Managed APs


Rehoming is the process of returning the APs that have failed over to the second cluster back
to their original cluster (once it becomes available). Rehoming must be done manually. APs that
have failed over will continue to be managed by the failover cluster until you rehome them.

NOTE: To rehome managed APs, you must enable cluster redundancy so that the APs will
continue to be managed by the failover cluster until you restore them to the original cluster
(rehome) manually. See Enabling Cluster Redundancy on page 42.

Rehoming APs must be done on a per-zone basis. Follow these steps to rehome managed APs
to the original cluster.
1. From the Access Points page, locate the zone where you want to switchover cluster settings.
2. Click More and select Switchover Cluster. The Switchover Cluster dialog box appears.
3. Select the Switchover Cluster from the drop-down.
4. The control IP configured while enabling cluster redundacy is listd in the IPv4 List.
5. Click OK, the system refreshes. You have configured the cluster switchover settings.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
88
Working With Access Points
Viewing Modes

Viewing Modes
You can view System, Zone, and AP Group-level information by selecting one of the following
View Mode options:
• List—Displays the list of all APs irrespective of the Zone or Group they belong.
• Group—Displays the list of APs in a hiearchy format. The is the default viewing mode.
• Mesh—Lists AP details.
• Map—Displays the location map of the APs.
• Zone—Lists zone details.

AP Status
The real-time status of the Access Points are classified as follows:
• Online—Number of Access Points that are online.

Flagged—Number of Access Points that are flagged.
• Offline—Number of Access Points that are offline.

NOTE: APs that exceed their health threshold and that require your attention are flagged. See
Configuring AP Health Thresholds.

Configuring Access Points


You can configure an Access Point.
To configure an Access Point:
1. From the list, select the Access Point that you want to configure and click Configure. The
Edit AP page appears.
2. Edit the parameters as explained in Table 12: Access Point Edit Parameters on page 89.
3. Click OK.

NOTE: Select the Override check box if you want to configure new settings.

Table 12: Access Point Edit Parameters

Field Description Your Action


AP Configuration > General Options
AP Name Indicates the name of the AP. Enter a name.
Description Gives a short description of the Enter a short description.
AP.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
89
Working With Access Points
Configuring Access Points

Field Description Your Action


Location Indicates generic location. Select the check box and
enter the location.
Location Additional Indicates specific location. Select the check box and
Information enter the location.
GPS Coordinates Indicates the geographical Select the option. For Manual
location. option, enter the following
details:
• Latitude
• Longitude
• Altitude

User Location Information Indicates the demographic Enter the Area Code and Cell
information. Identifier.
AP Admin Logon Indicates the admin logon Select the check box and
credentials. enter the Logon ID and
Password.
AP Configuration > Radio Options
Channel Range (2.4G) Indicates that you want to Select Select Channel Range
override the 2.4GHz channel (2.4G) check boxes for the
range that has been configured channels on which you want
for the zone to which this AP the 2.4GHz radios of managed
group belong. APs to operate. Channel
options include channels 1 to
11. By default, all channels are
selected.
Channel Range (5G) Indicates that you want to Select Select Channel Range
override the 5GHz channel (5G) check boxes for the
range that has been configured channels on which you want
for the zone to which this AP the 5GHz radios of managed
group belong. APs to operate.
Radio Options b/g/n (2.4 Indicates the radio option 2.4 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20 or
40 (MHz), or select Auto to
set it automatically.
• Channel—Select the
channel to use for the b/g/n
(2.4GHz) radio, or select
Auto to set it automatically.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
90
Working With Access Points
Configuring Access Points

Field Description Your Action


• TX Power
Adjustment—Select the
required option.
• WLAN Group—Select the
WLAN group to which this
AP belongs.
• WLAN Services—Select
the check box to enable
WLAN services in this
radio.

Radio Options a/n/ac (5 GHz) Indicates the radio option 5 Select the following options:
GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20,
40, 80 (MHz), or select
Auto to set it automatically.
• Channel—Select the
channel to use for the a/n/c
(5GHz) radio, or select
Auto to set it automatically.
• TX Power
Adjustment—Select the
required option.
• WLAN Group—Select the
WLAN group to which this
AP belongs.
• WLAN Services—Select
the check box to enable
WLAN services in this
radio.

AP Configuration > AP SNMP Options

NOTE: For SCG200 controllers, AP SNMP Option is not supported.

Override zone configuration Allows you to override the Select the check box
existing zone configuration
Enable AP SNMP Enables you to configure SNMP Select the check box
settings.
SNMPv2 Agent Allows you to add users to 1. Click Create and enter
SNMPv2 Agent. Community.
2. Select the required
Privilege. If you select

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
91
Working With Access Points
Configuring Access Points

Field Description Your Action


Notification enter the
Target IP.
3. Click OK.

SNMPv3 Agent Allows you to add users to 1. Click Create and enter
SNMPv3 Agent. User.
2. Select the required
Authentication.
3. Enter the Auth Pass
Phrase.
4. Select the Privacy option.
5. Select the required
Privilege. If you select
Notification select the
option Trap or Inform and
enter the Target IP.
6. Click OK.

AP Configuration > Model Specific Options


Model Specific Control Indicates that the model Select the check box.
overides the AP settings.
USB Port Disables the USB port on the Select the option. USB ports
selected AP model. are enabled by default.
Status LEDs Disable the status LED on the Select the option.
selected AP model.
LLDP Enables the Link Layer Select the option and enter the
Discovery Protocol (LLDP) on following details:
the selected AP model.
• Advertise Interval—Enter
the duration in seconds.
• Hold Time—Enter the
duration in seconds.
• Enable Management IP
TLV—Select the check
box.

PoE Operating Mode Allows you to operate using Select the option.
PoE mode.
Port Settings Indicates the port settings. Select the option and choose
the required LAN option.
AP Configuration > Advanced Options

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
92
Working With Access Points
Configuring Access Points

Field Description Your Action


Network Settings Determines the network Select the IPv4 Settings from
settings. the following:
• Static-Enter the IP
Address, Network Mask,
Gateway, Primary DNS,
Secondary DNS.
• Dynamic
• Keep the AP's Setting

Smart Monitor Indicates AP interval check and Select the required check
retry threshold settings. boxes.
Syslog Options Determines if external syslog Select the required check
server settings is applicable. boxes. For Enable external
syslog server option, update
the following information:
• Server Address
• Port
• Facility for Event
• Priority

Hotspot 2.0 version Profile Indicates the hotspot profile Select the required option or
that you want to assign to the click Create and update the
group. following details:
• Enter the Name.
• Enter the Description.
• Enter the Venue Names.
• Select the Venue
Category.
• Select the Type.
• Enter the WLAN Metrics.

AP Management VLAN Indicates the AP management Select the check box and
VLAN settings. choose the option.
Auto Channel Selection Indicates auto-channel settings. Select the check box and
choose the option.
Client Admission Control Indicates the load thresholds Select the check boxes and
on the AP at which it will stop update the following details:
accepting new clients.
• Min Client Count
• Max Radio Load
• Min Client Throughput

Swap Configuration

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
93
Working With Access Points
Managing Access Points

Field Description Your Action


Add Swap-In AP Allows to swap APs. Select the check box and
enter the Swap-in AP MAC
details.

NOTE: You can also move the location of an AP or delete an AP. To do so, select the AP from
the list and click Move or Delete as required.

Managing Access Points


Overview of Access Point Configuration
Once you have created registration rules and the AP zones to which joining access points can
be assigned automatically, access points will be able to join or register with the controller
automatically.
After an access point registers successfully with the controller, you can update its configuration
by following the steps described in this section.

Viewing Managed Access Points


After an access point registers successfully with the controller, it appears on the Access Points
page, along with other managed access points.
Follow these steps to view a list of managed access points.
1. Click Access Points, a list of access points that are being managed by the controller appears
on the Access Points page. These are all the access points that belong to all management
domains.
The list of managed access points displays details about each access point, including its:
• AP MAC address
• AP name
• Zone (AP zone)
• Model (AP model)
• AP firmware
• IP address (internal IP address)
• External IP address
• Provision Method
• Provision State
• Administrative Status
• Status
• Configuration Status
• Registered On (date the access point joined the controller network)
• Registration Details
• Registration State
• Actions (actions that you can perform)

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
94
Working With Access Points
Managing Access Points

NOTE: By default, the Access Points page displays 20 access points per page (although you
have the option to display up to 250 access points per page). If the controller is managing
more than 20 access points, the pagination links at the bottom of the page are active. Click
these pagination links to view the succeeding pages on which the remaining access points
are listed.

2. To view access points that belong to a particular administration domain, click the name of
the administration domain in the domain tree (on the sidebar).
The page refreshes, and then displays all access points that belong to that management
domain.

Downloading the Support Log from an Access Point


If you are experiencing issues with an access point, Ruckus Wireless® Support may request you
to download the support log from the access point.
The support log contains important technical information that may be help Ruckus Wireless®
Support troubleshoot the issue with the access point. Follow these steps to download the
support log from an access point.
To download a support log from an AP:
• Select the AP and click More > Download Support Log. The following message appears:
Do you want to open or save SupportLog_{random-string}.log.
Save the file and use a text editor (for example, Notepad) to view the contents of the text file.
Send the support log file to Ruckus Wireless® Support, along with your support request.

Provisioning and Swapping Access Points


The controller supports the provisioning and swapping of access points.
As an administrator you can:
• Upload a file containing list of AP and the pre-provisioned configuration data for each AP.
The controller processes the file and provides details on regarding the import results (including
a list of failed APs and failure reasons).
• Modify or delete pre-provisioning data if AP does not connect to the controller
• Monitor the status and stage of the pre-provisioned APs
• Manually lock or unlock APs
• Upload a file containing list of AP pairs for swapping. The controller processes the file and
provide the detailed import result (including a list of failed APs and failure reasons).
• Manually enter the AP swap pair
• Delete the swap configuration if AP fails to contact the controller
• Monitor the status and stage of the swapping AP pairs
• Manually swap the APs

Options for Provisioning and Swapping APs


The controller supports the provisioning and swapping of access points.
Use the following buttons on the AP List page to perform the AP provisioning and swapping.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
95
Working With Access Points
Managing Access Points

• Import Batch Provisioning APs: Select this option to import the provisioning file. The
controller displays the import results. Any errors that occur during the import process will be
listed by the controller.
• Export All Batch Provisioning APs: Select this option to download a CSV file that lists all
APs that have been provisioned. The exported CSV contains the following information:
• AP MAC Address
• Zone Name
• Model
• AP Name
• Description
• Location
• GPS Coordinates
• Logon ID
• Password
• Administrative State
• IP Address
• Network Mask
• Gateway
• Primary DNS
• Secondary DNS
• Serial Number
• IPv6 Address
• IPv6 Gateway
• IPv6 Primary DNS
• IPv6 Secondary DNS

NOTE: The exported CSV file for all batch provisioned APs only contains pre-provisioned
APs. It does not contain swapping APs or auto discovered APs.
If no APs have been pre-provisioned, you will still be able to export the CSV file but it will be
empty (except for the column titles).

• Import Swapping APs: Manually trigger the swapping of two APs by clicking the swap action
in the row. You can also edit the pre-provision configuration only if the AP does not connect
to the controller. Click the AP MAC address to bring up the configuration edit form, and then
select Pre-provision Configuration.
• Export All Batch Swapping APs: Select this option to download a CSV file that lists all APs
that have been swapped. The exported CSV contains the following information:
• Swap In AP MAC
• Swap In AP Model
• Swap Out AP MAC

NOTE: The exported CSV file for batch swapping APs only contains swapping APs. It
does not contain pre-provisioned APs or auto discovered APs.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
96
Working With Access Points
Managing Access Points

Understanding How Swapping Works


The following table lists how the controller handles swapping by detailing each stage. For example,
you have entered swap configuration as Swap In: A and Swap out: B.

Table 13: AP swapping stages

Stage State A Stage A State B Stage B


1. Enter data Swapping Not Registered Approved Waiting for swap
in AP registration
2. AP register Swapping Waiting for Approved Waiting for
swapping in swapping out
3. User swap Approved Swapped in Swapping Swapped out
4. Second swap Swapping Swapped out and Approved Swapped in and
waiting for waiting for
swapping in swapping out

Editing Swap Configuration


The controller supports the swapping or replacement of a managed AP with a new AP of the
same model. This feature is useful when you want to avoid service interruption because you
need to replace an AP in the field.
By configuring the swap settings, you can easily and automatically export and apply the settings
of the old AP to the new AP.
Follow these steps to configure the swap settings of an AP.
1. On the Access Points page, locate the access point whose swap configuration you want to
update.
2. Click Configure, the Edit AP page appears.
3. Click the Swap Configuration tab.
4. Select the Add Swap-In AP check box.
5. Enter the Swap-In AP MAC address.
6. Click OK.
You have completed editing the swap configuration.

Moving a Single Access Point to a Different AP Zone


Follow these steps to move a single access point from its current AP zone to a different one.

NOTE: The AP that you move will inherit the configuration of the new AP zone.

1. From the Access Points page, locate the access point that you want to move to a different
AP zone.
2. Click Move, the Select Destination AP Zone form appears.
3. Select the AP zone to which you want to move the access point.
4. Click OK.
You have completed moving an access point to a new AP zone.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
97
Working With Access Points
Managing Access Points

Monitoring Access Points


When you select an AP from the list, contextual tabs appear at the bottom of the page.
The following table helps you to understand the real-time information about the AP.

Table 14: Access Point Monitoring Tabs

Tabs Description
General Displays group information
Configuration Displays group configuration information.
Health Displays historical health information.
Traffic Displays historical traffic information.
Alarm Displays alarm information.
Event Displays event information.
Clients Displays client information.
Wired Clients Displays information of wired clients.

Additionally, you can select an AP and click More to perform the following operations as required:
• Select ALL - Selects all the APs in the list.
• Deselect All- Clears all selection from the list.
• Troubleshooting > Client Connection - Connects to client devices and analyze network
connection issues in real-time. See, Troubleshooting Client Connections on page 252
• Troubleshooting > Spectrum Analysis - Troubleshoots issues remotely, identify sources
of interferences within the network and allow administrators access to the RF health of the
network environment. See, Troubleshooting through Spectrum Analysis on page 254
• Restart - Restarts an access point remotely from the web interface.
• Lock - Disables all WLAN services on the AP and disconnect all wireless users associated
with those WLAN services temporarily.
• Unlock - Makes all WLAN services available.
• Import Batch Provisioning APs - Import the provisioning file. See, Options for Provisioning
and Swapping APs on page 95.
• Import Swapping APs - Manually trigger the swapping of two APs by clicking the swap
action in the row. See, Options for Provisioning and Swapping APs on page 95.
• Export All Batch Provisioning APs Downloads a CSV file that lists all APs that have been
provisioned.. See, Options for Provisioning and Swapping APs on page 95.
• Export All Swapping APs - Downloads a CSV file that lists all APs that have been swapped.
See, Options for Provisioning and Swapping APs on page 95.
• Download Support Log - Downloads support log. See Downloading the Support Log from
an Access Point on page 95.
• Trigger AP Binary Log - Triggers binary log for the selected AP.
• Download CM Support Log - Downloads Cable Momdem support log.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
98
Working With Access Points
Managing Access Points

• Restart Cable Modem - Restarts the cable modem. The AP will disconnect from the network
for a short period. The AP will disconnect from the network for a short period.
• Reset Cable Modem - Resets the cable modem.
• Reset Cable Modem to Factory Default - Resets the cable modem to factory default
settings.
• Untag Critical APs - Stating APs as non-critical. See, Tagging Critical APs on page 38.
• Swap - Swaps current AP to swap-in AP. See, Editing Swap Configuration on page 97.
• Approve - Approves AP and completes registering. See, Working with AP Registration Rules
on page 37.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
99
Working with WLANs and WLAN Groups
Zones, AP Groups, and WLANs

Working with WLANs and WLAN Groups 4


In this chapter:

• Zones, AP Groups, and WLANs


• Viewing Modes
• WLAN Groups
• Creating a WLAN Configuration
• Managing WLANs

Zones, AP Groups, and WLANs


If your wireless network covers a large physical environment (for example, multi-floor or
multi-building office) and you want to manage and provide different WLAN services to different
areas of your environment, you can virtually split them using the following hierarchy:
• Zones—Comprises of multiple WLAN groups
• WLAN Groups—Comprises of multiple WLANs
• WLANs—Wireless network service

NOTE: In vSZ-E and SZ100, when the system is upgraded to release 3.5, the new UI and
re-architected stats database will prevent the system from displaying AP and zone stats if the
AP/zone is operating on 3.4 or prior releases. In order to make full use of the UI introduced in
3.5, zones and APs should be updated to 3.5 as well. Operationally, the zones will still work,
but stats visibility will be impacted.

Viewing Modes
The View Mode on upper-right cornerr of the page provides two options to view the WLANs
available in the system:
• List—Displays the list of all WLANs irrespective of the Zone or Group they belong.
• Group—Displays the list of WLANs that belong to a specific Zone or Group.
The following WLAN details can be viewed regardless of the mode selected:
• Name
• Alert
• SSID
• Auth Method
• Encryption Method
• Clients
• Traffic
• VLAN

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
100
Working with WLANs and WLAN Groups
WLAN Groups

• Application Recognition
• Tunneled

WLAN Groups
A WLAN group is a way of specifying which APs or AP groups provide which WLAN services.
For example, if your wireless network covers three floors of a building and you need to provide
wireless access to visitors only on the first floor:
1. Create a WLAN service (for example, Guest Only Service) that provides guest-level
access only.
2. Create a WLAN group (for example, Guest Only Group), and then assign Guest Only
Service (WLAN service) to Guest Only Group (WLAN group).
3. Assign APs on the 1st Floor (where visitors need wireless access) to your Guest Only
Group.
Any wireless client that associates with APs assigned to the Guest Only Group will get the
guest-level access privileges defined in your Guest Only Service. APs on the 2nd and 3rd
floors can remain assigned to the default WLAN Group and provide normal-level access.

NOTE:
• WLAN groups are configured at the zone level.
• Creating WLAN groups is optional. If you do not need to provide different WLAN services to
different areas in your environment, you do not need to create a WLAN group.
• A default WLAN group called default exists. The first 27 WLANs that you create are
automatically assigned to this default WLAN group.
• A WLAN group can include a maximum of 27 member WLANs. For dual radio APs, each
radio can be assigned to only one WLAN group (single radio APs can be assigned to only
one WLAN group).

Creating a WLAN Group


To create a WLAN group:
1. In the Wireless LANs page, from the System tree hierarchy, select the zone where you want
to create a WLAN Group.
2.
Click the add button. The Create WLAN Group page appears.
3. Enter a Name and Description for the WLAN group.
4. From the Available WLANs list, select the required WLAN and click the move button. It will
appear in the Selected WLANs list.
5. Click Next, The Create WLAN Group form appears.
6. Click OK.

NOTE: You can also edit, clone, and delete WLAN group by selecting the options Configure ,
Clone , and Delete respectively, from the Wireless LANs page.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
101
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Creating a WLAN Configuration


To create a WLAN configuration:
1. In the Wireless LANs page, as shown in Figure 30: Wireless LANs on page 102, from the
System tree hierarchy, select the Zone where you want to create a WLAN.
Figure 30: Wireless LANs

2. Click Create, Figure 31: Create WLAN Configuration on page 102 appears.
Figure 31: Create WLAN Configuration

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
102
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

3. Set the required configurations as explained in Table 15: WLAN Configurations on page 103.
4. Click OK.

Table 15: WLAN Configurations

Field Description Your Action


General Options
Name Indicates the user-friendly Enter a name.
administrative name for
the WLAN.
SSID Indicates the SSID for the Enter the SSID
WLAN.
Description Indicates a user-friendly Enter a short description.
description of the WLAN’s
settings or function.
Zone Indicates the zone to Select the Zone to which the WLAN
which the WLAN belongs. settings apply.
WLAN Groups Indicates the WLAN Select the WLAN Groups.
group(s) to which the
WLAN applies.
WLAN Usage
Access Network Defines the data plane • Select the check box to tunnel the data
tunneling behavior. traffic to a central data plane.
• Clear the check box if you want APs to
NOTE: Select the Tunnel perform local breakouts.
WLAN traffic through
Ruckus GRE check box
to enable the Flexi-VPN
Profile settings in
Advanced Options.

Authentication Type Defines the type of Select the required option:


authentication flow for the
• Standard Usage—This is a regular
WLAN.
WLAN suitable for most wireless
networks.
NOTE: Authentication
types such as WeChat, • Hotspot (WISPr)—Click this option if
Web Authentication and want to use a hotspot service (use this
Guest Access are not type for external captive portal
supported by APs in IPv6 workflows) or WISPr.
mode.
NOTE: Hotspot (WISPr) applies to
WLAN traffic that is tunneled and not
tunneled.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
103
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


• Guest Access—Click this option if you
want guest users to use this WLAN.
After you complete creating this WLAN
for guest access, you can start
generating guest passes.
For more information about Hotspot 2.0
online signup, see the Hotspot 2.0
Reference Guide for this release.
• Web Authentication—Click this option
if you want to require all WLAN users to
complete a web-based logon to this
network every time they attempt to
connect.
• Hotspot 2.0 Access—Click this option
if you want a Hotspot 2.0 operator
profile that you previously created to use
this WLAN. See the Hotspot 2.0
Reference Guide for this release.
• Hotspot 2.0 Secure
Onboarding—Click this option if you
want to use this WLAN for Hotspot 2.0
OSEN. See the Hotspot 2.0 Reference
Guide for this release for more
information.
• WeChat—Click this option if you want
the WLAN usage through WeChat.

Authentication Options
Method Specifies the Select the following option:
authentication
• Open (Default)—No authentication
mechanism.
mechanism is applied to connections.
If WPA or WPA2 encryption is used, this
implies WPA-PSK authentication.
If you clicked Web Authentication in
Authentication Type, Open is the only
available authentication option, even
though PSK-based encryption can be
supported.
• 802.1x EAP—A very secure
authentication/encryption method that
requires a back-end authentication
server, such as a RADIUS server. Your
choice mostly depends on the types of

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
104
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


authentication the client devices support
and your local network authentication
environment. If you select Enable RFC
Location Delivery Support for
Authentication & Accounting Server,
enter the Operator Realm.
• MAC Address—Authenticate clients by
MAC address.
• MAC Authentication—Requires a
RADIUS server and uses the MAC
address as the user logon name and
password.
• Select Use user defined text as
authentication password
(default is device MAC address)
and enter the format.
• MAC Address Format—Choose the
MAC address format from teh
drop-down.

Encryption Options
Method Specifies the encryption Select the option:
method.
• WPA2—Enhanced WPA encryption
WPA and WPA2 are both using AES encryption algorithm.
encryption methods
1. Choose Algorithm:
certified by the Wi-Fi
Alliance; WPA2 with AES • AES:
is the recommended
1. Enter Passphrase.
encryption method. The
Wi-Fi Alliance will be 2. Select or clear Show.
mandating the removal of 3. Select
WEP due to its security • the Enable 802.11 Fast
vulnerabilities, and Ruckus BSS Transition check box
Wireless recommends and enter the Mobility
against using WEP if Domain ID.
possible. • the required 802.11w MFP
option.
4. Dynamic PSK
• Disable
• Internal
• Enter DPSK Length

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
105
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


• Choose DPSK Type
• Select DPSK Expiration
• External—Enables
Authentication Service

• AUTO:
1. Enter Passphrase.
2. Select or clear Show.
3. Select the Enable 802.11 Fast
BSS Transition check box
and enter the Mobility
Domain ID.
4. Dynamic PSK
• Disable
• Internal
• Enter DPSK Length
• Choose DPSK Type
• Select DPSK Expiration
• External—Enables
Authentication Service

• WPA-Mixed—Allows mixed networks


of WPA and WPA2 compliant devices.
Use this setting if your network has a
mixture of older clients that only support
WPA and TKIP, and newer client
devices that support WPA2 and AES.
1. Choose Algorithm: AES or AUTO.
2. Enter Passphrase.
3. Select or clear Show.
4. Select Enable 802.11 Fast BSS
Transition.
5. Enter the Mobility Domain ID.
6. Dynamic PSK
• Disable
• Internal
• Enter DPSK Length
• Choose DPSK Type
• Select DPSK Expiration

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
106
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


• External—Enables
Authentication Service

• WEP-64 (40 bits)—Provides a lower


level of encryption, and is less secure,
using 40-bit WEP encryption.
1. Choose the WEP Key.
2. Enter HEX value.
• WEP-128 (104 bits)—Provides a higher
level of encryption than WEP-64, using
a 104-bit key for WEP encryption.
However, WEP is inherently less secure
than WPA.
1. Choose the WEP Key.
2. Enter HEX value.
• None

Authentication & Accounting Server (for WLAN Authentication Type: Standard usage )
Authentication Server Specifies the server used 1. Select the check box.
for authentication on this 2. Select the server from the drop-down.
network. By enabling 3. Select the Enable
Proxy, authentication RFCLocationDeliverySupport.
requests will flow through
the controller. In a
non-proxy mode, the AP
will communicate directly
with the authentication
server without going
through the controller.
Accounting Server Specifies the server used 1. Select the check box.
for accounting messages. 2. Select the server from the drop-down.
By enabling Proxy,
accounting messages are
sent by the controller. In a
non-proxy mode, the AP
will communicate
accounting messages
directly.
Hotspot Portal (for WLAN Authentication Type: Hotspot (WisPr))
Hotspot (WISPr) Defines hotspot behavior, Select the hotspot portal profile that you
Portal like redirects, session want this WLAN to use.
timers, and location

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
107
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


information, among
others.
Bypass CNA Bypasses the Apple CNA Select the Enable check box.
feature on iOS and OS X
devices that connect to
this WLAN.
Authentication Server Indicates the Choose the option. Options include Local
authentication server that DB, Always Accept, and any AAA servers
you want to use for this that you previously added. Additionally, if
WLAN. you want the controller to proxy
authentication messages to the AAA server,
select the Use Controller as Proxy check
box.
Accounting Server Indicates the RADIUS Choose the option. You must have added
Accounting server that a RADIUS Accounting server previously.
you want to use for this Additionally, if you want the controller to
WLAN. proxy accounting messages to the AAA
server, select the Use the Controller as
Proxy check box.
Guest Access Portal (for WLAN Authentication Type: Guest Access)
Guest Portal Service Indicates the guest Choose the guest portal service.
access portal to be used
on this WLAN.
Bypass CNA Bypasses the Apple CNA Select the Enable check box.
feature on iOS and OS X
devices that connect to
this WLAN.
Guest Authentication Manages guest Select:
authentication.
• Guest to require users to enter their
guest pass credentials. Guest passes
are managed directly on the controller.
• Always Accept to allow users without
guest credentials to authentication.

Guest Accounting Indicates the RADIUS Choose the server. You must have added
Accounting server that a RADIUS Accounting server previously.
you want to use for this Additionally, if you want the controller to
WLAN. proxy accounting messages to the AAA
server, select the Use the Controller as
Proxy check box.
Authentication & Accounting Server (for WLAN Authentication Type: Web Authentication)

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
108
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


Web Authentication Indicates the web Choose the web authentication portal from
Portal authentication portal to the drop-down.
use for this WLAN.
Bypass CNA Bypasses the Apple CNA Select the Enable check box.
feature on iOS and OS X
devices that connect to
this WLAN.
Authentication Server Indicates the Choose the option. Options include Local
authentication server that DB, Always Accept, and any AAA servers
you want to use for this that you previously added. Additionally, if
WLAN. you want the controller to proxy
authentication messages to the AAA server,
select the Use the Controller as Proxy
check box.
Accounting Server Indicates the RADIUS Choose the server. You must have added
Accounting server that a RADIUS Accounting server previously.
you want to use for this Additionally, if you want the controller to
WLAN. proxy accounting messages to the AAA
server, select the Use the Controller as
Proxy check box.
Hotspot 2.0 Profile (for WLAN Authentication Type: Hotspot 2.0 Access)
Hotspot 2.0 Profile Indicates the profile, which Choose the profile.
includes operator and
identify provider profiles.
Authentication Server Supports RFC 5580 Select the check box.
RFC 5580 location delivery on the
WLAN, which carries
location information in
RADIUS exchanges.
Accounting Server Indicate the frequency to Enter the duration in minutes. Range: 0
Updates sends interim updates. through 1440.
Configure the account
update interval for
accounting servers
defined in the Hotspot 2.0
Identity Provider profile.

We Chat Portal (for WLAN Authentication Type: We Chat)


We Chat Portal Defines the We Chat Select a We Chat portal service.
authentication URL, DNAT
destination, and other
information.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
109
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


Accounting Server Indicates the RADIUS Choose the server. You must have added
Accounting server that a RADIUS Accounting server previously.
you want to use for this Additionally, if you want the controller to
WLAN. proxy accounting messages to the AAA
server, select the Use the Controller as
Proxy check box.
Forwarding Profile ( for WLAN Usage > Access Network)
Forwarding Policy Defines special data Forwarding Profile is Factory Default. It
packet handling to be is disabled.
taken by the data plane
when the traffic is
tunneled.
Options
Wireless Client Prevents wireless clients Click Enable to prevent wireless clients on
Isolation from communicating with the same VLAN/subnet from
each other communicating with each other.
Isolation Whitelist Defines wired destinations Select the option.
on the local subnet that
can be reached, even if
client isolation is enabled.
Priority Determines high vs low Choose the priority:
transmit preference of one
• High
WLAN compared to
another. Traffic for high • Low
priority WLAN is always
sent before low priority
WLANs in the same QoS
category (background,
best effort, video, voice).
RADIUS Option
NAS ID Defines the ID sent to the Choose the option:
RADIUS server, which will
• WLAN BSSID
identify the AP.
• AP MAC
• User-defined

NAS Request Timeout Indicates the duration Enter the timeout period (in seconds).
after which an expected
RADIUS response
message is considered to
have failed.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
110
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


NAS MAX Number of Indicates the maximum Enter the maximum number of failed
Retries number of failed connection attempts.
connection attempts after
which the controller will fail
over to the backup
RADIUS server.
NAS Reconnect Indicates the time interval Enter the duration in minutes. Range: 1
Primary after which the controller through 60 minutes. The default interval is
will recheck if the primary 5 minutes.
RADIUS server is available
when the controller has
failed over to the backup
RADIUS server.

Called STA ID Indicates the format for Select a format:


the called station ID,
• WLAN BSSID
which is sent to the
RADIUS server as an • AP MAC
attribute, and can be used • AP GROUP
in policy decision • NONE

NAS IP Indicates the NAS IP Select the option:


address.
• Disabled
• SZ Control IP
• SZ Management IP
• User-defined

Advanced Options
User Traffic Profile Defines the traffic policy Select the required option.
that will be applied to
users on this WLAN. The
default UTP allows all with
no rate limits. UTPs can
define rate limits as well
as L3-7 ACLs and
policies.
L2 Access Control Enables the WLAN to Select the required option.
blacklist or whitelist a
specific set of MAC
addresses based on a L2
access control policy.
OS Policy Enables the WLAN to Select the required option.
apply a unique policy to a
device based on OS type.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
111
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


Use a precedence profile
to determine whether a
role-based, AAA-based,
or OS-based policy will
take precedence.
Application Enables DPI-based L7 Select the Enable check box.
Recognition and application recognition,
Control and if enabled, an
application control policy.
Recognition and control
are performed on the AP.
Client Fingerprinting Enables the AP to attempt Select the check box.
utilize DHCP fingerprinting
to identify client devices
by their operating system,
device type, and host
name.
Access VLAN Tags the WLAN traffic Select the check box and enter the VLAN
with a VLAN ID between ID.
2-4094. By default, all
client traffic will be
assigned to the native
(untagged) VLAN on the
AP's Ethernet port, which
we represent as VLAN ID
1.
Hide SSID Removes the SSID from Select the check box.
Beacon frames. By
removing the SSID, in
most cases, clients will
not show this SSID in their
scan list unless the device
is already configured to
connect. This can simplify
the network decision for
an end user.
Client Load Balancing Disables client load Select the check box to disable client load
balancing on this WLAN if balancing on this WLAN.
the option is selected.
Proxy ARP Enables proxy ARP. When Select the check box.
proxy ARP is enabled on
a WLAN, the AP provides
proxy service for stations

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
112
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


when receiving neighbor
discovery packets (for
example, ARP request
and ICMPv6 Neighbor
Solicit messages), and
acts on behalf of the
station in delivering ARP
replies. When the AP
receives a broadcast
ARP/Neighbor Solicit
request for a known host,
the AP replies on behalf of
the host. If the AP
receives a request for an
unknown host, it forwards
the request.
MAX Clients Limits the number of Enter the number of clients allowed.
clients that can associate
with this WLAN per AP
radio (default is 100).
Every connection attempt
after this max value will
not be permitted to
connect.
802.11d Adds additional regulatory Select the check box to enable this option.
information to AP beacons
and probe responses.
This compliance
information provides
country-specific guidance
like permitted channels
and transmit power, to
ensure that the devices
operate within the legal
boundaries of the country.
11d is helpful for many
devices that cannot
independently determine
their operating country.
802.11k Neighbor Enhances roaming by Select the check box.
Report providing a list of neighbor
APs to the client device.
APs build a neighbor AP
list via background
scanning, and when the

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
113
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


client plans to roam, it will
request this list from the
AP. This list is then used
to perform efficient
scanning to find a roaming
candidate.
Force DHCP Requires the clients to Select the check box.
obtain a valid IP address
from DHCP within the
specified number of
seconds. This prevents
clients configured with a
static IP address from
connecting to the WLAN.
Additionally, if a client
performs Layer 3 roaming
between different subnets,
in some cases the client
sticks to the former IP
address. This mechanism
optimizes the roaming
experience by forcing
clients to request a new
IP address.
DHCP Option 82 Enables an AP to Select the check box.
encapsulate additional
information (such as VLAN
ID, AP name, SSID and
MAC address) into the
DHCP request packets
before forwarding them to
the DHCP server. The
DHCP server can then use
this information to allocate
an IP address to the client
from a particular DHCP
pool based on these
parameters.
Client tx/Rx Statistics Stops the controller from Select the check box.
monitoring traffic statistics
for unauthorized clients.
Inactivity Timeout Indicates the duration Enter the duration in seconds.
after which idle clients will
be disconnected.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
114
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


OFDM Only Disconnects 802.11b Select the check box.
devices to the WLAN and
all devices are forced to
use higher data rates for
more efficient airtime
usage. This setting only
affects the 2.4GHz radio.
OFDM is used by
802.11a/g/n/ac, but is not
supported by 802.11b.
BSS Min Rate Forces client devices to Select the option.
both be closer to the AP
and to use higher, more
efficient rates when you
increase the BSS min rate
above the default (all
rates) setting. The BSS
minimum rate is the
lowest data rate
supported on the WLAN.
When OFDM-only is
enabled, it takes higher
priority than BSS min rate
settings.
Mgmt Tx Rate Sets the transmit rate for Select the value.
management frames type
such as beacon and
probes.
Service Schedule Controls when the WLAN Choose the option:
service is active. The
• Always On
purpose of this setting is
to automatically enable or • Always Off
disable a WLAN based on • Specific and select a schedule profile
a pre-determined from the drop-down list.
schedule. By default, the
service is Always On.
Always Off can be
checked in order to create
a WLAN and apply it, but
prevent it from advertising
until ready. The"specific"
setting allows a
configurable schedule
based on time of day and
days of the week.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
115
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action

NOTE: When a service


schedule is created it is
saved by the SZ and AP
using the browser's time
zone. When it is enforced
bu the AP, the AP will
enforce it according to the
time zone of the browser
when it was configured.

Band Balancing Disables band balancing Select the Disable band balancing for
only for this WLAN, if you this WLAN service check box.
select the check box.
Qos Map Set Reprioritizes downlink Select Enable QOS Map Set.
packets based on the
configured mappings.
When an AP receives a
downlink packet, it checks
the existing DSCP (L3
QoS) marking, compares
it to this map set and then
changes the user priority
(L2 QoS) values for
transmission by the AP.
TO configure this feature,
select the User Priority
(UP) from the table (0-7)
and configure the DSCP
(0-64) range that will be
mapped to this UP.
Exceptions can also be
added such that the
original DSCP and UP
tagging are preserved the
honored by the AP.

SSID Rate Limiting Enforces an aggregate Select Uplink and Downlink check boxes
rate limit for all users of and enter the limiting rate in mbps
the WLAN. The purpose respectively. Range: 1 mbps through 200
of this feature is to prevent mbps.
the combined throughput
form all users of an SSID
from exceeding this
threshold. This feature is
different from per-user

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
116
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action


rate limiting, which
enforces the same rate
limit for each individual
device.
DNS Server Profile Allows the AP to inspect Select a profile from the drop-down menu.
DHCP messages and Select Disable from the drop-down menu
overwrite the DNS if you want to disable the DNS Server
server(s) with the DNS profile for the WLAN service.
server configured in this
profile. This allows for
policy-based DNS
application in which
unique users/roles should
use a different DNS server
than others.
Precedence Profile Defines the relative policy Select the option.
assignment priority for
some specific settings.
For example, if a WLAN is
configured to use VLAN
10, and a AAA/role policy
is configured for VLAN 20,
and a device OS policy is
configured for VLAN 30,
and a user/device
connects to the WLAN
matching all of these
policies, which VLAN
should be assigned? The
precedence policy
determines which setting
takes priority.

NOTE: This feature is


applicable only to vSZ-E
platform.

Flexi-VPN Profile Forwards tunneled traffic Choose the DHCP Profile from the
to another remote drop-down.
instance through
RuckusGRE Tunnel.

NOTE: This feature is


applicable only to vSZ-E
platform.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
117
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

Field Description Your Action

NOTE: To display this


feature, enable the Tunnel
WLAN traffic through
Ruckus GRE check box
in the Access Network
option.

NOTE: You can also edit, clone and delete WLANs by selecting the options Configure, Clone
and Delete respectively, from the Wireless LANs page.

802.11 Fast BSS Transition


802.11r Fast BSS Transition is a fast roaming protocol that reduces the number of frame
exchanges required for roaming and allows the clients and APs to reuse the master keys obtained
during a prior authentication exchange. 11r is most helpful for 802.1X networks. Client support
is required for 11r to work.

802.11w MFP
802.11w Management Frame Protection provides additional security measures for management
frames. Not all client devices support 802.11w.
Check your client devices before enabling 11w. If “Required” is selected, clients must support
11w in order to connect. If “Capable” is selected, clients with or without 11w should be able to
connect. However, note that some clients with poor driver software may have connection
problems even if 11w is set to Capable.

Band Balancing
Band balancing balances the client load on radios by distributing clients between the 2.4 GHz
and 5 GHz radios.
This feature is enabled by default and set to a target of 25% of clients connecting to the 2.4
GHz band. To balance the load on a radio, the AP encourages dual-band clients to connect to
the 5 GHz band when the configured percentage threshold is reached.

Bypassing Apple CNA


Some Apple® iOS and OS X® clients include a feature called Captive Network Assistant (CNA),
which allows clients to connect to an open captive portal WLAN without displaying the logon
page.
When a client connects to a wireless network, the CNA feature launches a pre-browser login
utility and it sends a request to a success page on the Apple® website. If the success page is
returned, the device assumes it has network connectivity and no action is taken. However, this
login utility is not a fully functional browser, and does not support HTML, HTML5, PHP or other
embedded video. In some situations, the ability to skip the login page for open WLANs is a
benefit. However, for other guest or public access designs, the lack of ability to control the entire
web authentication process is not desirable.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
118
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

The controller provides an option to work around the Apple® CNA feature if it is not desirable
for your specific deployment. With CNA bypass enabled, captive portal (web-based authentication)
logon must be performed by opening a browser to any unauthenticated page (HTTP) to get
redirected to the logon page.

Client Admission Control


Client admission control allows APs to adaptively allow or deny the association of clients based
on the potential throughput of the currently associated clients. This helps prevent APs from
becoming overloaded with clients and improves user experience for wireless users.
As an administrator, you can help maintain a positive user experience for wireless users on the
network by configuring the following client admission control settings:
• Minimum client count
• Maximum radio load
• Minimum client throughput
Client admission control is implemented on a per radio basis and is supported on 802.11n and
802.11ac APs.

Client Load Balancing


Enabling load balancing can improve WLAN performance by helping to spread the wireless client
load between nearby access points, so that one AP does not get overloaded while another sits
idle.
The load balancing feature can be controlled from within the controller web interface to balance
the number of clients per radio on adjacent APs.
Adjacent APs are determined by the controller at startup by measuring the RSSI during channel
scans. After startup, the controller uses subsequent scans to update the list of adjacent radios
periodically and when a new AP sends its first scan report. When an AP leaves, the controller
immediately updates the list of adjacent radios and refreshes the client limits at each affected
AP.
Once the controller is aware of which APs are adjacent to each other, it begins managing the
client load by sending the configured client limits to the APs. These limits are soft values that
can be exceeded in several scenarios, including:
• When a client's signal is so weak that it may not be able to support a link with another AP
• When a client's signal is so strong that it really belongs on this AP.
The APs maintain these configured client limits and enforce them once they reach the limits by
withholding probe responses and authentication responses on any radio that has reached its
limit.
Key Points About Client Load Balancing
Before you enable load balancing, keep the following considerations in mind:
• The load balancing rules apply only to client devices; the AP always responds to another AP
that is attempting to set up or maintain a mesh network.
• Load balancing does not disassociate clients already connected.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
119
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

• Load balancing takes action before a client association request, reducing the chance of client
misbehavior.
• The process does not require any time-critical interaction between APs and the controller.
• Provides control of adjacent AP distance with safeguards against abandoning clients.
• Can be disabled on a per-WLAN basis. For instance, on a voice WLAN, load balancing may
not be desired due to voice roaming considerations.
• Background scanning must be enabled on the WLAN for load balancing to work.

Mobility Domain ID
A Mobility Domain ID is used by 802.11r to define a scope of the network in which an 11r fast
roam is supported. Master keys are shared within the Mobility Domain, allowing clients to support
a fast roam.

Portal-based WLANs
There are many types of portal-based WLANs and they can be distinguished based on where
the user credentials are stored, and where the portal page is hosted.

Table 16: Portal-based WLANs

WLAN Type User Credential Portal on which WLAN is


Hosted
Guest Guest passes on the controller AP
Hotspot (WISPr) RADIUS server. LDAP/Active External portal server or internal
Directory from SmartZone portal on the controller
release 3.2 and later
Web Auth RADIUS/LDAP/Active Directory AP

Guest and WebAuth WLAN portals are hosted on the controller AP with limited customization.
WISPr WLANs are usually hosted on external portal servers providing the flexibility to customize.
WISPr WLANs allow for sophisticated customization such as providing a customized login page
which could include locale information, advertisements etc.
WISPr WLANs can also be configured to bypass the authentication portal such that if an end
user device’s MAC address (as a credential) is stored on a RADIUS server, there is no need to
redirect the end user to the portal server for authentication.
Characteristics of portal-based WLANs
Portal-based WLANs have the following characteristics:
• WebAuth WLAN
• Does not provide and option to modify the portal (WYSIWYG)
• User authentication is done by the RADIUS server, LDAP and Active Directory
• Allows redirecting user web pages
• Guest WLAN

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
120
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

• Provides and option to modify the portal elements such as the logo, Terms and Conditions,
title etc
• User authentication is by using guest passphrases or select the Always Accepted option
• Allows redirecting user web pages
• Does not posses a local database, LDAP, Active Directory or RADIUS server
• Hotspot (WISPr) WLAN
• Internal Portal
• Provides and option to modify the portal elements such as the logo, Terms and
Conditions, title etc
• Allows redirecting user web pages
• User authentication is by the local database, LDAP, Active Directory, RADIUS server
or rendered by selecting the Always Accepted option
• Supports the Walled Garden approach to allow user access to specific areas within
the network
• External Portal
• Allows customization of the portal pages through external services
• Supports Northbound Portal Interface for authentication
• User authentication is by the local database, LDAP, Active Directory, RADIUS server
or rendered by selecting the Always Accepted option
• Supports the Walled Garden approach to allow user access to specific areas within
the network
• Allows redirecting user web pages

Rate Limiting Ranges for Policies


You can define and apply rate limit values for user devices to control the data rate and types of
network traffic the device transmits.

NOTE: For SmartZone release 3.4 and 3.2.x, the APs support the following rate limiting values:
• 0.10Mbps
• 0.25Mbps - 20.00Mbps (increments by 0.25Mbps)
• 21.00Mbps - 200.00Mbps (increments by1.00mpbs)
For example, typing 6.45 Mbps maps to the closest predefined rate value, so 6.45Mbps will be
rendered as 6.50Mbps.

NOTE: For SmartZone release 3.1.x, the APs support the following rate limiting values:
• 0.10Mbps
• 0.25Mbps - 20.00Mbps (increments by 0.25Mbps)
• 30.00Mbps
• 40.00Mbps
• 50.00Mbps

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
121
Working with WLANs and WLAN Groups
Creating a WLAN Configuration

For example, typing 31.50 Mbps maps to the closest predefined rate value, so 31.50 Mbps will
be rendered as 40 Mbps. Any rate greater than 50.00Mbps would be mapped to the maximum
rate which is 50.00Mbps.

Table 17: Rate Limiting ranges for different controller policies

Policy Global or Rate limit range Rate limit range for Rate limit range for
Zone for zone running zone running zone running
SmartZone 3.4 SmartZone 3.2.x SmartZone 3.1.x
Device Policy Zone 0.1 Mbps to 200 0.1 Mbps to 200
0.1 Mbps to 200 Mbps.
Mbps Mbps But any rate greater
than 50Mbps will be
Support No support for
mapped to 50 Mbps
uni-direction uni-direction (Uplink
implicitly on the AP side
(Uplink and and Downlink need
when the rate is
Downlink need not not be enabled or
applied.
be enabled or disabled at the same
disabled at the time) No support for
same time) uni-direction

User Traffic Global 0.1 Mbps to 200 0.1 Mbps to 200 But any rate greater
Profile Mbps Mbps than 50Mbps will be
mapped to 50 Mbps
No support for No support for
implicitly on the AP side
uni-direction uni-direction
when the rate is
because this is
applied.
Global profile that
is used by 3.2.x No support for
and 3.1.x APs uni-direction

Working with WLAN Schedule Profiles


A WLAN schedule profile specifies the hours of the day or week during which a WLAN service
will be enabled or disabled.
For example, a WLAN for student use at a school can be configured to provide wireless access
only during school hours. Create a WLAN schedule profile, and then when you configure a
WLAN, select the schedule profile to enable or disable the WLAN service during those hours/days.

NOTE: This feature will not work properly if the system does not have the correct time. To ensure
that the system always maintains the correct time, configure an NTP server and point the system
to the NTP server's IP address, as described in Configuring System Time on page 28.

NOTE: WLAN service schedule times should be configured based on your browser's current
timezone. If your browser and the target AP/WLAN are in different timezones, configure the
on/off times according to the desired schedule according to your local browser. For example if
you wanted a WLAN in Los Angeles to turn on at 9 AM and your browser was set to New York
time, please configure the WLAN service schedule to enable the WLAN at noon. When configuring
the service schedule, all times are based on your browser's timezone setting.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
122
Working with WLANs and WLAN Groups
Managing WLANs

Creating a WLAN Schedule Profile


Follow these steps to create a WLAN schedule profile.
1. From the Wireless LANs page, select the WLAN for you want to create a WLAN Schedule
profile.
2. Click Configure, the Edit WLAN Config page appears.
3. Scroll down to the Advanced Options section.
4. In the Service Schedule field, select Specific.
5. Click Create, the Create Time Schedules Table form appears.
6. In General Options, enter the Schedule Name and Schedule Description.
7. To set a WLAN schedule:
• To enable or disable the WLAN for an entire day, click the day of the week under the Time
column.
• To enable or disable the WLAN for specific hour of a specific day, click the squares in the
table. A single square represents 30 minutes (two-15 minute blocks).
Blue-colored cells indicate the hours when the WLAN is enabled. Clear (or white) cells
indicate the hours when the WLAN is disabled.

8. Click Create, the page refreshes, and then the schedule you created appears in the drop-down
list.

Managing WLANs
When you select a System, Zone, or WLAN Group from the hierarchy tree, respective contextual
tabs appear at the bottom of the page.
These tabs are used to monitor the selected group. Table 18: System/Zone/WLAN Groups
Monitoring Tabs on page 123 lists the tabs that appear for System, Zone, and WLAN Group.

Table 18: System/Zone/WLAN Groups Monitoring Tabs

Tabs Description System Zone WLAN


Groups
Configuration Displays the respective configuration Yes Yes Yes
information.
Traffic Displays the respective historical traffic Yes Yes Yes
information.
Alarm Displays the respective alarms Yes Yes Yes
information. See Managing Events and
Alarms on page 281.
Event Displays the respective event Yes Yes Yes
information. See Managing Events and
Alarms on page 281.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
123
Working with WLANs and WLAN Groups
Managing WLANs

Tabs Description System Zone WLAN


Groups
APs Displays the respective AP Yes Yes NA
information. Working With Access
Points on page 67.
Clients Displays the respective client Yes Yes NA
information. See Managing Clients on
page 126.
Services Displays the respective Services Yes Yes NA
information. Services and Profiles on
page 158.
Administrators Displays the respective administrator Yes NA NA
account information. See Managing
Administrator and Roles on page 256.

When you can select a Zone and click More you can perform the following operations:
• Extract WLAN Template
• Apply WLAN Template
• Change AP Firmware
• Switchover Cluster

Extracting a WLAN Template


You can extract only WLAN-related configuration of an AP to a WLAN template.
Follow these steps to extract a WLAN template:
1. From the Wireless LANs page, locate the zone from where you want to extract the WLAN
template.
2. Click More and select Extract WLAN Template, the Extract WLAN Template form appears.
3. In WLAN Template Name, enter a name for the Template.
4. Click OK, a message appears stating that the WLAN template was extracted successfully.
5. Click OK. You have completed moving an access point to a new AP zone.
The extracted WLAN template can be viewed under System > Templates > WLAN
Templates.

Applying a WLAN Template


You can apply only WLAN-related configuration to an AP zone using a WLAN template.
Follow these steps to apply a WLAN template:
1. From the Wireless LANs page, locate the zone where you want to apply the WLAN template.
2. Click More and select Apply WLAN Template, the Apply WLAN Template dialog box
appears.
3. From the Select a WLAN template drop-down, select the template.
4. Click OK, a confirmation message appears asking to apply the wlan templates to the zone.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
124
Working with WLANs and WLAN Groups
Managing WLANs

5. Click Yes, a confirmation message appears stating the template was applied successfully.
You have completed applying WLAN template to the AP zone.

Changing the Zone's AP Firmware Version


The controller supports multiple firmware version. You can manually upgrade or downgrade the
zone's AP firmware version.
Follow these steps to change the zone's AP firmware version:
1. From the Wireless LANs page, locate the zone for which you want to change the AP firmware
setting.
2. Click More and select Change AP Firmware, the Change AP Firmware dialog box appears.
3. The Current AP Firmware version is displayed. Select the firmware version you need. If you
upgrade to a new firmware, a backup configuration file will be created. You can use this
backup file to downgrade to original firmware.
4. Click Yes, a confirmation message appears stating that the firmware version was updated
successfully.
5. Click OK. You have completed upgrading the zone's AP firmware version.

Rehoming Managed APs


Rehoming is the process of returning the APs that have failed over to the second cluster back
to their original cluster (once it becomes available). Rehoming must be done manually. APs that
have failed over will continue to be managed by the failover cluster until you rehome them.

NOTE: To rehome managed APs, you must enable cluster redundancy so that the APs will
continue to be managed by the failover cluster until you restore them to the original cluster
(rehome) manually. See Enabling Cluster Redundancy on page 42.

Rehoming APs must be done on a per-zone basis. Follow these steps to rehome managed APs
to the original cluster.
1. From the Wireless LANs page, locate the zone where you want to switchover cluster settings.
2. Click More and select Switchover Cluster. The Switchover Cluster dialog box appears.
3. Select the Switchover Cluster from the drop-down.
4. Click OK, the page refreshes. You have configured the cluster switchover settings.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
125
Managing Clients
Working with Wireless Clients

Managing Clients 5
In this chapter:

• Working with Wireless Clients


• Working with Wired Clients
• Working with Users and Roles
• Working with Guest Passes
• Working with Dynamic PSKs

Working with Wireless Clients


Wireless clients are client devices that are connected to the wireless network services that your
managed APs provide. Wireless clients can include smart phones, tablets, and notebook
computers equipped with wireless network adapters.

Viewing a Summary of Wireless Clients


View a summary of wireless clients that are currently associated with all of your managed access
points.
Go to Clients > Wireless Clients. The Wireless Clients page appears and displays a table that
lists all clients that are currently associated with your managed access points.
To view only wireless clients that belong to a particular zone, click the zone name in the zone
tree. The table refreshes and displays only the clients that belong to the zone you selected.
The following table lists the wireless client details.

NOTE: Not all of the columns listed below are displayed by default. To display column that are
currently hidden, click the gear icon in the upper-right corner of the table, and then select the
check boxes for the columns that you want to display.

You can view the clients listed in the table in two view modes - No TTG (without TTG) and TTG
(with TTG).

Click the icon to export all the data into a CSV file.

Table 19: Wireless client details

Column Name Description


Hostname Displays the hostname of the wireless client
OS Type Displays the operating system that the wireless client is using
IP Address Displays the IP address assigned to the wireless client

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
126
Managing Clients
Working with Wireless Clients

Column Name Description


MAC Address Displays the MAC address of the wireless client
WLAN Displays the name of the WLAN with which the client is associated
AP Name Displays the name assigned to the access point
AP MAC Displays the MAC address of the AP
Traffic (Session) Displays the total traffic (in KB/MB/GB/TB) for this client in this session
Traffic (Uplink) Displays the total uplink traffic (in KB/MB/GB/TB) for this client in this
session
Traffic (Downlink) Displays the total downlink traffic (in KB/MB/GB/TB) for this client in
this session
RSSI Displays the Received Signal Strength Indicator (RSSI), which indicates
how well a wireless client can receive a signal from an AP. The RSSI
value is shown in decibels (dB) and displayed as either the real-time
value or the average value over the past 90 seconds.
SNR Displays the Signal-to-Noise Ratio (SNR), which indicates the signal
strength relative to background noise. The SNR value is shown in
decibels (dB) and displayed as either the real-time value or the average
value over the past 90 seconds.
Radio Type Displays the type of wireless radio that the client supports. Possible
values include 11b, 11g, 11g/n, 11a, 11a/g/n, and 11ac.
VLAN Displays the VLAN ID assigned to the wireless client
Channel Displays the wireless channel (and channel width) that the wireless
client is using
User Name Displays the name of the user logged on to the wireless client
Connected Since Displays the time from which the AP is connected to the wireless client
# of Events Displays the number of client events
Data Rate (Up) Displays the rate at which data is transmitted from the wireless client
to the AP
Data Rate (Down) Displays the rate at which data is transmitted from the AP to the wireless
client
Auth Method Displays the authentication method used by the AP to authenticate the
wireless client
Auth Status Indicates whether the wireless client is authorized or unauthorized to
access the WLAN service
Encryption Displays the encryption method used by the AP

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
127
Managing Clients
Working with Wireless Clients

Column Name Description


Control Plane Displays the name of SmartZone node to which the AP's control plane
is connected
Packets to Displays the downlink packet count for this session
Packets from Displays the uplink packet count for this session
Packets dropped Displays the downlink packet count for this client that have been
dropped

Viewing Information about a Wireless Client


You can view more information about a wireless client, including its IP address, MAC address,
operating system, and even recent events that have occurred on it.
Follow these steps to view information about a wireless client.
1. Go to Clients > Wireless Clients.
2. From the list of wireless clients, locate the client whose details you want to view.
3. Under the MAC Address column, click the MAC address of the wireless client.
The Associated Client page appears and displays general information about the wireless
client.
• General: Displays general client information.
• Health: Displays information about the real-time health of the client. It displays graphical
trends based on the signal-to-noise ratio (SNR) and data rate. You can use the Start and
Stop option to review client health at real time.
• Traffic: Displays historical and real-time traffic information.
• Event: Displays information about events associated with the client.

Deauthorizing a Wireless Client


If you want to force wireless clients that joined the wireless network through an authentication
portal (for example, a hotspot, guest access or web authentication portal) to reauthenticate
themselves, you can deauthorize them. Deauthorized wireless clients remain connected to the
wireless network, but these clients will be redirected to the authentication portal whenever they
attempt to access network resources.
Follow these steps to deauthorize a wireless client.
1. On the menu, click Clients > Wireless Clients.
2. From the list wireless clients, locate the client that you want to deauthorize. If you have a large
number of wireless clients and you know the MAC address of the client, enter the MAC
address in the search box, and then press Enter to search for the client.
3. When you have located the client, select it, and then click the Deauthorize button above the
table.
The table refreshes, and then the client that you deauthorized disappears from the list.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
128
Managing Clients
Working with Wireless Clients

Blocking a Wireless Client


When a user associates a wireless client device with an AP that the controller is managing, the
client device is recorded and tracked. If, for any reason, you need to block a client device from
accessing the network, you can do so from the web interface.
A few reasons why you might consider blocking a wireless client device include:
• Network abuse
• Violation of acceptable use policy
• Theft
• Security compromise
Follow these steps to block a wireless client from accessing the SmartZone network.
1. On the menu, click Clients > Wireless Clients.
2. From the list wireless clients, locate the client that you want to block. If you have a large
number of wireless clients and you know the MAC address of the client, enter the MAC
address in the search box, and then press <Enter> to search for the client.
3. When you have located the client, select it, and then click the Block button above the table.
You have completed blocking a wireless client.

Unblocking a Wireless Client


If you want to allow a client that you previously blocked to access the SmartZone network, you
can unblock it.
Follow these steps to unblock a wireless client.
1. On the menu, click Services and Profiles > Access Control.
2. Click the Blocked Client tab.
3. From the list of blocked clients, locate the client that you want to unblock. If you have a large
number of blocked clients and you know the MAC address of the client, enter the MAC
address in the search box, and then press <Enter> to search for the client.
4. When you have located the client, select it, and then click the Delete button above the table.
The table refreshes, and then the client that you want to unblock disappears from the list.
You have completed unblocking a wireless client.

Disconnecting a Wireless Client


If you need to temporarily disconnect a wireless client from the wireless network, you can do so
from the web interface. For example, if you are troubleshooting problematic network connections,
you might have to manually disconnect wireless clients as part of the troubleshooting process.
Follow these steps to disconnect a wireless client from the WLAN to which it is connected.
1. On the menu, click Clients > Wireless Clients.
2. From the list wireless clients, locate the client that you want to disconnect. If you have a large
number of wireless clients and you know the MAC address of the client, enter the MAC
address in the search box, and then press <Enter> to search for the client.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
129
Managing Clients
Working with Wired Clients

3. When you have located the client, select it, and then click the Disconnect button above the
table.
The table refreshes, and then the client that you disconnected disappears from the list.

Working with Wired Clients


Wired clients are client devices that are connected to the Ethernet ports of APs managed by the
controllers, and thereby are connected to the wired network services that your managed APs
provide.

Viewing a Summary of Wired Clients


View a summary of wired clients that are currently associated with all of your managed access
points.
Go to Clients > Wired Clients. The Wired Clients page appears and displays a table that lists
all clients that are currently associated with your managed access points.
To view only wired clients that belong to a particular zone, click the zone name in the zone tree.
The table refreshes and displays only the clients that belong to the zone you selected.
The following table lists the wired client details.

Table 20: Wired client details

Column Name Description


MAC Addres Displays the MAC address of the wired client
Username Displays the name of the user logged on to the wire client
IP Address Displays the IP address assigned to the wired client
AP MAC Displays the MAC address of the AP
AP Name Displays the name assigned to the access point
LAN Displays the LAN ID assigned to the wired client
VLAN Displays the VLAN ID assigned to the wired client
Auth Status Indicates whether the wired client is authorized or unauthorized to
access the WLAN service

Viewing Information about a Wired Client


You can view more information about a wired client, including its IP address, MAC address and
even recent events that have occurred on it.
Follow these steps to view information about a wired client.
1. Go to Clients > Wired Clients.
2. From the list of wired clients, locate the client whose details you want to view.
3. Under the MAC Address column, click the MAC address of the wired client.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
130
Managing Clients
Working with Users and Roles

The Associated Client page appears and displays general information about the wired client.
• General: Displays general client information.
• Event: Displays information about events associated with the client.

Deauthorizing a Wired Client


If you want to force wired clients that joined the wired network through an authentication portal
to reauthenticate themselves, you can deauthorize them. Deauthorized wired clients remain
connected to the wired network, but these clients will be redirected to the authentication portal
whenever they attempt to access network resources.
Follow these steps to deauthorize a wired client.
1. On the menu, click Clients > Wired Clients.
2. From the list wired clients, locate the client that you want to deauthorize. If you have a large
number of wired clients and you know the MAC address of the client, enter the MAC address
in the search box, and then press Enter to search for the client.
3. When you have located the client, select it, and then click the Deauthorize button above the
table.
The table refreshes, and then the client that you deauthorized disappears from the list.

Working with Users and Roles


The controller provides a default role (named Default) that is automatically applied to all new
user accounts.
By default, this role links all users to the internal WLAN and permits access to all WLANs. As an
alternative, you can create additional roles that you can assign to select wireless network users,
to limit their access to certain WLANs, to allow them to log on with non-standard client devices,
or to grant permission to generate guest passes. (You can then edit the default role to disable
the guest pass generation option.)

Creating a User Role


Use user roles to limit user access to certain WLANs, to allow them to log on with non-standard
client devices.
Follow these steps to create a user role.
1. Go to Clients > Users & Roles.
2. Select the User Roles tab, and then select the zone for which you want to create the role.
3. Click Create.
The Create User Role page appears.
Figure 32: Create User Role

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
131
Managing Clients
Working with Users and Roles

4. Configure the options in the Create User Role form.


• Role Name: Type a name for this user role.
• Description: Type a description for this user role.
• User Traffic Profiles: Select the user traffic profile form the drop-down menu. You can also
create the user traffic profile. For more information, see Creating a User Traffic Profile on
page 173.
• Access VLAN: Provide the VLAN ID.
You can also select the Enable VLAN Pooling check-box and select the VLAN ID from the
drop-down list. You can also create a VLAN Pooling profile. For more information, see
Creating a VLAN Pooling Profile on page 178.

5. Click OK.
You have completed creating a user role.

NOTE: You can also edit, clone and delete user roles by selecting the options Configure, Clone
and Delete respectively, from the User Roles tab.

Creating a User Role with Active Directory Authentication


Configuring user roles using AD authentication provides broad range of directory-based
identity-related services.
To create a User Role with AD authentication:
1. Create a new UTP for a particular role, refer Creating a User Traffic Profile on page 173.
2. Create a role, refer Creating a User Role on page 131.
3. Create a new Proxy AD server and apply the UTP.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
132
Managing Clients
Working with Users and Roles

NOTE: Non-proxy Auth servers are not supported.

Refer Creating Proxy AAA Servers on page 196.

NOTE: In step 4, for Service Protocol option, choose Active Directory and proceed.

4. Perform an authentication test to ensure that the user gets assigned the correct Role. Refer
Testing AAA Servers on page 201.
5. Create a web authentication portal WLAN configuration and assign the Non-proxy AD server
to it. Refer Creating a WLAN Configuration on page 102.

NOTE:
1. Choose WLAN Usage > Authentication Type > Web Authentication.
2. Configure the following for Authentication & Accounting Server:
a. Web Authentication Portal: choose the option from the drop-down.
b. Authentication Server: select the Use the Controller Proxy check box and choose
the authentication service from the drop-down.

Creating a User Role with 802.1x Authentication


To create a User Role with 802.1x authentication:
1. Create a new UTP for a particular role, refer Creating a User Traffic Profile on page 173.
2. Create a role, refer Creating a User Role on page 131.
3. Create a new Proxy RADIUS server and apply the UTP.

NOTE: Non-proxy Auth servers are not supported.

Refer Creating Proxy AAA Servers on page 196.

NOTE: In step 4, for Service Protocol option, choose RADIUS and proceed.

4. Perform an authentication test to ensure that the user gets assigned the correct Role. Refer
Testing AAA Servers on page 201.
5. Create a web authentication portal WLAN configuration and assign the Non-proxy RADIUS
server to it. Refer Creating a WLAN Configuration on page 102.

NOTE:
1. Choose WLAN Usage > Authentication Type > Web Authentication.
2. Go to Authentication Options > Methods, choose 802.1x EAP and proceed.

Applying Role Policies to Users


Limitations: Specifically, user role policies are only supported in proxy-mode AAA WLANs. Also,
you configure the user-attribute-to-role mapping in AAA profiles. Also, there are some components
that will not work in 3.5, even though the GUI would lead us to believe they do. For example,

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
133
Managing Clients
Working with Users and Roles

L7 app policies will not be applied based on a role. Role-based VLAN will not be applied if
WLAN’s auth type is L7 because there is no easy way to change the UE VLAN without
disconnecting them. Also, we should mention precedence policies here, which are configurable
at the WLAN level, but have an impact on the way that roles are assigned. Finally, we should
talk about the difference between assigning UEs to roles via RADIUS and using RADIUS attributes
to apply some specific policy, like rate limit, VLAN, or ACL. RADIUS attribute will always take
precedence over the role assignment.

Creating a Local User


A local user in the controller refers to a registered user who may be given access to the controller
hotspot. A user account contains a user's personal information, logon information, and the
subscription package that he or she has been assigned. The controller's local user database
can include 802.1X, WISPr, and Zero-IT users.
When you create a user account, you will be required to assign a subscription package to the
user. Before creating a user account, Ruckus Wireless® recommends creating at least one
subscription package. See Creating a Subscription Package for more information.
1. Go to Clients > Users & Roles.
2. Select the Local Users tab, and then select the zone for which you want to create the local
user.
3. Click Create.
The Create User page appears.
Figure 33: Create User

4. Configure the options in the Create User form.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
134
Managing Clients
Working with Users and Roles

1. In the Contact Details section, fill the following:


• First Name
• Last Name
• Email
• Phone
• Address
• City
• State
• Zip Code
• Country
• Remark
2. In the Login Details section, fill out the following boxes to create the logon credentials of
this user:
• User Name: Type a name for this user. The user name is not case-sensitive and will
always be displayed in lowercase characters.
• Password: Type a password for this user. The password must be at least eight
characters in length.
• Confirm Password: Retype the password above.
3. In the Subscription Details section, select a subscription package that you want to assign
to this user. See Creating a Subscription Package on page 136, for more information.

5. Click OK.
You have completed creating a local user.
Select Enable to enable this user profile or select Disable.

You can view the list of local users by applying filters. Click the icon to do so.
The following information is displayed when you click on the user:
• Summary: Displays a summary of information about the user.
• Admin Activities: Displays information about the administrator activities.

Event: Displays information about events associated with the user. Click the icon to apply
filters.

Click the icon to export all the data into a CSV file.

NOTE: You can also edit, clone and delete user by selecting the options Configure, Clone and
Delete respectively, from the Local Users tab.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
135
Managing Clients
Working with Users and Roles

Creating a Subscription Package


A subscription package defines the characteristics of a subscription that has been created for
a registered user. These characteristics include the expiration date of the subscription.
If the user is connected at the time when his or her subscription expires, the user will get
disconnected from the AP and any attempts to re-authenticate will fail.
1. Go to Clients > Users & Roles.
2. Select the Subscription Package tab, and then select the zone for which you want to create
the package.
3. Click Create.
The Create Subscription Package page appears.
Figure 34: Create Subscription Package

4. Configure the options in the Create Subscription Package form.


• Name: Type a name for the subscription package that you are creating.
• Description: Type a description for this package.
• Expiration Interval: Set the time unit to use for the package expiration. Options include:
Hour, Day, Week, Month, Year and Never.
• Expiration Value: Set the actual value to use in combination with the Expiration Time.

5. Click OK.
You have completed creating a subscription package.

NOTE: You can also edit and delete a package by selecting the options Configure and Delete
respectively, from the Subscription Package tab.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
136
Managing Clients
Working with Guest Passes

Working with Guest Passes


Similar to user accounts, guest passes in the controller allow users to gain access to the controller
hotspots. However, unlike user accounts, guest pass users are not required to provide personal
information to access the controller hotspots and can therefore remain anonymous.
Guest passes are generated for specific WLANs only – guest pass users will only be able to gain
access to the WLANs for which the guest pass was generated.

Generating Guest Passes


Generating guest passes involves four steps:
Step 1: Create a Guest Access Service on page 137
Step 2: Create a Guest Access WLAN on page 137
Step 3: Generate a Guest Pass on page 138
Step 4: Send Guest Passes to Guest Users on page 140

Step 1: Create a Guest Access Service


1. Follow the instructions in Creating a WLAN Configuration on page 102 to create at least one
guest access service in Guest Access Portal.
2. When you finish creating a guest access service, continue to Step 2: Create a Guest Access
WLAN on page 137.

Step 2: Create a Guest Access WLAN


Guest passes are generated for specific WLANs only. Guest pass users will only be able to gain
access to the WLANs for which the guest pass is generated.
Follow these steps to create a WLAN that will be used for guest access only.
1. Click Wireless LANs.
The Wireless LANs page appears.
2. Click Create.
The Create WLAN Configuration page appears.
3. In General Options, configure the following:
• Name
• SSID
• Description
• Zone
• WLAN Group

4. In WLAN Usage, configure the following:


a) In Access Network, select the Tunnel WLAN traffic through Ruckus GRE check box
if you want to tunnel the traffic from this WLAN back to the controller.
b) In Authentication Type, click Guest Access.
5. Configure the rest of the WLAN settings.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
137
Managing Clients
Working with Guest Passes

For details on each setting, see Creating a WLAN Configuration on page 102.
6. When you finish creating a guest access WLAN, continue to Step 3: Generate a Guest Pass
on page 138.
Figure 35: Creating a WLAN for guest access only

Step 3: Generate a Guest Pass


Follow these steps to generate a guest pass.
1. Click Clients > Guests.
The Guest Pass page appears.

2. Click Generate Guest Pass.


The Generate Guest Pass form appears.
3. Configure the following options:
• Guest Name: Type a name that you want to assign to the guest user.
• Guest WLAN: Select the guest WLAN that you created in Step 2: Create a Guest Access
WLAN on page 137.
• Number of Passes: Type the number of guest passes that you want to generate.
• Pass Valid For: Set the validity period for the guest pass by filling in the two boxes. For
example, if you want the guest pass to be valid for seven days, type 7 in the first box, and
then select Days in the second box.

4. Configure the advanced options:


a) Pass Generation: Select the Auto Generate check box if you want the controller to
generate the guest pass key automatically.
If you want to generate the guest pass manually, clear the Auto Generate check box.
If you are generating more than one guest pass, the Auto Generate check box is selected
automatically and is not configurable.
b) Pass Effective Since: Set the guest pass validity period by selecting one of the following
options:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
138
Managing Clients
Working with Guest Passes

• Effective from the creation time: This type of guest pass is valid from the time it is
first created to the specified expiration time, even if it is not being used by any end user.
• Effective from first use: This type of guest pass is valid from the time the user uses
it to authenticate with the controller until the specified expiration time. An additional
parameter (Guest Pass will expire in X days) can be configured to specify when an
unused guest pass will expire regardless of use. The default is 7 days.
• Expire guest pass if not used within [ ] days: If you want this guest pass to expire if
it is unused after you generated it, type the number of days in the box (maximum value
is 365 days).
c) Max Devices Allowed: Set the number of users that can share this guest pass.
• Limited to [ ]: If you want a limited number of users to share this guest pass, click this
option, and then type the number in the box.
• Unlimited: If you want an unlimited number of users to share this guest pass, click this
option.
• Session Duration: If you clicked Unlimited, this option appears. If you want require
users to log on again after their sessions expire, select the Require guest re-login
after [ ] check box, and then select a time increment. If this feature is disabled,
connected users will not be required to re-log in until the guest pass expires.
d) In Remarks (optional), type your notes about this guest pass, if any.
5. Click Generate.
The page refreshes, and then the guest pass you generated appears in a table, along with
other guest passes that exist on the controller.
Click Enable to enable the guest pass for a user, and Disable to revoke the guest pass for
a particular user.

You have completed generating a guest pass. You are now ready to send the guest pass to
guest users. See Step 4: Send Guest Passes to Guest Users on page 140 for information.

You can view the list of guest passes by applying filters. Click the icon to do so.
The following information is displayed when you click on the guest pass created:
• Summary: Displays a summary of information about the user and credentials.
• Admin Activities: Displays information about the administrator activities.
• Event: Displays information about events associated with the user.

Click the icon to apply filters. Click the icon to export all the data into a CSV file.

Figure 36: Generating a guest pass

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
139
Managing Clients
Working with Guest Passes

Step 4: Send Guest Passes to Guest Users


Deliver the guest passes to guest users as per the delivery options that you choose.
The page that appears after you generate a guest pass contains options for delivering the guest
pass to guest users (see the following image).
Figure 37: Options for delivering guest passes to guest users

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
140
Managing Clients
Working with Guest Passes

Creating a Guest Pass Template


A guest pass template is a HTML file which contains variables for the information that guest
users need to connect to the controller hotspots (for example, guest name, key, and WLAN
name), and actual instructions for connecting to the guest WLAN.
A default printout template exists in the controller. If you want to create your own printout template,
follow these steps.
1. Go to Clients > Guests.
2. Click Guest Pass Template.
The Guest Pass Template page appears.

3. In the Guest Instruction HTML Template section, click default.html, which is the default
guest pass printout template.
The content of the default guest pass printout template appears in the Name: default.html.
4. Click Download below the template preview area to download a copy of the template to
your computer.
5. Using an HTML editor, create a new HTML file.
6. Add content to the file.
Typically, a printout template contains instructions for connecting to the controller hotspot.
See the following image for the content of the default printout template.
Figure 38: Content of the default printout

template

7. Insert the following variables into the content of your template:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
141
Managing Clients
Working with Guest Passes

• {GP_GUEST_NAME}: This is the guest pass user name.


• {GP_GUEST_KEY}: This is the guest pass key.
• {GP_VALID_TIME}: This is the expiration date and time of the guest pass.
• {GP_GUEST_WLAN}: This is the WLAN with which the guest user can associate using
the guest name and guest key.

8. Save the file.


9. In the Guest Instruction HTML Template page, click the Upload button for the template
that you are creating.
The Upload a Template File form appears on the right side of the page.

10. Configure the Upload a Template File options:


• Template Name: Type a name for the template that you are uploading.
• Template File: Click Browse, and select the template file you created.

11. Click Upload.


An information message box appears and informs you that the template file has been uploaded
successfully.

12. Click OK.


The template file you uploaded now appears in the list of templates.
Figure 39: The Upload a Template File form

Creating a Guest Instruction SMS Template


A guest SMS template is a text file which contains variables for the information that guest users
need to connect to the controller hotspots (for example, guest name, key, and WLAN name),
and actual instructions for connecting to the guest WLAN.
A default printout template exists in the controller. If you want to create your own printout template,
follow these steps.
1. Go to Clients > Guests.
2. Click Guest Pass Template.
The Guest Pass Template page appears.

3. In the Guest Instruction SMS Template section, click default.txt, which is the default
guest pass printout template.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
142
Managing Clients
Working with Guest Passes

The content of the default guest pass printout template appears in the Name: default.txt.
4. Click Download below the template preview area to download a copy of the template to
your computer.
5. Using an HTML editor, create a new text file.
6. Add content to the file.
Typically, a printout template contains instructions for connecting to the controller hotspot.
See the following image for the content of the default printout template.
Figure 40: Content of the default printout

template

7. Insert the following variables into the content of your template:


• {GP_GUEST_NAME}: This is the guest pass user name.
• {GP_GUEST_KEY}: This is the guest pass key.
• {GP_VALID_TIME}: This is the expiration date and time of the guest pass.
• {GP_GUEST_WLAN}: This is the WLAN with which the guest user can associate using
the guest name and guest key.

8. Save the file.


9. In the Guest Instruction SMS Template page, click the Upload button for the template that
you are creating.
The Upload a Template File form appears on the right side of the page.

10. Configure the Upload a Template File options:


• Template Name: Type a name for the template that you are uploading.
• Template File: Click Browse, and select the template file you created.

11. Click Upload.


An information message box appears and informs you that the template file has been uploaded
successfully.

12. Click OK.


The template file you uploaded now appears in the list of templates.
Figure 41: The Upload a Template File form

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
143
Managing Clients
Working with Guest Passes

Exporting the Guest Pass to CSV


Follow these steps to export the last generated guest passes to a comma-separated value (CSV)
file.
1. From the generate guest pass list, select the guest passes that you want to export to CSV.
2. Click Export Selected.
Your web browser downloads the CSV file to its default download location.

3. Go to your web browser's default download location and look for a file named
guestpass.csv.
4. Using Microsoft Excel or a similar application, open the CSV file. The CSV file displays the
details of the guest passes, including:
• Guest Name
• Key
• Remarks
• Generated
• Expiration Date
• WLAN

You have completed exporting the last generated guest passes to CSV.
Figure 42: A sample CSV of generated guest passes when opened in Excel

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
144
Managing Clients
Working with Guest Passes

Generating Guest Passes from an Imported CSV


You can also manually define the guest passes that you want to generate in a comma-separated
value (CSV) file (a sample of which is available for download from the Guest Pass page).
Follow these steps to generate guest passes from an imported CSV file.
1. Click Clients > Guests .
The Guest Pass page appears.

2. Click Import Guest Pass,


The Import Guest Pass form appears.

3. Look for the following text under Browse:


To download a sample guest pass, click here.

4. Click the here link to download the sample CSV file.


5. Using Microsoft Excel or a similar application, open the CSV file.
6. In the CSV file, fill out the following columns:
• #Guest Name (Must): Assign a user name to the guest pass user.
• Remarks (Optional): Add some notes or comments about this guest pass.
• Key: Enter a guest pass key or leave it blank so the controller can generate the key
automatically.
Figure 43: The sample CSV file when opened in Excel

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
145
Managing Clients
Working with Guest Passes

7. Save the CSV file.


8. Go back to the Import Guest Pass page, and then configure the following settings on the
Common Guest Pass Settings:
• Guest WLAN: Select the guest WLAN that you created in Step 2: Create a Guest Access
WLAN on page 137.
• Pass Valid For: Set the validity period for the guest pass by filling in the two boxes. For
example, if you want the guest pass to be valid for seven days, type 7 in the first box, and
then select Days in the second box.

9. Configure the advanced options:


a) Pass Effective Since: Set the guest pass validity period by selecting one of the following
options:
• Effective from the creation time: This type of guest pass is valid from the time it is
first created to the specified expiration time, even if it is not being used by any end user.
• Effective from first use: This type of guest pass is valid from the time the user uses
it to authenticate with the controller until the specified expiration time. An additional
parameter (Guest Pass will expire in X days) can be configured to specify when an
unused guest pass will expire regardless of use. The default is 7 days.
• Expire guest pass if not used within [ ] days: If you want this guest pass to expire if
it is unused after you generated it, type the number of days in the box (maximum value
is 365 days).
b) Max Devices Allowed: Set the number of users that can share this guest pass.
• Limited to [ ]: If you want a limited number of users to share this guest pass, click this
option, and then type the number in the box.
• Unlimited: If you want an unlimited number of users to share this guest pass, click this
option.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
146
Managing Clients
Working with Guest Passes

• Session Duration: If you clicked Unlimited, this option appears. If you want require
users to log on again after their sessions expire, select the Require guest re-login
after [ ] check box, and then select a time increment. If this feature is disabled,
connected users will not be required to re-log in until the guest pass expires.

10. In Guest List CSV File (at the top of the page), click Browse, and then select the CSV file
you edited earlier.
The page refreshes, and the number of guest passes that the controller has identified in the
CSV file appears below the Browse button.
11. Click Import.
The page refreshes, and then the guest pass you generated appears in a table, along with
other guest passes that exist on the controller.
You have completed generating a guest pass. You are now ready to send the guest pass to
guest users. See Step 4: Send Guest Passes to Guest Users on page 140 for information.
Figure 44: The Guest Pass page for importing a CSV file

Printing the Guest Pass


After you generate the guest pass, you can print the guest pass information, which contains the
guest user information and instructions on how to connect to the hotspot, and give it to the
guest user.

NOTE: If your browser is blocking pop-ups, make you temporarily disable the pop-up blocker
so you can view and print the guest pass.

Follow these steps to print a guest pass.


1. From the generated guest passes list, select the guest passes that you want to print.
2. In Guest Instruction HTML Template, select a printout template to use.
The default printout template (default.html) is selected by default. If you created custom
printout templates (see Creating a Guest Pass Template on page 141), they will appear in the
drop-down menu.
3. Click Print Selected.
A new browser page appears, which displays the guest pass and available printing options.
4. Configure your printer settings, and then print the guest passes.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
147
Managing Clients
Working with Guest Passes

You have completed printing the guest passes.


Figure 45: What a guest pass printout looks like

Sending the Guest Pass via Email


To send guest passes via email, you must have added an external email server to the controller.
Follow these steps to send the guest pass via email.
1. From the generated guest passes list, select the guest passes that you want to send via
email.
2. Click Email.
The Recipient Email form appears on the right side of the page (see Figure 46: Use the
Recipient Email form to specify who will receive the guest passes via email on page 148).

3. Click Add New.


4. In the box that appears below, type the email address to which you want to send the guest
passes.
5. To add another recipient, click Add Newagain, and then type another email address.
6. When you have finished adding all the email recipients, click Send Email.
A dialog box appears and informs you that the emails have been sent to the message queue
successfully

7. Click OKto close the dialog box.


You have completed sending guest passes via email.
Figure 46: Use the Recipient Email form to specify who will receive the guest passes via
email

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
148
Managing Clients
Working with Dynamic PSKs

Sending the Guest Pass via SMS


To send guest passes via sms, you must have added an external SMS gateway to the controller.
Follow these steps to send the guest pass via email.
1. From the generated guest passes list, select the guest pass that you want to send via SMS.
2. Click SMS.
SMS options appear on the right side of the page (see Figure 47: Options for sending guest
passes via SMS on page 149).
3. In Guest Instruction SMS Template, select the SMS template that you want to use.
4. Click Add New.
5. In the box that appears below, type the phone number to which you want to send the guest
passes via SMS.
6. To add another SMS recipient, click Add New again, and then type another phone number.
7. When you have finished adding all the SMS recipients, click Send SMS.
A dialog box appears and informs you that the SMS messages have been sent to the message
queue successfully
8. Click OK to close the dialog box.
You have completed sending guest passes via SMS.
Figure 47: Options for sending guest passes via SMS

Working with Dynamic PSKs


Dynamic PSKs (DPSKs) are unique pre-shared keys assigned to a user or device. DPSKs are
used to provide secure wireless access, which helps avoid manual wireless configuration and
managing encryption keys.
DPSK is a form of PSK (static key) in a WPA2 WLAN and its purpose is to provide each user
device with a unique dynamic PSK to associate to a WLAN without any modifications to the
WLAN configuration. For example, a school administrator provides a time-limited DPSK for
student's device so that the student can access the school's WLAN for the period their DPSK
is valid. After the validity period ends, the DPSK expires and the student's device can no longer
access the school's WLAN. Without the use of DPSKs, the school administrator would have to

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
149
Managing Clients
Working with Dynamic PSKs

change the default static key to prevent the student from using the WLAN resources, which in
turn would impact all other users of that WLAN.
Individual DPSKs can be deleted in the event of a student leaving the school, or their device
being lost or stolen without impacting other users of the WLAN.
A “bound” DPSK is one which is assigned to the MAC address of a user device at the time of
creation. No other user device can utilize this DSPK. Bound DPSKs are stored in on APs.
An “unbound” DPSK is not assigned to a device's MAC address during creation, but upon its
first use (that is, when the device first connects to a WLAN and the DPSK is entered as the
WLAN security key). Once a DPSK becomes assigned to a user device, it becomes bound and
no other user device can use it. Unbound DPSKs are stored on the controller.

NOTE: If you generate a single unbound DPSK, then only one device can be connected to the
DPSK WLAN by the key, since other devices can still use “admin” PSK to connect to the DPSK
WLAN. However, when devices from different APs try to use the same unbound DPSK
simultaneously, for a short period, they could both connect to the WLAN successfully, but the
later device will be disconnected by the controller. If the AP happens to disconnect from the
controller, the device could stay connected until the AP connects back to the controller.

When DPSKs are created, there are some prevented behaviors that are considered database
conflicts such as the following:
• You cannot create two unbound DPSKs with the same passphrase.
• You cannot create two bound DPSKs for the same MAC address and passphrase. Create
two DPSKs for the same MAC address, the former will be replaced. However, you can create
multiple bound DPSKs with different MAC addresses and the same passphrase.
• You can also create bound DPSKs and a single unbound DPSK with the same passphrase.
UEs within a PSK WLAN use the same shared key to encrypt data traffic, but if the key is
compromised by even one WLAN user, the entire user traffic can be accessed/hacked. Therefore,
a secure tunnel is created for each user connected to the WLAN, by configuring the PSK WLAN
as an Internal or External DPSK.
In Internal DPSKs, the controller manages and records the DPSK for each individual user and a
limited number of DPSKs are supported.
In External DPSKs, the DPSK is maintained by the Radius Server (AAA) and Radius protocols
are used to authenticate the UE. The UE is authenticated by the open authentication WLAN -
WPA/WPA2 encryption where in, the controller uses the RADIUS interface with the RADIUS
server (AAA includes the DPSK in the Radius response or Access Accept message and sends
it to the AP) so that the DPSK is maintained in one place. There is no limitation on the number
of DPSK supported in this mode.

NOTE: Only proxy AAA authentication is supported for External DPSK.

NOTE: External DPSKs are supported only on bounded DPSKs.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
150
Managing Clients
Working with Dynamic PSKs

Viewing Dynamic PSKs


View dynamic PSKs that have been generated on the controller.
Follow these steps to view the DPSKs:
Click Clients > Dynamic PSK.
The Dynamic PSK page appears listing the DPSKs that have been generated.
The following information about dynamic PSKs is available:
• User Name
• MAC Address
• WLAN (SSID)
• VLAN ID
• Created Date
• Expiration Date
• Expired
• Actions
You can sort the list of DPSKs as well.
You can also export the DPSKs listed to a CSV file.
The Delete Expired DPSKs option available on the Dynamic PSKs page allows you to
customize when the system must remove the DPSKs that are no longer valid. Following are
the settings available:
• Never: No action must be taken for the expired DPSKs.
• After 1 day: Auto deletes DPSKs that have expired after one day.
• After 6 months: Auto deletes DPSKs that have expired after 6 months.

You have completed viewing the list of dynamic PSKs.

Generating Dynamic PSKs


You can generate new dynamic PSKs to secure the WiFi network.
Follow these steps to generate the dynamic PSKs (DPSKs):
1. Click Clients > Dynamic PSK.
The Dynamic PSK page appears listing the PSKs that were generated.
2. Click Generate DPSKs.
The Generate DPSKs dialog box appears.
3. Provide the following information
• WLAN: From the drop-down list, select a DPSK-enabled WLAN.
• Number of DPSKs: Type the number of PSKs you want to create. You can generate up
to 256 DPSKs at a time.

NOTE: For SZ300/SCG200/vSZ-H, a maximum of 10,000 DPSKs can be included within


an AP zone and a maximum of 20,000 DPSKs can be included within a cluster (Carrier:
per Domain. Enterprise: System), and up to 50,000 DPSKs an be included within a cluster

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
151
Managing Clients
Working with Dynamic PSKs

(Carrier: System). For SZ100/vSZ-E, a maximum of 10,000 DPSKs can be included. Up


to 256 unbound DPSKs and 64 group DPSKs ( those that are not bound to a MAC address)
can be included within an AP zone.

• User Name: Leave it blank if you want the controller to auto-generate the user name, or
enter the user name manually.
• Passphrase: Leave it blank if you want the controller to auto-generate the passphrase,
or enter the passphrase manually.
• User Role: If you have created user roles, select the user role that you want to assign to
the device that connects to the SmartZone network using this DPSK. The device will be
assigned the same attributes and permissions (VLAN, UTP, time restrictions, etc.) that
have been defined for the assigned user role.

NOTE: The VLAN attribute of the user role will not be applied to the DPSK user.

• VLAN ID: Type a VLAN ID within the range 1-4094.


• Group DPSK: If you want multiple devices to be able to use this DPSK, click Yes. If you
want only a single device to use this DPSK (bound DPSK), click No.

4. Click Generate.
You have completed creating dynamic PSKs.

To delete a DPSK, click the DPSK from the list, and then click the Delete icon.

Importing Dynamic PSKs


You can import CSV files to create DPSKs to secure the WiFi network.
Follow these steps to import dynamic PSKs (DPSKs):
1. Click Clients > Dynamic PSK.
The Dynamic PSK page appears and lists the DPSKs that have been generated.
2. Click the Download Sample (CSV) link to download the CSV template for generating DPSKs.
A sample CSV file is displayed as show in the figure.
Figure 48: Sample CSV

el i f

3. Modify the CSV file as appropriate and save it. The following are the fields that need to be
completed in the CSV file:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
152
Managing Clients
Working with Dynamic PSKs

• User Name (mandatory field): Leave it blank if you want the controller to auto-generate
the user name, or enter the user name manually.
• Passphrase (optional): Leave it blank if you want the controller to auto-generate the
passphrase, or enter the passphrase manually.
• MAC Address (optional): Enter the MAC address of the device for which to generate a
DPSK (bound DPSK). If you leave the MAC address field empty, the controller will generate
an unbound DPSK.
• VLAN ID (optional): Enter a value to override the WLAN VLAN ID, or leave it empty if you
do not want to override the WLAN VLAN ID.
• Role (optional): If you have created user roles, type the name of the user role that you
want to assign to the device that connects to the SmartZone network using this DPSK.
The device will be assigned the same attributes and permissions (VLAN, UTP, time
restrictions, etc.) that have been defined for the assigned user role.

NOTE: The VLAN attribute of the user role will not be applied to the DPSK user.

4. Click Import CSV.


The Import CSV dialog box appears.

NOTE: Importing a CSV file that contains a MAC address to which an existing DPSK (on the
same target WLAN) is already assigned will replace the existing DPSK on the controller
database.

5. In DPSK Enabled WLAN, select a WLAN from the drop-down list. Only WLANs that support
DPSK must be selected.
6. In Choose File, click Browse to choose the CSV file.
Click Clear if you want to replace the CSV file.
You can also specify Group DPSK in the CSV file.

7. Click Upload.
The generated DPSKs appear in the table on the Dynamic PSK page.

NOTE:
You can import up to 1,000 DPSKs (not over 256 unbound and 64 group DPSK limitation)
at a time.

8. Click Download CSV to download a CSV that contains the generated DPSKs.
The CSV file appears in the following format.
Figure 49: New CSV

m
o
rfa
t

You have completed generating DPSKs.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
153
Managing Clients
Working with Dynamic PSKs

NOTE: Click Export All to export all the dynamic PSKs to a CSV file. You can also export specific
dynamic PSKs by selected them and clicking Export Selected.

Creating an External DPSK Over RADIUS WLAN


External DPSKs use the radius interface with the RADIUS Server (AAA) to maintain the DPSKs
centrally. There is no limitation in the number of DPSKs that are supported.
To create an external DPSK over RADIUS WLAN:
1. Create an Authentication Service. Refer, Creating Non-Proxy Authentication AAA servers on
page 194.
2. Create an Accounting Service. Refer, Creating Proxy Accounting AAA Servers on page 212.
3. Create Zone Configuration. Refer, Creating an AP Zone on page 68.
4. Create WLAN Configuration for DPSK. Refer, Creating a WLAN Configuration on page 102.
Figure 50: External DPSK Configuration

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
154
155

Application Recognition and Control 6


In this chapter:

• Monitoring Applications

Application Recognition and Control enables you to identify, monitor and control the applications that
are running on wireless clients associated with managed APs.

Monitoring Applications
If you have enabled Application Recognition and Control for at least one WLAN, you can monitor
the applications that run on wireless clients associated with that WLAN.

NOTE: To configure application recognition and control policies, go to Services and Profiles
> Application Control. For more information, see Configuring Application Controls on page 186.

To monitor the top applications by traffic consumption on the wireless network:


1. Go to Applications on the main menu.
2. Select whether to view the Top Applications by Application or Port, select a time period
to display, and optionally filter the data by AP MAC address and WLAN name using the
drop-down menus.
3. Select whether to display the Top 10 or Top 25 applications in Chart or Table format.

NOTE: If Application Recognition and Control is unable to find an application name, it displays
the source and destination IP: port address of the application

Figure 51: Top Applications - Chart View

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
155
Application Recognition and Control
Monitoring Applications

Figure 52: Top Applications by Port - Table View

4. Click on an application from the list on the left (either Chart or Table view) to view a list of the
top clients using the selected application in the list on the right. The client list displays the
client's MAC address, OS, hostname, IP address (IPv4 and IPv6), and application usage
volume and percent of application traffic generated by the client. From the Total option, you
can also filter the data based on the radio frequencies (2.4 GHz and 5 GHz).
Figure 53: Click an application to view top client details

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
156
Application Recognition and Control
Monitoring Applications

5. Click on a client in the list on the right, and scroll down to the client specific details table on
the bottom right to view the top 10 applications used by the client.
Figure 54: Click a client to view application details

NOTE: You can configure application control policies (denial, rate limiting, and QoS) using the
Services and Profiles > Application Control page. For more information, see Configuring
Application Controls on page 186.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
157
Services and Profiles
Working with Hotspots and Portals

Services and Profiles 7


In this chapter:

• Working with Hotspots and Portals


• Configuring Access Control
• Configuring Application Controls
• Authentication
• Accounting
• Bonjour
• Working with Tunnels and Ports
• Location Services
• DHCP

Working with Hotspots and Portals


Creating a Guest Access Portal
Using the controller's Guest Access features, you can provide visitors to your organization limited
access to a guest WLAN with configurable guest policies. The following sections describe how
to configure guest WLANs and access policies that control guest use of your network.
Each guest WLAN must be associated with a Guest Access service portal, which defines the
behavior of the guest WLAN interface. Follow these steps to create a guest access service.
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the Guest Access tab, and then select the zone for which you want to create the
portal.
3. Click Create.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
158
Services and Profiles
Working with Hotspots and Portals

The Create Guest Access Portal page appears.


Figure 55: Creating a Guest Access

P
alo
tr

4. Configure the following:


1. General Options
• Portal Name: Type a name for the guest access service portal that you are creating.
• Portal Description: Type a short description of the guest access service portal.
• Language: Select the display language to use for the buttons on the guest access logon
page.
2. Redirection: select where to redirect the user after successfully completing authentication.
• Redirect to the URL that the user intends to visit: Allows the guest user to continue to
their destination without redirection.
• Redirect to the following URL: Redirect the user to a specified web page (entered into
the text box) prior to forwarding them to their destination. When guest users land on
this page, they are shown the expiration time for their guest pass.
3. Guest Access
• Guest Pass SMS Gateway: You can deliver the guest pass to the user using Short
Message Service (SMS). But first you need to configure an SMS server. If you previously
configured an SMS server, you can select it here or you can select Disable.
• Terms and Conditions: To require users to read and accept your terms and conditions
prior to use, Show Terms and Conditions check box. The box below, Terms and
Conditions which contains the default Terms of Use text, becomes editable. Edit the
text or leave it unchanged to use the default text.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
159
Services and Profiles
Working with Hotspots and Portals

• Web Portal Logo: By default, the guest hotspot logon page displays the Ruckus Wireless
logo. To use your own logo, click the Browse button, select your logo Web Portal Logo
(recommended size is 138 x 40 pixels, maximum file size is 20KB), and then click Open.
• Web Portal Title: Type your own guest hotspot welcome text or accept the default
welcome text (Welcome to the Guest Access login page).
4. User Session
• Session Timeout: Specify a time limit after which users will be disconnected and required
to log on again.
• Grace Period: Set the time period during which clients will not need to re-authenticate
after getting disconnected from the hotspot. Enter a number (in minutes) between 1
and 14399.

5. Click OK.
You have completed creating a guest access service.

NOTE: You can also edit, clone and delete a guest access portal by selecting the options
Configure, Clone and Delete respectively, from the Guest Access tab.

Working with Hotspot (WISPr) Services


A hotspot is a venue or area that provides Internet access to devices with wireless networking
capability such as notebooks and smart phones.
Hotspots are commonly available in public venues such as hotels, airports, coffee shops and
shopping malls. Configure a traditional (WISPr 1.0) hotspot service to provide public access to
users via its WLANs. In addition to the controller and its managed APs, you will need the following
to deploy a hotspot:
Captive Portal: A special web page, typically a login page, to which users that have associated
with your hotspot will be redirected for authentication purposes. Users will need to enter a valid
user name and password before they are allowed access to the Internet through the hotspot.
RADIUS Server: A Remote Authentication Dial-In User Service (RADIUS) server through which
users can authenticate.
For installation and configuration instructions for the captive portal and RADIUS server software,
refer to the documentation that was provided with them. After completing the steps below, you
will need to edit the WLAN(s) for which you want to enable Hotspot service. The controller
supports up to 32 WISPr hotspot service entries, each of which can be assigned to multiple
WLANs.

Creating a Hotspot (WISPr) Portal


Define the basic settings that you need to configure to create a hotspot service.
Before creating a hotspot, you need to create a user defined interface.
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the Hotspot (WISPr) tab, and then select the zone for which you want to create the
portal.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
160
Services and Profiles
Working with Hotspots and Portals

3. Click Create.
The Create Hotspot (WISPr) Portal page appears.
Figure 56: Creating a Hotspot (WISPr)

P
alo
tr

4. Configure the following:


1. General Options
• Portal Name: Type a name for the hotspot service portal that you are creating.
• Portal Description: Type a short description of the hotspot service portal.
2. Redirection: select where to redirect the user after successfully completing authentication.
• Smart Client Support: select one of the following
• None: Select this option to disable Smart Client support on the hotspot service.
• Enable: Selection this option to enable Smart Client support.
• Only Smart Client Allowed: Select this option to allow only Smart Clients to connect
to the hotspot service.
• Logon URL: select one of the following
• Internal: Type the internal URL of the subscriber portal (the page where hotspot
users can log in to access the service).
• External: Type the external URL of the subscriber portal.
• Redirect MAC Format: Type the MAC address to which redirection must be done.
• Start Page: select one of the following
• Redirect to the URL that the user intends to visit: You could redirect users to the
page that they want to visit.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
161
Services and Profiles
Working with Hotspots and Portals

• Redirect to the following URL: You could set a different page where users will be
redirected (for example, your company website).
• HTTPS Redirect: Enable this option if you want the AP to redirect HTTPS requests to
the Hotspot portal.
3. User Session
• Session Timeout: Set a time limit (in minutes) after which users will be disconnected
from the hotspot service and will be required to log on again.
• Grace Period: Set the time period (in minutes) during which disconnected users are
allowed access to the hotspot service without having to log on again.
4. Location Information
• Location ID: Type the ISO and ITU country and area code that the AP includes in
accounting and authentication requests. The required code includes:
• isocc (ISO-country-code): The ISO country code that the AP includes in RADIUS
authentication and accounting requests.
• cc (country-code): The ITU country code that the AP includes in RADIUS
authentication and accounting requests.
• ac (area-code): The ITU area code that the AP includes in RADIUS authentication
and accounting requests.
• network: The following is an example of what the Location ID entry should look like:
isocc=us,cc=1,ac=408,network=RuckusWireless
• Location Name: Type the name of the location of the hotspot service.
5. Walled garden: A walled garden is a limited environment to which an unauthenticated user
is given access for the purpose of setting up an account.
Click Add to add a user to walled garden, to provide access.
Click Import CSV to import the CSV file with user information.

5. Click OK.
You have completed creating a Hotspot (WISPr) service portal.

NOTE: You can also edit, clone and delete a Hotspot (WISPr) service portal by selecting the
options Configure, Clone and Delete respectively, from the Hotspot (WISPr) tab.

Creating a Web Authentication Portal


Web authentication (also known as a “captive portal”) redirects users to a logon web page the
first time they connect to this WLAN, and requires them to log on before granting access to use
the WLAN.
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the Web Auth tab, and then select the zone for which you want to create the portal.
3. Click Create.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
162
Services and Profiles
Working with Hotspots and Portals

The Create Web Authentication Portal page appears.


Figure 57: Creating a Web Authentication

P
alo
tr

4. Configure the following:


1. General Options
• Portal Name: Type a name for the hotspot service portal that you are creating.
• Portal Description: Type a short description of the hotspot service portal.
• Language: Select the display language that you want to use on the web authentication
portal.
2. Redirection: select where to redirect the user after successfully completing authentication.
• Start Page: select one of the following
• Redirect to the URL that the user intends to visit: Allows the guest user to continue
to their destination without redirection.
• Redirect to the following URL: Redirect the user to a specified web page (entered
into the text box) prior to forwarding them to their destination. When guest users
land on this page, they are shown the expiration time for their guest pass.

3. User Session
• Session Timeout: Set a time limit (in minutes) after which users will be disconnected
from the hotspot service and will be required to log on again.
• Grace Period: Set the time period (in minutes) during which disconnected users are
allowed access to the hotspot service without having to log on again.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
163
Services and Profiles
Working with Hotspots and Portals

5. Click OK.
You have completed creating a Web Auth service portal.

NOTE: You can also edit, clone and delete a Web Auth service portal by selecting the options
Configure, Clone and Delete respectively, from the Web Auth tab.

Creating a WeChat Portal


WeChat is a mobile app from Tenecent that enables its users to call and send text messages
to one another. If you have WeChat users on the network and you want your WLANs to support
WeChat services, you can create a WeChat portal that WeChat users can use.
A WeChat portal defines the third party authentication server, also known as the equipment
service provider (ESP) server, to which the controller will forward all WeChat authentication
requests from wireless devices that are associated with controller-managed APs. In turn, the
third party authentication server will forward these authentication requests to the WeChat server.
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the WeChat tab, and then select the zone for which you want to create the portal.
3. Click Create.
The Create WeChat Portal page appears.
Figure 58: Creating a WeChat Portal

4. Configure the following:


1. General Options
• Name: Type a name for the portal that you are creating.
• Description: Type a short description of the portal.
2. Portal Settings: configure the following

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
164
Services and Profiles
Working with Hotspots and Portals

• Authentication URL: Type the authentication interface URL on the third party
authentication server. When a managed AP receives a WeChat logon request from a
client device, it will send the request to this authentication URL and get the authorization
result.
• DNAT Destination: Type the DNAT destination server address to which the controller
will forward HTTP requests from unauthenticated client devices. The DNAT destination
server and the authentication server (above) may or may not be the same server.
• Grace Period: Type the number of minutes during which disconnected users who were
recently connected will be allowed to reconnect to the portal without needing to
re-authenticate. The default grace period is 60 minutes (range is between 1 and 14399
minutes).
• Blacklist: Type network destinations that the controller will automatically block associated
wireless clients from accessing. Use a comma to separate multiple entries.
3. Whitelist: Type network destinations that the controller will automatically allow associated
wireless clients to access. You can add a single entry or multiple entries.
To add a single entry, type the entry in Wall Garden Entry, and then click Add. The entry
you added appears in the table below. To add multiple entries, in a comma-separated
value (CSV) file, type all the network destinations that you want to add to the whitelist, and
then save the CSV file. In the Whitelist section, click Import CSV, and then select the CSV
file you created. Click Open. The entries in the CSV file are added to the whitelist.
4. DNAT Port Mapping: specify at least one pair of source-to-destination port mapping. To
add a port mapping, type the source and destination ports in the boxes provided, and
then click Add. The AP will use this information to drop or forward HTTP requests from
associated clients to specified ports on the DNAT server. For example, if an HTTP request
from a wireless client does not originate from the specified source (from) port, the AP will
discard the HTTP request. By default, a port mapping of 80-80 (source-destination) exists.

5. Click OK.
You have completed creating a WeChat portal.

NOTE: You can also edit, clone and delete a WeChat service portal by selecting the options
Configure, Clone and Delete respectively, from the WeChat tab.

Working with Hotspot 2.0 Services


You must be aware of Hotspot 2.0 - a Wi-Fi Alliance specification that allows for automated
roaming between service provider access points when both the client and access gateway
support the newer protocol.
Hotspot 2.0 (also known as Passpoint™, the trademark name of the Wi-Fi Alliance certification)
aims to improve the experience of mobile users when selecting and joining a Wi-Fi hotspot by
providing information to the station prior to association.
This information can then be used by the client to automatically select an appropriate network
based on the services provided and the conditions under which the user can access them. In
this way, rather than being presented with a list of largely meaningless SSIDs to choose from,
the Hotspot 2.0 client can automatically select and authenticate to an SSID based on the client's

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
165
Services and Profiles
Working with Hotspots and Portals

configuration and services offered, or allow the user to manually select an SSID for which the
user has login credentials.
The controller's Hotspot 2.0 implementation complies with the IEEE 802.11u standard and the
Wi-Fi Alliance Hotspot 2.0 Technical Specification.
See the Hotspot 2.0 Reference Guide for SmartZone for information on configuring Hotspot 2.0
services, including:
• Working with Hotspot 2.0 operator profiles
• Working with Hotspot 2.0 identity providers
• Creating a Hotspot 2.0 online signup portal

Creating a Hotspot 2.0 WLAN Profile


You can assign and Hotspot 2.0 service to a Hotspot 2.0 WLAN, for which you must create a
Hotspot 2.0 WLAN profile.
Follow these steps to create a Hotspot 2.0 WLAN profile.
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the Hotspot 2.0 tab, and then select the zone for which you want to create the profile.
3. Click Create.
The Create Hotspot 2.0 WLAN Profile page appears.
Figure 59: Creating a Hotspot 2.0 WLAN Profile

4. Configure the following:


1. Name: Enter a name for this WLAN profile. This name identifies the WLAN profile when
assigning an HS2.0 service to a HS2.0 WLAN.
2. Description: Enter a description for the WLAN profile.
3. Operator: Select the operator profile. This name identifies the service operator when
assigning an HS2.0 service to a HS2.0 WLAN.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
166
Services and Profiles
Working with Hotspots and Portals

You can also click Create to create a Hotspot 2.0 WiFi operator. See Creating a Hotspot
2.0 WiFi Operator Profile on page 167 for more information.
4. Identity Provider: Choose one or more identity providers. Choose the identity provider.
You can configure an OSU SSID when you add an Identity Provider which enables OSU
and provisioning. Since there may be more than one identity provider per Hotspot 2.0
profiles having its own authentication profile, the No Match and Unspecified mapping could
be duplicated. To avoid duplication, the default identity provider is taken as the correct
configuration for No Match and Unspecified mapping. OSUSSID can be OSEN or OPEN
[Guest].
You can also click Create to create a Hotspot 2.0 WiFi operator. See Creating a Hotspot
2.0 Identity Provider on page 168 for more information.
5. Advanced Options:
• Internet Options: Specify if this HS2.0 network provides connectivity to the Internet.
• Access Network Type: Access network type (private, free public, chargeable public,
etc.), as defined in IEEE802.11u.
• IPv4 Address: Select IPv4 address type availability information, as defined in
IEEE802.11u
• IPv6 Address: Select IPv6 address type availability information, as defined in
IEEE802.11u
• Connection Capabilities: Provides information on the connection status within the
hotspot of the most commonly used communications protocols and ports.
Provide the Protocol Name, Protocol Number, Port Number and Status to Add a
new connection.
• Custom Connection Capabilities: Allows addition of custom connection capability rules.
Up to 21 custom rules can be created.
Provide the Protocol Name, Protocol Number, Port Number and Status to Add a
new connection.

5. Click OK.
You have completed creating a Hotspot 2.0 WLAN profile.

NOTE: You can also edit, clone and delete a Hotspot 2.0 WLAN profile by selecting the options
Configure, Clone and Delete respectively, from the WLAN Profile section in the Hotspot 2.0
tab.

Creating a Hotspot 2.0 WiFi Operator Profile


An operator profile defines all the properties pertaining to an operator while a service profile
defines the properties related to a service provider. If a WLAN is configured to provide Hotspot
2.0 service, it must be linked exactly like a Hotspot 2.0 operator profile.
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the Hotspot 2.0 tab, and then select the device for which you want to create the
profile.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
167
Services and Profiles
Working with Hotspots and Portals

3. Click Create.
The Creating Hotspot 2.0 WiFi Operator Profile page appears.
Figure 60: Creating a hotspot 2.0 WiFi operator profile

4. Configure the following:


1. Name: Enter a name for this Wi-Fi operator profile.
2. Description: Enter a description for the venue profile.
3. Domain Names: HS2.0 operator's domain name is a mandatory field, which specifies the
operator’s domain name. Hotspot 2.0 AP broadcasts the domain name to indicate the
home Wi-Fi providers.
4. Signup Security: This is an optional field and is disabled by default. Enabling would mean
that operator supports secure onboarding (OSEN).
5. Certificate: Select the certificate for the operator - AAA. This can be the same certificate
as the one used with OSU service.
6. Friendly Names: HS2.0 operator's friendly name is a mandatory field. Operator's friendly
name is displayed on mobile client's screen. It is also used for operator verification during
secure onboarding (OSEN). Select the display language from the drop down list.

5. Click OK.
Creating a Hotspot 2.0 Identity Provider
The Hotspot 2.0 Identity provider provides authentication, accounting and online sign-up service.
There can be one or more identity providers per Hotspot 2.0 access WLAN.
To configure the HS 2.0 identity provider, you must configure the following:
Network Identifier
Follow these steps to create a Hotspot 2.0 Identity Provider - Network Identifier.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
168
Services and Profiles
Working with Hotspots and Portals

1. Configure the following:


1. Name: Enter a name or this network identifier profile.
2. Description: Enter a description for the network identifier profile.
3. PLMNs: Each record contains MCC and MNC.
MCC: Set the correct country code for the geographical location. This is required when
the controller sends MAP authentication information. Type the mobile country code digits.
Decimal digit strings with maximum length of 3 and minimum length of 2.
MNC: Set the mobile network code based on the geographical location. This is required
when controller sends MAP authentication information. Type the mobile network code
digits. Decimal digit strings with maximum length of 3 and minimum length of 2.
4. Realms: List of NAI realms corresponding to service providers or other entities whose
networks or services are accessible via this AP. Up to 16 NAI realm entries can be created.
Each NAI realm entry can contain up to four EAP methods. You can add a realm by
providing the realm Name, Encoding technique (choose between RFC-4282 and UTF-8)
and EAP Methods.
5. Home Ols: Organization Identifier (OI) is a unique value assigned to the organization. User
can configure a maximum of 12 OI values and can adjust the order since the AP takes
only 3 OIs in the beacon.

2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Network Identifier.
Online Signup and Provisioning
Follow these steps to create a Hotspot 2.0 Identity Provider - Online Signup and Provisioning.
1. Configure the following:
1. Provisioning Options
• Provisioning Service: The provisioning service is responsible for any subscription
provisioning process in which messages are communicated between the UE and the
SZ resulting in a PPS-MO provisioned into the UE. The provisioning supports both
SOAP-XML and OMA-DM as communication protocols for the process based on the
initial request coming from the UE. The provisioning service supports sign-up;
remediation and policy update flows where the UE is provisioned with a full PPS -MO
or only with internal node/s of the PPS-MO. Administrator can only set External Internal
Provisioning Services. , where the administrator is required to fill the external OSU server
URL.
• Provisioning Protocol: Select communication protocols OMA-DM or SOAP-XML.
2. Online Signup Options
• OSU NAI Realm: This configuration is only for External Provision Service. In case of
Internal Provisioning Service, the NAI realm should be configured per authentication
service, which is available during on-boarding.
• Common Language Icon: This is the default icon presented in the device for this identity
provider in case the device does not find any match for other icons per language in the
table.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
169
Services and Profiles
Working with Hotspots and Portals

• OSU Service Description: This table configures the friendly name, description and icon
per language. This information is presented on the device when it receives ANQP
message which includes OSU providers. Friendly names, which are required to be part
of the OSU certificate is automatically populated in this table. In case description is also
included in the OSU certificate it is automatically populated into the table. Administrators
are required to set the matched icon per language as included in the OSU certificate.
• Whitelisted Domain: Add the domain names of the External Portal domain.

2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Online Signup and Provisioning.
Authentication
Follow these steps to create a Hotspot 2.0 Identity Provider - Authentication.
1. Configure the following:
1. Realm: configure the realm mapping to the authentication service.
2. Auth Service: map the realm to an external RADIUS server which should be pre-configured.
3. Dynamic VLAN ID: type the VLAN ID.

2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Authentication.
Accounting
Follow these steps to create a Hotspot 2.0 Identity Provider - Accounting.
1. Configure the following:
1. Realm: if the authentication's realm is set as remote credential type, administrator should
set this realm here to the customer's external accounting server.
2. Accounting Service: select the accounting service.

2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Accounting.
Review
Review the configuration on the page before committing the changes to the server. Click
Create to create the Hotspot 2.0 Identity Provider.

Creating a Hotspot 2.0 Venue Profile


The Hotspot 2.0 technology allows users to seamlessly roam between the provider's home Wi-Fi
network and the visited Wi-Fi network in a different location. A Wi-Fi provider can partner with
several roaming partners to provide Wi-Fi access to partner's subscribers. Public venues such
as institutions, restaurants, and stadiums are considered roaming partners.
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the Hotspot 2.0 tab, and then select the zone for which you want to create the profile.
3. Click Create.
The Create Hotspot 2.0 Venue Profile page appears.
Figure 61: Creating a Hotspot 2.0 Venue Profile

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
170
Services and Profiles
Working with Hotspots and Portals

4. Configure the following:


1. Name: Enter a name for this venue profile. This name identifies the venue profile when
assigning an HS2.0 service to a HS2.0 venue.
2. Description: Enter a description for the venue profile.
3. Venue:
• Venue Names: Create a new venue name. Select the language and enter the venue
name in that language.
• Venue Category: Select venue group and venue type as defined in IEEE802.11u, Table
7.25m/n.
• WAN Metrics: Provides information about the WAN link connecting an IEEE 802.11
access network and the Internet; includes uplink/downlink speed estimates
Select the operator profile. This name identifies the service operator when assigning an
HS2.0 service to a HS2.0 WLAN.

5. Click OK.
You have completed creating a Hotspot 2.0 WLAN profile.

NOTE: You can also edit, clone and delete a Hotspot 2.0 venue profile by selecting the options
Configure, Clone and Delete respectively, from the Venue Profile section in the Hotspot 2.0
tab.

Creating a UA Blacklist Profile


The controller automatically blocks certain user agents (or software used by a user) from accessing
hotspots provided by controller-managed APs. When the controller blocks any of these user

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
171
Services and Profiles
Working with Hotspots and Portals

agents, an error message appears on the user device. You can add to or remove user agents
from this blacklist.
Following are some of the blocked user agents:
• ZoneAlarm
• VCSoapClient
• XTier NetIdentity
• DivX Player
• Symantec LiveUpdate
• Windows Live Messenger
• StubInstaller
• windows-update-agent
• Windows Live Essentials
• Microsoft Dr. Watson for Windows (MSDW)
• Avast Antivirus Syncer
• Microsoft Background Intelligent Transfer Service (BITS)
• Google Update
• TrendMicro client
• Skype WISPr
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the UA Blacklist tab, and then select the zone for which you want to create the portal.
3. Click Create.
The Creating a UA Blacklist Profile page appears.
Figure 62: Creating a UA Blacklist Profile

4. Configure the following:


1. Name: Type a name of the user agent.
2. User Agent Pattern: Type the agent pattern.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
172
Services and Profiles
Configuring Access Control

3. Error: Specify the error message number.


4. Error Message: Specify the error message.

5. Click Create.
You have completed creating a UA Blacklist Profile

NOTE: You can also edit, clone and delete a UA blacklist profile by selecting the options
Configure, Clone and Delete respectively, from the UA Blacklist tab.

Configuring Access Control


SmartZone's Access Control features provide a wide range of options to control access and
utilization of the wireless network.

Creating a User Traffic Profile


A User Traffic Profile (UTP) can be created to block or limit user traffic based on a number of
factors, including Source IP address, Port, Destination IP address, Protocol, etc. Additionally, a
UTP can be created to shape traffic according to a configurable Application Control Policy.
Once the UTP is created, it can be applied to any WLAN from the Wireless LANs page.
1. Go to Services & Profiles > Access Control.
2. Select the User Traffic tab, and then select the zone for which you want to create the profile.
3. Click Create. The Create User Traffic Profile page appears.
Figure 63: Create User Traffic Profile

4. Configure the following:


1. Name: Type a name for the user profile.
2. Description: Type a short description for this profile.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
173
Services and Profiles
Configuring Access Control

3. Rate Limiting: Specify and apply rate limit values for the user profile to control the data
rate. Select the Enable check-box to set the Uplink and Downlink rate limit values.

5. To create traffic control rules, click Create in the Traffic Access Control List section, and
then configure Traffic Control Rules as required. For Default Access, select whether to Allow
or Block access if no rule is matched. See Creating a User Traffic Access Control Rule on
page 174 for more information.
6. In Application Recognition and Control, select an Application Policy from the list, or click
Create to create a new policy.
For more information, see Configuring Application Controls on page 186.
7. Click OK to save the User Traffic Profile.
You have completed creating a UTP. You can now assign this traffic profile to a WLAN from the
Wireless LANs page.

NOTE: You can also edit, clone and delete a profile by selecting the options Configure, Clone
and Delete respectively, from the User Traffic tab.

Creating a User Traffic Access Control Rule


User Traffic Profiles consist of multiple traffic control rules, which can be enforced in any order
you prefer (click up or down arrows to rearrange rules).
To create a user traffic control rule:
1. Click Create. The Create User Traffic Access Control Rule page appears.
Figure 64: Creating a User Traffic Access Control Rule

2. Configure the following:


• Description: Type a short description for the user traffic rule.
• Access: Select Allow or Block depending on whether you want to set this rule as the
default rule.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
174
Services and Profiles
Configuring Access Control

• Source IP: Specify the source IP address to which this rule will apply. To apply this rule
to an IP address range, type the network address and the subnet mask. To apply this rule
to a single IP, clear the Subnet check box, and then enter the IP address.
• Source Port: Specify the source port to which this rule will apply. To apply this rule to a
port range, type the starting and ending port numbers in the two boxes. To apply this rule
to a single port number, clear the Range check box, and then enter the port number.
• Destination IP: Specify the destination IP address to which this rule will apply. To apply
this rule to an IP address range, type the network address and the subnet mask. To apply
this rule to a single IP, clear the Subnet check box, and then enter the IP address.
• Destination Port: Specify the source port to which this rule will apply. To apply this rule
to a port range, type the starting and ending port numbers in the two boxes. To apply this
rule to a single port number, clear the Range check box, and then enter the port number.
• Protocol: Select the network protocol to which this rule will apply. Supported protocols
include TCP, UDP, UDPLITE, ICMP (ICMPv4), ICMPV6, IGMP, ESP, AH, SCTP.

3. Click OK to save your changes.

Creating an Application Policy


You can create policies around the applications that the controller will monitor, and there by
control them.
Follow these steps to create and application policy:
1. Click Create. The Create Application Policy page appears.
Figure 65: Creating an Application Policy Rule

2. Configure the following:


• General Options:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
175
Services and Profiles
Configuring Access Control

• Name: Type the name of the application policy.


• Description: Type a short description for the application policy.
• In Rules, click Create.
The Create Application Policy Rule page appears.
Figure 66: Creating an Application Policy Rule

• Rule Type: Select one of the rule types from Denial Rules, QoS and Rate Limiting.
• Application Type: Select whether the application type is user defined or system defined.
• Application: select the application for which the rule applies and click OK.

3. Click Create.
The Application Policy is created.

Creating OS Policy Service


You can control how devices installed with certain OS configurations can be connected to the
network, and also control what they can be allowed to do within the network. Using the OS
policy service, the system can identify the type of client attempting to connect, and perform
control actions such as allow/block, rate limiting, and VLAN tagging based on the OS rule.
1. Go to Services & Profiles > Access Control.
2. Select the OS Policy tab, and then select the zone for which you want to create the policy.
3. Click Create.
The Create OS Policy Service page appears.
Figure 67: Creating an OS Policy Service

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
176
Services and Profiles
Configuring Access Control

4. Configure the following:


1. Name: Type a name for the OS policy.
2. Description: Type a short description for this OS policy.
3. Default Access: select either Allow or Block. This is the default action that the system will
take if no rules are matched.
4. Rules: Define the OS Policy rules. For more information see, Creating OS Policy Rules on
page 177
5. Click OK.

You have created the OS policy service.

NOTE: You can also edit, clone and delete a service by selecting the options Configure, Clone
and Delete respectively, from the OS Policy tab.

Creating OS Policy Rules


You can create rules for every OS policy service that you create.
1. Click Create. The Create OS Policy Rule page appears.
Figure 68: Create OS Policy Rule

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
177
Services and Profiles
Configuring Access Control

2. Configure the following:


• Description: Type a short description for the rule.
• Access: Select Allow or Block. This is the action that the system will take if the client
matches any of the attributes in the rule.
• Device Type: Select from any of the supported OS types.
• Rate Limiting: Specify and apply rate limit values for the device.
Select the Enable check-box to set the Uplink and Downlink rate limit values.
• VLAN: Segment this client type into a specified VLAN (1~4094; if no value is entered, this
policy does not impact device VLAN assignment).
• Click OK.

You have created the OS policy rule.

Creating a VLAN Pooling Profile


Each VLAN pool can contain up to 16 VLANs, and a maximum of 64 VLAN pools can be created.
Each WLAN can be configured with a single VLAN pool.
1. Go to Services & Profiles > Access Control.
2. Select the VLAN Pooling tab, and then select the zone for which you want to create the
profile.
3. Click Create.
The Create VLAN Pooling page appears.
Figure 69: Creating a VLAN Pooling Profile

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
178
Services and Profiles
Configuring Access Control

4. Configure the following:


1. Name: Type a name for the VLAN profile.
2. Description: Type a short description for this profile.
3. VLANS: Type the VLAN IDs to be assigned to this pool. VLAN IDs can be separated by
hyphens, commas, or a combination (for example, 7-10, 13, 17, 20-28).
4. Click OK.

You have created the VLAN Pooling profile.

NOTE: You can also edit, clone and delete a profile by selecting the options Configure, Clone
and Delete respectively, from the VLAN Pooling tab.

VLAN Pooling
When Wi-Fi is deployed in a high density environment such as a stadium or a university campus,
the number of IP addresses required for client devices can easily run into the thousands. Placing
thousands of clients into a single large subnet or VLAN can result in degraded performance due
to factors like broadcast and multicast traffic. VLAN pooling is adopted to address this problem.
VLAN pooling allows administrators to a deploy pool of multiple VLANs to which clients are
assigned, thereby automatically segmenting large groups of clients into multiple smaller
subgroups, even when connected to the same SSID. As the client device joins the WLAN, the
VLAN is assigned to one of the VLANs in the pool based on a hash of the client’s MAC address.
To use the VLAN pooling feature, you first need to create a VLAN pooling profile, and then you
can assign the profile to a specific WLAN or override the VLAN settings of a WLAN group.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
179
Services and Profiles
Configuring Access Control

Create Precedence Profile


Clients are assigned to VLANs by various methods, and there is an order of precedence by
which VLANs are assigned. The assignment is commonly done from lowest to highest
precedence. You can also set precedence for Rate limiting attribute of the profile.

NOTE: Each WLAN has a default precedence.

1. Go to Services & Profiles > Access Control.


2. Select the Precedence tab, and then select the zone for which you want to create the policy.
3. Click Create.
The Create Precedence Profile page appears.
Figure 70: Creating a Create Precedence Profile

4. Configure the following:


1. Name: Type the name of the profile.
2. VLAN Precedence: Use the Up and Down options to set the VLAN priority.
3. Rate Limiting Precedence: Use the Up and Down options to set the Rate Limit priority.

NOTE: When SSID Rate Limiting (restricts total usage on WLAN) is enabled, per-user rate
limiting is disabled.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
180
Services and Profiles
Configuring Access Control

4. Click OK.

You have created the Precedence profile.

NOTE: You can also edit, clone and delete a profile by selecting the options Configure, Clone
and Delete respectively, from the Precedence tab.

Creating an L2 Access Control Service


Another method to control access to the network is by defining Layer 2/MAC address access
control lists (ACLs), which can then be applied to one or more WLANs or WLAN groups. L2
ACLs are either allow-only or deny-only; that is, an ACL can be set up to allow only specified
clients or to deny only specified clients. MAC addresses that are in the deny list are blocked at
the AP.
1. Go to Services & Profiles > Access Control.
2. Select the L2 Access Control tab, and then select the zone for which you want to create
the access control service.
3. Click Create.
The Create L2 Access Control Service page appears.
Figure 71: Creating an L2 Access Control Service

4. Configure the following:


1. General Options:
• Name: Type a name for this policy.
• Description: Type a short description for this policy.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
181
Services and Profiles
Configuring Access Control

• Restriction: Select the default action that the controller will take if no rules are matched.
Available options include: Allow only the stations listed below or Block only the
stations listed below.
2. Rules:
• MAC Address: Type the MAC address to which this L2 access policy applies.
3. Click OK.

You have created an L2 access policy.

NOTE: You can also edit, clone and delete a policy by selecting the options Configure, Clone
and Delete respectively, from the L2 Access Control tab.

Creating Blocked Clients


You can deny access to the network for certain clients by using the block client access control
feature.
1. Go to Services & Profiles > Access Control.
2. Select the Blocked Client tab, and then select the zone for which you want to block the
client access.
3. Click Create.
The Create Blocked Client page appears.
Figure 72: Create Blocked Client

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
182
Services and Profiles
Configuring Access Control

4. Configure the following:


1. Client MAC: Type MAC address of the client that you want to block.
2. Description: Type a short description for client.
3. Click OK.

You have created the blocked client list.

NOTE: You can also edit, clone and delete a list by selecting the options Configure, Clone and
Delete respectively, from the Blocked Client tab.

Creating a Client Isolation Whitelist


This feature allows the administrator to manually specify an approved list of wired destinations
that may be reachable by wireless clients.

NOTE: The whitelist only applies to destinations that are on the wired network, and it will not
work on wireless destinations.

1. Go to Services & Profiles > Access Control.


2. Select the Client Isolation Whitelist tab, and then select the zone for which you want to
specify the list of approved clients.
3. Click Create.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
183
Services and Profiles
Configuring Access Control

The Create Client Isolation Whitelist page appears.


Figure 73: Creating a Client Isolation Whitelist

4. Configure the following:


1. Name: Type a name for the client.
2. Description: Type a short description about the client.
3. Auto Whitelist: Select this check-box if you want the AP to automatically scan for devices
and include them to the whitelist.
4. Client Entries: To add the clients to the list, click Create and provide client information
such as MAC address (mandatory), IP address and Description.
5. Click OK.

You have created the list of whitelisted clients that can access the network.

NOTE: You can also edit, clone and delete the list by selecting the options Configure, Clone
and Delete respectively, from the Client Isolation Whitelist tab.

Creating Time Schedules


You can control client access to the network by providing a time schedule within which the
device can access the network.
1. Go to Services & Profiles > Access Control.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
184
Services and Profiles
Configuring Access Control

2. Select the Time Schedule tab, and then select the zone for which you want to create the
schedule.
3. Click Create.
The Create Time Schedule Table page appears.
Figure 74: Creating a Time Schedule Table

4. Configure the following:


1. Schedule Name: Type a name for the schedule you want to create.
2. Schedule Description: Type a short description for this schedule.
3. Draw the schedule table.
4. Click OK.

You have created the schedule.

NOTE: You can also edit, clone and delete the schedule by selecting the options Configure,
Clone and Delete respectively, from the Time Schedule tab.

Creating a DNS Server Profile


By creating a DNS server profile, you can specify the primary and secondary address of the
DNS server that will be used to transmit data packets to the DNS server.
1. Go to Services & Profiles > Access Control.
2. Select the DNS Servers tab, and then select the zone for which you want to create the profile.
3. Click Create.
The Create DNS Server Profile page appears.
Figure 75: Creating a DNS Server Profile

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
185
Services and Profiles
Configuring Application Controls

4. Configure the following:


1. Name: Type a name for the DNS server profile.
2. Description: Type a short description for profile.
3. Primary DNS IP: Type the primary DNS IP address.
4. Secondary DNS IP: Type the secondary DNS IP address.
5. Click OK.

You have created the DNS Server Profile.

NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the DNS Servers tab.

Configuring Application Controls


Using the Application Control screen, you can identify, control, and monitor applications that
are running on wireless clients associated with managed APs, and you can also apply filtering
policies to prevent users from accessing certain applications.
Additionally, you can create your own user-defined applications, import an updated application
signature package, and configure rate limiting and QoS traffic shaping policies based on
system-defined or user-defined applications.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
186
Services and Profiles
Configuring Application Controls

Creating an Application Control Policy


You can create an application policy to limit traffic by application, to classify traffic into priority
queues using QoS traffic shaping rules, or to completely block access to an application.
To create an application policy:
1. Go to Services & Profiles > Application Control.
2. Select the Application Policy tab.
3. Click Create.
The Create Application Policy page appears.
Figure 76: Creating an Application Policy

4. Enter a Name and optionally a Description for the policy.


5. In Rules, click Create to create a new rule. Each application policy can contain up to 32
rules.
The Create Application Policy Rule page appears.
Figure 77: Creating an Application Policy Rule

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
187
Services and Profiles
Configuring Application Controls

6. Configure the following:


• Rule Type: Enter the type of rule from options: Denial Rules, QoS and Rate Limiting.
• Application Type: Select whether the application is user defined or system defined.
• Application: Select the application for which you want to create a policy rule.

7. Click OK to save the rule.


8. Click OK to save the application policy.
You have created an application policy.
Next, you can continue to apply the application control policy to user traffic, as described in
Implementing an Application Control Policy.

Implementing an Application Control Policy


Deploying an application control policy involves configuring a User Traffic Profile (UTP) with the
policy, and then applying that profile to a WLAN.
To implement an Application Control Policy:
1. Go to Services and Profiles > Access Control > User Traffic.
2. Click Create. The Create User Traffic Profile form appears.
3. Enter a Name, and optionally a Description for the UTP.
4. In the Application Recognition and Control section, select an Application Policy from the
drop-down list. Alternatively, click Create to create a new policy.
5. Click OK to save the User Traffic Profile.
6. Go to Wireless LANs.
7. Locate the WLAN for which you want to apply the application policy, and select it from the
list.
8. Click Configure. The Edit WLAN [WLAN Name] form appears.
9. Expand the Advanced Options section, and select a User Traffic Profile you created from
the drop-down list. Alternatively, click Create to create a new UTP.
10. Click OK to save your WLAN changes.
Figure 78: Create a User Traffic Profile (UTP)

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
188
Services and Profiles
Configuring Application Controls

Figure 79: Select an Application Policy to apply to this UTP

Figure 80: Apply the UTP to a WLAN

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
189
Services and Profiles
Configuring Application Controls

Creating a User Defined Application


When an application is unrecognized and generically (or incorrectly) categorized, the controller
will be unable to monitor its traffic, unless you configure an explicit application identification policy
based on IP address/mask, port and protocol.
To configure a user-defined application:
1. Go to Services & Profiles > Application Control.
2. Select the User Defined tab.
3. Click Create.
The Create User Defined Application page appears.

Figure 81: Creating a User Defined Application

4. Configure the following:


1. Name: Type a name for the application. This is the name that will identify this application
on the dashboard.
2. Type: Select Default or Port Mapping Only (destination port).
3. Destination IP: Type the destination IP address of the application.
4. Netmask: Type the netmask of the destination IP address.
5. Destination Port: Type the destination port for the application.
6. Protocol: Select the protocol used by the application. Options include TCP and UDP.
7. Click OK.

You have created the user defined application.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
190
Services and Profiles
Configuring Application Controls

NOTE: You can also edit, clone and delete the application policy by selecting the options
Configure, Clone and Delete respectively, from the User Defined tab.

Creating an Application Control Policy


You can create an application policy to limit traffic by application, to classify traffic into priority
queues using QoS traffic shaping rules, or to completely block access to an application.
To create an application policy:
1. Go to Services & Profiles > Application Control.
2. Select the Application Policy tab.
3. Click Create.
The Create Application Policy page appears.
Figure 82: Creating an Application Policy

4. Enter a Name and optionally a Description for the policy.


5. In Rules, click Create to create a new rule. Each application policy can contain up to 32
rules.
The Create Application Policy Rule page appears.
Figure 83: Creating an Application Policy Rule

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
191
Services and Profiles
Configuring Application Controls

6. Configure the following:


• Rule Type: Enter the type of rule from options: Denial Rules, QoS and Rate Limiting.
• Application Type: Select whether the application is user defined or system defined.
• Application: Select the application for which you want to create a policy rule.

7. Click OK to save the rule.


8. Click OK to save the application policy.
You have created an application policy.
Next, you can continue to apply the application control policy to user traffic, as described in
Implementing an Application Control Policy.

Working with Application Signature Package


Ruckus Wireless will periodically release and make new application signature packages available
for download.
Download the latest application signature package to a local folder and perform the following
procedure:
• Step 1: Uploading the Signature Package on page 192
• Step 2: Validating the Signature Package on page 193

Step 1: Uploading the Signature Package


Once you have downloaded a new signature package, you can import it into SmartZone using
the following procedure:
1. Go to Services & Profiles > Application Control.
2. Select the Signature Package tab.
Figure 84: Viewing and Uploading Signature Package File Information

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
192
Services and Profiles
Configuring Application Controls

3. The Current Signature Package Info section displays the information about the signature
package file name, size and version.
4. In Upload Signature Package, click Browse to select the file.
5. Click Upload to upload the file. Once the import is complete, the list of system-defined
applications is updated immediately.

Step 2: Validating the Signature Package


The application updates the latest signature package in all the connected APs. To validate the
latest version follow the procedure:
1. In the Access Point, enter the Privileged EXEC mode using CLI.
2. Enter the following CLI command, which displays the latest version of the signature package.
rkscli:get tdts-sigpack
Current TDTS Signature Package is Ruckus-SigPack-Ver-x.xx.trf
OK

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
193
Services and Profiles
Authentication

Authentication
You can add AAA servers to the controller in order to use them to authenticate users attempting
to associate with controller-managed APs.

Creating Non-Proxy Authentication AAA servers


A non-proxy AAA server is used when the APs connect to the external AAA server directly.
1. Go to Services & Profiles > Authentication.
2. Select the Non-Proxy (AP Authenticator) tab, and then select the zone for which you want
to create the AAA server.
3. Click Create.
The Create AAA Server page appears.
Figure 85: Creating an AAA Server

4. Configure the following:


1. General Options
• Name: Type a name for the AAA server that you are creating.
• Description: Type a short description of the AAA server.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
194
Services and Profiles
Authentication

• Type: Select the type of AAA server that you are creating. Options include RADIUS,
Active Directory and LDAP.
• Backup RADIUS (appears if you clicked RADIUS above): Select the Enable Secondary
Server check box if a secondary RADIUS server exists on the network.
• Global Catalog (appears if you clicked Active Directory above): Select the Enable Global
Catalog support if you the Active Directory server to provide a global list of all objects.
2. Primary Server
• If you selected RADIUS, configure the following options in the Primary Server section:
• IP Address: Type the IP address of the AAA server. Both IPv4 and IPv6 addressing
formats are supported.
• Port: Type the port number of the AAA server. The default RADIUS server port
number is 1812.
• Shared Secret: Type the AAA shared secret.
• Confirm Secret: Retype the shared secret to confirm.
If you have enabled Backup RADIUS to the Secondary Sever, you must provide
similar information as in the primary server.
See RADIUS Service Options on page 198 for more information.
• If you selected Active Directory, configure the following options in the Primary Server
section:
• IP Address: Type the IPv4 address of the AD server.
• Port: Type the port number of the AD server. The default port number (389) should
not be changed unless you have configured the AD server to use a different port.
• Windows Domain Name: Type the Windows domain name assigned to the AD server
(for example, domain.ruckuswireless.com).
• If you selected LDAP, configure the following options:
• IP Address: Type the IPv4 address of the LDAP server.
• Port: Type the port number of the LDAP server. Default is 389.
• Base Domain Name: Type the base DN in LDAP format for all user accounts (for
example, dc=ldap,dc=com).
• Admin Domain Name: Type the admin DN in LDAP format (for example,
cn=Admin;dc=<Your Domain>,dc=com).
• Admin Password: Type the administrator password for the LDAP server.
• Confirm Password: Retype the administrator password to confirm.
• Key Attribute: Type a key attribute to denote users (for example, default: uid)
• Search Filter: Type a search filter (for example, objectClass=Person).

5. Click OK.
You have completed creating a Non-proxy AAA server.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
195
Services and Profiles
Authentication

NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Non-Proxy (AP Authenticator) tab.

Testing AAA Server (Auth)


To ensure that the controller administrators will be able to authenticate successfully with the
RADIUS server type that you selected, Ruckus Wireless strongly recommends testing the AAA
server after you set it up.
The test queries the RADIUS server for a known authorized user and return groups associated
with the user that can be used for configuring roles within the controller.
1. Go to Services & Profiles > Authentication.
2. Select the Non-Proxy (AP Authenticator) tab, and then select the zone for which you want
to test the AAA server.
3. Click Test AAA.
The Test AAA Server page appears.
4. Configure the following:
1. Name: Select one of the AAA servers that you previous created.
2. User Name: Type an existing user name on the AAA server that you selected.
3. Password: Type the password for the user name you specified.

5. Click Test.
If the test was unsuccessful, there are two possible results (other than success) that will be
displayed to inform you if you have entered information incorrectly: Admin invalid or User
name or password invalid. These results can be used to troubleshoot the reasons for failure
to authenticate administrators with an AAA server through the controller.

You have completed testing the non-proxy AAA servers that you created.

Creating Proxy AAA Servers


A proxy AAA server is used when APs send authentication/accounting messages to the controller
and the controller forwards these messages to an external AAA server.
1. Go to Services & Profiles > Authentication.
2. Select the Proxy (SZ Authenticator) tab, and then select the zone for which you want to
create the AAA server.
3. Click Create.
The Create Authentication Service page appears.
Figure 86: Creating an Authentication Service

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
196
Services and Profiles
Authentication

4. Configure the following:


1. Name: Type a name for the authentication service that you are adding.
2. Friendly Name: Type an alternative name that is easy to remember.
3. Description: Type a description for the authentication service.
4. Service Protocol: If you select
• RADIUS, see RADIUS Service Options on page 198 for more information.
• Active Directory, configure the following:
1. Global Catalog: Select the Enable Global Catalog support if you the Active Directory
server to provide a global list of all objects.
2. Primary Server:
• Encryption: Select the Enable TLS Encryption check box if you want to use the
Transport Layer Security (TLS) protocol to secure communication with the server.

NOTE: You must also configure the Trusted CA certificates to support TLS
encryption.

3. IP Address: Type the IPv4 address of the AD server.


4. Port: Type the port number of the AD server. The default port number (389) should
not be changed unless you have configured the AD server to use a different port.
5. Windows Domain Name: Type the Windows domain name assigned to the AD server
(for example, domain.ruckuswireless.com).
• LDAP, configure the following:
1. Select the Enable TLS Encryption check box if you want to use the Transport Layer
Security (TLS) protocol to secure communication with the server.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
197
Services and Profiles
Authentication

NOTE: You must also configure the Trusted CA certificates to support TLS
encryption.

2. IP Address: Type the IPv4 address of the LDAP server.


3. Port: Type the port number of the LDAP server.
4. Base DN: Type the base DN in LDAP format for all user accounts (for example,
dc=ldap,dc=com).
5. Admin DN: Type the admin DN in LDAP format (for example, cn=Admin;dc=<Your
Domain>,dc=com).
6. Admin Password: Type the administrator password for the LDAP server.
7. Confirm Password: Retype the administrator password to confirm.
8. Key Attribute: Type a key attribute to denote users (for example, default: uid)
9. Search Filter: Type a search filter (for example, objectClass=Person).
• OAuth, configure the following:
1. Provider: Authorize Google, Facebook or LinkedIn by selecting one of them.
2. Application ID: Specify the application ID.
3. Application Secret: Type the application secret.
4. Collect E-mail Address: Select this check-box if you want the controller to collect
the user's email address and maintain it for further use.

5. Advanced Options - Domain name: Type the whitelisted domain name that you want to
add.
6. User Traffic Profile Mapping:
a. Type a Group Attribute Value.
b. Select a User Role from the drop-down list.
c. Click Add.
The mapped user profile is listed.

5. Click OK.
You have completed creating a Proxy AAA server.

NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Proxy (SZ Authenticator) tab.

RADIUS Service Options


These are the Radius service options available for the primary and secondary servers.
RFC 5580 Out of Band Location Delivery: If you want out-of-band location delivery (RFC 5580)
to apply only to Ruckus Wireless APs, select the Enable for Ruckus AP Only check box.

Table 21: Primary Server Options

Configure the primary RADIUS server settings.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
198
Services and Profiles
Authentication

Option Description
IP Address Type the IP address of the RADIUS server. Both
IPv4 and IPv6 protocols are supported.
Port Type the port number of the RADIUS server.
The default RADIUS server port number is 1812
and the default RADIUS Accounting server port
number is 1813.
Shared Secret Type the RADIUS shared secret.
Confirm Secret Retype the shared secret to confirm.

Table 22: Secondary Server Options

If you have a secondary RADIUS server on the network that you want to use as a backup, select
the Enable Secondary Server check box, and then configure the settings below.

Option Description
Backup RADIUS Select Enable Secondary Server.
When a secondary RADIUS server is enabled
and the primary RADIUS server becomes
unavailable, the secondary Automatic Fallback
Disable server takes over the handling of
RADIUS requests. When the primary server
becomes available again, it takes back control
over RADIUS requests from the secondary
server. If you want to prevent the primary server
from retaking control over RADIUS requests
from the secondary server, select the
Automatic Fallback Disable check box.
IP Address Type the IP address of the secondary AAA
server. IPv4 and IPv6 addressing formats are
supported.
Port Type the port number of the secondary AAA
server port number. The default RADIUS server
port number is 1812 and the default RADIUS
Accounting server port number is 1813.
Shared Secret Type the AAA shared secret.
Confirm Secret Retype the shared secret to confirm.

Table 23: Health Check Policy

These options define the health monitoring settings of the primary and secondary RADIUS
servers, when the controller is configured as RADIUS proxy for RADIUS Authentication and
Accounting messages.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
199
Services and Profiles
Authentication

Option Description
Response Window Set the time (in seconds) after which, if the AAA
server does not respond to a request, the
controller will initiate the zombie period (see
below). Response Window
If the primary AAA server does not respond to
RADIUS messages sent after Response
Window expires, the controller will forward the
retransmitted RADIUS messages to the
secondary AAA server.

NOTE: The zombie period is not started


immediately after the Response Window
expires, but after the configured Response
Window plus ¼ of the configured Zombie
Period. The default Response Window is 20
seconds

Zombie Period Set the time (in seconds) after which, if the AAA
server does not respond to ANY packets during
the zombie period, it will be considered to
inactive or unreachable.
An AAA server that is marked zombie (inactive
or unreachable) will be used to proxy with a low
priority. If there are other live AAA servers, the
controller will attempt to use these servers first
instead of the zombie AAA server.
The controller will only proxy requests to a
zombie server only when there are no other live
servers. Any request that is sent as a proxy to
an AAA server will continue to be sent to that
AAA server until the home server is marked
inactive or unreachable. At that point, the
request will fail over to another server, if a live
AAA server is available. The default Zombie
Period is 40 seconds.
Revive Interval Set the time (in seconds) after which, if no
RADIUS messages are sent as proxy to the
AAA server after it has been marked as inactive
or unreachable, the controller will mark the AAA
server as active again (and assume that it has
become reachable again). The default Revive
Interval is 120 seconds.
No Response Fail Click Yes to respond with a reject message to
the NAS if no response is received from the

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
200
Services and Profiles
Authentication

Option Description
RADIUS server. Click No to skip sending a
response.

NOTE: To ensure that the RADIUS fail-over mechanism functions correctly, either accept the
default values for the Response Window, Zombie Period, and Revive Interval, or make sure that
the value for Response Window is always higher than the value for RADIUS NAS request timeout
multiplied by the value for RADIUS NAS max number of retries. For third party APs, you must
ensure that the configured Response Window on the controller is higher than the RADIUS NAS
request timeout multiplied by the RADIUS value. The maximum number of retries is configured
at the 3rd party controller/AP.

Table 24: Rate Limiting

Configure the following options.

Options Description
Maximum Outstanding Requests (MOR) Set the maximum outstanding requests per
server. Type 0 to disable it, or set a value
between 10 and 4096.
Threshold (% of MOR) Set a percentage value of the MOR at which
(when reached) the controller will generate an
event. Threshold (% of MOR)
For example, if the MOR is set to 1000 and the
threshold is set to 50%, the controller will
generate an event when the number of
outstanding requests reaches 500.

Sanity Timer Set a timer (in seconds) that will be started


whenever a condition that generates an event
is reached. This helps prevent conditions that
trigger events which occur frequently.

Testing AAA Servers


To ensure that the controller administrators will be able to authenticate successfully with the
RADIUS server type that you selected, Ruckus Wireless strongly recommends testing the AAA
server after you set it up.
1. Go to Services & Profiles > Authentication.
2. Select the Proxy (SZ Authenticator) tab, and then select the zone for which you want to
test the AAA server.
3. Click Test AAA.
The Test AAA Server page appears.
Figure 87: Testing an AAA Server

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
201
Services and Profiles
Authentication

4. Configure the following:


1. Name: Select one of the AAA servers that you previously created.
2. User Name: Type an existing user name on the AAA server that you selected.
3. Password: Type the password for the user name you specified.

5. Click Test.
If the controller was able to connect to the authentication server and retrieve the configured
groups/attributes, the information appears at the bottom of the page. If the test was
unsuccessful, there are two possible results (other than success) that will be displayed to
inform you if you have entered information incorrectly: Admin invalid or User name or
password invalid. These results can be used to troubleshoot the reasons for failure to
authenticate administrators with an AAA server through the controller.

Authentication Support Matrix


It is important to understand the compatibility between AAA servers and different WLANs.
Proxy Mode
In proxy mode, authentication requests are set through the controller.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
202
Services and Profiles
Authentication

Table 25: Proxy Mode Compatibility

Authentication Source 802.1X HS 2.0 Secure Web Auth Hotspot/WISPr


Local Database No Yes No Yes
IDM-Provisioned Local Yes Yes NA NA
DB
Active Directory No * No Yes Yes
RADIUS Yes Yes Yes Yes
LDAP Yes No Yes Yes
OAuth - No No No No
Google/FB/LinkedIn

NOTE: To support 802.1X with Active Directory, an external RADIUS server (such as NPS) must
be used.

NOTE: IDM Provisioned username (also called local cache credential) is relevant only in secure
access after Onboarding.

NOTE: 802.1X (MSCHAPv2 via built-in RADIUS using AD-NPS), WebAuth, and WISPr support
AD authentication from SmartZone release in 3.2.

NOTE: 802.1X, WebAuth, and WISPr support LDAP authentication against from SmartZone
release in 3.2.

Non-proxy Mode
In the Non-proxy mode, authentication requests are sent directly by AP and not through the
controller. The local database is stored on the controller, therefore, authentication sources such
as local database and IDM-provisioned local databases are not supported.

Table 26: Non-proxy Mode Compatibility

Authentication 802.1X Zero-IT HS 2.0 HS 2.0 Web Auth Hotspot/WISPr


Source Onboard Onboard Secure
Active Directory No No* No* No Yes No
RADIUS Yes No* No* No Yes Yes*
LDAP No No* No* No Yes No
OAuth - No No* No* No No No
Google/FB/LinkedIn

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
203
Services and Profiles
Authentication

(*) From the configuration it may seem like non-proxy RADIUS is supported in WISPr, but the
call flow goes through the controller.

NOTE: Zero-IT Onboard and HS2.0 Onboard are supported only if the controller sends the
authentication requests.

Profile Configuration
The following table details proxy and non-proxy AAA server configurations against various
platforms.

Table 27: Profile Configuration

Feature SCG200 SZ100 vSZ-E vSCG-H Description


Per-Zone ProxyAAA No NA NA NA Ability to
Profiles configure a
ProxyAAA
profile in a
specific zone
Global ProxyAAA Yes Yes Yes Yes Ability to
Profiles configure a
ProxyAAA
profile
globally and
then use it
across zones
Per-Zone NonProxy Yes NA NA Yes Ability to
AAA Profiles configure a
NonProxyAAA
profile in a
specific zone
Global NonProxy AAA No Yes Yes No Ability to
Profiles configure a
NonProxy
AAA profile
globally and
then use it
across zones

Dynamic Policy Assignment (Proxy Authentication Types)


The following table details dynamic policy assignments across authentication types.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
204
Services and Profiles
Authentication

Table 28: Dynamic Policy Assignment (Proxy)

Feature 802.1X Zero-IT HS 2.0 HS 2.0 Web Hotspot/WISPr MAC Description


Onboard Onboard Secure Auth Auth
Dynamic Yes Yes Yes Yes Yes Yes Yes Ability to
Role assign a
Assignment user to a
particular
local Role
via a
group/role
attribute
from
RADIUS,
AD, LDAP,
OAuth.

NOTE:
From
SmartZone
3.4, Role
can
contain
UTP.
Therefore,
, when you
assign a
role, you
also get
the ACL
and Rate
Limiting
policies.

Dynamic Yes NA NA NA No No Yes Ability to


VLAN / assign a
VLAN user to a
Pool VLAN
through a
VLAN
attribute
from
RADIUS,
AD, LDAP,
OAuth.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
205
Services and Profiles
Authentication

Feature 802.1X Zero-IT HS 2.0 HS 2.0 Web Hotspot/WISPr MAC Description


Onboard Onboard Secure Auth Auth
Form
SmartZone
release
3.5, you
can also
assign
VLANs and
VLAN
pools
based on
the user
role.

Dynamic Yes Yes Yes Yes Ability to


UTP assign a
user to a
UTP
through an
attribute
from an
authentication
source.
Dynamic Yes Yes Yes No Yes Yes Yes Ability to
ACL assign a
specific
ACL to a
user
through an
attribute
from
RADIUS,
AD, LDAP,
OAuth.
Dynamic Yes Yes Yes Yes Yes Ability to
Rate Limit assign a
specific
Rate Limit
to a user
through an
attribute
from
RADIUS,

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
206
Services and Profiles
Authentication

Feature 802.1X Zero-IT HS 2.0 HS 2.0 Web Hotspot/WISPr MAC Description


Onboard Onboard Secure Auth Auth
AD, LDAP,
OAuth.

NOTE: In dynamic ACL and Rate limit, since ACL and rate limit are associated with a UTP,
assigning a UTP also assigns an ACL or rate limit.

Dynamic Policy Assignment (Non-Proxy Authentication Types)


The following table details dynamic policy assignments across authentication types.

Table 29: Dynamic Policy Assignment (Non-Proxy)

Feature 802.1X HS 2.0 Web Auth Description


Secure
Dynamic Role No Ability to assign a
Assignment user to a local Role
through a group/role
attribute from the
authentication source.
Dynamic VLAN / Ability to assign a
VLAN Pool user to a VLAN
through a VLAN
attribute from the
authentication source.
Dynamic UTP Ability to assign a
user to a UTP through
an attribute from the
authentication source.

NOTE: From
SmartZone release
3.4, UTP contains
ACL and rate limit.

Dynamic ACL Ability to assign a


specific ACL to a user
through an attribute
from the
authentication source.

NOTE: ACLs are a


part of a UTP. If you

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
207
Services and Profiles
Authentication

Feature 802.1X HS 2.0 Web Auth Description


Secure

configure a UTP
without a rate
limit,you effectively
only have an ACL.

Dynamic Rate Limit Ability to assign a


specific Rate Limit to
a user through an
attribute from the
authentication source.

NOTE: Rate limiting is


also a part of a UTP.
If you configure a UTP
without ACL, you
effectively only have a
rate limiting policy.

Other Authentication Features


The following table details authentication support for various authentication features.

Table 30: Authentication Features

Feature Supported Description


Test AAA - RADIUS Yes Ability to test a specific
username/password against a
configured RADIUS serve.
Test AAA - Active Directory Yes Ability to test a specific
username/password against a
configured AD serve.
Test AAA - LDAP Yes Ability to test a specific
username/password against a
configured LDAP serve.

NOTE: Only Non-Proxy LDAP is


supported at the Zone Level.

Test AAA - OAuth No Ability to test a specific


username/password against a
configured OAuth server.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
208
Services and Profiles
Authentication

Feature Supported Description


Test AAA - Return a Role Yes - supported by RADIUS, Ability to return a role assignment
AD and LDAP when testing a AAA server.
RADIUS CoA - Change Role Ability to change a user's Role
through a Change of
Authorization (CoA).
RADIUS CoA - Change VLAN Ability to change a user's VLAN
through a Change of
Authorization (CoA).
RADIUS CoA - Change ACL Ability to change a user's ACL
through a Change of
Authorization (CoA).
RADIUS CoA - Change Rate Ability to change a user's rate limit
Limit through a Change of
Authorization (CoA).
RADIUS CoA - Change Ability to authorize or deauthorize
Authorization a user through a Change of
Authorization (CoA).

PAP/CHAP Support
The following table details PAP and CHAP support for various authentication features.

Table 31: PAP/CHAP Support

Feature 802.1X Web Auth Hotspot/ MAC Auth Notes


WISPr
Proxy-Mode
Active Directory Yes Yes* Yes No PAP / CHAP
is supported
for Web
Authentication
and
HotSpot/WISPr.

NOTE: NPS
interface (AD)
is required
for
WebAuthenticaiton
(CHAP) and

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
209
Services and Profiles
Authentication

Feature 802.1X Web Auth Hotspot/ MAC Auth Notes


WISPr

802.1X
(MSCHAPv2).

RADIUS Yes Yes* Yes Yes


LDAP Yes Yes* Yes No PAP / CHAP
is supported
for Web
Authentication
and
HotSpot/WISPr
LDAP-TLS Yes Yes* Yes No This support
is available
from
SmartZone
version 3.5.
Active Directory Yes Yes* Yes No This support
(TLS) is available
from
SmartZone
version 3.5.

NOTE: NPS
interface (AD)
is required
for
WebAuthenticaiton
(CHAP) and
802.1X
(MSCHAPv2).

Non-proxy Mode
Active Directory No Yes* Yes No
RADIUS Yes Yes* Yes Yes
LDAP No Yes* Yes No

NOTE: (*) This is an AP CLI setting:

set aaa auth-method pap|chap

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
210
Services and Profiles
Accounting

. It is a global setting for all WebAuth WLANs on the AP. The default is CHAP.

Accounting
Creating Non-Proxy Accounting AAA Servers
A non proxy AAA server is used when the APs connect to the external AAA server directly.
1. Go to Services & Profiles > Accounting.
2. Select the Non-Proxy tab, and then select the zone for which you want to create the AAA
server.
3. Click Create.
The Create AAA Server page appears.
Figure 88: Creating an AAA Server

4. Configure the following:


1. General Options
• Name: Type a name for the AAA server that you are creating.
• Description: Type a short description of the AAA server.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
211
Services and Profiles
Accounting

• Type: Select the type of AAA server that you are creating. Options include RADIUS,
Active Directory and LDAP.
• Backup RADIUS (appears if you clicked RADIUS above): Select the Enable Secondary
Server check box if a secondary RADIUS server exists on the network.
2. If you selected RADIUS, configure the following options in the Primary and Secondary
server sections:
• IP Address: Type the IP address of the AAA server.
• Port: Type the port number of the AAA server. The default RADIUS server port number
is 1813.
• Shared Secret: Type the AAA shared secret.
• Confirm Secret: Retype the shared secret to confirm.

5. Click OK.
You have completed creating a Non-proxy Accounting AAA server.
For information on how to test this server, see Testing AAA Servers on page 201

NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Non-Proxy tab.

Creating Proxy Accounting AAA Servers


A proxy AAA server is used when APs send authentication/accounting messages to the controller
and the controller forwards these messages to an external AAA server.
1. Go to Services & Profiles > Accounting.
2. Select the Proxy tab, and then select the zone for which you want to create the AAA server.
3. Click Create.
The Create Accounting Service page appears.
Figure 89: Creating an Accounting Service

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
212
Services and Profiles
Bonjour

4. Configure the following:


1. Name: Type a name for the authentication service that you are adding.
2. Description: Type a description for the authentication service.
3. Service Protocol:
• RADIUS Accounting. For more information, see RADIUS Service Options on page 198.

5. Click OK.
You have completed creating a Proxy Accounting AAA server.
For information on how to test this server, see Testing AAA Servers on page 201

NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Proxy tab.

Bonjour
Bonjour is Apple's implementation of a zero-configuration networking protocol for Apple devices
over IP.
Bonjour allows OS X and iOS devices to locate other devices such as printers, file servers and
other clients on the same broadcast domain and use the services offered without any network
configuration required.
Multicast applications such as Bonjour require special consideration when being deployed over
wireless networks. Bonjour only works within a single broadcast domain, which is usually a small
area. This is by design to prevent flooding a large network with multicast traffic. However, in
some situations, a user may want to offer Bonjour services from one VLAN to another.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
213
Services and Profiles
Bonjour

SmartZone provides two features for controlling how and where Bonjour services are available
to clients:
• Bonjour Gateway on page 214: Bridge Bonjour services from one VLAN to another.
• Bonjour Fencing on page 216: Limit the range in physical space at which Bonjour services are
available to clients.

Bonjour Gateway
Bonjour Gateway policies enable APs to provide Bonjour services across VLANs.
The controller's Bonjour gateway feature provides an mDNS proxy service configurable from
the web interface to allow administrators to specify which types of Bonjour services can be
accessed from/to which VLANs.
In order for the Bonjour Gateway to function, the following network configuration requirements
must be met:
• The target networks must be segmented into VLANs.
• VLANs must be mapped to different SSIDs.
• The controller must be connected to a VLAN trunk port.
Additionally, if the VLANs to be bridged by the gateway are on separate subnets, the network
has to be configured to route traffic between them.
The following requirements and limitations should be taken into consideration before enabling
the Bonjour Gateway feature:
• Bonjour policy deployment to an AP takes effect after the AP joins the controller.
• Some APs of one local area link must be in one subnet. The switch interfaces connected to
these APs must be configured in VLAN-trunk mode. Only by doing so can the designated
AP receive all the multicast Bonjour protocol packets from other VLANs.
• Dynamic VLANs are not supported.
• Some AP models are incompatible with this feature due to memory requirements.

Creating Bonjour Gateway Policies


A Bonjour Gateway policy must be created for an AP zone before the policy can be deployed
to an AP or group of APs.
To create a Bonjour Gateway policy:
1. Go to Services & Profiles > Bonjour.
2. Select the Gateway tab, and then select the zone for which you want to create the policy.
3. Click Create.
The Create Bonjour Policy page appears.
Figure 90: Creating a Bonjour Gateway Policy

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
214
Services and Profiles
Bonjour

4. Configure the following:


1. Name: Type a name for the policy.
2. Description: Type a description for the policy.
3. Rules: Create the policy rule by configuring the following
a. Click Create. The Create Bonjour Policy Rule page appears.
b. Configure the following options:
• Bridge Service: Select the Bonjour service from the list.
• From VLAN: Select the VLAN from which the Bonjour service will be advertised.
• To VLAN: Select the VLAN to which the service should be made available.
• Notes: Add optional notes for this rule.
c. Click OK.
You have created a Bonjour policy rule.

4. Click OK.

You have created a Bonjour policy with a rule.

NOTE: You can also edit, clone and delete the policy by selecting the options Configure, Clone
and Delete respectively, from the Gateway tab.

You may now continue to apply this Bonjour gateway policy to an AP or AP group, as described
in Applying a Bonjour Gateway Policy to an AP or AP Group.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
215
Services and Profiles
Bonjour

Applying a Bonjour Gateway Policy to an AP or AP Group


Once a Bonjour Gateway policy is created, you can select which AP (or AP group) will serve as
the gateway for Bonjour services.
To apply a Bonjour Gateway policy to an AP or AP group:
1. Go to Access Points > Access Points.
2. Select the AP or AP group that you want to configure from the zone in which the AP/group
exists.
3. Click Configure.
4. Expand the Advanced Options, and in Bonjour Gateway, enable the check box next to
Enable as Bonjour Gateway with policy, and select the policy you created from the
drop-down list.
5. Click OK to save your changes.

Bonjour Fencing
Bonjour Fencing provides a mechanism to limit the scope of Bonjour (mDNS) service discovery
in the physical/spatial domain.
While Bonjour Fencing is related to Bonjour Gateway, they are two separate features designed
for different purposes. Bonjour Gateway bridges mDNS services across VLANs, and is useful
because Bonjour is designed as a same-VLAN protocol. Bonjour Fencing limits the range of
Bonjour service discovery within physical space, which is useful because logical network
boundaries (e.g. VLANs) do not always correlate well to physical boundaries within a building/floor.
The following considerations should be taken into account before deploying Bonjour fencing
policies:
• Bonjour fencing is not supported on Mesh APs.
• Switch interfaces to which APs are connected must be configured in VLAN trunk mode so
that Bonjour traffic gets forwarded across VLANs based on Bonjour Gateway Policies.
• Bonjour fencing is implemented at the AP, not at the controller.
• Fencing policies can be applied on a zone level only, and cannot be configured per AP group.
• In order for a wired fencing policy to work properly, wireless fencing for the same mDNS
service should also be enabled. If wired fencing is enabled but wireless is disabled, APs that
are not the "closest AP" will be unable to determine whether the source of the mDNS
advertisement was wired or wireless.
• Bonjour fencing will work for local breakout scenarios, but will not work for tunnel based
configuration.

Creating Bonjour Fencing Policies


Bonjour Fencing policies can be created and applied to a zone at the same time using the
Fencing tab on the Services and Profiles > Bonjour screen.
To create a Bonjour Fencing policy:
1. Go to Services & Profiles > Bonjour.
2. Select the Fencing tab, and then select the zone for which you want to create the policy.
3. Click Create.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
216
Services and Profiles
Bonjour

The Create Bonjour Fencing Policy page appears.


Figure 91: Creating a Bonjour Fencing Policy

4. Configure the following:


1. Name: Type a name for the policy.
2. Description: Type a description for the policy.
3. Fencing Rule: Create the policy rule by configuring the following:
Figure 92: Fencing Rule

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
217
Services and Profiles
Bonjour

a. Click Create. The Fencing Rule page appears.


b. Configure the following options:
• Device Type: Select the Wireless or Wired network connection method for the
device advertising bonjour services.
When you select Wired, you must also specify the MAC address of the device
advertising bonjour services in Device MAC, and the access point that is physically
closest to the wired device in Closest AP. Setting the closest AP creates a physical
anchor point for fencing, and the closest AP is auto-detected for wireless devices,
based on the AP association.
• Service: Select one of the bonjour services from the drop-down list.
• Fencing Range: Select the fencing range to be the Same AP or 1-Hop AP Neighbors.
• Description: Specify any notes you may need to refer.
c. Click OK to save the rule.
You have created a Bonjour fencing rule. Each policy can contain up to 32 rules.

4. Click OK to save the policy.

You have created a Bonjour fencing policy.

NOTE: You can also edit, clone and delete the policy by selecting the options Configure, Clone
and Delete respectively, from the Fencing tab.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
218
Services and Profiles
Working with Tunnels and Ports

Working with Tunnels and Ports


Creating a Ruckus GRE Profile
You can configure the Ruckus GRE tunnel profile of the controller to manage AP traffic.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Ruckus GRE tab, and then select the zone for which you want to create the profile.
3. Click Create.
The Create Ruckus GRE Profile page appears.
Figure 93: Creating a Ruckus GRE Profile

4. Configure the following:


1. Name: Type a name for the profile.
2. Description: Type a description for the profile.
3. Ruckus Tunnel Model: Select a protocol to use for tunneling WLAN traffic back to the
controller.
• GRE + UDP: Select this option to allow APs behind a NAT server to tunnel WLAN traffic
back to the controller.
• GRE: Select this option to tunnel regular WLAN traffic only.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
219
Services and Profiles
Working with Tunnels and Ports

4. Tunnel Encryption: Select the Enable tunnel encryption check box if you want managed
APs to decrypt 802.11 packets, and then use an AES encrypted tunnel to send them to
the controller. By default, when WLAN traffic is tunneled to the controller, only the
management traffic is encrypted; data traffic is unencrypted.
5. WAN Interface MTU: Set the maximum transmission unit (MTU) for the tunnel to either
Auto (default) or Manual (a specific size 850 to 1500 bytes). MTU is the size of the largest
protocol data unit that can be passed on the controller network.
6. Click OK.

You have created the Ruckus GRE profile.

NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the Ruckus GRE tab.

Creating a Soft GRE Profile


You can configure the Soft GRE tunnel profile of the controller to manage AP traffic.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Soft GRE tab, and then select the zone for which you want to create the profile.
3. Click Create.
The Create Soft GRE Profile page appears.
Figure 94: Creating a Soft GRE Profile

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
220
Services and Profiles
Working with Tunnels and Ports

4. Configure the following:


1. Name: Type a name for the profile.
2. Description: Type a description for the profile.
3. Gateway IP Mode: Select IPv4 or IPv6 addressing.
4. Primary Gateway Address: Type the IP address or fully-qualified domain name (FQDN) of
the primary gateway server.
5. Secondary Gateway Address: If you have a secondary gateway server on the network,
type its IP address or FQDN in the box provided. If the controller is unable to reach the
primary gateway server, it will automatically attempt to reach the secondary gateway
address that you specify here.
6. Gateway Path MTU: Set the maximum transmission unit (MTU) for the gateway path.
Options include Auto (default) and Manual (range is 850 to 1500 bytes).
7. ICMP Keep Alive Period: Type the time interval (in seconds) at which APs send a keepalive
message to the active third party WLAN gateway. The range is 1 to 180 seconds and the
default value is 10 seconds.
8. ICMP Keep Alive Retry: Type the number of keepalive attempts that APs wait for a response
from the active third party WLAN gateway before failing over to the standby WLAN gateway.
The range is 2 to 10 retries and the default value is 5 retries.
9. Force Disassociate Client: Enable this option by selecting the check-box if you want to
disassociate the client when AP fails over to another tunnel.
10. Click OK.

You have created the Soft GRE profile.

NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the Soft GRE tab.

Creating an IPsec Profile


1. Go to Services & Profiles > Tunnels and Ports.
2. Select the IPsec tab, and then select the zone for which you want to create the profile.
3. Click Create.
The Create IPsec Profile page appears.
Figure 95: Creating an IPsec Profile

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
221
Services and Profiles
Working with Tunnels and Ports

4. Configure the following:


1. Name: Type a name for the profile.
2. Description: Type a description for the profile.
3. Security Gateway: Type the IP address or FQDN of the IPSec server. If you use the IP
address, the IP address format that you must enter will depend on the IP mode that is
configured on the controller.
4. Authentication: Select Preshared Key to use PSK for authentication or Certificate to use
an X.509 certificate on the certificate authority (CA) or registration authority (RA) server.
The controller uses the CMPv2 protocol to obtain the signed certificate from the CA/RA
server.
If you selected Preshared Key, type the PSK in this box. The PSK must be eight to 128
ASCII characters in length.
5. Security Association
a. IKE Proposal Type: Select Default to use the default Internet Key Exchange (IKE) security
association (SA) proposal type or select Specific to manually configure the IKE SA
proposal. If you clicked Specific, you will need to configure the following settings:
• Encryption Algorithm: Options include 3DES, AES128, AES192, and AES256.
• Integrity Algorithm: Options include MD5, SHA1, AES-XCBC, SHA256, SHA384,
and SHA512.
• Pseudo-Random Function: Options include Use integrity ALG, PRF-MD5, PRF-SHA1,
PRF-AES-XCBC, PRF-AES-CMAC, PRF-SHA256, and PRF-SHA384.
• DH Group: Options for Diffie-Hellman groups for IKE include modp768, modp1024,
modp1536, modp2048, modp3072, modp4096, modp6144, and modp8192.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
222
Services and Profiles
Working with Tunnels and Ports

b. ESP Proposal Type: Click Default to use the default Encapsulating Security Payload
(ESP) SA proposal type or click Specific to manually configure the ESP proposal. If you
clicked Specific, you will need to configure the following settings:
• Encryption Algorithm: Options include 3DES, AES128, AES192, AES256, and NONE.
• Integrity Algorithm: Options include MD5, SHA1, AES-XCBC, SHA256, SHA384,
and SHA512.
• DH Group: Options for Diffie-Hellman groups for ESP include None, modp768,
modp1024, modp1536, modp2048, modp3072, modp4096, modp6144, and
modp8192.

6. Rekey Options
a. Internet Key Exchange: To set time interval at which the IKE key renews, select a time
unit (day, hour, or minute) from the drop-down list, and then type a number in the box.
To disable IKE rekey, select the Disable check box. SmartZone 100/Virtual SmartZone
Essentials for Release 3.4 Administrator Guide 82 Configuring the Wireless Network
Configuring Access Points.
b. Encapsulating Security Payload: To set time interval at which the ESP key renews,
select a time unit (day, hour, or minute) from the drop-down list, and then type a number
in the box. To disable ESP rekey, select the Disable check box.
7. Certificate Management Protocol
a. DHCP Option 43 Sub Code for CA/RA Address: Set the DHCP Option 43 subcode
that will be used to discover the address of the CA/RA server on the network. The
default subcode is 8.
b. CA/RA Address: Type the IP address or FQDN of the CA/RA server. If you use the IP
address, the IP address format that you must enter will depend on the IP mode that is
configured on the controller.
c. Server Path: Type the path to the X.509 certificate on the CA/RA server.
d. DHCP Option 43 Sub Code for Subject Name of CA/RA: Set the DHCP Option 43
subcode that will be used to discover the subject name of the CA/RA server on the
network. The default subcode is 5.
e. Subject Name of CA/RA: Type an ASCII string that represents the subject name of the
CA/RA server.
8. Advanced Options
a. DHCP Option 43 Sub Code for Security Gateway: Set the DHCP Option 43 subcode
that will be used to discover the address of the security gateway on the network. The
default subcode is 7.
b. Retry Limit: Set the number of times that the controller will attempt to discover the
address of the security gateway. The default retry count is 5. Accepted values are 0
(disable) to 16.
c. Replay Window: Set the ESP replay window (in packets). The default size is 32 packets.
Accepted values are 0 (disable) to 32 packets.
d. IP Compression: To enable IP Payload Compression Protocol (IPComp) compression
before encryption, click Enable. The default value is Disable.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
223
Services and Profiles
Working with Tunnels and Ports

e. Force NAT-T: To enforce UDP encapsulation of ESP packets, click Enable. The default
value is Disable.
f. Dead Peer Detection: By default, the IKE protocol runs a health check with remote peer
to ensure that it is alive. To disable this health check, click Disable.
g. NAT-T Keep Alive Interval: To set the keep alive interval (in seconds) for NAT traversal,
type a value in the box. The default keep alive interval is 20 seconds. Accepted values
are 1 to 65536. To disable the keep alive interval, click Disable.
h. FailOver Options: To configure the failover settings when APs are unable to connect,
configure the following:
i. Retry Period: Set the number of days (minimum 3 days) during which APs will keep
attempting to connect. To keep try indefinitely, select the Forever check box.
j. Retry Interval: Set the interval (in minutes) between each retry attempt. The default retry
interval is 1 minute. Accepted values are from 1 to 30 minutes.
k. Retry Mode: If you want APs to fall back to the specified primary security gateway, click
Revertive. If you want APs to maintain connectivity with the security gateway to which
they are currently connected, click Non-revertive.
9. Click OK.

You have created the IPsec GRE profile.

NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the IPsec GRE tab.

Creating an Ethernet Port Profile


An Ethernet port profile contains settings that define how an AP will handle VLAN packets when
its port is designated as either trunk, access, or general port. By default, three Ethernet port
profiles exist: General Port, Access Port and Trunk Port.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Ethernet Port tab, and then select the zone for which you want to create the
profile.
3. Click Create.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
224
Services and Profiles
Working with Tunnels and Ports

The Create Ethernet Port page appears.


Figure 96: Creating a Ethernet Port

e l i f orP

4. Configure the following:


1. General Options
a. Name: Type a name for the Ethernet port profile that you are creating.
b. Description: Type a short description about the profile.
c. Type: The Ethernet port type defines how the AP will manage VLAN frames. You can
set Ethernet ports on an AP to one of the following types: Trunk Port, Access Port or
General Port.
2. Port Setting
a. Tunnel: Select this check box to enable tunneling on the Ethernet port.
b. VLAN Untag ID: Type the ID of the native VLAN (typically, 1), which is the VLAN into
which untagged ingress packets are placed upon arrival. If your network uses a different

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
225
Services and Profiles
Working with Tunnels and Ports

VLAN as the native VLAN, configure the AP Trunk port’s VLAN Untag ID with the native
VLAN used throughout your network.
c. VLAN Members: Type the VLAN IDs that you want to use to tag WLAN traffic that will
use this profile. You can type a single VLAN ID or a VLAN ID range (or a combination
of both). The valid VLAN ID range is 1 to 4094.
d. Enable Dynamic VLAN: Select this check box if you want the controller to assign VLAN
IDs on a per-user basis. Before enabling dynamic VLAN, you need to define on the
RADIUS server the VLAN IDs that you want to assign to users.

NOTE: This option is only available when Type is set to Access Port and 802.1X
authentication is set to MAC-based Authenticator.

3. Guest VLAN: If you want to assign a device that fails authentication to still be able to access
the Internet but to internal network resources, select this check box.

NOTE: This check box only appear when the Enable Dynamic VLAN check box is selected.

4. 802.1X
• MAC-based Authenticator: If you select this authenticator, each MAC address host is
individually authenticated. Each newly-learned MAC address triggers an EAPOL
request-identify frame.
• Port-based Authenticator: If you select this authenticator, only a single MAC host must
be authenticated for all hosts to be granted access to the network.
5. Authenticator
a. Authentication Server: Select the check-box and a controller from the drop-down menu
to use the controller as a proxy authentication server.
b. Accounting Server: Select the check-box and a controller from the drop-down menu
to use the controller as a proxy accounting server.
c. Enable MAC authentication bypass: Select this check-box if you want to use the device
MAC address as access credentials (username and password).
6. RADIUS Options
a. NAS ID: Set the NAS ID for the AP to communicate with the RADIUS server. Options
include using the AP MAC address or any User-defined address.
b. Delimiter: If AP MAC is selected to configure the NAS ID, then you can choose between
Dash or Colon as delimiters to separate.
7. Click OK.

You have created the Ethernet Port profile.

NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the Ethernet Port tab.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
226
Services and Profiles
Working with Tunnels and Ports

Creating a Tunnel DiffServ Profile


If you need to configure the type of traffic (ToS) bit settings for the access side traffic from Ruckus
Wireless APs, follow these steps to create a Differentiated Services (DiffServ) profile. This profile
can only be applied to Ruckus GRE and SoftGRE traffic.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the DiffServ tab, and then select the zone for which you want to create the profile.
3. Click Create.
The Create Tunnel DiffServ Profile page appears.
Figure 97: Creating a Tunnel DiffServ Profile

4. Configure the following:


1. Name: Type a name for the DiffServ profile that you are creating.
2. Description: Type a brief description for the DiffServ profile.
3. Tunnel DiffServ: configure the following options.
a. Set Uplink DiffServ: Select the check box if you want to set the Differentiated Services
field for uplink user traffic from Ruckus Wireless APs towards either the controller or a
third SmartCell Gateway 200/Virtual SmartZone High-Scale for Release 3.4.1
Administrator Guide 92 Managing Ruckus Wireless AP Zones Creating a DiffServ Profile
party gateway via SoftGRE. Configure the desired value to be set by the Ruckus Wireless
AP.
b. Set Downlink DiffServ: Select the check box if you want to set the Differentiated Services
field for downlink user traffic from the controller towards the AP, and then configure the
desired value to be set by the Ruckus Wireless AP.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
227
Services and Profiles
Working with Tunnels and Ports

4. Preserved DiffServ: Configure up to eight (8) entries in the preserved DiffServ list. The
Preserved DiffServ list allows the preservation of values that have been already marked in
incoming packets either in uplink or downlink traffic.
5. Click OK.

You have created the DiffServ profile.

NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the DiffServ tab.

DHCP Relay
DHCP relay agents are hosts that are used to forward DHCP packets between clients and
servers when they are not on the same physical subnet.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the DHCP Relay tab.
You will be able to view the details of the DHCP relay agents.

Enabling Flexi VPN


You can enable Flexi-VPN and limit the network resources that a UE can access. Flexi-VPN
allows an administrator to customize the network topology, and is thereby able to control the
network resources accessible to the end-user. This feature is only supported on vSZ-E and
vSZ-H, and is enabled by purchasing the Flexi-VPN license.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Forwarding Rule (vSZ-D) tab.
The page with Flexi-VPN and L3 Roaming settings appears.
Figure 98: Enabling Flexi-VPN

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
228
Services and Profiles
Working with Tunnels and Ports

NOTE: The Flexi-VPN option is only available if the Access VLAN ID is 1, and when VLAN
Pooling, Dynamic VLAN and Core Network VLAN options are disabled.

NOTE: You can only apply 1024 WLAN IDs to a Flexi-VPN profile.
Flexi-VPN supports IPv4 addressing formats and Ruckus GRE tunnel protocol. It does not
support IPv6 addressing formats.

3. Select a virtual data plane for which you want to enable the Flexi-VPN feature, and then select
the Enable Flexi-VPN check-box.
4. Click OK.
You have successfully enabled the Flexi-VPN feature on the selected vDP.

Enabling L3 Roaming Criteria for vDPs


Using the layer 3 roaming feature, clients can roam across APs in the network (from one data
plane to another data plane). This is typically required when the number of clients in the network
increases and clients have to roam from a network that they were connected to, to another
WLAN network with similar access settings. This feature enables seamless roaming and ensures
session continuity between the client and the network.

NOTE: L3 roaming is only supported on vSZ-H and vSZ-E.

You can configure the roaming criteria for a vDP so that it uses one of these two options - UE
subnet or VLAN ID to access another vDP to connect to, within a network. Before this, you must
ensure that the L3 roaming feature is enabled in the vDP.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Forwarding Rules (vSZ-D) tab.
The page with options to configure the Flexi-VPN and L3 Roaming features appears.
Figure 99: Enabling L3 Roaming

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
229
Services and Profiles
Working with Tunnels and Ports

3. Select the Enable L3 Roaming check-box.


4. From the Roaming Criteria drop-down, select one of these options to define the data format
to establish connection between vDPs: UE Subnet or VLAN ID.
5. Click OK.
You have successfully enabled L3 roaming, and also set the roaming criteria based on which
vDPs would connect within the network.

NOTE: A fresh controller software installation or upgrade from a version that does not support
L3 roaming resets the L3 roaming configuration and it remains disabled. You must enable L3
roaming on a vDP again.

Editing L3 Roaming for a vDP


For L3 roaming to work without session break, the vDPs between which the roaming happens
must both be enabled with the L3 Roaming feature.

NOTE: If the IP address of the UE changes, then the session breaks.

1. Go to Services & Profiles > Tunnels and Ports.


2. Select the Forwarding Rules (vSZ-D) tab.
The page with options to configure the Flexi-VPN and L3 Roaming features appears.
3. In L3 Roaming Profiles, select a virtual data plane for which you want to enable the L3 roaming
feature, and then click Configure.
The Edit L3 Roaming page appears.
Figure 100: Configuring the L3 Roaming setting for a vDP

4. In Activate, select Enable or Disable as appropriate.


5. Based on the Roaming Criteria that you set, you will be able to add a UE subnet or a VLAN
ID to the selected vDP. Click Create to add a UE Subnet or VLAN ID to the vDP. The UE

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
230
Services and Profiles
Working with Tunnels and Ports

Subnet or Add VLAN ID page appears, respectively, depending on the roaming criteria you
chose.
6. Type the UE Subnet IP address or the VLAN ID as appropriate.
7. Click OK.
8. Click OK again.
In L3 Roaming Profiles, the following information about the vDP is displayed:
• vSZ-D: Displays the name of the virtual data plane.
• Version: Displays the version of the vDP.
• Activate: Displays whether L3 roaming is enabled or disabled.
• UE Subnet or VLAN ID: Depending on the global settings you choose for the roaming
criteria, the UE subnet IP address or the VLAN ID is displayed.

You have enabled L3 roaming in the selected vDP.

Tunnel Encryption
You can use the tunnel encryption feature to encrypt data that needs to be transmitted to a
private network, through a public network which does not support the protocol of the private
network. This feature is available in vSZ-H and vSZ-E.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Tunnel Encryption (vSZ-D) tab.
The Tunnel Encryption (vSZ-D) page appears.
Figure 101: Tunnel Encryption (vSZ-D)

3. Select the Enable Tunnel Encryption check-box.


4. Click OK.
You have successfully enabled tunnel encryption.

Forwarding Multicast Packets


In multicast forwarding, a group of hosts are typically grouped under a multicast IP address.
Data can then be transmitted from the source to the IP address which in turn transmits data to
the various hosts assigned to the multicast IP. This is a point-to-multipoint data transmission.
You can forward multicast traffic on vDP by enabling the multicast forwading feature in tunnel
mode, but you must make sure that the hosts are connected to the vDP and that Ruckus GRE
tunnel is configured in the vDP. This feature is only available in SZ100.
1. Go to Services & Profiles > Tunnels and Ports.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
231
Services and Profiles
Location Services

2. Select the Multicast Forwarding tab.


The Multicast Forwarding page appears.
Figure 102: Forwarding Multicast Packets

3. In Global Setting, select the Enable forwarding multicast packet on tunnel mode
check-box.
4. Click OK. The form is submitted and multicast packet forwarding is enabled.
You have successfully enabled multicast forwarding for data packets in the tunnel mode.

Location Services
If your organization purchased the Ruckus Wireless Smart Positioning Technology (SPoT) location
service, the controller must be configured with the venue information that is displayed in the
SPoT Administration Portal.
After completing purchase of the SPoT location service, you will be given account login information
that you can use to log into the SPoT Administration Portal. The Admin Portal provides tools for
configuring and managing all of your venues (the physical locations in which SPoT service is
deployed). After a venue is successfully set up, you will need to enter the same venue information
in the controller.
1. Go to Services & Profiles > Location Services.
The Location Services page appears.
Figure 103: Location Services

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
232
Services and Profiles
Location Services

2. Click Create.
The Create LBS Server page appears.
Figure 104: Creating an LBS Server

3. Configure the following:


1. Venue Name: Type a venue name for server.
2. Server Address: Type the IP address of the server.
3. Port: Type the port number to communicate with the server. Default is 8883.
4. Password: Type the password to access the server.
5. Click OK.

You have created the location-based service on the controller.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
233
Services and Profiles
DHCP

NOTE: You can also edit, clone and delete the service by selecting the options Configure, Clone
and Delete respectively, from the Location Services tab.

DHCP
DHCP functionality on SZ-managed APs allows customers to reduce costs and complexity by
removing the need for an extra box (DHCP/NAT router) to provide IP addresses to clients.
In highly distributed environments, particularly those with only a few APs per site, the ability for
an AP or a set of APs to provide DHCP/NAT support to local client devices simplifies deployment
by providing all-in-one functionality on the AP, which eliminates the need for a separate router
and DHCP server for each site. It also eases site management by providing central control and
monitoring of the distributed APs and their clients.
Three general DHCP scenarios are supported:
• SMB Single AP: DHCP is running on a single AP only. This AP also functions as the Gateway
AP.
• SMB Multiple APs (<12): DHCP service is running on all APs, among which two of the APs
will be Gateway APs. These two Gateway APs will provide the IP addresses as well as Internet
connectivity to the clients via NAT.
• Enterprise (>12): For Enterprise sites, an additional on site vDP will be deployed at the remote
site which will assume the responsibilities of performing DHCP/NAT functions. Therefore,
DHCP/NAT service will not be running on any APs (they will serve clients only), while the
DHCP/NAT services are provided by the onsite vDP.

Caveats and Limitations


The SmartZone DHCP on AP functionality has some limitations. These limitations should be
considered before enabling this feature:
• Running DHCP/NAT services on an AP can consume significant memory resources. Therefore,
Ruckus recommends deploying this feature only on APs with 256MB or more RAM.
• Max 4 IP address pools. Each pool must have non-overlapping IP addresses, and must be
assigned a VLAN ID (2~4094).
• Max 1,000 IP addresses per pool.
• The following features are incompatible with the DHCP feature and cannot be enabled for a
zone in which DHCP is enabled (or, if enabled for a zone, DHCP cannot be enabled or will
be allowed but with a warning message):
• Application Recognition and Control
• IPv6
• WeChat WLANs
• Mesh (irrelevant for single-AP scenarios, configurable but with limitations for multi-AP
scenarios)
• DVLAN
• VLAN Pooling

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
234
Services and Profiles
DHCP

• Bonjour Gateway
• Bonjour Fencing
• Client Isolation: If any WLAN within a zone uses a "Manual-Only" client isolation whitelist,
DHCP cannot be enabled. Only Auto and Hybrid options are supported for zones with
DHCP enabled.

Creating a DHCP Pool


Creating a DHCP pool is necessary for assigning IP addresses to clients. Multiple address pools
can be created and assigned to APs that are running DHCP services. Then, when a client
connects to the wireless network, it will be assigned an address from the DHCP pool(s) you
specified.
To configure a DHCP pool for IP address allocation:
1. Go to Services & Profiles > DHCP.
2. Select the Pool tab, and then select the zone for which you want to create the pool.
3. Click Create.
The Create DHCP Pool page appears.
Figure 105: Creating a DHCP Pool

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
235
Services and Profiles
DHCP

4. Configure the following:


• Name: Type a name for the pool you want to create.
• Description: Type a description of the pool you want to create.
• VLAN ID: Type the vlan id for the pool.
• Subnet Network Address: Type the IP subnet network address (e.g., 192.168.0.0).
• Subnet Mask: Type the subnet mask address (e.g., 255.255.255.0).
• Pool Start Address: Type the first IP address to be allocated to clients from the pool (e.g.,
192.168.0.1).
• Pool End Address: Type the last IP address to be allocated to clients from the pool (e.g.,
192.168.0.253).

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
236
Services and Profiles
DHCP

• Primary DNS IP: Type the primary DNS server IP address.


• Secondary DNS IP: Type the secondary DNS server IP address.
• Lease Time: Enter the IP address lease time, after which clients will have to renew or
request new IP addresses.

5. Click OK.
You have created a DHCP address pool. You can now apply this address pool to a DHCP
service, as described in Configuring DHCP Service Settings on page 237.

NOTE: You can also edit, clone and delete the address pool by selecting the options Configure,
Clone and Delete respectively, from the Pool tab.

Configuring DHCP Service Settings


Using DHCP service settings, you can configure an AP to assign private IP addresses to Wi-Fi
clients without the need for a separate DHCP server (router).
To configure DHCP services:
1. Go to Services & Profiles > DHCP.
2. Select the Setting tab, and then select the zone for which you want to configure the settings.
3. Select a Zone from the zone list on the left side of the screen, and click Enable DHCP Service
on AP.
Figure 106: Enabling DHCP Service

4. Click Edit DHCP Service on AP. The DHCP Settings wizard appears.
Figure 107: DHCP Settings wizard

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
237
Services and Profiles
DHCP

5. On the first page of the wizard (Base Settings), configure the DHCP Configuration as follows:
• Enable on Each AP: Each AP in this zone runs its own DHCP server instance. This option
is typically used when APs are at different sites and roaming is not required.
• Enable on Multiple APs: Designate which APs will provide DHCP/NAT service. This option
is typically used when multiple APs are at the same site and roaming is required. This
option also allows you to choose whether to automatically or manually specify which APs
will provide DHCP service.

6. On the next wizard screen, (Select Pools), select up to four DHCP pools from which to assign
client IP addresses.
Figure 108: Selecting Pools

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
238
Services and Profiles
DHCP

NOTE: If you have not already created DHCP pools, you can do so from within the wizard.
Click the Plus (+) icon and configure the IP address pools as described in Creating a DHCP
Pool on page 235.

7. Click Next. The Select APs screen appears.

NOTE: If you selected Auto Select AP on the first wizard screen, this configuration screen
will be skipped.

8. On the Select APs wizard screen, select the AP(s) that you want to set as the primary and
secondary DHCP servers (if you previously selected Enable on Multiple APs).
Figure 109: Selecting APs

9. Click Next.
10. On the Review screen, review your settings to make sure everything is correct. Once you
are satisfied with your settings, click OK to confirm.
Figure 110: Review DHCP settings

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
239
Services and Profiles
DHCP

You have configured the DHCP server settings and applied them to an AP (or multiple APs).
These APs will now provide DHCP/NAT functionality and assign IP addresses to wireless clients
from the DHCP address pools you specified.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
240
241

Working with Reports 8


In this chapter:

• Types of Reports
• Managing Report Generation
• Rogue Access Points
• Viewing AP Client Statistics
• Ruckus AP Tunnel Stats

Types of Reports
The controller provides the following types of reports:

Client Number Report


The Client Number report shows a historical view of the maximum and minimum number of
clients connect to the system.
Client number can be shown in different time intervals for a specified duration. The report can
be generated based on a specific AP, SSID, or radio.

Client Number vs Airtime Report


The Client Number vs Airtime report shows a historical view of the average number of clients
connected to the system and the corresponding airtime (TX, RX, Busy).
Client number and airtime can be shown in different time intervals for a specified duration. The
report can be generated based on a specific AP or radio.

Continuously Disconnected APs Report


The Continuously Disconnected APs report shows a list of access points disconnected within
the specified time range.

Failed Client Associations Report


The Failed Client Associations report shows a historical view of the number of failed client
associations. Failed client associations can be shown in different time intervals for a specified
duration. The report can be generated based on a specific AP, SSID, or radio.

New Client Associations Report


The New Client Associations report shows a historical view of the number of new client
associations. New client Associations can be shown in different time intervals for a specified
duration. The report can be generated based on a specific AP, SSID, or radio.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
241
Working with Reports
Managing Report Generation

System Resource Utilization Report


The System Resource Utilization report shows a historical view of the CPU and memory usage
of the system. The CPU and memory usage can be shown in different time intervals for a specific
duration. The report can be generated based on specific plane.

TX/RX Bytes Report


The TX/RX Bytes report shows a historical view of the transmitted (TX) and received (RX) bytes
of the system. The transmitted and received bytes can be shown in different time intervals for a
specified duration. The report can be generated based on a specific AP, SSID or radio.

Managing Report Generation


You can create and manage reports.

NOTE: Global filter settings does not apply to the Reports feature.
As reports are segmented by individual administrators, each administrator’s reports are unique
and applies only to them.

Creating Reports
To create a new report:
1. From the left pane, select Report > Report Generation. Figure 111: Report Generation
Screen on page 242 appears.
Figure 111: Report Generation Screen

2. Click Create, Figure 112: Create Reports Screen on page 242 appears.
Figure 112: Create Reports Screen

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
242
Working with Reports
Managing Report Generation

3. Enter the required parameters as explained in Table 32: Report Parameters on page 243.
4. Click OK.

Table 32: Report Parameters

Field Description Your Action


General Information
Title Indicates the report name. Enter a title for the report.
Description Describes the report type. Enter a short description.
Report Type Specifies the report type Select the required report.
Output Format Specifies the report output Select the required report
format. output format.
Resource Filter Criteria
Device Indicates the level of resource Select Device and choose the
filtering for which you want to option.
generate the report. For
example: AP Zone or Access
Point.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
243
Working with Reports
Managing Report Generation

Field Description Your Action


SSID Indicates the SSID for which Select the check box and
you want to generate the choose the SSID for which you
report. want the report.
Radio Indicates the frequency for Select the check box and
which you want to generate the choose the required frequency:
report.
• 2.4G
• 5G

Time Filter
Time Interval Defines the time interval at Select the required time
which to generate the report. interval.
Time Filter Defines the time duration for Select the required time filter.
which to generate the report.
Schedules
Enable/Disable Specifies the scheduled time By default the option is
when a report must be disabled. Select Enable and
generated. select the Interval, Hour and
Minute. You can add multiple
schedules.
Email Notification
Enable/Disable Triggers an email notification By default the option is
when the report is generated. disabled. Select Enable and
click the Add New and enter
the email address. You can
add multiple email addresses.
Export Report Results
Export Report Results, Uploads the report results to By default the option is
Enable/Disable an FTP server. disabled. Select Enable and
select the FTP Server.

NOTE: You can also edit or delete a report by selecting the options Configure or Delete
respectively.

Generating Reports
To generate a report:
1. From the left pane, select Report > Report Generation. Figure 111: Report Generation
Screen on page 242 appears.
2. Select the required report from the list and click Generate. The Report Generated form
appears.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
244
Working with Reports
Rogue Access Points

3. Click OK, the report will be generated and listed in the Report Results area.
4. Select the required format from the Result Links column and click Open.

Rogue Access Points


Viewing Rogue Access Points
Rogue (or unauthorized) APs pose problems for a wireless network in terms of airtime contention,
as well as security.
Usually, a rogue AP appears in the following way: an employee obtains another manufacturer's
AP and connects it to the LAN, to gain wireless access to other LAN resources. This would
potentially allow even more unauthorized users to access your corporate LAN - posing a security
risk. Rogue APs also interfere with nearby Ruckus Wireless APs, thus degrading overall wireless
network coverage and performance.
The controller's rogue AP detection options include identifying the presence of a rogue AP,
categorizing it as either a known neighbor AP or as a malicious rogue.
If you enabled rogue AP detection when you configured the common AP settings (see Configuring
APs), click Report > Rogue Access Points. The Rogue Access Points page displays all rogue
APs that the controller has detected on the network, including the following information:
• Rogue MAC: MAC address of the rogue AP.
• Type: Rogue, a normal rogue AP, not yet categorized as malicious or non-malicious.
• Channel: Radio channel used by the rogue AP.
• Radio: WLAN standards with which the rogue AP complies.
• SSID: WLAN name that the rogue AP is broadcasting.
• Detecting AP Name: Name of the AP.
• Zone: Zone to which the AP belongs.
• RSSI: Radio signal strength.
• Encryption: Indicates whether the wireless signal is encrypted or not.
• Last Detected: Date and time when the rogue AP was last detected by the controller.

Marking Rogue Access Points


You can mark a Rogue (or unauthorized) AP as known.
To mark a Rogue AP as known:
1. From the left pane, click Report and Rogue Access Points. The Rogue Access Points page
appears.
2. Select the Rogue AP from the list and click Mark as Known. The classification Type of the
Rogue AP changes to Known. You can also select the Rogue AP from the list and click
Unmark, to change the classification.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
245
Working with Reports
Viewing AP Client Statistics

Viewing AP Client Statistics


AP Client Statistics is a cumulative value per session and one entry is created per session. Data
is reported every 60 seconds and is not bin data. The user interface displays the table and its
corresponding graph chart. The two representations are synchronized and controlled by the
search criteria. For performance reasons, the total counters per DP or per GGSN IP for each
bin is precalculated.
To view AP Client Statistics:
1. From the left pane, select Report > Historical Client Stats. The Ruckus AP Client page
appears.
2. Update the parameters as explained in Table 33: AP Client Statistics Report Parameters on
page 246.
3. Click:
• Load Data— To view the report in the workspace.
• Export CSV—To open or save the report in CSV file format.

Table 33: AP Client Statistics Report Parameters

Field Description Your Action


Time Period Indicate the time period for Move the slider to set the
which you want to view the duration.
report.
Zone Name Specifies the zone for which Select the required zone.
you want to view the report.
Client MAC Specifies the MAC. Enter the client MAC.
Client IP Indicates the client IP. Enter the client IP address.

Table 34: AP Client Statistics Report Attributes on page 246 contains historical client statistics
report based on the UE session statistics.

Table 34: AP Client Statistics Report Attributes

Attribute Type Description


Start Long Indicates the session creation
time.
End Long Indicates the session end time.
Client MAC String Indicates the Mac address of
the client.
Client IP Address String Indicates the IP address of the
client.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
246
Working with Reports
Ruckus AP Tunnel Stats

Attribute Type Description


Core Type String Indicates the core network
tunnel type.
AP MAC String Indicates the Client AP MAC.
SSID String Indicates the SSID
Bytes from Client Long Indicates the number of bytes
received from the client.
Bytes to Client Long Indicates the number of bytes
sent to the client.
Packets from Client Long Indicates the number of
packets received from the
client.
Packets to Client Long Indicates the number of
packets sent to the client.
Dropped Packets from Client Long Indicates the number of
packets dropped from the
client.
Dropped Packets to Client Long Indicates the number of
packets dropped to the client.

Ruckus AP Tunnel Stats


Viewing Statistics for Ruckus GRE Tunnels
The web interface displays the table and its corresponding graph chart. The two representations
are synchronized and controlled by the search criteria. For performance reasons, the total
counters per DP or per AP for each bin may be pre-calculated.
To view the Ruckus GRE Tunnel Statistics:
1. From the left pane, select Report > Ruckus AP Tunnel Stats. The Ruckus GRE tab appears
by default.
2. Update the parameters as explained in Table 35: Ruckus GRE Report Parameters on page
248.
3. Click:
• Load Data— To view the report in the workspace.
• Export CSV—To open or save the report in CSV file format.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
247
Working with Reports
Ruckus AP Tunnel Stats

Table 35: Ruckus GRE Report Parameters

Field Description Your Action


Time Period Indicate the time period for Move the slider to set the
which you want to view the duration.
report.
Data Plane Indicates the Data Plane. Select the Data Plane.
AP MAC or IP Address Indicates the MAC of the Enter the AP MAC or IP
Access Point or IP Address. address.
Zone Name Specifies the zone for which Select the required zone.
you want to view the report.

Table 36: Ruckus GRE report attributes on page 248 contains the report based on the statistics
for Ruckus GRE. Each entry contains the 15 minutes cumulative data.

Table 36: Ruckus GRE report attributes

Attribute Type Description


Time Long Bin ID, which is stamped at a 15
minute interval. For example, 10:00,
10:15.
TXBytes Long Indicates the number of bytes sent.
RXBytes Long Indicates the number of bytes
received.
TXPkts Long Indicates the number of packets sent.
RXPkts Long Indicates the number of packets
received.
Dropped Packets Long Indicates the number of packets
dropped.

Viewing Statistics for SoftGRE Tunnels


The web interface displays the table and its corresponding graph chart. The two representations
are synchronized and controlled by the search criteria. For performance reasons, the total
counters per DP or per AP for each bin may be pre-calculated.
To view the SoftGRE Tunnel Statistics:
1. From the left pane, select Report > Ruckus AP Tunnel Stats. The Ruckus GRE tab appears
by default.
2. Select SoftGRE. Update the parameters as explained in Table 37: SoftGRE Report Parameters
on page 249.
3. Click:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
248
Working with Reports
Ruckus AP Tunnel Stats

• Load Data— To view the report in the workspace.


• Export CSV—To open or save the report in CSV file format.

Table 37: SoftGRE Report Parameters

Field Description Your Action


Time Period Indicate the time period for Move the slider to set the
which you want to view the duration.
report.
Zone Name Specifies the zone for which Select the required zone.
you want to view the report.
Gateway Address Specifies the gateway Enter the gateway address.
address
AP MAC or IP Address Indicates the MAC of the Enter the AP MAC or IP
Access Point or IP Address. address.

Table 38: SoftGRE Report Attributes on page 249 contains the report based on the statistics for
SoftGRE. Each entry contains the 15 minutes cumulative data.

Table 38: SoftGRE Report Attributes

Attribute Type Description


Time Long Bin ID, which is stamped at a 15 minute
interval. For example, 10:00, 10:15.
TXBytes Long Indicates the number of bytes sent.
RXBytes Long Indicates the number of bytes received.
TXPkts Long Indicates the number of packets sent.
RXPkts Long Indicates the number of packets
received.
RX Dropped Packets Long Indicates the number of packets
dropped.
TX Dropped Packets Long Indicates the number of packets
dropped.
TX Error Packets Long Indicates the number of packets with a
header error.
RX Error Packets Long Indicates the number of packets with a
header error.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
249
Working with Reports
Ruckus AP Tunnel Stats

Viewing Statistics for SoftGRE IPsec Tunnels


The web interface displays the table and its corresponding graph chart. The two representations
are synchronized and controlled by the search criteria. For performance reasons, total counters
per DP or per AP for each bin may be pre-calculated.
To view the SoftGRE IPsec Tunnel Statistics:
1. From the left pane, select Report > Ruckus AP Tunnel Stats. The Ruckus GRE tab appears
by default.
2. Select SoftGRE + IPsec. Update the parameters as explained in Table 39: SoftGRE + IPsec
Report Parameters on page 250.
3. Click:
• Load Data— To view the report in the workspace.
• Export CSV—To open or save the report in CSV file format.

Table 39: SoftGRE + IPsec Report Parameters

Field Description Your Action


Time Period Indicate the time period for Move the slider to set the
which you want to view the duration.
report.
Zone Name Specifies the zone for which Select the required zone.
you want to view the report.
Gateway Address Specifies the gateway Enter the gateway address.
address
AP MAC or IP Address Indicates the MAC of the Enter the AP MAC or IP
Access Point or IP Address. address.

Table 40: SoftGRE + IPsecReport Attributes on page 250 contains the report based on the
statistics for access point IPsec. Each entry contains the 15 minutes cumulative data.

Table 40: SoftGRE + IPsecReport Attributes

Attribute Type Description


Time Long Bin ID, which is stamped at a 15 minute
interval. For example, 10:00, 10:15.
TXBytes Long Indicates the number of bytes sent.
RXBytes Long Indicates the number of bytes received.
TXPkts Long Indicates the number of packets sent.
RXPkts Long Indicates the number of packets
received.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
250
Working with Reports
Ruckus AP Tunnel Stats

Attribute Type Description


TX Dropped Packets Long Indicates the number of packets
dropped.
RX Dropped Packets Long Indicates the number of packets
dropped.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
251
Troubleshooting
Troubleshooting Client Connections

Troubleshooting 9
In this chapter:

• Troubleshooting Client Connections


• Troubleshooting through Spectrum Analysis

Troubleshooting Client Connections


This feature allows network administrators to connect to client devices and analyze network
connection issues in real-time.
The network administrator types the MAC address of the client device and starts various services
to identify the connectivity issue. The APs assigned to the client device relay data frames from
the device to the controller which the administrator analysis to determine which stage of the
connection is causing problems.
1. Go to Troubleshooting.
The Troubleshooting page appears.
Figure 113: Troubleshooting - Client Connections

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
252
Troubleshooting
Troubleshooting Client Connections

2. In Type, select Client Connection from the drop-down menu.


3. In Client MAC, type the MAC address of the client device which is facing connectivity issues.
4. In Select APs, click Select.
The Select APs page appears. Select an AP to communicate between the client and controller
and then click OK.
5. In Connectivity Trace, click Start.
The controller configures the APs to receive data frame from the target client so that the APs
can relay relevant frames that match the client filter to the controller.
The APs that receive probe requests from the target client are listed in a table along with the
APs operating channel and the RSSI at which the client’s frames were received. This stage
of the connection identifies whether there are acceptable APs for the client to connect to.
Following are the details displayed in the table:
• AP Name and MAC Address.
• Radio: Identifies the 2.4 or 5 GHz radio of the AP and the channel number the radio is
operating on.
• Client SNR: This is the signal-to-noise ratio received in dB.
• Latency: Time delay in connecting the AP to the client.
• Connection Failures: Displays the percentage of AP-client connection attempts that failed.
• Airtime Utilization: Percentage of the air time that was used by the client to transfer data.
AT this stage, the tool displays the statuses Client is in a discovery state and
not currently connected(when the tool starts/when the client is already connected
to an AP) and Client is attempting a new connection(when the target client
sends an 802.11 authentication request frame to an AP to initiate a connection.).
By using the list of APs that communicated with the client, you will be able to identify if the
client chose the best AP based on signal quality and other health metrics.
When the client sends an 802.11 authentication request frame, a flow diagram depicting
different stages of the AP-client connection is initiated. This sends a trigger frame to the AP
and it is highlighted from the list for reporting APs.
The Flow ladder in the diagram shows the step-by-step exchange of information between
devices during the connection process. As the steps are completed, colored arrows are
displayed based on whether the step depicts a warnings (yellow) or event (for example, red
for failure). Typical warning scenarios include time delays or when a client negotiates and EAP
type that's not supported. Failure conditions are also highlighted as red arrows typically when
the connection itself fails.

6. Click Stop to terminate connection between the AP and client.

NOTE: The following authentication types are supported:


• Open
• PSK (WPA2-Personal)
• 802.1X (PEAP, TTLS, TLS, SIM)
• WISPr

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
253
Troubleshooting
Troubleshooting through Spectrum Analysis

Troubleshooting through Spectrum Analysis


Interference between wireless devices is seen to increase dramatically due to the increase in the
number of device used, and the availability of only three non-interfering channels in 802.11. This
reduces the performance of the wireless network, therefore, it is important to monitor the spectrum
usage in a particular area and efficiently allocate the spectrum as needed to wireless devices.
In addition, spectrum analysis provides the flexibility to troubleshoot issues remotely, identify
sources of interferences within the network and allow administrators access to the RF health of
the network environment.
APs which are put in spectrum-mode transmit data to the controller, which in turn displays the
data in specturm-mode for analysis.
1. Go to Troubleshooting.
The Troubleshooting page appears.
Figure 114: Troubleshooting - Spectrum Analysis

2. In Type, select Spectrum Analysis from the drop-down menu.


3. In AP MAC Address, select the AP that needs to be in the spectrum analysis-mode.
4. In Spectrum Capture, select the radio frequency values (2.4GHz or 5GHz) for the analysis
from the Radio option.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
254
Troubleshooting
Troubleshooting through Spectrum Analysis

The 2.4GHz band spans from 2400 - 2480 GHz and 5GHz band spans from 5.15 - 5.875
GHz.
You can select and view the spectrum analysis trends in these graphs:
• Spectrum Usage: This chart uses a color-based view to show collections of data points
over time. As more data samples are measured at a specific frequency and amplitude
coordinate, the color shown at that coordinate will change. If you choose to view colors
by amplitude, the warm colors depict higher amplitude and cool colors lower amplitudes.
If you view the colors by density, the warm colors depict a high number of samples at a
given coordinate and cool colors show low number of samples at a given coordinate.
• Real-Time FFT : This chart is a second-by-second (2sec) update of measured data across
the band. If you view by Amplitude (signal strength), then the chart displays both average
and maximum amplitudes of energy measured across the band for that sample period. If
you view by Utilization (duty cycle), then the chart displays the percentage (%) of time at
which the frequency is utilized at an amplitude above N. The amplitude threshold is
configurable but the default is -85dBm.
• Swept Spectrogram: This chart displays a waterfall of color over time, where each horizontal
line in the waterfall represents one sample period (e.g. 2 seconds), and the full waterfall
display spans 2 minutes of time (60 sample bins of 2sec each). There are two display
options for the spectrogram chart:
• Amplitude: Shows both average and maximum amplitude of energy measured across
the band for that sample period.
• Utilization: Shows the percentage of time at which the frequency is utilized at an
amplitude above N. The amplitude threshold is configurable but the default is -85dBm.

5. After you select the parameters that you want to use to view the graphs, click Start.
6. Click Stop to terminate viewing spectrum analysis trends.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
255
Administering the Controller
Managing Administrator and Roles

Administering the Controller 10


In this chapter:

• Managing Administrator and Roles


• Backing Up and Restoring Clusters
• Upgrading the Controller
• Managing Licenses
• ZoneDirector to SmartZone Migration
• Monitoring Administrator Activities

Managing Administrator and Roles


The controller must be able to manage various administrators and roles that are created within
the network in order to assign tasks and functions, and to authenticate users.

Creating User Groups


Creating user groups and configuring their access permissions, resources and administrator
accounts allows administrators to manage a large number of users.
1. Go to Administration > Admins and Roles.
2. Select the Groups tab.
3. Click Create after selecting the system domain.
The Create User Group page appears.
4. Configure the following:
1. Permission
a. Name: Type the name of the user group you want to create.
b. Description: Type a short description for the user group you plan to create.
c. Permission: Select one of the access permission for the user group, from the drop-down
menu. You can also grant admin permission to generate guest passes.
d. Click Next.
2. Resource: From Select Resources, add the resources you want to assign to this user
group.
3. Click Next.
4. Click Next.
5. Administrator: Select the users available in the list and add them under Selected User.
You can also create Administrator accounts for the group from this page.
6. Click Next.
7. Review: Verify the user group's configuration that you have selected.
8. Click OK to confirm.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
256
Administering the Controller
Managing Administrator and Roles

You have created the user groups.

NOTE: You can also edit and delete the group configuration by selecting the options Configure,
and Delete respectively, from the Groups tab.

Creating Administrator Accounts


The controller supports the creation of additional administrator accounts. This allows you to
share or delegate management and monitoring functions with other members of your organization.
1. Go to Administration > Admins and Roles.
2. Select the Administrators tab.
3. Click Create.
The Create Administrator Account page appears.
Figure 115: Creating an Administrator Account

4. Configure the following:


1. Account Name: Type the name that this administrator will use to log on to the controller.
2. Real Name: Type the actual name (for example, John Smith) of the administrator.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
257
Administering the Controller
Managing Administrator and Roles

3. Password: Type the password that this administrator will use (in conjunction with the
Account Name) to log on to the controller.
4. Confirm Password: Type the same password as above.
5. Phone: Type the phone number of this administrator.
6. Email: Type the email address of this administrator.
7. Job Title: Type the job title or position of this administrator in your organization.
8. Click OK.

You have created the administrator account.

NOTE: You can also edit and delete the admin account by selecting the options Configure, and
Delete respectively, from the Administrator tab.

Creating a RADIUS Server for Administrator Authentication


You can add RADIUS servers that you want to use for authorizing and authenticating
administrators.
1. Go to Administration > Admins and Roles.
2. Select the AAA tab.
3. Click Create.
The Create Administrator RADIUS Server page appears.
Figure 116: Creating an Administrator RADIUS Server

4. Configure the following:


1. Name: Type a name for the RADIUS server.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
258
Administering the Controller
Managing Administrator and Roles

2. Type: Select the type of RADIUS server that you are using. Options include:
• RADIUS: Click this option to use a Remote Authentication Dial-In User Service (RADIUS)
server on the network for authenticating controller administrators.
• TACACS+: Click this option to use a Terminal Access Controller Access-Control System
Plus (TACACS+) server on the network for authentication controller administrators.
3. Realm: Type the realm (or realms) to which the RADIUS server belongs. If the RADIUS
server belongs to multiple realms, use a comma (,) to separate the realm names.
4. Backup RADIUS: Select the Enable Secondary Server to back up the RADIUS server
configuration.
a. Primary Server: Type the IP address, port, shared secret for the primary server that
needs to be backed up.
b. Secondary Server: Type the IP address, port, shared secret for the secondary server
to which the back must be done.
c. Failover Policy at NAS:'
• Request Timeout: Type the timeout period (in seconds) after which an expected
RADIUS response message is considered to have failed.
• Max Number of Retries: Type the number of failed connection attempts after which
the controller will fail over to the backup RADIUS server.
• Reconnect Primary: Type the number of minutes after which the controller will attempt
to reconnect to the primary RADIUS server after failover to the backup server.

5. IP Address: Type the IP address of the RADIUS server.


6. Port: Type the UDP port that the RADIUS server is using. The default port is 1812.
7. Shared Secret: Type the shared secret.
8. Confirm Secret: Retype the same secret in.
9. Click OK.

You have completed adding a RADIUS server for authenticating administrators.

NOTE: You can also edit, clone and delete the server by selecting the options Configure, Clone
and Delete respectively, from the Administrator tab.

Enabling the Access Control List


You can control access to management interfaces from CLI or SSH.
1. Go to Administration > Admins and Roles.
2. Select the Access Control List tab.
3. Select Enable.
4. Click Create.
The Management Interface Access Control Rule page appears.
Figure 117: Management Interface Access Control Rule

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
259
Administering the Controller
Backing Up and Restoring Clusters

5. Configure the following:


1. Name: Type the name that rule you want to create to access the management interface.
2. Description: Type a short description for the rule.
3. Type: Select one of the following
• Single IP: Type the IP address of the interface that can be accessed per this rule.
• IP Range: Type the range of IP address that will be allowed access.
4. Subnet: Type the network address and subnet mask address of the interface that will be
allowed access.
5. Click OK.

You have created the access control list rule.

NOTE: You can also edit and delete the list by selecting the options Configure and Delete
respectively, from the Access Control List tab.

Backing Up and Restoring Clusters


Back up the controller cluster periodically to ensure that you can restore the control plane, data
plane, and AP firmware versions as well as the system configuration in the cluster if is a system
failure occurs.

Creating a Cluster Backup


Backing up the cluster (includes OS, configuration, database and firmware) periodically enables
you to restore it in the event of an emergency. Ruckus Wireless also recommends that you back
up the cluster before you upgrade the controller software.
1. Go to Administration > Backup and Restore.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
260
Administering the Controller
Backing Up and Restoring Clusters

2. Select the Cluster tab.


3. In Cluster Backup and Restore, click Backup Entire Cluster to backup both nodes in a
cluster.
The following confirmation message appears: Are you sure you want to back up
the cluster?
4. 4. Click Yes.
The following message appears: The cluster is in maintenance mode. Please
wait a few minutes.
When the cluster backup process is complete, a new entry appears in the Cluster Backups
History section with a Created On value that is approximate to the time when you started
the cluster backup process.

Restoring Cluster Backup


You must be able to restore a cluster to ts previous version in the case of a failure.
1. Go to Administration > Backup and Restore.
2. Select the Cluster tab.
3. In Cluster Backup History, select the cluster and click Restore.
The following confirmation message appears:
Are you sure you want to restore the cluster?

4. Click Yes.
The cluster restore process may take several minutes to complete. When the restore process
is complete, the controller logs you off the web interface automatically.

ATTENTION: Do not refresh the controller web interface while the restore process is in
progress. Wait for the restore process to complete successfully.

5. Log on to the controller web interface.


If the web interface displays the message Cluster is out of service. Please
try again in a few minutes appears after you log on to the controller web interface,
wait for about three minutes. The dashboard will appear shortly. The message appears
because the controller is still initializing its processes.
6. Go to Administration > Upgrade, and then check the Current System Information section
and verify that all nodes in the cluster have been restored to the previous version and are all
in service.
7. Go to Diagnostics > Application Logs, and then under Application Logs & Status check
the Health Status column and verify that all of the controller processes are online.
You have completed restoring the cluster backup.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
261
Administering the Controller
Backing Up and Restoring Clusters

Backing Up and Restoring the Controller's Network Configuration from an FTP Server
In addition to backing up and restoring the controller's network configuration from its own
database, the controller supports backup and restore of its network configuration from an FTP
server using the CLI.
This section describes the requirements for backing up and restoring the controller's network
configuration from an FTP server, the information that is included in the backup file, and how to
perform the backup and restore process.
To back up and restore the controller's network configuration from an FTP server, the controller
must have already been set up and in service. In case of a multi-node cluster, all the nodes in
the cluster must be in service.
The following table lists the network configuration that is backed up from the control and data
planes when you perform a backup procedure to an FTP server.

Table 41: Information that is backed up to the FTP server

Control Plane Data Plane


• Control interface • Primary interface
• Cluster interface • Static routes
• Management interface • Internal subnet prefix
• Static routes
• User-defined interfaces

Backing Up to an FTP Server


Follow these steps to back up the controller network configuration to an FTP server.
1. Log on to the controller from the controller's command line interface (CLI). For more
information, see the corresponding Command Line Interface Reference Guide for your controller
platform.
2. At the prompt, enter en to enable privileged mode.

Figure 118: Enable privileged mode

3. Enter - to display the statuses of the node and the cluster.


Before continuing to the next step, verify that both the node and the cluster are in service.
Figure 119: Verify that both the node and the cluster are in service

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
262
Administering the Controller
Backing Up and Restoring Clusters

4. Enter backup network to back up the controller network configuration, including the control
plane and data plane information.
The controller creates a backup of its network configuration on its database.
Figure 120: Run backup network

5. Enter show backup-network to view a list of backup files that have been created.
Verify that the Created On column displays an entry that has a time stamp that is approximate
to the time you started the backup.
Figure 121: Enter the show backup-network command

6. Enter copy backup-network {ftp-url}, where {ftp-url} (remove the braces) is the
URL or IP address of the FTP server to which you want to back up the cluster configuration.
The CLI prompts you to choose the number that corresponds to the backup file that you
want to export to the FTP server.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
263
Administering the Controller
Backing Up and Restoring Clusters

7. Enter the number of the backup file that you want to export to the FTP server.
The controller encrypts the backup file, and then exports it to the FTP server. When the export
process is complete, the following message appears on the CLI:
Succeed to copy to remote FTP server
Successful operation
Figure 122: Succeed to copy to remote FTP server indicates that you have
exported the backup file to the FTP server successfully

8. Using an FTP client, log on to the FTP server, and then verify that the backup file exists.
The file format of the backup file is
network_<YYYYMMDDHHmmss>_<controller-version>.bak.
For example, if you created the backup file on October 24th 2013 at 02:40:22 and the
controller version is 2.5.0.0.402, you should see a file named
network_20131024024022_2.5.0.0.402.bak on the FTP server.

You have completed backing up the controller to an FTP server.

Restoring from an FTP Server


Before you continue, take note of the following limitations with restoring a backup file of the
controller network configuration from an FTP server:
• Only release 2.1 and later support restoring from an FTP server.
• In this current release, restoring the entire cluster from an FTP server is unsupported. The
restore process must be performed on one node at a time.
• Restoring from an FTP server can only be performed using the CLI.

CAUTION: Restoring a backup file to the controller requires restarting all of the controller
services.

Follow these steps to restore a backup file of the controller's network configuration that you
previously uploaded to an FTP back to the controller.
1. Log on to the controller from the CLI. For more information, see the corresponding Command
Line Interface Reference Guide for your controller platform.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
264
Administering the Controller
Backing Up and Restoring Clusters

2. At the prompt, enter en to enable privileged mode.


Figure 123: Enable privileged mode

3. Enter show cluster-state to display the statuses of the node and the cluster.
Before continuing to the next step, verify that both the node and the cluster are in service.
Figure 124: Verify that both the node and the cluster are in service

4. Enter the following command to log on to the FTP server and check for available backup files
that can be copied to the controller:
copy <ftp-url> backup-network
5. If multiple backup files exist on the FTP server, the CLI prompts you to select the number
that corresponds to the file that you want to copy back to the controller.
If a single backup file exists, the CLI prompts you to confirm that you want to copy the existing
backup file to the controller.
When the controller finishes copying the selected backup file from the FTP server back to
the controller, the following message appears: Succeed to copy the chosen file
from the remote FTP server

6. Enter show backup-network to verify that the backup file was copied back to the controller
successfully.
Figure 125: Verify that the backup file was copied to the controller successfully

7. Run restore network to start restoring the contents of the backup file to the current controller.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
265
Administering the Controller
Backing Up and Restoring Clusters

The CLI displays a list of backup files, and then prompts you to select the backup file that
you want to restore to the controller.

8. Enter the number that corresponds to the backup file that you want to restore.
Figure 126: Enter the number that corresponds to the backup file that you want to
restore

The CLI displays the network configuration that the selected backup file contains.
If the serial number of the current controller matches the serial number contained in one of
the backup files, the CLI automatically selects the backup file to restore and displays the
network configuration that it contains.

9. Type yes to confirm that you want to restore the selected backup file. The controller starts
the restore process and performs the following steps:
a) Stop all services.
b) Back up the current network configuration.
This will enable the controller to roll back to the current configuration, in case there is an
issue with the restore process.
c) Clean up the current network configuration.
The controller deletes its previous network configuration, including static routes, name server,
user defined interfaces, etc.

10. Restore the network configuration contained in the selected backup file.
11. Restart all services.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
266
Administering the Controller
Backing Up and Restoring Clusters

When the restore process is complete, the following message appears on the CLI: All
services are up!
Figure 127: The controller performs several steps to restore the backup file

12. Do the following to verify that the restore process was completed successfully:
a) Run show cluster-state to verify that the node and the cluster are back in service.
b) Run show interface to verify that all of the network configuration settings have been restored.
Figure 128: Verify that the node and cluster are back in service and that the network
configuration has been restored successfully

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
267
Administering the Controller
Backing Up and Restoring Clusters

You have completed importing and applying the network configuration backup from the FTP
server to the controller.

Backing up Cluster Configuration


Ruckus Wireless® strongly recommends that you back up the controller database periodically.
This will help ensure that you can restore the system configuration settings easily if the database
becomes corrupted for any reason.
The following are backed up in the system configuration backup file:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
268
Administering the Controller
Backing Up and Restoring Clusters

Table 42: Contents of a cluster configuration backup file

Configuration Data Administration Data Report Data Identity Data


AP zones Cluster backup Saved reports Created profiles
Third-party AP zones System configuration Historical client Generated guest
backups statistics passes
Services and profiles Upgrade settings and Network tunnel
history statistics
Packages Uploaded system
diagnostic scripts
System settings Installed licenses
Management domains
Administrator accounts
MVNO accounts

A system configuration backup does not include control plane settings, data plane settings, and
user-defined interface settings.
1. Go to Administration > Backup and Restore.
2. Select the Configuration tab.
3. In System Configuration Backup History, click Backup.
The following confirmation message appears: Are you sure you want to back up
the controller’s configuration?
4. Click Yes.
A progress bar appears as the controller creates a backup of the its database. When the
backup process is complete, the progress bar disappears, and the backup file appears under
the System Configuration Backup History section.

Scheduling a Configuration Backup


You also have the option to configure the controller to backup its configuration automatically
based on a schedule you specify.
1. Go to Administration > Backup and Restore.
2. Select the Configuration tab.
3. In Schedule Backup, you can configure the controller to backup its configuration automatically
based on a schedule you specify.
1. In Schedule Backup, click Enable.
2. In Interval, set the schedule when the controller will automatically create a backup of its
configuration. Options include: Daily, Weekly and Monthly.
3. Hour: Select the hour of the day when the controller must generate the backup.
4. Minute: Select the minute of the hour.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
269
Administering the Controller
Backing Up and Restoring Clusters

5. Click OK.

You have completed configuring the controller to create a backup automatically.

Exporting the Configuration Backup to an FTP Server Automatically


In addition to backing up the configuration file manually, you can configure the controller to
export the configuration file to an FTP server automatically whenever you click Backup.
Follow these steps to back up the configuration file to an FTP server automatically.
1. Go to Administration > Backup and Restore.
2. Select the Configuration tab.
3. In Auto Export Backup, you can configure the controller to export the configuration file to an
FTP server automatically whenever you back up the configuration file.
1. In Auto Export Backup, click Enable.
2. FTP Server: Select the FTP server to which you want to export the backup file.
3. Click Test. The controller attempts to establish connection to the FTP server using the
user name and password that you supplied. If the connection attempt is successful, a
success message is displayed. If the connection attempt is unsuccessful, verify that the
FTP server details (including the user name and password) are correct, and then click Test
again.
4. Click OK.
5.

4. After you verify the controller is able to connect to the FTP server successfully, click OK to
save the FTP server settings.
You have completed configuring the controller to export the configuration backup file to an FTP
server.

Restoring a System Configuration Backup


In the event of a failure or emergency where you may need to go back to the previous version
of a cluster, you will have to restore your system configuration backup and restart the cluster.
1. Go to Administration > Backup and Restore.
2. Select the Configuration tab.
3. Once you locate the backup file, click Restore that is in the same row as the backup file. A
confirmation message appears.

NOTE: Take note of the backup version that you are using. At the end of this procedure, you
will use the backup version to verify that the restore process was completed successfully.

4. Click Yes. The following message appears: System is restoring. Please wait...
When the restore process is complete, the controller logs you off the web interface
automatically.
5. Log on to the controller web interface.
Check the web interface pages and verify that the setting and data contained in the backup
file have been restored successfully to the controller.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
270
Administering the Controller
Upgrading the Controller

You have completed restoring a system configuration backup file.

Downloading a Copy of the Configuration Backup


After you create a configuration backup, you have the option to download the backup file from
the System Configuration Backups History section.
1. Go to Administration > Backup and Restore.
2. Select the Configuration tab.
3. Locate the entry for the backup file that you want to download. If multiple backup files appear
on the list, use the date when you created the backup to find the backup entry that you want.
4. Click Download.
Your web browser downloads the backup file to its default download folder. NOTE: When
your web browser completes downloading the backup file, you may see a notification at the
bottom of the page.
5. Check the default download folder for your web browser and look for a file that resembles
the following naming convention: {Cluster
Name}_BackupConf_{MMdd}_db_{MM}_{dd}_{HH}_{mm}.bak
For example, if the controller cluster is named Cluster A and you created the configuration
backup on September 7 at 11:08 AM, the backup file name will be:
ClusterA_BackupConf_0907_db_09_07_11_08.bak

You have completed downloading a copy of the configuration backup.

Upgrading the Controller


Ruckus Wireless may periodically release controller software updates that contain new features,
enhancements, and fixes for known issues. These software updates may be made available on
the Ruckus Wireless support website or released through authorized channels.

CAUTION: Although the software upgrade process has been designed to preserve all controller
settings, Ruckus Wireless strongly recommends that you back up the controller cluster before
performing an upgrade. Having a cluster backup will ensure that you can easily restore the
controller system if the upgrade process fails for any reason.

CAUTION: Ruckus Wireless strongly recommends that you ensure that all interface cables are
intact during the upgrade procedure.

CAUTION: Ruckus Wireless strongly recommends that you ensure that the power supply is not
disrupted during the upgrade procedure.

If you are managing a SCG200 controller, you can also perform system configuration backup,
restore, and upgrade from the controller command line interface.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
271
Administering the Controller
Upgrading the Controller

Performing the Upgrade


Ruckus Wireless® strongly recommends backing up the controller cluster before performing the
upgrade. If the upgrade process fails for any reason, you can use the latest backup file to restore
the controller cluster.
Before starting this procedure, you should have already obtained a valid controller software
upgrade file from Ruckus Wireless® Support or an authorized reseller.
Always back up the controller before attempting a software upgrade. If you are managing a
multi-node cluster, back up the entire cluster, and then verify that the backup process completes
successfully.
If you have an FTP server, back up the entire cluster and upload the backup files from all the
nodes in a cluster to a remote FTP server.
1. Copy the software upgrade file that you received from Ruckus Wireless® to the computer
where you are accessing the controller web interface or to any location on the network that
is accessible from the web interface.
2. Go to Administration > Upgrade.
3. Select the Upgrade tab.
In Current System Information, the controller version information displayed.

NOTE: The Upgrade History tab displays information about previous cluster upgrades.

4. In Upload, select the Run Pre-Upgrade Validations check box to verify if the data migration
was successful. This option allows you to verify data migration errors before performing the
upgrade.
5. Click Browse to select the patch file.
6. Click Upload to upload the controller configuration to the one in the patch file.
The controller uploads the file to its database, and then performs file verification. After the file
is verified, the Patch for Pending Upgrade section is populated with information about the
upgrade file. If data migration was unsuccessful, the following error is displayed: Exception
occurred during the validation of data migration. Please apply the
system configuration backup and contact system administrator.
7. You can now:
• Click Upgrade to start the upgrade process without backing up the current controller
cluster or its system configuration, or
• Click Backup & Upgrade to back up the controller cluster and system configuration before
performing the upgrade.

When the upgrade (or backup-and-upgrade) process is complete, the controller logs you off the
web interface automatically. When the controller log on page appears again, you have completed
upgrading the controller.
In the Current System Information section, check the value for controller version. If the firmware
version is newer than the firmware version that controller was using before you started the
upgrade process, then the upgrade process was completed successfully.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
272
Administering the Controller
Upgrading the Controller

NOTE: APs periodically send scheduled configuration requests to the controller, including the
firmware version. Therefore, when an AP joins a zone for the first time, the firmware version is
verified by the controller. If the firmware version is different from that which is configured for the
zone, the controller responds with a request to upgrade it, after which the AP initiates a request
to upgrade the firmware using HTTP.

Verifying the Upgrade


You can verify that the controller upgrade was completed successfully.
1. Go to Administration > Upgrade.
2. In the Current System Information section, check the value for Controller Version. If the
firmware version is newer than the firmware version that controller was using before you
started the upgrade process, then the upgrade process was completed successfully.

NOTE: APs periodically send scheduled configuration requests to the controller, including
the firmware version. Therefore, when an AP joins a zone for the first time, the firmware version
is verified by the controller. If the firmware version is different from that which is configured
for the zone, the controller responds with a request to upgrade it, after which the AP initiates
a request to upgrade the firmware using HTTP.

Rolling Back to a Previous Software Version


There are scenarios in which you may want to roll back the controller software to a previous
version.
Here are two:
• You encounter issues during the software upgrade process and the controller cannot be
upgraded successfully. In this scenario, you can only perform the software rollback from the
CLI using the restore local command. If you have a two-node controller cluster, run the restore
local command on each of the nodes to restore them to the previous software before
attempting to upgrade them again.
• You prefer a previous software version to the newer version to which you have upgraded
successfully. For example, you feel that the controller does not operate normally after you
upgraded to the newer version and you want to restore the previous software version, which
was more stable. In this scenario, you can perform the software rollback either from the web
interface or the CLI. If you have a two-node controller cluster, you must have cluster backup
on both of the nodes.
To ensure that you will be able to roll back to a previous version, Ruckus Wireless® strongly
recommends the following before attempting to upgrade the controller software:
• Always back up the controller before attempting a software upgrade. If you are managing a
multi-node cluster, back up the entire cluster, and then verify that the backup process
completes successfully. See Creating a Cluster Backup on page 260 for the local backup
instructions. If you have a local backup and you want to roll back the controller to a previous
software version, follow the same procedure described in Restoring Cluster Backup on page
261.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
273
Administering the Controller
Upgrading the Controller

• If you have an FTP server, back up the entire cluster and upload the backup files from all the
nodes in a cluster to a remote FTP server. See Backing Up to an FTP Server on page 345
for remote backup instructions and Restoring from an FTP Server on page 347 for remote
restore instructions.

Uploading an AP Patch File


New AP models and firmware updates are supported without the need to upgrade the controller
image by using the AP patch files supplied by Ruckus Wireless.
1. Go to Administration > Upgrade.
2. Select the AP Patch tab.
3. In Patch File Upload, click Browse to select the patch file (with extension .patch).
4. Click Open.
5. Click Upload. After the patch file is updated, the section is populated with the Start time, AP
firmware version number and AP model number.
6. Click Apply Patch.
After the patch file is updated, the AP patch information is populated with the following
information:
• Name of the patch file
• Size of the patch file
• AP firmware version number
• AP model number
You will be prompted to log out after this step.
7. Click Browse to select the patch file.
8. Click Upload to upload the controller configuration tot he one int h patch file.
The controller uploads the file to its database, and then performs file verification. After the file
is verified, the Patch for Pending Upgrade section is populated with information about the
upgrade file. If data migration was unsuccessful, the following error is displayed: Exception
occurred during the validation of data migration. Please apply the
system configuration backup and contact system administrator.
9. You can now:
• Click Upgrade to start the upgrade process without backing up the current controller
cluster or its system configuration, or
• Click Backup & Upgrade to back up the controller cluster and system configuration before
performing the upgrade.

You have successfully updated the AP models and AP firmware with the patch file, without
having to upgrade the controller software.

Upgrading the Data Plane


You can view and upgrade the virtual data plane version using patch files. This feature is only
applicable for vSZ-H and vSZ-E.
1. Go to Administration > Upgrade.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
274
Administering the Controller
Upgrading the Controller

2. Select the DP Patch tab.


The DP Patch page appears.
Figure 129: Upgrading the Virtual Data Plane

3. In Patch File Upload, click Browse to select the patch file (.ximg file).
4. Click Upload.
The controller uploads the file to its database, and then performs file verification. After the file
is verified, the Patch for Pending Upgrade section is populated with information about the
upgrade file.
The following upgrade details are displayed:
• Patch File Name: Displays the name of the patch file.
• Patch File Size: Displays the size of the patch file.
• Patch Version: Displays the version of the patch file.

5. In Data Planes, choose a patch file version from the Select upgrade version.
6. Click Apply to apply the patch file version to the virtual data plane.
The following information about the virtual data plane is displayed after the patch file upgrade
is completed.
• Name: Displays the name of the virtual data plane.
• DP MAC Address: Displays the MAC IP address of the data plane.
• Firmware: Displays the version of the data plan that has been upgraded.
• Registration State: This field displays whether all licenses pertaining to the data plane are
approved.
• Upgrade Status: Displays the completion stats of the patch file upgrade for the virtual data
plane.

You have successfully upgarded the virtual data plane.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
275
Administering the Controller
Managing Licenses

Managing Licenses
Depending on the number of Ruckus Wireless APs that you need to manage with the controller,
you may need to upgrade the controller license as your network expands.
The maximum number of access points that the controller can manage is controlled by the
license file that came with the controller. If the number of access points on the network exceeds
the limit in the license file, you will need to obtain an additional license file and upload it to the
controller.

NOTE: For information on obtaining additional license files, contact Ruckus Wireless Support
or an authorized Ruckus Wireless reseller.

The maximum number of access points that a license supports depends on its stock-keeping
unit (SKU).

Viewing Installed Licenses


You can synchronizing the license data, import a license file into the controller if it is unable to
connect to the Ruckus Wireless SmartLicense system and release licenses bound to an offline
controller by downloading a copy of the licenses.
1. Go to Administration > Licenses.
2. Select the Installed Licenses tab.
You can view the following information about the licenses you have uploaded to the controller:
• Name: The name of the node to which the license was uploaded
• Node: Displays the name of the node
• Start Date: The date when the license file was activated.
• End Date: For time-bound licenses, this column shows the date when the license file
expires.
• Capacity: The number of units or license seats that the license file provides.
• Description: The type of license.

Importing Installed Licenses


If the controller is disconnected from the Internet or is otherwise unable to communicate with
the Ruckus Wireless SmartLicense system (due to firewall policies, etc.), you can manually import
a license entitlement file into the controller.

NOTE: The option to import a license file manually into the controller is only available if the
controller is using the cloud license server.

1. Obtain the license file. You can do this by logging on to your Ruckus Wireless Support account,
going to the license management page, and then downloading the license file (the license file
is in .bin format).
2. Log on to the controller web interface, and then go to Administration > Licenses.
3. Select the Installed Licenses tab.
4. Select the node for which you are uploading the license file and click Upload.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
276
Administering the Controller
Managing Licenses

The Upload License page appears where you must provide the following information:
• Select Controller: Select the node for which you are uploading the license file.
• Select License File: Click Browse, locate the license file (.bin file) that you downloaded
from your Ruckus Wireless Support account, and then select it.

The page refreshes, and the information displayed changes to reflect the updated information
imported from the SmartLicense platform.

Synchronizing Controller with the License Server


By default, the controller automatically synchronizes its license data with the selected license
server every 24 hours. If you made changes to the controller licenses (for example, you purchased
additional licenses) and you want the controller to download the updated license data immediately,
you can trigger a manual synchronization.
1. Log on to the controller web interface, and then go to Administration > Licenses.
2. Select the Installed Licenses tab.
3. Click Sync Now.
When the sync process is complete, the message Sync license with the license
server successful appears. If the previously saved license data are different the latest
license data on the server, the information in the Installed Licenses section refreshes to reflect
the latest data.

You have completed manually synchronizing the controller with the license server.

Downloading License Files


If you need to release licenses bound to an offline controller and allow those licenses to be used
elsewhere (on a different controller), you can download a copy of the controller licenses. The
option to download a copy of the controller licenses is only available if the controller is using the
Ruckus Wireless cloud license server.
1. Log on to the controller web interface, and then go to Administration > Licenses.
2. Select the Installed Licenses tab.
3. Click Download.
The Download License page appears. In Select Controller, select the controller node for
which you want to download the license files.

NOTE: You can upload and download license files only if the controller is using the Ruckus
Wireless cloud license server.

4. Click Download. Your web browser downloads the license files from the controller.
5. When the download is complete, go to the default download folder that you have configured
for your web browser, and then verify that the binary copy of the license files (with .bin
extension) exists.
You have completed downloading copies of the controller licenses.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
277
Administering the Controller
Managing Licenses

Configuring the License Server


Ruckus Wireless provides two options for managing the licenses that you have purchased for
the controller - Cloud License Server and Local License Server (LLS).
Cloud License Server also known as the SmartLicense server, this a cloud-based server that
stores all of the licenses and support entitlements that you have purchased for the controller.
For information on how to set up and activate your SmartLicense account, see the SmartLicense
User Guide.
1. Go to Administration > Licenses.
2. Select the License Server tab.
The Server details and Synchronization history are displayed.
3. Click Configure.
The License Server Configuration page appears.
• Cloud License Server: Select this option to use the Ruckus Wireless SmartLicense server.
• Local License Server: Select this option to use an LLS that you have set up on the network,
and then configure
• Domain or IP: Type the FQDN or IP address of the LLS.
• Port: Type the port number. Port range is from 0 to 65535 (default is 3333).

4. Click OK.
5. Click Sync Now and the controller saves the selected license server configuration, deletes
all of its saved license data, and then automatically synchronizing the license information with
the selected license server.
You have completed configuring the license server that the controller will use.

Configuring License Bandwidth


You can assign a license bandwidth for a virtual data plane provided it is already approved. Each
virtual data plane can be configured with only one bandwidth license.
1. Go to Administration > Licenses.
2. Select the License Bandwidth Configuration tab.
The License Bandwidth Configuration page appears.
Figure 130: License Bandwidth Configuration

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
278
Administering the Controller
ZoneDirector to SmartZone Migration

3. In vSZ-D, type the name of the virtual data plane.


4. From the Bandwidth drop-down menu, select the license bandwidth you want to assign to
the virtual data plane. Default is 1 Gbps.
5. Click Add. The vSZ-D with the assigned license bandwidth is displayed.
6. Click OK.
The message Submitting form appears, and the vSZ-D is assigned a bandwidth.

You have successfully assigned a license bandwidth to the virtual data plane.

ZoneDirector to SmartZone Migration


SmartZone controllers are better equipped to handle large WiFi deployments such as within
campuses and when customers are vastly distributed; therefore, Ruckus Wireless recommends
that you migrate existing ZoneDirector deployments to SamrtZone controller deployments. You
can migrate ZoneDirector AP configuration information to SmartZone controllers from the controller
itself, using a migration tool.
The AP models should be supported by the controller.

NOTE: Only ZD versions 9.13, 9.13.1, 9.13.2 and 9.13.3 are supported.

1. Go to Administration > ZD Migration.


The ZoneDirector Migration page appears.
2. Configure the following:
1. ZoneDirector IP Address: Type the IP address of the ZD that you want to migrate.
2. Admin Credentials: Enter the username and password details to access/login to ZD.
3. Click Connect. Lists of APs connected to the ZD deployment are displayed.
4. Click Select AP to choose the AP information that you want to migrate from ZD.
5. Click Migrate to migrate the AP. The controller imports the ZD configuration and applies
it to the selected AP.
The ZoneDirector Migration Status section displays the status of the migration. When
completed successfully, a success message is displayed. If migration fails, a failure message
is displayed and you can attempt the migration process again.

Monitoring Administrator Activities


The controller keeps a record of all actions and configuration changes that administrators perform
on the server. This feature enables you and other administrators in the organization to determine
what changes were made to the controller and by whom.
1. Go to Administration > Admin Activities.
2. Select the Admin Activities tab. the Admin Activities page displays the administrator actions.
The following information is displayed:

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
279
Administering the Controller
Monitoring Administrator Activities

• Date and Time: Date and time when the alarm was triggered
• Administrator: Name of the administrator who performed the action
• Source IP: Displays the IP address of the device form which the administrator manages
the controller.
• Browser IP: IP address of the browser that the administrator used to log on to the controller.
• Action: Action performed by the administrator.
• Resource: Target of the action performed by the administrator. For example, if the action
is Create and the object is Hotspot Service, this means that the administrator created a
new hotspot service.
• Description: Displays additional details about the action. For example, if the administrator
created a new hotspot service, this column may show the following: Hotspot
[company_hotspot] .

Click to export the administrator activity list to a CSV file. You can view the default
download folder of your web browser to see the CSV file named clients.csv. Use a
spreadsheet application (for example, Microsoft® Excel®) to view the contents of the CSV
file.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
280
281

Managing Events and Alarms 11


In this chapter:

• Viewing Events
• Sending SNMP Traps and Email Notifications for Events
• Configuring Event Threshold
• Configuring Alarms

Viewing Events
An event is an occurrence or the detection of certain conditions in and around the network. An
AP being rebooted, an AP changing its IP address, and a user updating an AP's configuration
are all examples of events.
Go to Events and Alarms > Events.
The Events page appears displaying the following information:

You can also click the icon to apply filters, to display events based on time and severity.
• Date and Time: Displays the date and time when the event occurred
• Code: Displays the event code (see the Alarm and Event Reference Guide for your controller
platform more information).
• Type: Displays the type of event that occurred (for example, AP configuration updated).
• Severity: Displays the severity level assigned to the events such as Critical, Debug,
Informational, Warning, Major etc.
• Activity: Displays additional details about the event, including (if available) the specific
access point, control plane, or data plane that triggered the event.

NOTE: Click to export the event details to a CSV file. Check the default download folder
of your web browser and look for a file named events.csv and view it using a spreadsheet
application (for example, Microsoft Excel®).

Sending SNMP Traps and Email Notifications for Events


By default, the controller saves a record of all events that occur to its database. You can configure
the controller to also send SNMP traps and email notifications for specific events whenever they
occur.
Verify that global SNMP traps are enabled to ensure that the controller can send SNMP traps
for alarms.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
281
Managing Events and Alarms
Configuring Event Threshold

You can also manually trigger SNMP traps without generating events using CLI. You can use
the #trigger-trap <event code> command to trigger traps for respective events with
their default attributes.
You can acquire the status of a specific client MAC address by using the query
RUCKUS-CTRL-MIB. For more information, see the SmartZone SNMP MIB Reference Guide.
1. Go to Events and Alarms > Events.
2. Click the Event Management tab.
The Event Management page appears displaying the following information:
• Email Notification: Select the Enable check box, and then type an email address or email
addresses in the Mail To box. If you want to send notifications to multiple recipients, use
a comma to separate the email addresses. Then, click OK.
• Events: View the table and select the events for which you want to send traps or email
notifications (or both). Select the Enable or Disable options from the drop-down menu,
and configure the following:
• Enable SNMP Notification: Click this link to enable SNMP trap notifications for all selected
events.
• Enable Email: Click this link to enable email notifications for all selected events.
• Enable DB Persistence: Click this link to enable saving of all selected events to the
controller database. If an event is already currently enabled, it will stay enabled after
you click this link.

Configuring Event Threshold


An event threshold defines a set of conditions related to the controller hardware that need to be
met before the controller triggers an event. You can accept the default threshold values or you
can update the threshold values to make them more suitable to your deployment or controller
environment.
1. Go to Events and Alarms > Events.
2. Click the Event Threshold tab.
This page displays the list of events with configurable thresholds including the event code,
severity level, default value and accepted range, and unit of measurement for each event.
3. Identify the event threshold that you want to configure.
4. Click the event name under the Name column.
The threshold value for the event becomes editable. Next to the threshold value, the acceptable
range is displayed.
5. Edit the threshold value.
6. Click OK.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
282
Managing Events and Alarms
Configuring Alarms

Configuring Alarms
Alarms are a type of event that typically warrants your attention. Alarms are generated by managed
access points and the controller system (control plane and data plane).
Go to Events and Alarms > Alarms.
The Alarms page appears displaying the following information:
• Date and Time: Displays the date and time when the alarm was triggered.
• Code: Displays the alarm code (see the Alarm and Reference Guide for your controller
platform for more information).
• Alarm Type: Displays the type of alarm event that occurred (for example, AP reset to factory
settings).
• Severity: Displays the severity level assigned to the events such as Critical, Major, Minor
and Warning.
• Status: Indicates whether the alarm has already been cleared or still outstanding.
• Activity: Displays additional details about the alarm, including (if available) the specific
access point, control plane, or data plane that triggered the alarm.
• Acknowledged On: Displays the date and time when the administrator acknowledge the
alarm.
• Cleared By: Displays information about who cleared the alarm.
• Cleared On: Displays the date and time when the alarm was cleared.
• Comments: Displays administrator notes recorded during alarm management.

NOTE: Click to export the alarms details to a CSV file. Check the default download folder
of your web browser and look for a file named alarms.csv and view it using a spreadsheet
application (for example, Microsoft Excel®).

Clearing Alarms
Clearing an alarm removes the alarm from the list but keeps it on the controller's database.
To clear an alarm:
1. Select the alarm form the list and click Clear Alarm. The Clear Alarm page appears.
2. Type your comments and select Apply.

Acknowledging Alarms
Acknowledging an alarm lets other administrators know that you have examined the alarm. After
you acknowledge an alarm, it will remain on the list of alarms and will show the date and time
that you acknowledged it.
To acknowledge an alarm:
1. Select the alarm from the list and click Acknowledge Alarm.
This message appears:
Are you sure you want to acknowledge the selected alarms?

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
283
Managing Events and Alarms
Configuring Alarms

.
2. Select Yes.

Applying Filters
You can view a list of alarms by date, time, severity and status.
1.
Click the icon.
The Apply Filters page appears. Configure the following:
1. Severity: Select the severity level by which you want to filter the list of alarms.
2. Status: Select the status by which you want to filter the list of alarms.
3. Date and Time: Select the alarms by their start and end dates.

2. Click OK.
All the alarms that meet the filter criteria are displayed on the Alarms page and the display
changes to Filter On.

You can export the alarms into a CSV file by clicking the icon.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
284
285

Diagnostics 12
In this chapter:

• Applying Scripts
• Applying AP CLI Scripts
• Viewing and Downloading Logs
• Viewing RADIUS Proxy Settings

Applying Scripts
New AP models and firmware updates are supported without the need to upgrade the controller
image by using AP patch files and diagnostic scripts.
1. Go to Administration > Diagnostics > Scripts.
2. Select the Patch/Diagnostic Scripts tab.
3. Select the Upload to current node check-box.
4. Click Browse to select a script that you want to upload to the controller.
5. Click Upload.
The script is listed in the System Uploaded Scripts section.
If you have uploaded a patch script, it is displayed in the System Uploaded Patch Scripts
section with the following information:
• Name of the patch file
• Patch file description
• Supported AP firmware version
• AP model number
Click Delete to delete scripts.

6. Click Apply Patch to apply the patch file to the AP model or firmware as appropriate.
You have successfully applied scripts to the controller AP.

Applying AP CLI Scripts


New AP models and firmware updates are supported without the need to upgrade the controller
image by using AP CLI scripts.
1. Go to Administration > Diagnostics > Scripts.
2. Select the AP CLI Scripts tab.
3. From Select AP Zone, choose the AP zone for which you want to apply the script.
4. Click Browse to select an AP CLI script that you want to upload.
5. Click Upload.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
285
Diagnostics
Viewing and Downloading Logs

The script is listed in the Script Execution Summary section.


Click Delete to delete scripts.

6. Click Execute to apply the AP CLI script file to the AP zone.


You have successfully applied AP CLI scripts to the controller AP.

Viewing and Downloading Logs


The controller generates logs for all the applications that are running on the server.
1. Go to Administration > Diagnostics > Application Logs.
The Application Logs page appears.
2. From Select the Control Plan, select the control plane for which you want to download logs.
3. Select the Upload to current node check-box.
4. You can now opt to select:
Option Description
Download Logs To download all logs for the selected application.
Download All To download all available logs from the controller.
Logs
Go to your web browsers default download location and verify that the
TGZ file was downloaded successfully. You must use your preferred
compression/decompression program to extract the log files from the
TGZ file. When the log files are extracted (for example, adminweb.log,
cassandra.log, communicator.log, etc.), use a text editor to
open and view the log contents.

Download To download snapshot logs that contain system and configuration


Snapshot Logs information, such as the AP list, configurations settings, event list,
communicator logs, SSH tunnel lists, etc.
If you triggered the controller to generate a snapshot from the CLI, you
have the option to download snapshot logs from the web interface.
Go to your browser's default download folder, and then verify that the
snapshot log file or files have been downloaded successfully. Extract
the contents of the tar file.

You have successfully completed downloading log files/snapshot logs from the controller.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
286
Diagnostics
Viewing and Downloading Logs

Available System Logs for SZ100


The controller generates logs for all the applications that are running on the server.

Table 43: Controller applications and log types

Application Description
API Stands for application program interface (API), this provides an interface
for customers to configure and monitor the system
AUT Manages the sessions in the controller's TTG module
CaptivePortal Performs portal redirect for clients and manages the walled garden and
blacklist
Cassandra The controller's database server that stores most of the run-time
information and statistical data
CNR An application that obtains TTG configuration updates and applies the
settings to related modules
Configurer Performs configuration synchronization and cluster operations (for
example, join, remove, upgrade, backup, and restore)
Diagnostics An interface that customers can use to upload Ruckus Wireless scripts
for performing troubleshooting or applying software patches
ElasticSearch Scalable real-time search engine used in the controller
Memcached The controller's memory cache that stores client authentication
information for fast authentication or roaming
MemProxy Replicates MemCached entries to other cluster nodes
Mosquitto A lightweight method used to carry out messaging between LBS and
APs
NC The Node Controller, which monitors all of the controller's TTG
processes
Northbound Performs UE authentication and handles approval or denial of UEs to
AP
RadiusProxy Sets the RADIUS dispatch rules and synchronizes configuration to each
cluster node
SMF An application that monitors the health of TTG processes
SNMP Provides a framework for the monitoring devices on a network. The
SNMP manager is the system used to control and monitor the activities
of network hosts using SNMP.
SubscriberManagement A process for maintaining local user credentials for WISPr authentication
SubscriberPortal Internal portal page for WISPr (hotspot)
System Collects and sends log information from all processes

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
287
Diagnostics
Viewing RADIUS Proxy Settings

Application Description
Web Runs the controller’s management web server

Viewing RADIUS Proxy Settings


You must be aware of the RADIUS proxy settings on the controller to monitor the health of the
controller.
Go to Administration > Diagnostics > RADIUS.
The Proxy page appears displaying the RADIUS settings.
Figure 131: Diagnostics - RADIUS Proxy

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
288
289

Appendix

A
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D
Communication
The table below lists the ports that must be opened in the network firewall to ensure that the
SCG/vSZ-D/SZ/vSZ (controller), managed APs, and RADIUS servers can communicate with each
other successfully.

Table 44: Ports to open for AP-SCG/SZ/vSZ/vSZ-D communication

Port Layer 4 From To (Listener) Configurable Purpose


Number Protocol (Sender) from Web
Interface?
21 TCP AP vSZ control Yes FTP upload of reports,
plane statistics, and configuration
backups
22 TCP • AP vSZ control No SSH tunnel
• vSZ-D plane

49 TCP TACACS+ vSZ control Yes TACACS+ based


server plane authentication of controller
administrators
Port 91 (AP TCP AP vSZ control No AP firmware upgrade
firmware plane
version 2.0 NOTE: Starting in release
to 3.1.x) and 3.2, the controller uses an
11443 (AP HTTPS connection and an
firmware encrypted path for the
version 3.2 firmware download. The
and later) port used for AP firmware
downloads has also been
changed from port 91 to
11443 to distinguish
between the two methods.
To ensure that all APs can

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
289
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D Communication

Port Layer 4 From To (Listener) Configurable Purpose


Number Protocol (Sender) from Web
Interface?

be upgraded successfully
to the new firmware, open
both ports 11443 and 91 in
the network firewall.

123 UDP AP vSZ control No NTP sync up


plane
Not required in 2.1.2, 2.1.3,
2.5.1, 2.6, 3.0
Required in1.x, 2.1, 2.1.1,
2.5

443 TCP • AP vSZ control No Access to the SCG/vSZ/SZ


• vSZ-D plane control plane over secure
HTTPS
6868 TCP vSZ-D vSZ No Internal communication port
8443 TCP Any vSZ No Access to the SCG/vSZ/SZ
management web interface via HTTPS
plane
23232 TCP AP SCG (data No GRE tunnel
plane)
NOTE: Only applicable to
SCG.

23233 UDP and AP Data plane Yes GRE tunnel (required only
TCP when tunnel mode is GRE
over UDP)

NOTE: On the vSZ-D, this


port is used for both data
and control in both UDP
and TCP.

12222/12223 UDP AP vSZ control No LWAPP discovery


plane
NOTE:

If your AP is within the same


subnet as the controller,
disable nat-ip-translation to
establish a connection

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
290
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D Communication

Port Layer 4 From To (Listener) Configurable Purpose


Number Protocol (Sender) from Web
Interface?

between the AP and the


controller so that AP
firmware upgrade
progresses.
If your AP is on the side of
the NAT server and if the
NAT server does not
support PASV-Mode FTP,
enable nat-ip-translation. If
the NAT server supports
PASV-Mode FTP, then
disable nat-ip-translation for
AP firmware upgrade to
progress

1812/1813 UDP AP Radius Yes AAA authentication and


servers (s) accounting
8022 No (SSH) Any Management Yes CLI (Command Line
interface Interface) access to the vSZ
8090 TCP Any vSZ control No Allows unauthorized UEs to
plane browse to an HTTP website
8099 TCP Any vSZ control No Allows unauthorized UEs to
plane browse to an HTTPS
website
8100 TCP Any vSZ control No Allows unauthorized UEs to
plane browse using a proxy UE
8111 TCP Any vSZ control No Allows authorized UEs to
plane browse using a proxy UE
9080 HTTP Any vSZ control No Northbound Portal Interface
plane for hotspots
9443 HTTPS Any vSZ control No Northbound Portal Interface
plane for hotspots
9998 TCP Any vSZ control No Hotspot WISPr subscriber
plane portal login/logout over
HTTPSl

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
291
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D Communication

Port Layer 4 From To (Listener) Configurable Purpose


Number Protocol (Sender) from Web
Interface?
3333 TCP Controller License No Local license server
server
443 HTTPS Controller License No Cloud license server
server
9996 TCP Client Controller No HotSpot 2.0 portal for
interface onboarding and remediation
9999 TCP Client Controller No HotSpot 2.0 trust CA
interface verification
8200 TCP Client Controller No HotSpot 2.0 Oauth in HTTP
interface
8222 TCP Client Controller No HotSpot 2.0 Oauth in
interface HTTPS

NOTE: The destination interfaces are meant for three interface deployments. In a single interface
deployment, all the destination ports must be forwarded to the combined management/control interface
IP address.

NOTE: Communication between APs is not possible across NAT servers.

SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
292
Index
802.11 118 application policies (continued)
802.11w MFP 118 creating 187, 191
deleting 187, 191
editing 187, 191
A application policy 175
aaa server 196, 201–202 creating 175
testing 196, 201 applications 155
AAA server authentication 194 control 155
Access Point Configuration 94 monitoring 155
administration 256–259 recognition 155
access control 259 Applying a WLAN Template 65
creating 259 Applying WLAN Template 124
deleting 259 Applying Zone Template 88
editing 259 Applying Zone Templates 64
access control list 259 Approving APs 36
accounts 257 APs 67
creating 257 Assigning Certificates to Services 56
deleting 257 authentication compatibility 202
editing 257
radius server 258 B
cloning 258
creating 258 Background Scanning 74
deleting 258 backing up 262
editing 258 FTP 262
user groups 256 backing up configuration 262
creating 256 ftp 262
deleting 256 backup 260
editing 256 Band Balancing 118
administrator activity 279 blocking clients 182
Alarm 50 cloning 182
Acknowledging 50 creating 182
Clearing 50 deleting 182
alarms 20, 283 editing 182
acknowledging 283 bonjour application 214
clearing 283 bonjour fencing 216
filters 283 bonjour fencing policy 216
AP Client Statistics 246 cloning 216
AP Firmware Version 88, 125 creating 216
AP groups 67, 76 deleting 216
cloning 76 editing 216
deleting 76 bonjour gateway policy 214
editing 76 cloning 214
managing 76 creating 214
AP Groups 76 deleting 214
AP Health 21 editing 214
AP Registration Rule 37 Bypassing Apple CNA 118
Clone 37
Create 37
Delete 37
C
Edit 37 Certificate Signing Request 56
AP Status 89 Certificates 55
AP Zones 68 Change AP Firmware 123
application control 186 Changing AP Firmware Version 125
application policies 187, 191 Changing the Administrator Password 17
cloning 187, 191 ChannelFly 74
Chassis View 42 Critical AP Tagging 38
Client Admission Control 119
client isolation whitelist 183
cloning 183
D
creating 183 Data Planes 40
deleting 183 dhcp pool 235
editing 183 cloning 235
Client Load Balancing 119 creating 235
Client Number Report 241 deleting 235
Client Number vs Airtime Report 241 editing 235
cluster backup 260 dhcp relay 228
creating 260 dhcp service 234
cluster configuration 268–271 dhcp settings 237
backing up 268 diagnostics 285–286, 288
downloading 271 ap cli scripts 285
ftp 270 diagnostic scripts 285
restoring 270 logs 286
scheduling 269 patch scripts 285
Cluster Node 21 radius proxy 288
Cluster Node Health Metrics 21 diffserv profile 227
Cluster Nodes 42 cloning 227
Cluster Redundancy 42–43 creating 227
Cluster SwitchOver 88, 125 deleting 227
cluster versions 273 editing 227
roll back 273 DNS server profile 185
communication ports 289 cloning 185
Configuring Access Points 89 creating 185
deleting 89 deleting 185
moving 89 editing 185
Configuring Client Admission Control 86 dynamic psk 149, 151–152
Configuring FTP Server Settings 35 generating 151
Creating 35 importing 152
Deleting 35 viewing 151
Editing 35
Configuring SCI Settings 31
Creating 31 E
Deleting 31
Editing Swap Configuration 97
Editing 31
Editing System Time 28
Configuring SMTP Server Settings 35
ethernet port profile 224
Configuring SNMP Agent Settings 31
cloning 224
Creating 31
creating 224
Deleting 31
deleting 224
Editing 31
editing 224
Configuring SNMP v2 Agent 32
Ethernet Port Type 85
Configuring SNMP v3 Agent 32
Event 50
Configuring the Control Plane 44
events 281–282
Deleting 44
email notification 281
Restarting 44
events threshold 282
Shutting Down 44
configuring 282
Configuring the Remote Syslog Server 29
snmp traps 281
Continuously Disconnected APs Report 241
viewing 281
Control Planes 40
Exporting Zone Template 64
copyright information 9
External DPSK 154
Creating a WLAN Group 101
Extracting a WLAN Template 124
Creating CSR 56
Extracting a Zone Template 87
Cloning 56
Deleting 56
Editing 56
Creating New Zone 87
F L
Failed Client Associations Report 241 L2 access control 181
Fast BSS Transition 118 cloning 181
Filtering Events 50 creating 181
firewall ports 289 deleting 181
flexi vpn 228 editing 181
enabling 228 layer 3 roaming 229–230
forwarding 231 enabling 230
multicast packets 231 roaming criteria 229
legal 9
license 276–278
G downloading 277
Generating Reports 244 importing 276
Global Filters 18 license bandwidth 278
guest access portal 158 license server 278
cloning 158 configuring 278
configuring 158 managing 276
creating 158 synchronising 277
deleting 158 viewing 276
LLDP Attributes 84
local user 134
H cloning 134
configuring 134
Health 20
creating 134
Hierarchy Overview 67
deleting 134
Hospot (WISPr) 160
location services 232
hotspot 2.0 identity provider 168
cloning 232
creating 168
creating 232
hotspot 2.0 services 165
deleting 232
hotspot 2.0 venue profile 170
editing 232
cloning 170
logging off 17
configuring 170
creating 170
deleting 170 M
hotspot 2.0 wlan profile 166
cloning 166 Managed Access Points 94
configuring 166 Managing AP Certificates 57
creating 166 Managing APs 98
deleting 166 Managing Report Generation 242
hotspot portal 160 Managing WLANs 123
cloning 160 Maps 20, 23
creating 160 Marking Rouge Access Points 245
deleting 160 migration 279
editing 160 ZoneDirector to SmartZone 279
Mobility Domain ID 120
Model-Based Settings 82
I Monitoring Cluster Settings 50
Monitoring Zones and AP Groups 86
Importing New Certificates 55
Moving Single Access Point 97
Deleting 55
Editing 55
Importing Zone Templates 65 N
Interface and Routing 41
ipsec 221 Network Settings 50
cloning 221 New Client Associations Report 241
creating 221 non-proxy accounting server 211
deleting 221 cloning 211
editing 221 creating 211
deleting 211
editing 211
non-proxy auth server 196 ruckus gre (continued)
testing 196 creating 219
non-proxy authentication server 194 deleting 219
cloning 194 editing 219
creating 194 Ruckus GRE Tunnels 247
deleting 194
editing 194
notifications 20
S
Setting Filters 18
O Setting the Northbound Portal Password 31
Setting Up the Controller 14
OS policy 176 severity 20
cloning 176 Signature Package 192
creating 176 soft gre 220
deleting 176 cloning 220
editing 176 creating 220
OS policy rule 177 deleting 220
creating 177 editing 220
SoftGRE IPsec Tunnels 250
SoftGRE Tunnels 248
P subscription package 136
Port Settings 85 configuring 136
Portal-based WLANs 120 creating 136
ports to open 289 deleting 136
precedence profile 180 Summary 50
cloning 180 Support Log 95
creating 180 Swapping 97
deleting 180 Swapping Access Points 95
editing 180 Swapping APs 95
Prioritizing AP Registration Rules 38 Switchover Cluster 123
proxy accounting server 212 System 67
cloning 212 System Cluster Overview 39
creating 212 system logs 287
deleting 212 available logs 287
editing 212 System Resource Utilization Report 242
proxy authentication server 196
cloning 196 T
creating 196
deleting 196 Tagging Critical APs 38
editing 196 time schedule 184
cloning 184
creating 184
R deleting 184
RADIUS service 198 editing 184
Rate Limiting Ranges 121 Top Access Points 24
Rebalancing APs 48 Top Clients 26
Report 242 Top WLANs 26
Creating 242 trademarks 9
Deleting 242 Traffic & Health 50
Editing 242 Traffic Analysis 24
restore 260 troubleshooting 252, 254
restoring 264 client connections 252
FTP 264 spectrum analysis 254
restoring cluster 261 Trusted CA Certificates 58
roles 133 Deleting 58
applying to users 133 Editing 58
ruckus gre 219 Importing 58
cloning 219 tunnel encryption 231
Tunnel UDP Port 39
TX/RX Bytes Report 242 web auth portal 162
Types of Reports 241 cloning 162
configuring 162
creating 162
U deleting 162
ua blacklist 171 Web Interface Features 15
cloning 171 wechat portal 164
configuring 171 cloning 164
creating 171 configuring 164
deleting 171 creating 164
upgrading 271–274 deleting 164
ap patch file 274 wifi operator profile 167
controller 271 creating 167
pre-upgrade check 272 wired clients 130–131
verifying 273 deauthenticating 131
virtual data plane 274 deauthorizing 131
Upgrading AP Firmware Version 88 viewing information 130
Uploading the Signature Package 192 viewing summary 130
user defined applications 190 wireless client 129
cloning 190 unblocking 129
creating 190 wireless clients 126, 128–129
deleting 190 blocking 129
editing 190 deauthenticating 128
User Role 132–133 deauthorizing 128
802.1x Authentication 133 deleting 129
Active Directory Authentication 132 viewing information 128
user roles 131 viewing summary 126
cloning 131 wlan 202
configuring 131 WLAN 102
creating 131 cloning 102
deleting 131 configuring 102
user traffic profile 173 creating 102
cloning 173 deleting 102
configuring 173 WLAN Groups 100–101
creating 173 WLAN Schedule Profile 123
deleting 173 WLAN Schedule Profiles 122
user traffic rule 174 WLAN Template 123
creating 174 Applying 123
Extracting 123
WLAN Templates 65
V Cloning 65
Creating 65
Validating the Signature Package 193
Deleting 65
Viewing AP Certificates 57
Editing 65
Viewing Modes 89, 100
WLANs 100
Viewing Rogue Access Points 245
Working With Access Points 67
Viewing System Settings 28
Working with CSR 56
vlan pooling 179
VLAN Pooling 76
vlan pooling profile 178 Z
cloning 178
creating 178 Zone Affinity 38
deleting 178 Zone Templates 59
editing 178 Cloning 59
Creating 59
Deleting 59
W Editing 59
Zones 67, 100
Warnings 19
Zones and AP groups 68
Warnings and Notifications 19
cloning 68
Zones and AP groups (continued) Zones and AP groups (continued)
deleting 68 managing 68
editing 68

You might also like