Smartzone 100
Smartzone 100
Smartzone 100
Essentials
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
2
Configuring FTP Server Settings........................................................................35
Configuring the SMS Gateway Server................................................................36
Configuring AP Settings..............................................................................................36
Approving APs..................................................................................................36
Working with AP Registration Rules...................................................................37
Creating vSZ-D Zone Affinity..............................................................................38
Tagging Critical APs..........................................................................................38
Configuring the Tunnel UDP Port.......................................................................39
Setting the Country Code..................................................................................39
Viewing the System Cluster Overview..........................................................................39
Control Planes and Data Planes........................................................................40
Interface and Routing........................................................................................41
Displaying the Chassis View of Cluster Nodes...................................................42
Enabling Cluster Redundancy............................................................................42
Configuring the Control Plane............................................................................44
Monitoring Cluster Settings................................................................................50
Working with Maps......................................................................................................51
Importing a Floorplan Map.................................................................................51
Monitoring APs Using the Map View..................................................................54
Certificates..................................................................................................................55
Importing New Certificates.................................................................................55
Assigning Certificates to Services......................................................................56
Generating Certificate Signing Request (CSR)....................................................56
Managing AP Certificates..................................................................................57
Importing Trusted CA Certificates......................................................................58
Configuring Templates................................................................................................59
Working with Zone Templates...........................................................................59
Working with WLAN Templates.........................................................................65
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
3
Managing Access Points.............................................................................................94
Overview of Access Point Configuration............................................................94
Viewing Managed Access Points.......................................................................94
Downloading the Support Log from an Access Point.........................................95
Provisioning and Swapping Access Points........................................................95
Editing Swap Configuration...............................................................................97
Moving a Single Access Point to a Different AP Zone.........................................97
Monitoring Access Points..................................................................................98
5 Managing Clients
Working with Wireless Clients....................................................................................126
Viewing a Summary of Wireless Clients............................................................126
Viewing Information about a Wireless Client.....................................................128
Deauthorizing a Wireless Client........................................................................128
Blocking a Wireless Client................................................................................129
Unblocking a Wireless Client............................................................................129
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
4
Disconnecting a Wireless Client.......................................................................129
Working with Wired Clients........................................................................................130
Viewing a Summary of Wired Clients...............................................................130
Viewing Information about a Wired Client.........................................................130
Deauthorizing a Wired Client............................................................................131
Working with Users and Roles...................................................................................131
Creating a User Role.......................................................................................131
Creating a User Role with Active Directory Authentication................................132
Creating a User Role with 802.1x Authentication.............................................133
Applying Role Policies to Users........................................................................133
Creating a Local User......................................................................................134
Creating a Subscription Package.....................................................................136
Working with Guest Passes.......................................................................................137
Generating Guest Passes................................................................................137
Creating a Guest Pass Template.....................................................................141
Creating a Guest Instruction SMS Template....................................................142
Exporting the Guest Pass to CSV....................................................................144
Generating Guest Passes from an Imported CSV............................................145
Printing the Guest Pass...................................................................................147
Sending the Guest Pass via Email....................................................................148
Sending the Guest Pass via SMS....................................................................149
Working with Dynamic PSKs.....................................................................................149
Viewing Dynamic PSKs....................................................................................151
Generating Dynamic PSKs..............................................................................151
Importing Dynamic PSKs.................................................................................152
Creating an External DPSK Over RADIUS WLAN.............................................154
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
5
Configuring Access Control.......................................................................................173
Creating a User Traffic Profile..........................................................................173
Creating OS Policy Service..............................................................................176
Creating a VLAN Pooling Profile.......................................................................178
Create Precedence Profile...............................................................................180
Creating an L2 Access Control Service............................................................181
Creating Blocked Clients.................................................................................182
Creating a Client Isolation Whitelist..................................................................183
Creating Time Schedules.................................................................................184
Creating a DNS Server Profile..........................................................................185
Configuring Application Controls...............................................................................186
Creating an Application Control Policy.............................................................187
Implementing an Application Control Policy.....................................................188
Creating a User Defined Application................................................................190
Creating an Application Control Policy.............................................................191
Working with Application Signature Package...................................................192
Authentication...........................................................................................................194
Creating Non-Proxy Authentication AAA servers..............................................194
Creating Proxy AAA Servers............................................................................196
Authentication Support Matrix.........................................................................202
Accounting................................................................................................................211
Creating Non-Proxy Accounting AAA Servers..................................................211
Creating Proxy Accounting AAA Servers..........................................................212
Bonjour.....................................................................................................................213
Bonjour Gateway.............................................................................................214
Bonjour Fencing..............................................................................................216
Working with Tunnels and Ports................................................................................219
Creating a Ruckus GRE Profile........................................................................219
Creating a Soft GRE Profile..............................................................................220
Creating an IPsec Profile..................................................................................221
Creating an Ethernet Port Profile......................................................................224
Creating a Tunnel DiffServ Profile.....................................................................227
DHCP Relay....................................................................................................228
Enabling Flexi VPN..........................................................................................228
Enabling L3 Roaming Criteria for vDPs............................................................229
Tunnel Encryption............................................................................................231
Forwarding Multicast Packets..........................................................................231
Location Services......................................................................................................232
DHCP........................................................................................................................234
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
6
Creating a DHCP Pool.....................................................................................235
Configuring DHCP Service Settings.................................................................237
9 Troubleshooting
Troubleshooting Client Connections..........................................................................252
Troubleshooting through Spectrum Analysis..............................................................254
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
7
Backing Up and Restoring the Controller's Network Configuration from an FTP
Server.........................................................................................................262
Backing up Cluster Configuration....................................................................268
Upgrading the Controller...........................................................................................271
Performing the Upgrade..................................................................................272
Verifying the Upgrade......................................................................................273
Rolling Back to a Previous Software Version....................................................273
Uploading an AP Patch File.............................................................................274
Upgrading the Data Plane................................................................................274
Managing Licenses...................................................................................................276
Viewing Installed Licenses...............................................................................276
Configuring the License Server........................................................................278
Configuring License Bandwidth.......................................................................278
ZoneDirector to SmartZone Migration........................................................................279
Monitoring Administrator Activities.............................................................................279
12 Diagnostics
Applying Scripts........................................................................................................285
Applying AP CLI Scripts............................................................................................285
Viewing and Downloading Logs.................................................................................286
Available System Logs for SZ100....................................................................287
Viewing RADIUS Proxy Settings................................................................................288
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
8
9
Disclaimer
THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN (“MATERIAL”) IS
PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. RUCKUS AND ITS LICENSORS
MAKE NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THE
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE,
OR THAT THE MATERIAL IS ERROR-FREE, ACCURATE OR RELIABLE. RUCKUS RESERVES
THE RIGHT TO MAKE CHANGES OR UPDATES TO THE MATERIAL AT ANY TIME.
Limitation of Liability
IN NO EVENT SHALL RUCKUS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL
OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA
OR USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT
OR TORT, ARISING FROM YOUR ACCESS TO, OR USE OF, THE MATERIAL.
Trademarks
Ruckus Wireless, Ruckus, the bark logo, BeamFlex, ChannelFly, Dynamic PSK, FlexMaster,
Simply Better Wireless, SmartCell, SmartMesh, SmartZone, Unleashed, ZoneDirector and
ZoneFlex are trademarks of Ruckus Wireless, Inc. in the United States and other countries. All
other product or company names may be trademarks of their respective owners.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
9
Document Conventions
Document Conventions
Table 1: Text conventions on page 10 and Table 2: Notice conventions on page 10 list the text
and notice conventions that are used throughout this guide.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
10
Document Conventions
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
11
Documentation Feedback
Documentation Feedback
Ruckus Wireless is interested in improving its documentation and welcomes your comments
and suggestions.
You can email your comments to Ruckus Wireless at: docs@ruckuswireless.com
When contacting us, please include the following information:
• Document title
• Document part number (on the cover page)
• Page number (if appropriate)
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
12
13
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
13
Navigating the Dashboard
Setting Up the Controller for the First Time
For information for the first time, including instructions for running and completing the controller's
Setup Wizard, see the Getting Started Guide or Quick Setup Guide for your controller platform.
NOTE: While deploying vSZ, iSCSI must be used for block storage and make the hosts see
everything as Direct-attached storage (DAS) for real-time database access/synchronisation as
it requires lower latency and a high number of r/w transactions. Due to higher r/w latency, SAN
and NAS might not be suitable for vSZ deployment.
Some of the new features (for example, location based services, rogue AP detection, force
DHCP, and others) that this guide describes may not be visible on the controller web interface
if the AP firmware deployed to the zone you are configuring is earlier than this release. To ensure
that you can view and configure all new features that are available in this release, Ruckus Wireless
recommends upgrading the AP firmware to the latest version.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
14
Navigating the Dashboard
Web Interface Features
1. On a computer that is on the same subnet as the Management (Web) interface, start a web
browser.
Supported web browsers include:
• Google Chrome 47 and later (recommended)
• Safari 7 and later (Mac OS)
• Mozilla Firefox 44 and later
• Internet Explorer 11 and later
• Microsoft Edge
2. In the address bar, type the IP address that you assigned to the Management (Web) interface,
and then append a colon and 8443 (the controller's management port number) at the end
of the address.
For example, if the IP address that you assigned to the Management (Web) interface is
10.10.101.1, then you should enter: https://10.10.101.1:8443
NOTE: The controller web interface requires an HTTPS connection. You must append https
(not http) to the Management interface IP address to connect to the web interface. If a
browser security warning appears, this is because the default SSL certificate (or security
certificate) that the controller is using for HTTPS communication is signed by Ruckus Wireless
and is not recognized by most web browsers.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
15
Navigating the Dashboard
Web Interface Features
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
16
Navigating the Dashboard
Changing the Administrator Password
2. Enter:
• Old Password—Your current password.
• New Password—Your new password.
• Confirm Password—Your new password.
3. Click Change, your new password is updated.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
17
Navigating the Dashboard
Configuring Global Filters
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
18
Navigating the Dashboard
Warnings and Notifications
• Save As—To save the filter settings as a new group. The below figure appears. Enter a
new name for the group and click OK.
Figure 4: New Name Form
NOTE: You can delete the filter setting. To do so, click the Filter setting button. The Global
Filter form appears, click Delete.
Warnings
Warnings are displayed in the Miscellaneous bar. They are issues which are critical in nature.
Warnings cannot be removed or acknowledged unless the critical issue is resolved.
Figure 5: Sample Warning Message
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
19
Navigating the Dashboard
Health and Maps
• AP Certificate Expiration
• Node Out of Service
• Cluster Out of Service
• VM Resource Mismatch
• Suggested AP Limit Exceeded
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
20
Navigating the Dashboard
Health and Maps
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
21
Navigating the Dashboard
Health and Maps
• AP Status: Configure the criteria upon which APs will be flagged. For more information, see
Customizing AP Flagged Status Thresholds.
Figure 7: Setting Cluster Health Status
The
rsho
dls
4. Configure thresholds above which APs will be marked as "flagged" for the following criteria:
• Latency
• Airtime Utilization
• Connection Failures
• Total connected clients
5. Configure the radio (2.4 / 5 GHz) from the drop-down menu and select the level (system,
zone, AP group) at which you want to apply the policy, and configure the Sensitivity control
for the threshold (Low, Medium, High). Setting the Sensitivity level to Low means that an AP
must remain above the threshold for a longer period of time before it will appear in the flagged
category, while a High sensitivity means that APs will more quickly alternate between flagged
and non-flagged status.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
22
Navigating the Dashboard
Health and Maps
sen
tigs
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
23
Navigating the Dashboard
Traffic Analysis
NOTE: In order for your venues to appear on the world map, you must first import a map of your
site floorplan, as described in Working with Maps.
Traffic Analysis
You can analyze network traffic for APs, WLANs and clients.
From the traffic analysis tab, you can choose to analyze data using the following filters:
• Channel Range
• Total
• 2.4GHz
• 5GHz
• Throughput
• TX+RX—Number of bytes sent and received
• TX—Number of bytes sent
• RX—Number of bytes received
• Group
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
24
Navigating the Dashboard
Traffic Analysis
1. From the Access Points area, click settings . Figure 10: AP Settings Form on page 25
appears.
Figure 10: AP Settings Form
2. In Show top, enter the number of APs for which the traffic must be analyzed. Range: 5
through 20.
3. Select the Type of display you want to view. For example, Chart or Table.
4. Select the required AP identification option to be displayed. For example, Name, MAC or
IP.
5. From the drop-down, select the required display layout. For example, Horizontal Layout or
Vertical Layout.
6. Select or clear the required options that must be displayed in the Content area.
• Topology—To view the location map.
• Bytes—To view the throughput.
• Clients—To view the client details.
7. Select the following mouse-scroll behavior when you point the mouse over a map:
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
25
Navigating the Dashboard
Traffic Analysis
• Zoom
• Scroll
8. Click OK.
2. In Show top, enter the number of WLANs for which the traffic must be analyzed. Range: 5
through 20.
3. Select the Type of display you want to view. For example, Chart or Table.
4. Select the required WLAN identification option to be displayed. For example, Name or SSID.
5. Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
26
Navigating the Dashboard
Traffic Analysis
• From the Clients area, click settings . Figure 12: Client Setting Form on page 27 appears.
Figure 12: Client Setting Form
• In Show top, enter the number of Clients for which the traffic must be analyzed. Range: 5
through 20.
• Select the Type of display you want to view. For example, Chart or Table.
• Select the required Client identification option to be displayed. For example, Name, MAC
or IP.
• Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
27
Configuring System Settings
Configuring General Settings
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
28
Configuring System Settings
Configuring General Settings
2. Enter the NTP Server address that you want to use. The default NTP server address is
ntp.ruckuswireless.com.
3. Click Sync Server to enable an AP to join the controller and automatically synchronize its
time every day.
4. Select the System Time Zone, from the drop-down that you want the controller to use. The
default time zone is (GMT +0:00) UTC.
5. Click OK.
Secondary Syslog Server Indicates the backup syslog 1. Enter the server address.
Address server on the network, if any, 2. Enter the Port number.
in case the primary syslog 3. Choose the Protocol type.
server is unavailable. 4. Click Ping Syslog Server.
If the syslog server is
reachable, a flashing green
circle and the message
Success appears after the
button.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
29
Configuring System Settings
Configuring General Settings
Event Filter Severity applies Indicates the lowest severity Select the option from the
to Event Filter > All events level. Events above this drop-down.
above a severity severity level will be sent to
the syslog server.
Priority Indicates the event severity to Choose the syslog priority
syslog priority mapping in the among Error, Warning, Info
controller. and Debug, for the following
event severities:
• Critical
• Major
• Minor
• Warning
• Informational
• Debug
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
30
Configuring System Settings
Configuring General Settings
NOTE: You can also edit or delete an SCI profile. To do so, select the SCI profile from the list
and click Configure or Delete as required.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
31
Configuring System Settings
Configuring General Settings
NOTE: You can also edit or delete an SNMPv2 agent. To do so, select the SNMPv2 agent
from the list and click Configure or Delete respectively.
4. Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
32
Configuring System Settings
Configuring General Settings
3. To configure the SNMPv3 Agent, click Create and update the details as explained in the
follwoing table.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
33
Configuring System Settings
Configuring General Settings
NOTE: You can also edit or delete an SNMPv3 agent. To do so, select the SNMPv3 agent
from the list and click Configure or Delete respectively.
4. Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
34
Configuring System Settings
Configuring General Settings
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
35
Configuring System Settings
Configuring AP Settings
NOTE: You can edit or delete an existing FTP setting. To do so, select the FTP setting from the
list and click Configure or Delete respectively.
Configuring AP Settings
Approving APs
APs must be approved to join the system.
To approve an AP:
1. Go to System > AP Settings > Approval.
2. To approve each newly discovered APs
• automatically, select the Automatically approve all join requests from APs check box.
• manually, clear the Automatically approve all join requests from APs check box. This
option enhances wireless security.
3. Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
36
Configuring System Settings
Configuring AP Settings
NOTE: A registration rule is only applied to an AP the first time it joins the controller. If an AP’s
MAC address already exists on the controller database (whether it is in connected on
disconnected state and whether it belongs to the Staging Zone or any other zone), the controller
will assign the AP to its last known AP zone.
NOTE: The format of the IP address or addresses that you need to enter here depends on
the AP IP mode that you selected when you created the AP zone to which this rule will be
assigned. If you selected IPv4 Only, enter an IPv4 address. If you selected IPv6 Only, enter
an IPv6 address.
• IP Address Range: If you select this option, enter the From (starting) and To (ending) IP
address that you want to use.
• Subnet: If you select this option, enter the IP address and subnet mask pair to use for
matching.
• GPS Coordinates: If you select this option, type the GPS coordinates to use for matching.
Access points that have been assigned the same GPS coordinates will be automatically
assigned to the AP zone that you will choose in the next step.
You can choose the Rule Type as GPS coordinates, wherein you must provide information
about the latitude, longitude and distance to determine if the AP is within the defined area.
• Provision Tag: If the access points that are joining the controller have been configured
with provision tags, click the Provision Tag option, and then type a tag name in the Provision
Tag box. Access points with matching tags will be automatically assigned to the AP zone
that you will choose in the next step.
NOTE: Provision tags can be configured on a per-AP basis from the access point’s
command line interface.
6. Click OK.
When the process is complete, the page refreshes, and then registration rule that you created
appears on the AP Registration Rules page.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
37
Configuring System Settings
Configuring AP Settings
To create another registration rule, repeat the preceding steps. You can create as many
registration rules as you need to manage the APs on the network.
NOTE: You can also edit, delete or clone an AP registration rule. To do so, select the rule profile
from the list and click Configure, Delete or Clone respectively.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
38
Configuring System Settings
Viewing the System Cluster Overview
• In the second box, select the data unit for the threshold – MB for megabytes or GB for
gigabytes.
5. Click OK.
APs that exceed the daily traffic threshold that you specified will appear highlighted on the Access
Points page and the Access Point details page. Additionally, the controller will send an SNMP
trap to alert you that that an AP has been disconnected.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
39
Configuring System Settings
Viewing the System Cluster Overview
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
40
Configuring System Settings
Viewing the System Cluster Overview
NOTE: The user defined interface (UDI) is unavailable in Virtual SmartZone (High-Scale and
Essentials).
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
41
Configuring System Settings
Viewing the System Cluster Overview
Static Routing
Static routing is used to manually configure routing entry. Static routes are fixed and do not
change if the network is changed or reconfigured. Static routing are usually used to maximize
efficiency and to provide backups in the event that dynamic routing information fails to be
exchanged.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
42
Configuring System Settings
Viewing the System Cluster Overview
NOTE: After configuring redundancy for a cluster, Ruckus Wireless strongly recommends backing
up the controller configuration.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
43
Configuring System Settings
Viewing the System Cluster Overview
4. If managed APs are able to connect to one of the IP address specified for Cluster B, they fail
over to Cluster B. Then, they apply the registration rules that have been configured for Cluster
B and renew their certificates.
NOTE: The second cluster to which APs fail over must have sufficient license seats to
accommodate the new APs that it will be managing. If the second cluster has insufficient license
seats, the failover will be unsuccessful.
NOTE: You must configure the Control interface, IPv4 Cluster interface, andManagement
interface to be on three different subnets. Failure to do so may result in loss of access to the
web interface or failure of system functions and services.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
44
Configuring System Settings
Viewing the System Cluster Overview
IPv6-Control Interface (This Indicates the IPv6 control Select the IP Mode:
feature is supported only for interface settings
• Static
SZ300 controllers)
(recommended)—To
manually assign an IP
address to this interface
manually.
• Enter the IPv6 IP
Address (global only)
with a prefix length (for
example,
1234::5678:0:C12/123)
is required. Link-local
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
45
Configuring System Settings
Viewing the System Cluster Overview
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
46
Configuring System Settings
Viewing the System Cluster Overview
Access & Core Separation Indicates that the Select the Enable check box.
management interface (core
side) to be the system default
gateway and the control
interface (access side) to be
used only for access traffic.
IPv4 Default Gateway & Indicates the IPv4 gateway 1. Default
DNS that you want to use - Gateway—Choose the
Control, Cluster, and Interface for which you
Management. want to assign the default
gateway setting.
NOTE: When Access & Core 2. Primary DNS
Separation is enabled, the Server—Enter the server
Default Gateway field is details.
hidden. 3. Secondary DNS
Server—Enter the server
details.
NOTE: The control plane and the UDI must be on different subnets. If the control plane and
UDI are on the same subnet, and assigned the same IP address, APs will be unable to
communicate with the control plane. If the control plane and UDI are on the same subnet
and assigned different IP addresses, hotspot clients will not be redirected to the logon URL
for user authentication.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
47
Configuring System Settings
Viewing the System Cluster Overview
NOTE: You can also delete or restart a control plane. To do so, select the control plane from
the list and click Delete or Restart respectively.
Rebalancing APs
AP rebalancing helps distribute the AP load across nodes that exist within a cluster.
When a multi-node cluster is upgraded, the node that reboots the last typically does not have
any APs associated with it.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
48
Configuring System Settings
Viewing the System Cluster Overview
NOTE:
• APs may recreate the Ruckus-GRE tunnel to a different data plane.
• Devices associated with an AP that uses the Ruckus-GRE tunnel may temporarily lose network
connection for a short period of time (typically, around five minutes) during the AP rebalancing
process.
• When node affinity is enabled, AP rebalancing is disallowed on those nodes.
• When data plane grouping is enabled, AP rebalancing is disallowed on those data planes.
• AP rebalancing only supports APs running release 3.2 firmware. APs running on legacy
firmware will not be rebalanced.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
49
Configuring System Settings
Viewing the System Cluster Overview
2. Click Yes, the controller rebalances AP connections across the nodes over the next 15
minutes.
NOTE: If you want to repeat this procedure, you must wait 30 minutes before the controller
will allow you to rebalance APs again.
Filtering Events
You can view a list of events by severity or date and time.
To apply filters:
1. From the Event tab, select the icon. The Apply Filters form appears.
2. Select any or both the following criteria:
• Severity: Select the severity level by which you want to filter the list of events.
• Date and Time: Select the events by their Start and End dates.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
50
Configuring System Settings
Working with Maps
NOTE: You can filter events that generated in the last seven days.
3. Click OK, all the events that meet the filter criteria are displayed on the Event page.
For more information, refer ../EventandAlarms/m-ManagingEventsAndAlarms.ditamap.
nio
fm
ra
oitn.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
51
Configuring System Settings
Working with Maps
• Client connections to an AP
• Location-specific trouble spots related to AP or client connectivity
To import a floorplan map:
1. Go to System > Maps.
2. From the System tree hierarchy, select the location where you want to create a map and click
the add button. The Add Map form appears.
3. On the Details tab, enter a Name and optionally a Description to identify the map.
4. Enter a Location for the map.
5. For GPS Coordinates, enter the Latitude and Longitude values.
Figure 20: The Add Map
m
o
rf
6. To add a Map Image, click Browse and select a site, venue, or floor map in jpg, jpeg, png,
bmp or svg file formats.
NOTE:
The maximum file size per indoor map is 5MB.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
52
Configuring System Settings
Working with Maps
8. Click two points on the map between which you know the distance. Blue dots appear to
show the points you selected.
Figure 21: Click two points on the map to define the map's
es
c
a
l
9. Enter the Physical Distance between the two points and select the unit of measurement
(mm, cm, m, ft, yard).
10. Click Save & Next. The Place APs tab appears.
11. From the Available list, drag the APs and place them in their physical locations on the map.
Click the Placed tab to see the list of placed APs.
Figure 22: Drag and drop to place APs onto your
o
a
o
p
n
lrf
12. Once you are happy with the placement of your APs on the map, click OK to save your map.
Your venue now appears as an icon on the world map on the Dashboard, located at your venue's
actual physical location (if you entered the GPS coordinates correctly). The Dashboard icon that
represents your venue provides an overview of the number of APs in the venue and their status.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
53
Configuring System Settings
Working with Maps
Hover over the icon to view more details, or click one of the links to zoom in to the venue floorplan
map you imported.
Figure 23: The imported venue map icon appears at the GPS coordinates you
con
gifue
rd
NOTE: You can also edit or delete a map. To do so, select the map from the list and click the
Edit or Delete buttons respectively.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
54
Configuring System Settings
Certificates
sd
la
eit
4. To view more specific details on the AP, click the See this AP in AP page link.
Certificates
All the security certificates that the controller uses for its web interface, AP portal, and hotspots
are managed from a central storage.
By default, a Ruckus Wireless-signed SSL certificate (or security certificate) exists in the controller.
However, because this default certificate is signed by Ruckus Wireless and is not recognized
by most web browsers, a security warning appears whenever you connect to the web interface
or users connect to the AP portal or a hotspot. To prevent these security warnings from appearing,
you can import an SSL certificate that is issued by a recognized certificate authority.
If you are implementing Hotspot 2.0 on the network and you want to support anonymous
authentication using OSU Server-Only Authenticated L2 Encryption Network (OSEN), you will
need to import a trust root certificate, server or intermediate certificate and private key.
NOTE: The file size of each signed certificate and intermediate certificate must not exceed 8192
bytes. If a certificate exceeds 8192 bytes, you will be unable to import it into the controller.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
55
Configuring System Settings
Certificates
NOTE: You can also edit or delete a certificate by selecting the options Configure or
Delete respectively.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
56
Configuring System Settings
Certificates
NOTE: You can also edit, clone, download or delete a CSR by selecting the options Configure,
Clone, Download or Delete respectively.
Managing AP Certificates
AP certificates are valid for a period of time and have to be replaced when they expire.
You must get AP Certificate Replacement before your AP certificate expires. The system generates
an apCertificateExpireSystem alarm and event when an AP certificate expires.
To get an AP Certificate replacement:
1. From the application select, System > Certificates > AP Certificate Replacement.
2. In the AP Request List area, those APs with the Need Export column marked Yes needs
certificate replacement. Those marked with No means that the certificate request has already
been exported.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
57
Configuring System Settings
Certificates
NOTE: Use the Search terms option to look for APs by name, model, serial number, or
description.
NOTE: All exported AP Certificate request (.req) files generated from a cluster include it's
name. To manage multiple export request files, change the file name before uploading it to
uniquely identify the file.
For example: cert-scg-cluster5f6433ef-711b-4f44-b38a-ddd485ee2c37-R500.req
NOTE: All APs included in the imported response (.res) file reboot after their certificate is
refreshed.
13. From the Certificate Status area, check the Status column of the AP. If the status is:
• Updating—Controller is in the process of updating the certificate.
• Update Failed—Controller failed to update the certificate.
NOTE: The AP reports to the controller at 15-minute intervals. As a result, it may take up to
15 minutes for the AP to update its certificate status on the web interface.
14. Click Reset Update Failed AP, to reset the status of the APs for which certification update
failed. The status of the AP will change.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
58
Configuring System Settings
Configuring Templates
1. From the application select, System > Certificates > Trusted CA Certs (Chain).
2. Click Import, the Import CA Certs (Chain) form appears.
3. Enter a Name.
4. Enter a Description of the certificate.
5. For Intermediate CA Certificates, click Browse and select the file. If you need to upload
additional intermediate CA certificates to establish a chain of trust to the signed certificate,
you can select up to four certificates.
6. For Root CA Certificate, click Browse and select the file.
7. Click OK.
NOTE: You can also edit or delete a CA certificate by selecting the options Configure or
Delete respectively.
Configuring Templates
Working with Zone Templates
You can create, configure, and clone zone templates
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
59
Configuring System Settings
Configuring Templates
AP Admin Logon Indicates the admin logon Enter the Logon ID and Password.
credentials.
Time Zone Indicates the time zone that Select the option:
applies.
• System Defined: Select the
time zone.
• User defined:
1. Enter the Time Zone
Abbreviation.
2. Choose the GMT Offset
time.
3. Select Daylight Saving
Time.
Radio Options
Channel Range Indicates that you want to Select Select Channel Range
override the 2.4GHz channel (2.4G) check boxes for the
range that has been configured channels on which you want the
for the zone. 2.4GHz radios to operate. Channel
options include channels 1 to 11.
By default, all channels are
selected.
DFS Channels Allows ZoneFlex APs to use Select the check box.
DFS channels.
Channel Range (5G) Indicates for what channels Select the check boxes.
Indoor want the 5GHz radios to
operate.
Channel Range (5G) Indicates for what channels Select the check boxes.
Outdoor want the 5GHz radios to
operate.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
60
Configuring System Settings
Configuring Templates
Radio Options a/n/ac (5 Indicates the radio option 5 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20, 40, 80,
80+80 or select Auto.
• Channel—For Indoor and
Outdoor, select the channel to
use for the a/n/c (5GHz) radio,
or select Auto.
• TX Power Adjustment—Select
the preferred TX power, if you
want to manually configure the
transmit power on the 5GHz
radio. By default, TX power is set
to Full/Auto on the 5GHz radio.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
61
Configuring System Settings
Configuring Templates
Syslog Options
Enable external syslog Indicates if an external syslog Select the check box and update
server for Aps server is enabled. the following details:
• Server Address
• Port
• Facility for Event
• Priority
AP SNMP Options
Enable AP SNMP Indicates if the AP SNMP Select the check box.
option is enabled.
SNMPv2 Agent Indicates SNMPv2 Agent is 1. Click Create and enter
applied. Community.
2. Select the required Privilege:
Read or Write.
3. Click OK.
SNMPv3 Agent Indicates SNMPv3 Agent is 1. Click Create and enter User.
applied. 2. Select the required
Authentication:
• None
• SHA
1. Enter the Auth Pass
Phrase
2. Select the Privacy option.
For DES and AES
options, Enter the Privacy
Phrase.
• MD5
1. Enter the Auth Pass
Phrase
2. Select the Privacy option.
For DES and AES
options, Enter the Privacy
Phrase.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
62
Configuring System Settings
Configuring Templates
DoS Protection Indicates settings for blocking Select the check box and enter the:
a client.
• duration in seconds to Block a
client for
• number of repeat
authentication failures
• duration in seconds to be
blocked for every repeat
authentication failures.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
63
Configuring System Settings
Configuring Templates
AP Reboot Timeout Indicates AP reboot settings. Choose the required option for:
• Reboot AP if it cannot reach
default gateway after
• Reboot AP if it cannot reach
the controller after
NOTE: You can select a zone from the list and edit, clone or delete its template by selecting the
options Configure, Clone or Delete respectively.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
64
Configuring System Settings
Configuring Templates
1. From the application select, System > Templates > Zone Templates.
2. Select the zone template that you want to export and click Export Template.
3. A pop-up appears prompting you to Open or Save the zone template file with .bak extension.
Click:
• Open—To view the template file
• Save—Select the destination folder where you want to save the template file and then
click Open to view it.
NOTE: You can select a WLAN and edit, clone or delete its template by selecting the
options Configure, Clone or Delete respectively.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
65
Configuring System Settings
Configuring Templates
4. Click Apply.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
66
67
The following image gives you an understanding of the Access Points home page.
Figure 25: Access Points
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
67
Working With Access Points
Understanding the System, Zones and AP Groups
NOTE: When an AP is assigned or moved to the Staging Zone, the cluster name becomes its
user name and password after the AP shows up-to-date state. If you need to log on to the AP,
use the cluster name for the user name and password.
Before creating an AP zone, Ruckus Wireless recommends that you first set the default system
time zone on the General Settings page. This will help ensure that each new AP zone will use
the correct country. For information on how to set the default system time zone, see Configuring
System Time on page 28.
NOTE: In vSZ-E and SZ100, when the system is upgraded to release 3.5, the new UI and
re-architected stats database will prevent the system from displaying AP and zone stats if the
AP/zone is operating on 3.4 or prior releases. In order to make full use of the UI introduced in
3.5, zones and APs should be updated to 3.5 as well. Operationally, the zones will still work,
but stats visibility will be impacted.
Creating an AP Zone
An AP zone (or zone) functions as a way of grouping Ruckus Wireless APs and applying settings
including WLANs to these groups of Ruckus Wireless APs. Each AP zone can include up to six
WLAN services.
To create an AP zone:
1. On the menu, click Access Points. The figure below appears.
Figure 26: Access Points
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
68
Working With Access Points
Understanding the System, Zones and AP Groups
2. From the System tree, select the location where you want to create the zone (for example,
System or Domain), and then click .
Figure 27: Create Groups
3. Configure the zone by completing the settings listed in the table below.
4. Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
69
Working With Access Points
Understanding the System, Zones and AP Groups
AP Admin Logon Indicates the admin logon Enter the Logon ID and Password.
credentials.
AP Time Zone Indicates the time zone that Select a time zone, and the enter
applies. the details as required.
AP IP Mode Indicates the IP version that Select the IP version.
applies.
Configuration > Mesh Options
Enable Mesh Indicates if mesh networking is Select the check box and enter the
Networking in this zone enabled. following:
• Mesh Name (ESSID)
• Mesh Passphrase
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
70
Working With Access Points
Understanding the System, Zones and AP Groups
Radio Options a/n/ac (5 Indicates the configuration Select the following options:
GHz) options for the 5 GHz radio.
• Channelization—Set the
channel width used during
transmission to either 20, 40, 80,
80+80, 160 (MHz), or select
Auto to set it automatically.
• Channel—For Indoor and
Outdoor, select the channel to
use for the a/n/c (5GHz) radio,
or select Auto to set it
automatically.
• Secondary Channel
(80+80)—For Indoor and
Outdoor, the default secondary
channel to use for the a/n/c
(5GHz) radio, is set as Auto.
• TX Power Adjustment—Select
the preferred TX power, if you
want to manually configure the
transmit power on the 5GHz
radio. By default, TX power is set
to Full on the 5GHz radio.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
71
Working With Access Points
Understanding the System, Zones and AP Groups
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
72
Working With Access Points
Understanding the System, Zones and AP Groups
Smart Monitor Indicates AP interval check and Select the check box and enter the
retry threshold settings. duration and threshold.
AP Management VLAN Indicates the AP management Choose the option. Click VLAN ID,
VLAN settings. and then type the VLAN ID that you
want to assign (valid range is from
1 to 4094). To keep the same
management VLAN ID that has
been configured on the AP, click
Keep AP's settings
Rogue AP Detection Indicates rogue AP settings. Select the check box and choose
the options:
• Enable events and alarms for
all rogue devices
• Enable events and alarms for
only malicious rogue devices
of selected type and select the
Rogue Type:
• SSID Spoofing
• Same Network
• MAC Spoofing
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
73
Working With Access Points
Understanding the System, Zones and AP Groups
DoS Protection Indicates settings for blocking Select the check box and enter the
a client. duration in seconds.
Client Load Balancing Balances the number of clients Select the check box and enter the
across APs. threshold.
Band Balancing Balances the bandwidth of the Select the check box and enter the
clients. percentage.
Location Based Service Indicates that the location • Select the check box and
based service is enabled. choose the options.
• Click Create, In the Create LBS
Server form:
1. Enter the Venue Name.
2. Enter the Server Address.
3. Enter the Port number.
4. Enter the Password.
Client Admission Control Indicates the load thresholds Select the check box and update
on the AP at which it will stop the following settings:
accepting new clients.
• Min Client Count
• Max Radio Load
• Min Client Throughput
AP Reboot Timeout Indicates the AP reboot Choose the required option for:
settings.
• Reboot AP if it cannot reach
default gateway after
• Reboot AP if it cannot reach
the controller after
NOTE: You can also edit, clone or delete an AP Zone by selecting the options Configure ,
Clone or Delete respectively, from the Access Points page.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
74
Working With Access Points
Understanding the System, Zones and AP Groups
The main difference between ChannelFly and Background Scanning is that ChannelFly determines
the optimal channel based on real-time statistical analysis of actual throughput measurements,
while Background Scanning uses channel measurement and other techniques to estimate the
impact of interference on Wi-Fi capacity based on progressive scans of all available channels.
NOTE: If you enable ChannelFly, Background Scanning can still be used for adjusting radio
power and rogue detection while ChannelFly manages the channel assignment. Both cannot
be used at the same time for channel management.
Benefits of ChannelFly
With ChannelFly, the AP intelligently samples different channels while using them for service.
ChannelFly assesses channel capacity every 15 seconds and changes channel when, based
on historical data, a different channel is likely to offer higher capacity than the current channel.
Each AP makes channel decisions based on this historical data and maintains an internal log of
channel performance individually.
When ChannelFly changes channels, it utilizes 802.11h channel change announcements to
seamlessly change channels with no packet loss and minimal impact to performance. The
802.11h channel change announcements affect both wireless clients and Ruckus mesh nodes
in the 2.4 GHz and/or 5 GHz bands.
Initially (in the first 30-60 minutes) there will be more frequent channel changes as ChannelFly
learns the environment. However, once an AP has learned about the environment and which
channels are most likely to offer the best throughput potential, channel changes will occur less
frequently unless a large measured drop in throughput occurs.
ChannelFly can react to large measured drops in throughput capacity in as little as 15 seconds,
while smaller drops in capacity may take longer to react to.
Disadvantages of ChannelFly
Compared to Background Scanning, ChannelFly takes considerably longer for the network to
settle down. If you will be adding and removing APs to your network frequently, Background
Scanning may be preferable. Additionally, if you have clients that do not support the 802.11h
standard, ChannelFly may cause significant connectivity issues during the initial capacity
assessment stage.
You can enable/disable ChannelFly per band. If you have 2.4 GHz clients that do not support
802.11h, Ruckus recommends disabling ChannelFly for 2.4 GHz but leaving it enabled for the
5 GHz band.
Background Scanning
Using Background Scanning, SmartZone controllers regularly samples the activity in all Access
Points to assess RF usage, to detect rogue APs and to determine which APs are near each
other for mesh optimization. These scans sample one channel at a time in each AP so as not
to interfere with network use. This information is then applied in AP Monitoring and other controller
monitoring features. You can, if you prefer, customize the automatic scanning of RF activity,
deactivate it if you feel it's not helpful, or adjust the frequency, if you want scans at greater or
fewer intervals.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
75
Working With Access Points
Understanding the System, Zones and AP Groups
NOTE: Background Scanning must be enabled for SmartZone controllers to detect rogue APs
on the network.
VLAN Pooling
When Wi-Fi is deployed in a high density environment (such as a stadium) or on a university
campus to provide access for students, the number of IP addresses required for client devices
can easily run into several thousands.
Allocating a single large subnet results in a high probability of degraded performance due to
factors like broadcast/multicast traffic.
To address this problem, VLAN pooling provides a method by which administrators can deploy
pools of multiple VLANs from which clients are assigned, thereby automatically segmenting large
groups of clients into smaller subgroups, even when connected to the same SSID.
As the client device joins the Wi-Fi network, the VLAN is assigned based on a hash of the client’s
MAC address (by default).
NOTE: AP group configuration settings can be overridden by individual AP settings. For example,
if you want to set the transmit power to a lower setting for only a few specific APs, leave the Tx
Power Adjustment at Auto in the AP group configuration page, then go to the individual AP
configuration page (Access Points > Access Points > Edit [AP MAC address]) and set the
Tx Power Adjustment to a lower setting.
Creating an AP Group
Creating an AP group means creating a configuration profile that defines the channels, radio
settings, Ethernet ports and other configurable fields for all members of the group or for all APs
of a specific model in the group.
Follow these steps to create an AP group.
1. From the left pane, select Access Points. The below figure appears.
Figure 28: Access Point
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
76
Working With Access Points
Understanding the System, Zones and AP Groups
2. From the System tree hierarchy, select the location (for example: System, Zone) and click
. The following figure appears.
Figure 29: Create Groups
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
77
Working With Access Points
Understanding the System, Zones and AP Groups
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
78
Working With Access Points
Understanding the System, Zones and AP Groups
Radio Options a/n/ac (5 Indicates the radio option 5 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20, 40, 80,
80+80, 160 (MHz), or select
Auto to set it automatically.
• Channel—For Indoor and
Outdoor, select the channel to
use for the a/n/c (5GHz) radio,
or select Auto to set it
automatically.
• TX Power—Select the preferred
TX power, if you want to
manually configure the transmit
power on the 5GHz radio. By
default, TX power is set to Full
on the 5GHz radio.
• WLAN Group—Specify to which
WLAN group this AP group
belongs.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
79
Working With Access Points
Understanding the System, Zones and AP Groups
SNMPv3 Agent Indicates SNMPv3 Agent is 1. Click Create and enter User.
applied. 2. Select the required
Authentication.
3. Enter the Auth Pass Phrase.
4. Select the Privacy option.
5. Select the required Privilege. If
you select Notification select
the option Trap or Inform and
enter the Target IP and Target
Port.
6. Click OK.
NOTE: Select the Override check box for that setting, and then configure the setting.
External Antenna (2.4 Enables the external 2.4 GHz Select the Enable external
GHz) antenna on the selected AP antenna check box, and then set
model. the gain value (between 0 and
90dBi) in the box provided.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
80
Working With Access Points
Understanding the System, Zones and AP Groups
Internal Heater Enables the heater that is built Select the Enable internal heaters
into the selected AP model (specific AP models only) check
box.
USB Port Disables the USB port. USB Select the Disable USB port check
ports are enabled by default. box.
Configuration > Advanced Options
Location Based Service Enables location-based service • Select the Override zone
for the AP group. configuration check box.
• Select the Enable LBS Service
check box.
• Select an LBS Server from the
drop-down.
Hotspot 2.0 Venue Indicates the hotspot profile Select the required option or click
Profile that you want to assign to the Create and update the following
group. details:
• Enter the Name.
• Enter the Description.
• Enter the Venue Names.
• Select the Venue Category.
• Select the Type.
• Enter the WLAN Metrics.
AP Management VLAN Indicates the AP management Choose the option. Click VLAN ID,
VLAN settings. and then type the VLAN ID that you
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
81
Working With Access Points
Understanding the System, Zones and AP Groups
NOTE: You can also edit, clone or delete an AP Group by selecting the options Configure ,
Clone or Delete respectively, from the Access Points page.
NOTE: The options that appear in the General Options section depend on the AP model
that you select. Not all the options described in the table below will appear for every AP model.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
82
Working With Access Points
Understanding the System, Zones and AP Groups
Option Description
USB Port To disable the USB port on the selected AP model, select the
Disable USB port check box. USB ports are enabled by default.
Status LEDs To disable the status LED on the selected AP model, select the
Disable Status LEDs check box.
LLDP To enable the Link Layer Discovery Protocol (LLDP) on the
selected AP model, select the Enable Link Layer Discovery
Protocol check box.
• Enter the Advertise Interval duration in seconds
• Enter the Hold Time duration in seconds
• Select the Enable Management IP TLV check box
PoE Operating Mode Select the PoE operating mode of the selected AP model.
Available options include Auto (default), 802.3af, 802.3at, and
802.3at+ mode. If 802.3af PoE Operating Mode PoE is selected,
this AP model will operate in 802.3af mode and will consume
less power than in 802.3at mode. However, when this option
is selected, some AP features are disabled to reduce power
consumption, such as the USB port and one of the Ethernet
ports.
PoE out port To enable the PoE out port on the selected AP model, select
the Enable PoE out ports (specific ZoneFlex AP models
only) .
Internal Heater To enable the heater that is built into the selected AP model,
select the Enable internal heaters (specific AP models only)
check box.
External Antenna (2.4 To enable the external 2.4 GHz antenna on the selected AP
GHz) model, select the Enable external antenna check box, and
then set the gain value (between 0 and 90dBi) in the box
provided.
External Antenna (5 GHz) To enable the external 5 GHz antenna on the selected AP model,
select the Enable external antenna check box, and then set the
gain value (between 0 and 90dBi) in the box provided.
6. In the Port Settings section, configure the following options for each LAN port.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
83
Working With Access Points
Understanding the System, Zones and AP Groups
NOTE: The number of LAN ports that appear in this section correspond to the physical LAN
ports that exist on the selected AP model.
NOTE: When trunk port limitation is enabled, the controller does not validate the port settings
configured in the AP or the AP group with no members.
Option Description
Enable Use this option to enable and disable this LAN port on the
selected AP model. By default, this check box is selected. To
disable this LAN port, clear this check box.
Profile Use this option to select the Ethernet port profile that you want
this LAN port to use. Two default Ethernet port profile exist:
Default Trunk Port (selected by default) and Default Access
Port. If you created Ethernet port profiles (see Creating an
Ethernet Port Profile on page 224), these profiles will also appear
on the drop-down list.
7. Click OK.
Supported LLDP Attributes
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Layer 2 protocol that allows a
network device (for example, a Ruckus Wireless AP) to advertise its identity and capabilities on
the local network.
LLDP information is sent by devices from each of their interfaces at a fixed interval (default is 30
seconds), in the form of an Ethernet frame. Each LLDP Ethernet frame contains a sequence of
type-length-value (TLV) structures starting with Chassis ID, Port ID and Time to Live (TTL) TLV.
Table 2 lists the LLDP attributes supported by the controller.
LLDP information is sent by devices from each of their interfaces at a fixed interval (default is 30
seconds), in the form of an Ethernet frame. Each LLDP Ethernet frame contains a sequence of
type-length-value (TLV) structures starting with Chassis ID, Port ID and Time to Live (TTL) TLV.The
follwoing table lists the LLDP attributes supported by the controller.
Attribute (TLV) Description
Chassis ID Indicates the MAC address of the AP’s br0 interface
Port ID Identifies the port from which the LLDP packet was sent
Time to Live Same as LLDP Hold Time. Indicates the length of time (in seconds)
that a receiving device will hold the LLDP information sent by the
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
84
Working With Access Points
Understanding the System, Zones and AP Groups
NOTE: You cannot move an AP model to an AP group and configure the AP model to
use a trunk port at the same time, if general ports are enabled when trunk port limitation
is disabled. You must configure the selected AP model to use at least one trunk port, and
then move the AP model to the AP group.
• For single port APs, the single LAN port must be a trunk port and is therefore not
configurable.
• For ZoneFlex 7025/7055, the LAN5/Uplink port on the rear of the AP is defined as a Trunk
Port and is not configurable. The four front-facing LAN ports are configurable.
• For all other APs, you can configure each port individually as either a Trunk Port, Access
Port, or General Port. See Designating an Ethernet Port Type for more information.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
85
Working With Access Points
Understanding the System, Zones and AP Groups
For most ZoneFlex APs, you can set which ports you want to be your Access, Trunk and General
Ports from the controller web interface, as long as at least one port on each AP is designated
as a Trunk Port.
By default, all ports are enabled as Trunk Ports with Untag VLAN set as 1 (except for ZoneFlex
7025, whose front ports are enabled as Access Ports by default). If configured as an Access
Port, all untagged ingress traffic is the configured Untag VLAN, and all egress traffic is untagged.
If configured as a Trunk Port, all untagged ingress traffic is the configured Untag VLAN (by default,
1), and all VLAN-tagged traffic on VLANs 1-4094 will be seen when present on the network.
The default Untag VLAN for each port is VLAN 1. Change the Untag VLAN to:
• Segment all ingress traffic on this Access Port to a specific VLAN.
• Redefine the native VLAN on this Trunk Port to match your network configuration.
When trunk port limitation is disabled using the eth-port-validate-one-trunk disable command,
validation checks are not performed for the VLAN members and the AP Management VLAN. If
the AP configuration for general ports and access ports does not include a member of an AP
management VLAN, or the VLAN of a WAN interface configured through CLI, the AP will
disconnect and the Ethernet port stops transmitting data. Make sure that you configure the
correct VLAN member in the ports (general/access) and the AP management VLAN.
NOTE: Ensure that at least one of the general port VLANs is the same as a Management VLAN
of the AP.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
86
Working With Access Points
Understanding the System, Zones and AP Groups
Additionally, you can select System, Zone or AP Group and click More to perform the following
operations as required:
• Create New Zone from Template—Does not apply to Zone and AP group management.
• Extract Zone Template—Does not apply to System and AP group management.
• Apply one Template—Does not apply to System and AP group management.
• Change AP Firmware—Does not apply to System and AP group management.
• Switchover Cluster—Does not apply to System and AP group management.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
87
Working With Access Points
Understanding the System, Zones and AP Groups
NOTE: To rehome managed APs, you must enable cluster redundancy so that the APs will
continue to be managed by the failover cluster until you restore them to the original cluster
(rehome) manually. See Enabling Cluster Redundancy on page 42.
Rehoming APs must be done on a per-zone basis. Follow these steps to rehome managed APs
to the original cluster.
1. From the Access Points page, locate the zone where you want to switchover cluster settings.
2. Click More and select Switchover Cluster. The Switchover Cluster dialog box appears.
3. Select the Switchover Cluster from the drop-down.
4. The control IP configured while enabling cluster redundacy is listd in the IPv4 List.
5. Click OK, the system refreshes. You have configured the cluster switchover settings.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
88
Working With Access Points
Viewing Modes
Viewing Modes
You can view System, Zone, and AP Group-level information by selecting one of the following
View Mode options:
• List—Displays the list of all APs irrespective of the Zone or Group they belong.
• Group—Displays the list of APs in a hiearchy format. The is the default viewing mode.
• Mesh—Lists AP details.
• Map—Displays the location map of the APs.
• Zone—Lists zone details.
AP Status
The real-time status of the Access Points are classified as follows:
• Online—Number of Access Points that are online.
•
Flagged—Number of Access Points that are flagged.
• Offline—Number of Access Points that are offline.
NOTE: APs that exceed their health threshold and that require your attention are flagged. See
Configuring AP Health Thresholds.
NOTE: Select the Override check box if you want to configure new settings.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
89
Working With Access Points
Configuring Access Points
User Location Information Indicates the demographic Enter the Area Code and Cell
information. Identifier.
AP Admin Logon Indicates the admin logon Select the check box and
credentials. enter the Logon ID and
Password.
AP Configuration > Radio Options
Channel Range (2.4G) Indicates that you want to Select Select Channel Range
override the 2.4GHz channel (2.4G) check boxes for the
range that has been configured channels on which you want
for the zone to which this AP the 2.4GHz radios of managed
group belong. APs to operate. Channel
options include channels 1 to
11. By default, all channels are
selected.
Channel Range (5G) Indicates that you want to Select Select Channel Range
override the 5GHz channel (5G) check boxes for the
range that has been configured channels on which you want
for the zone to which this AP the 5GHz radios of managed
group belong. APs to operate.
Radio Options b/g/n (2.4 Indicates the radio option 2.4 Select the following options:
GHz) GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20 or
40 (MHz), or select Auto to
set it automatically.
• Channel—Select the
channel to use for the b/g/n
(2.4GHz) radio, or select
Auto to set it automatically.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
90
Working With Access Points
Configuring Access Points
Radio Options a/n/ac (5 GHz) Indicates the radio option 5 Select the following options:
GHz configurations.
• Channelization—Set the
channel width used during
transmission to either 20,
40, 80 (MHz), or select
Auto to set it automatically.
• Channel—Select the
channel to use for the a/n/c
(5GHz) radio, or select
Auto to set it automatically.
• TX Power
Adjustment—Select the
required option.
• WLAN Group—Select the
WLAN group to which this
AP belongs.
• WLAN Services—Select
the check box to enable
WLAN services in this
radio.
Override zone configuration Allows you to override the Select the check box
existing zone configuration
Enable AP SNMP Enables you to configure SNMP Select the check box
settings.
SNMPv2 Agent Allows you to add users to 1. Click Create and enter
SNMPv2 Agent. Community.
2. Select the required
Privilege. If you select
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
91
Working With Access Points
Configuring Access Points
SNMPv3 Agent Allows you to add users to 1. Click Create and enter
SNMPv3 Agent. User.
2. Select the required
Authentication.
3. Enter the Auth Pass
Phrase.
4. Select the Privacy option.
5. Select the required
Privilege. If you select
Notification select the
option Trap or Inform and
enter the Target IP.
6. Click OK.
PoE Operating Mode Allows you to operate using Select the option.
PoE mode.
Port Settings Indicates the port settings. Select the option and choose
the required LAN option.
AP Configuration > Advanced Options
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
92
Working With Access Points
Configuring Access Points
Smart Monitor Indicates AP interval check and Select the required check
retry threshold settings. boxes.
Syslog Options Determines if external syslog Select the required check
server settings is applicable. boxes. For Enable external
syslog server option, update
the following information:
• Server Address
• Port
• Facility for Event
• Priority
Hotspot 2.0 version Profile Indicates the hotspot profile Select the required option or
that you want to assign to the click Create and update the
group. following details:
• Enter the Name.
• Enter the Description.
• Enter the Venue Names.
• Select the Venue
Category.
• Select the Type.
• Enter the WLAN Metrics.
AP Management VLAN Indicates the AP management Select the check box and
VLAN settings. choose the option.
Auto Channel Selection Indicates auto-channel settings. Select the check box and
choose the option.
Client Admission Control Indicates the load thresholds Select the check boxes and
on the AP at which it will stop update the following details:
accepting new clients.
• Min Client Count
• Max Radio Load
• Min Client Throughput
Swap Configuration
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
93
Working With Access Points
Managing Access Points
NOTE: You can also move the location of an AP or delete an AP. To do so, select the AP from
the list and click Move or Delete as required.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
94
Working With Access Points
Managing Access Points
NOTE: By default, the Access Points page displays 20 access points per page (although you
have the option to display up to 250 access points per page). If the controller is managing
more than 20 access points, the pagination links at the bottom of the page are active. Click
these pagination links to view the succeeding pages on which the remaining access points
are listed.
2. To view access points that belong to a particular administration domain, click the name of
the administration domain in the domain tree (on the sidebar).
The page refreshes, and then displays all access points that belong to that management
domain.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
95
Working With Access Points
Managing Access Points
• Import Batch Provisioning APs: Select this option to import the provisioning file. The
controller displays the import results. Any errors that occur during the import process will be
listed by the controller.
• Export All Batch Provisioning APs: Select this option to download a CSV file that lists all
APs that have been provisioned. The exported CSV contains the following information:
• AP MAC Address
• Zone Name
• Model
• AP Name
• Description
• Location
• GPS Coordinates
• Logon ID
• Password
• Administrative State
• IP Address
• Network Mask
• Gateway
• Primary DNS
• Secondary DNS
• Serial Number
• IPv6 Address
• IPv6 Gateway
• IPv6 Primary DNS
• IPv6 Secondary DNS
NOTE: The exported CSV file for all batch provisioned APs only contains pre-provisioned
APs. It does not contain swapping APs or auto discovered APs.
If no APs have been pre-provisioned, you will still be able to export the CSV file but it will be
empty (except for the column titles).
• Import Swapping APs: Manually trigger the swapping of two APs by clicking the swap action
in the row. You can also edit the pre-provision configuration only if the AP does not connect
to the controller. Click the AP MAC address to bring up the configuration edit form, and then
select Pre-provision Configuration.
• Export All Batch Swapping APs: Select this option to download a CSV file that lists all APs
that have been swapped. The exported CSV contains the following information:
• Swap In AP MAC
• Swap In AP Model
• Swap Out AP MAC
NOTE: The exported CSV file for batch swapping APs only contains swapping APs. It
does not contain pre-provisioned APs or auto discovered APs.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
96
Working With Access Points
Managing Access Points
NOTE: The AP that you move will inherit the configuration of the new AP zone.
1. From the Access Points page, locate the access point that you want to move to a different
AP zone.
2. Click Move, the Select Destination AP Zone form appears.
3. Select the AP zone to which you want to move the access point.
4. Click OK.
You have completed moving an access point to a new AP zone.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
97
Working With Access Points
Managing Access Points
Tabs Description
General Displays group information
Configuration Displays group configuration information.
Health Displays historical health information.
Traffic Displays historical traffic information.
Alarm Displays alarm information.
Event Displays event information.
Clients Displays client information.
Wired Clients Displays information of wired clients.
Additionally, you can select an AP and click More to perform the following operations as required:
• Select ALL - Selects all the APs in the list.
• Deselect All- Clears all selection from the list.
• Troubleshooting > Client Connection - Connects to client devices and analyze network
connection issues in real-time. See, Troubleshooting Client Connections on page 252
• Troubleshooting > Spectrum Analysis - Troubleshoots issues remotely, identify sources
of interferences within the network and allow administrators access to the RF health of the
network environment. See, Troubleshooting through Spectrum Analysis on page 254
• Restart - Restarts an access point remotely from the web interface.
• Lock - Disables all WLAN services on the AP and disconnect all wireless users associated
with those WLAN services temporarily.
• Unlock - Makes all WLAN services available.
• Import Batch Provisioning APs - Import the provisioning file. See, Options for Provisioning
and Swapping APs on page 95.
• Import Swapping APs - Manually trigger the swapping of two APs by clicking the swap
action in the row. See, Options for Provisioning and Swapping APs on page 95.
• Export All Batch Provisioning APs Downloads a CSV file that lists all APs that have been
provisioned.. See, Options for Provisioning and Swapping APs on page 95.
• Export All Swapping APs - Downloads a CSV file that lists all APs that have been swapped.
See, Options for Provisioning and Swapping APs on page 95.
• Download Support Log - Downloads support log. See Downloading the Support Log from
an Access Point on page 95.
• Trigger AP Binary Log - Triggers binary log for the selected AP.
• Download CM Support Log - Downloads Cable Momdem support log.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
98
Working With Access Points
Managing Access Points
• Restart Cable Modem - Restarts the cable modem. The AP will disconnect from the network
for a short period. The AP will disconnect from the network for a short period.
• Reset Cable Modem - Resets the cable modem.
• Reset Cable Modem to Factory Default - Resets the cable modem to factory default
settings.
• Untag Critical APs - Stating APs as non-critical. See, Tagging Critical APs on page 38.
• Swap - Swaps current AP to swap-in AP. See, Editing Swap Configuration on page 97.
• Approve - Approves AP and completes registering. See, Working with AP Registration Rules
on page 37.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
99
Working with WLANs and WLAN Groups
Zones, AP Groups, and WLANs
NOTE: In vSZ-E and SZ100, when the system is upgraded to release 3.5, the new UI and
re-architected stats database will prevent the system from displaying AP and zone stats if the
AP/zone is operating on 3.4 or prior releases. In order to make full use of the UI introduced in
3.5, zones and APs should be updated to 3.5 as well. Operationally, the zones will still work,
but stats visibility will be impacted.
Viewing Modes
The View Mode on upper-right cornerr of the page provides two options to view the WLANs
available in the system:
• List—Displays the list of all WLANs irrespective of the Zone or Group they belong.
• Group—Displays the list of WLANs that belong to a specific Zone or Group.
The following WLAN details can be viewed regardless of the mode selected:
• Name
• Alert
• SSID
• Auth Method
• Encryption Method
• Clients
• Traffic
• VLAN
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
100
Working with WLANs and WLAN Groups
WLAN Groups
• Application Recognition
• Tunneled
WLAN Groups
A WLAN group is a way of specifying which APs or AP groups provide which WLAN services.
For example, if your wireless network covers three floors of a building and you need to provide
wireless access to visitors only on the first floor:
1. Create a WLAN service (for example, Guest Only Service) that provides guest-level
access only.
2. Create a WLAN group (for example, Guest Only Group), and then assign Guest Only
Service (WLAN service) to Guest Only Group (WLAN group).
3. Assign APs on the 1st Floor (where visitors need wireless access) to your Guest Only
Group.
Any wireless client that associates with APs assigned to the Guest Only Group will get the
guest-level access privileges defined in your Guest Only Service. APs on the 2nd and 3rd
floors can remain assigned to the default WLAN Group and provide normal-level access.
NOTE:
• WLAN groups are configured at the zone level.
• Creating WLAN groups is optional. If you do not need to provide different WLAN services to
different areas in your environment, you do not need to create a WLAN group.
• A default WLAN group called default exists. The first 27 WLANs that you create are
automatically assigned to this default WLAN group.
• A WLAN group can include a maximum of 27 member WLANs. For dual radio APs, each
radio can be assigned to only one WLAN group (single radio APs can be assigned to only
one WLAN group).
NOTE: You can also edit, clone, and delete WLAN group by selecting the options Configure ,
Clone , and Delete respectively, from the Wireless LANs page.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
101
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
2. Click Create, Figure 31: Create WLAN Configuration on page 102 appears.
Figure 31: Create WLAN Configuration
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
102
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
3. Set the required configurations as explained in Table 15: WLAN Configurations on page 103.
4. Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
103
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
Authentication Options
Method Specifies the Select the following option:
authentication
• Open (Default)—No authentication
mechanism.
mechanism is applied to connections.
If WPA or WPA2 encryption is used, this
implies WPA-PSK authentication.
If you clicked Web Authentication in
Authentication Type, Open is the only
available authentication option, even
though PSK-based encryption can be
supported.
• 802.1x EAP—A very secure
authentication/encryption method that
requires a back-end authentication
server, such as a RADIUS server. Your
choice mostly depends on the types of
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
104
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
Encryption Options
Method Specifies the encryption Select the option:
method.
• WPA2—Enhanced WPA encryption
WPA and WPA2 are both using AES encryption algorithm.
encryption methods
1. Choose Algorithm:
certified by the Wi-Fi
Alliance; WPA2 with AES • AES:
is the recommended
1. Enter Passphrase.
encryption method. The
Wi-Fi Alliance will be 2. Select or clear Show.
mandating the removal of 3. Select
WEP due to its security • the Enable 802.11 Fast
vulnerabilities, and Ruckus BSS Transition check box
Wireless recommends and enter the Mobility
against using WEP if Domain ID.
possible. • the required 802.11w MFP
option.
4. Dynamic PSK
• Disable
• Internal
• Enter DPSK Length
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
105
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
• AUTO:
1. Enter Passphrase.
2. Select or clear Show.
3. Select the Enable 802.11 Fast
BSS Transition check box
and enter the Mobility
Domain ID.
4. Dynamic PSK
• Disable
• Internal
• Enter DPSK Length
• Choose DPSK Type
• Select DPSK Expiration
• External—Enables
Authentication Service
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
106
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
Authentication & Accounting Server (for WLAN Authentication Type: Standard usage )
Authentication Server Specifies the server used 1. Select the check box.
for authentication on this 2. Select the server from the drop-down.
network. By enabling 3. Select the Enable
Proxy, authentication RFCLocationDeliverySupport.
requests will flow through
the controller. In a
non-proxy mode, the AP
will communicate directly
with the authentication
server without going
through the controller.
Accounting Server Specifies the server used 1. Select the check box.
for accounting messages. 2. Select the server from the drop-down.
By enabling Proxy,
accounting messages are
sent by the controller. In a
non-proxy mode, the AP
will communicate
accounting messages
directly.
Hotspot Portal (for WLAN Authentication Type: Hotspot (WisPr))
Hotspot (WISPr) Defines hotspot behavior, Select the hotspot portal profile that you
Portal like redirects, session want this WLAN to use.
timers, and location
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
107
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
Guest Accounting Indicates the RADIUS Choose the server. You must have added
Accounting server that a RADIUS Accounting server previously.
you want to use for this Additionally, if you want the controller to
WLAN. proxy accounting messages to the AAA
server, select the Use the Controller as
Proxy check box.
Authentication & Accounting Server (for WLAN Authentication Type: Web Authentication)
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
108
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
109
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
NAS Request Timeout Indicates the duration Enter the timeout period (in seconds).
after which an expected
RADIUS response
message is considered to
have failed.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
110
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
Advanced Options
User Traffic Profile Defines the traffic policy Select the required option.
that will be applied to
users on this WLAN. The
default UTP allows all with
no rate limits. UTPs can
define rate limits as well
as L3-7 ACLs and
policies.
L2 Access Control Enables the WLAN to Select the required option.
blacklist or whitelist a
specific set of MAC
addresses based on a L2
access control policy.
OS Policy Enables the WLAN to Select the required option.
apply a unique policy to a
device based on OS type.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
111
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
112
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
113
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
114
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
115
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
Band Balancing Disables band balancing Select the Disable band balancing for
only for this WLAN, if you this WLAN service check box.
select the check box.
Qos Map Set Reprioritizes downlink Select Enable QOS Map Set.
packets based on the
configured mappings.
When an AP receives a
downlink packet, it checks
the existing DSCP (L3
QoS) marking, compares
it to this map set and then
changes the user priority
(L2 QoS) values for
transmission by the AP.
TO configure this feature,
select the User Priority
(UP) from the table (0-7)
and configure the DSCP
(0-64) range that will be
mapped to this UP.
Exceptions can also be
added such that the
original DSCP and UP
tagging are preserved the
honored by the AP.
SSID Rate Limiting Enforces an aggregate Select Uplink and Downlink check boxes
rate limit for all users of and enter the limiting rate in mbps
the WLAN. The purpose respectively. Range: 1 mbps through 200
of this feature is to prevent mbps.
the combined throughput
form all users of an SSID
from exceeding this
threshold. This feature is
different from per-user
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
116
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
Flexi-VPN Profile Forwards tunneled traffic Choose the DHCP Profile from the
to another remote drop-down.
instance through
RuckusGRE Tunnel.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
117
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
NOTE: You can also edit, clone and delete WLANs by selecting the options Configure, Clone
and Delete respectively, from the Wireless LANs page.
802.11w MFP
802.11w Management Frame Protection provides additional security measures for management
frames. Not all client devices support 802.11w.
Check your client devices before enabling 11w. If “Required” is selected, clients must support
11w in order to connect. If “Capable” is selected, clients with or without 11w should be able to
connect. However, note that some clients with poor driver software may have connection
problems even if 11w is set to Capable.
Band Balancing
Band balancing balances the client load on radios by distributing clients between the 2.4 GHz
and 5 GHz radios.
This feature is enabled by default and set to a target of 25% of clients connecting to the 2.4
GHz band. To balance the load on a radio, the AP encourages dual-band clients to connect to
the 5 GHz band when the configured percentage threshold is reached.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
118
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
The controller provides an option to work around the Apple® CNA feature if it is not desirable
for your specific deployment. With CNA bypass enabled, captive portal (web-based authentication)
logon must be performed by opening a browser to any unauthenticated page (HTTP) to get
redirected to the logon page.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
119
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
• Load balancing takes action before a client association request, reducing the chance of client
misbehavior.
• The process does not require any time-critical interaction between APs and the controller.
• Provides control of adjacent AP distance with safeguards against abandoning clients.
• Can be disabled on a per-WLAN basis. For instance, on a voice WLAN, load balancing may
not be desired due to voice roaming considerations.
• Background scanning must be enabled on the WLAN for load balancing to work.
Mobility Domain ID
A Mobility Domain ID is used by 802.11r to define a scope of the network in which an 11r fast
roam is supported. Master keys are shared within the Mobility Domain, allowing clients to support
a fast roam.
Portal-based WLANs
There are many types of portal-based WLANs and they can be distinguished based on where
the user credentials are stored, and where the portal page is hosted.
Guest and WebAuth WLAN portals are hosted on the controller AP with limited customization.
WISPr WLANs are usually hosted on external portal servers providing the flexibility to customize.
WISPr WLANs allow for sophisticated customization such as providing a customized login page
which could include locale information, advertisements etc.
WISPr WLANs can also be configured to bypass the authentication portal such that if an end
user device’s MAC address (as a credential) is stored on a RADIUS server, there is no need to
redirect the end user to the portal server for authentication.
Characteristics of portal-based WLANs
Portal-based WLANs have the following characteristics:
• WebAuth WLAN
• Does not provide and option to modify the portal (WYSIWYG)
• User authentication is done by the RADIUS server, LDAP and Active Directory
• Allows redirecting user web pages
• Guest WLAN
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
120
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
• Provides and option to modify the portal elements such as the logo, Terms and Conditions,
title etc
• User authentication is by using guest passphrases or select the Always Accepted option
• Allows redirecting user web pages
• Does not posses a local database, LDAP, Active Directory or RADIUS server
• Hotspot (WISPr) WLAN
• Internal Portal
• Provides and option to modify the portal elements such as the logo, Terms and
Conditions, title etc
• Allows redirecting user web pages
• User authentication is by the local database, LDAP, Active Directory, RADIUS server
or rendered by selecting the Always Accepted option
• Supports the Walled Garden approach to allow user access to specific areas within
the network
• External Portal
• Allows customization of the portal pages through external services
• Supports Northbound Portal Interface for authentication
• User authentication is by the local database, LDAP, Active Directory, RADIUS server
or rendered by selecting the Always Accepted option
• Supports the Walled Garden approach to allow user access to specific areas within
the network
• Allows redirecting user web pages
NOTE: For SmartZone release 3.4 and 3.2.x, the APs support the following rate limiting values:
• 0.10Mbps
• 0.25Mbps - 20.00Mbps (increments by 0.25Mbps)
• 21.00Mbps - 200.00Mbps (increments by1.00mpbs)
For example, typing 6.45 Mbps maps to the closest predefined rate value, so 6.45Mbps will be
rendered as 6.50Mbps.
NOTE: For SmartZone release 3.1.x, the APs support the following rate limiting values:
• 0.10Mbps
• 0.25Mbps - 20.00Mbps (increments by 0.25Mbps)
• 30.00Mbps
• 40.00Mbps
• 50.00Mbps
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
121
Working with WLANs and WLAN Groups
Creating a WLAN Configuration
For example, typing 31.50 Mbps maps to the closest predefined rate value, so 31.50 Mbps will
be rendered as 40 Mbps. Any rate greater than 50.00Mbps would be mapped to the maximum
rate which is 50.00Mbps.
Policy Global or Rate limit range Rate limit range for Rate limit range for
Zone for zone running zone running zone running
SmartZone 3.4 SmartZone 3.2.x SmartZone 3.1.x
Device Policy Zone 0.1 Mbps to 200 0.1 Mbps to 200
0.1 Mbps to 200 Mbps.
Mbps Mbps But any rate greater
than 50Mbps will be
Support No support for
mapped to 50 Mbps
uni-direction uni-direction (Uplink
implicitly on the AP side
(Uplink and and Downlink need
when the rate is
Downlink need not not be enabled or
applied.
be enabled or disabled at the same
disabled at the time) No support for
same time) uni-direction
User Traffic Global 0.1 Mbps to 200 0.1 Mbps to 200 But any rate greater
Profile Mbps Mbps than 50Mbps will be
mapped to 50 Mbps
No support for No support for
implicitly on the AP side
uni-direction uni-direction
when the rate is
because this is
applied.
Global profile that
is used by 3.2.x No support for
and 3.1.x APs uni-direction
NOTE: This feature will not work properly if the system does not have the correct time. To ensure
that the system always maintains the correct time, configure an NTP server and point the system
to the NTP server's IP address, as described in Configuring System Time on page 28.
NOTE: WLAN service schedule times should be configured based on your browser's current
timezone. If your browser and the target AP/WLAN are in different timezones, configure the
on/off times according to the desired schedule according to your local browser. For example if
you wanted a WLAN in Los Angeles to turn on at 9 AM and your browser was set to New York
time, please configure the WLAN service schedule to enable the WLAN at noon. When configuring
the service schedule, all times are based on your browser's timezone setting.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
122
Working with WLANs and WLAN Groups
Managing WLANs
8. Click Create, the page refreshes, and then the schedule you created appears in the drop-down
list.
Managing WLANs
When you select a System, Zone, or WLAN Group from the hierarchy tree, respective contextual
tabs appear at the bottom of the page.
These tabs are used to monitor the selected group. Table 18: System/Zone/WLAN Groups
Monitoring Tabs on page 123 lists the tabs that appear for System, Zone, and WLAN Group.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
123
Working with WLANs and WLAN Groups
Managing WLANs
When you can select a Zone and click More you can perform the following operations:
• Extract WLAN Template
• Apply WLAN Template
• Change AP Firmware
• Switchover Cluster
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
124
Working with WLANs and WLAN Groups
Managing WLANs
5. Click Yes, a confirmation message appears stating the template was applied successfully.
You have completed applying WLAN template to the AP zone.
NOTE: To rehome managed APs, you must enable cluster redundancy so that the APs will
continue to be managed by the failover cluster until you restore them to the original cluster
(rehome) manually. See Enabling Cluster Redundancy on page 42.
Rehoming APs must be done on a per-zone basis. Follow these steps to rehome managed APs
to the original cluster.
1. From the Wireless LANs page, locate the zone where you want to switchover cluster settings.
2. Click More and select Switchover Cluster. The Switchover Cluster dialog box appears.
3. Select the Switchover Cluster from the drop-down.
4. Click OK, the page refreshes. You have configured the cluster switchover settings.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
125
Managing Clients
Working with Wireless Clients
Managing Clients 5
In this chapter:
NOTE: Not all of the columns listed below are displayed by default. To display column that are
currently hidden, click the gear icon in the upper-right corner of the table, and then select the
check boxes for the columns that you want to display.
You can view the clients listed in the table in two view modes - No TTG (without TTG) and TTG
(with TTG).
Click the icon to export all the data into a CSV file.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
126
Managing Clients
Working with Wireless Clients
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
127
Managing Clients
Working with Wireless Clients
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
128
Managing Clients
Working with Wireless Clients
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
129
Managing Clients
Working with Wired Clients
3. When you have located the client, select it, and then click the Disconnect button above the
table.
The table refreshes, and then the client that you disconnected disappears from the list.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
130
Managing Clients
Working with Users and Roles
The Associated Client page appears and displays general information about the wired client.
• General: Displays general client information.
• Event: Displays information about events associated with the client.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
131
Managing Clients
Working with Users and Roles
5. Click OK.
You have completed creating a user role.
NOTE: You can also edit, clone and delete user roles by selecting the options Configure, Clone
and Delete respectively, from the User Roles tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
132
Managing Clients
Working with Users and Roles
NOTE: In step 4, for Service Protocol option, choose Active Directory and proceed.
4. Perform an authentication test to ensure that the user gets assigned the correct Role. Refer
Testing AAA Servers on page 201.
5. Create a web authentication portal WLAN configuration and assign the Non-proxy AD server
to it. Refer Creating a WLAN Configuration on page 102.
NOTE:
1. Choose WLAN Usage > Authentication Type > Web Authentication.
2. Configure the following for Authentication & Accounting Server:
a. Web Authentication Portal: choose the option from the drop-down.
b. Authentication Server: select the Use the Controller Proxy check box and choose
the authentication service from the drop-down.
NOTE: In step 4, for Service Protocol option, choose RADIUS and proceed.
4. Perform an authentication test to ensure that the user gets assigned the correct Role. Refer
Testing AAA Servers on page 201.
5. Create a web authentication portal WLAN configuration and assign the Non-proxy RADIUS
server to it. Refer Creating a WLAN Configuration on page 102.
NOTE:
1. Choose WLAN Usage > Authentication Type > Web Authentication.
2. Go to Authentication Options > Methods, choose 802.1x EAP and proceed.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
133
Managing Clients
Working with Users and Roles
L7 app policies will not be applied based on a role. Role-based VLAN will not be applied if
WLAN’s auth type is L7 because there is no easy way to change the UE VLAN without
disconnecting them. Also, we should mention precedence policies here, which are configurable
at the WLAN level, but have an impact on the way that roles are assigned. Finally, we should
talk about the difference between assigning UEs to roles via RADIUS and using RADIUS attributes
to apply some specific policy, like rate limit, VLAN, or ACL. RADIUS attribute will always take
precedence over the role assignment.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
134
Managing Clients
Working with Users and Roles
5. Click OK.
You have completed creating a local user.
Select Enable to enable this user profile or select Disable.
You can view the list of local users by applying filters. Click the icon to do so.
The following information is displayed when you click on the user:
• Summary: Displays a summary of information about the user.
• Admin Activities: Displays information about the administrator activities.
•
Event: Displays information about events associated with the user. Click the icon to apply
filters.
Click the icon to export all the data into a CSV file.
NOTE: You can also edit, clone and delete user by selecting the options Configure, Clone and
Delete respectively, from the Local Users tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
135
Managing Clients
Working with Users and Roles
5. Click OK.
You have completed creating a subscription package.
NOTE: You can also edit and delete a package by selecting the options Configure and Delete
respectively, from the Subscription Package tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
136
Managing Clients
Working with Guest Passes
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
137
Managing Clients
Working with Guest Passes
For details on each setting, see Creating a WLAN Configuration on page 102.
6. When you finish creating a guest access WLAN, continue to Step 3: Generate a Guest Pass
on page 138.
Figure 35: Creating a WLAN for guest access only
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
138
Managing Clients
Working with Guest Passes
• Effective from the creation time: This type of guest pass is valid from the time it is
first created to the specified expiration time, even if it is not being used by any end user.
• Effective from first use: This type of guest pass is valid from the time the user uses
it to authenticate with the controller until the specified expiration time. An additional
parameter (Guest Pass will expire in X days) can be configured to specify when an
unused guest pass will expire regardless of use. The default is 7 days.
• Expire guest pass if not used within [ ] days: If you want this guest pass to expire if
it is unused after you generated it, type the number of days in the box (maximum value
is 365 days).
c) Max Devices Allowed: Set the number of users that can share this guest pass.
• Limited to [ ]: If you want a limited number of users to share this guest pass, click this
option, and then type the number in the box.
• Unlimited: If you want an unlimited number of users to share this guest pass, click this
option.
• Session Duration: If you clicked Unlimited, this option appears. If you want require
users to log on again after their sessions expire, select the Require guest re-login
after [ ] check box, and then select a time increment. If this feature is disabled,
connected users will not be required to re-log in until the guest pass expires.
d) In Remarks (optional), type your notes about this guest pass, if any.
5. Click Generate.
The page refreshes, and then the guest pass you generated appears in a table, along with
other guest passes that exist on the controller.
Click Enable to enable the guest pass for a user, and Disable to revoke the guest pass for
a particular user.
You have completed generating a guest pass. You are now ready to send the guest pass to
guest users. See Step 4: Send Guest Passes to Guest Users on page 140 for information.
You can view the list of guest passes by applying filters. Click the icon to do so.
The following information is displayed when you click on the guest pass created:
• Summary: Displays a summary of information about the user and credentials.
• Admin Activities: Displays information about the administrator activities.
• Event: Displays information about events associated with the user.
Click the icon to apply filters. Click the icon to export all the data into a CSV file.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
139
Managing Clients
Working with Guest Passes
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
140
Managing Clients
Working with Guest Passes
3. In the Guest Instruction HTML Template section, click default.html, which is the default
guest pass printout template.
The content of the default guest pass printout template appears in the Name: default.html.
4. Click Download below the template preview area to download a copy of the template to
your computer.
5. Using an HTML editor, create a new HTML file.
6. Add content to the file.
Typically, a printout template contains instructions for connecting to the controller hotspot.
See the following image for the content of the default printout template.
Figure 38: Content of the default printout
template
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
141
Managing Clients
Working with Guest Passes
3. In the Guest Instruction SMS Template section, click default.txt, which is the default
guest pass printout template.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
142
Managing Clients
Working with Guest Passes
The content of the default guest pass printout template appears in the Name: default.txt.
4. Click Download below the template preview area to download a copy of the template to
your computer.
5. Using an HTML editor, create a new text file.
6. Add content to the file.
Typically, a printout template contains instructions for connecting to the controller hotspot.
See the following image for the content of the default printout template.
Figure 40: Content of the default printout
template
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
143
Managing Clients
Working with Guest Passes
3. Go to your web browser's default download location and look for a file named
guestpass.csv.
4. Using Microsoft Excel or a similar application, open the CSV file. The CSV file displays the
details of the guest passes, including:
• Guest Name
• Key
• Remarks
• Generated
• Expiration Date
• WLAN
You have completed exporting the last generated guest passes to CSV.
Figure 42: A sample CSV of generated guest passes when opened in Excel
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
144
Managing Clients
Working with Guest Passes
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
145
Managing Clients
Working with Guest Passes
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
146
Managing Clients
Working with Guest Passes
• Session Duration: If you clicked Unlimited, this option appears. If you want require
users to log on again after their sessions expire, select the Require guest re-login
after [ ] check box, and then select a time increment. If this feature is disabled,
connected users will not be required to re-log in until the guest pass expires.
10. In Guest List CSV File (at the top of the page), click Browse, and then select the CSV file
you edited earlier.
The page refreshes, and the number of guest passes that the controller has identified in the
CSV file appears below the Browse button.
11. Click Import.
The page refreshes, and then the guest pass you generated appears in a table, along with
other guest passes that exist on the controller.
You have completed generating a guest pass. You are now ready to send the guest pass to
guest users. See Step 4: Send Guest Passes to Guest Users on page 140 for information.
Figure 44: The Guest Pass page for importing a CSV file
NOTE: If your browser is blocking pop-ups, make you temporarily disable the pop-up blocker
so you can view and print the guest pass.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
147
Managing Clients
Working with Guest Passes
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
148
Managing Clients
Working with Dynamic PSKs
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
149
Managing Clients
Working with Dynamic PSKs
change the default static key to prevent the student from using the WLAN resources, which in
turn would impact all other users of that WLAN.
Individual DPSKs can be deleted in the event of a student leaving the school, or their device
being lost or stolen without impacting other users of the WLAN.
A “bound” DPSK is one which is assigned to the MAC address of a user device at the time of
creation. No other user device can utilize this DSPK. Bound DPSKs are stored in on APs.
An “unbound” DPSK is not assigned to a device's MAC address during creation, but upon its
first use (that is, when the device first connects to a WLAN and the DPSK is entered as the
WLAN security key). Once a DPSK becomes assigned to a user device, it becomes bound and
no other user device can use it. Unbound DPSKs are stored on the controller.
NOTE: If you generate a single unbound DPSK, then only one device can be connected to the
DPSK WLAN by the key, since other devices can still use “admin” PSK to connect to the DPSK
WLAN. However, when devices from different APs try to use the same unbound DPSK
simultaneously, for a short period, they could both connect to the WLAN successfully, but the
later device will be disconnected by the controller. If the AP happens to disconnect from the
controller, the device could stay connected until the AP connects back to the controller.
When DPSKs are created, there are some prevented behaviors that are considered database
conflicts such as the following:
• You cannot create two unbound DPSKs with the same passphrase.
• You cannot create two bound DPSKs for the same MAC address and passphrase. Create
two DPSKs for the same MAC address, the former will be replaced. However, you can create
multiple bound DPSKs with different MAC addresses and the same passphrase.
• You can also create bound DPSKs and a single unbound DPSK with the same passphrase.
UEs within a PSK WLAN use the same shared key to encrypt data traffic, but if the key is
compromised by even one WLAN user, the entire user traffic can be accessed/hacked. Therefore,
a secure tunnel is created for each user connected to the WLAN, by configuring the PSK WLAN
as an Internal or External DPSK.
In Internal DPSKs, the controller manages and records the DPSK for each individual user and a
limited number of DPSKs are supported.
In External DPSKs, the DPSK is maintained by the Radius Server (AAA) and Radius protocols
are used to authenticate the UE. The UE is authenticated by the open authentication WLAN -
WPA/WPA2 encryption where in, the controller uses the RADIUS interface with the RADIUS
server (AAA includes the DPSK in the Radius response or Access Accept message and sends
it to the AP) so that the DPSK is maintained in one place. There is no limitation on the number
of DPSK supported in this mode.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
150
Managing Clients
Working with Dynamic PSKs
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
151
Managing Clients
Working with Dynamic PSKs
• User Name: Leave it blank if you want the controller to auto-generate the user name, or
enter the user name manually.
• Passphrase: Leave it blank if you want the controller to auto-generate the passphrase,
or enter the passphrase manually.
• User Role: If you have created user roles, select the user role that you want to assign to
the device that connects to the SmartZone network using this DPSK. The device will be
assigned the same attributes and permissions (VLAN, UTP, time restrictions, etc.) that
have been defined for the assigned user role.
NOTE: The VLAN attribute of the user role will not be applied to the DPSK user.
4. Click Generate.
You have completed creating dynamic PSKs.
To delete a DPSK, click the DPSK from the list, and then click the Delete icon.
el i f
3. Modify the CSV file as appropriate and save it. The following are the fields that need to be
completed in the CSV file:
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
152
Managing Clients
Working with Dynamic PSKs
• User Name (mandatory field): Leave it blank if you want the controller to auto-generate
the user name, or enter the user name manually.
• Passphrase (optional): Leave it blank if you want the controller to auto-generate the
passphrase, or enter the passphrase manually.
• MAC Address (optional): Enter the MAC address of the device for which to generate a
DPSK (bound DPSK). If you leave the MAC address field empty, the controller will generate
an unbound DPSK.
• VLAN ID (optional): Enter a value to override the WLAN VLAN ID, or leave it empty if you
do not want to override the WLAN VLAN ID.
• Role (optional): If you have created user roles, type the name of the user role that you
want to assign to the device that connects to the SmartZone network using this DPSK.
The device will be assigned the same attributes and permissions (VLAN, UTP, time
restrictions, etc.) that have been defined for the assigned user role.
NOTE: The VLAN attribute of the user role will not be applied to the DPSK user.
NOTE: Importing a CSV file that contains a MAC address to which an existing DPSK (on the
same target WLAN) is already assigned will replace the existing DPSK on the controller
database.
5. In DPSK Enabled WLAN, select a WLAN from the drop-down list. Only WLANs that support
DPSK must be selected.
6. In Choose File, click Browse to choose the CSV file.
Click Clear if you want to replace the CSV file.
You can also specify Group DPSK in the CSV file.
7. Click Upload.
The generated DPSKs appear in the table on the Dynamic PSK page.
NOTE:
You can import up to 1,000 DPSKs (not over 256 unbound and 64 group DPSK limitation)
at a time.
8. Click Download CSV to download a CSV that contains the generated DPSKs.
The CSV file appears in the following format.
Figure 49: New CSV
m
o
rfa
t
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
153
Managing Clients
Working with Dynamic PSKs
NOTE: Click Export All to export all the dynamic PSKs to a CSV file. You can also export specific
dynamic PSKs by selected them and clicking Export Selected.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
154
155
• Monitoring Applications
Application Recognition and Control enables you to identify, monitor and control the applications that
are running on wireless clients associated with managed APs.
Monitoring Applications
If you have enabled Application Recognition and Control for at least one WLAN, you can monitor
the applications that run on wireless clients associated with that WLAN.
NOTE: To configure application recognition and control policies, go to Services and Profiles
> Application Control. For more information, see Configuring Application Controls on page 186.
NOTE: If Application Recognition and Control is unable to find an application name, it displays
the source and destination IP: port address of the application
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
155
Application Recognition and Control
Monitoring Applications
4. Click on an application from the list on the left (either Chart or Table view) to view a list of the
top clients using the selected application in the list on the right. The client list displays the
client's MAC address, OS, hostname, IP address (IPv4 and IPv6), and application usage
volume and percent of application traffic generated by the client. From the Total option, you
can also filter the data based on the radio frequencies (2.4 GHz and 5 GHz).
Figure 53: Click an application to view top client details
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
156
Application Recognition and Control
Monitoring Applications
5. Click on a client in the list on the right, and scroll down to the client specific details table on
the bottom right to view the top 10 applications used by the client.
Figure 54: Click a client to view application details
NOTE: You can configure application control policies (denial, rate limiting, and QoS) using the
Services and Profiles > Application Control page. For more information, see Configuring
Application Controls on page 186.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
157
Services and Profiles
Working with Hotspots and Portals
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
158
Services and Profiles
Working with Hotspots and Portals
P
alo
tr
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
159
Services and Profiles
Working with Hotspots and Portals
• Web Portal Logo: By default, the guest hotspot logon page displays the Ruckus Wireless
logo. To use your own logo, click the Browse button, select your logo Web Portal Logo
(recommended size is 138 x 40 pixels, maximum file size is 20KB), and then click Open.
• Web Portal Title: Type your own guest hotspot welcome text or accept the default
welcome text (Welcome to the Guest Access login page).
4. User Session
• Session Timeout: Specify a time limit after which users will be disconnected and required
to log on again.
• Grace Period: Set the time period during which clients will not need to re-authenticate
after getting disconnected from the hotspot. Enter a number (in minutes) between 1
and 14399.
5. Click OK.
You have completed creating a guest access service.
NOTE: You can also edit, clone and delete a guest access portal by selecting the options
Configure, Clone and Delete respectively, from the Guest Access tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
160
Services and Profiles
Working with Hotspots and Portals
3. Click Create.
The Create Hotspot (WISPr) Portal page appears.
Figure 56: Creating a Hotspot (WISPr)
P
alo
tr
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
161
Services and Profiles
Working with Hotspots and Portals
• Redirect to the following URL: You could set a different page where users will be
redirected (for example, your company website).
• HTTPS Redirect: Enable this option if you want the AP to redirect HTTPS requests to
the Hotspot portal.
3. User Session
• Session Timeout: Set a time limit (in minutes) after which users will be disconnected
from the hotspot service and will be required to log on again.
• Grace Period: Set the time period (in minutes) during which disconnected users are
allowed access to the hotspot service without having to log on again.
4. Location Information
• Location ID: Type the ISO and ITU country and area code that the AP includes in
accounting and authentication requests. The required code includes:
• isocc (ISO-country-code): The ISO country code that the AP includes in RADIUS
authentication and accounting requests.
• cc (country-code): The ITU country code that the AP includes in RADIUS
authentication and accounting requests.
• ac (area-code): The ITU area code that the AP includes in RADIUS authentication
and accounting requests.
• network: The following is an example of what the Location ID entry should look like:
isocc=us,cc=1,ac=408,network=RuckusWireless
• Location Name: Type the name of the location of the hotspot service.
5. Walled garden: A walled garden is a limited environment to which an unauthenticated user
is given access for the purpose of setting up an account.
Click Add to add a user to walled garden, to provide access.
Click Import CSV to import the CSV file with user information.
5. Click OK.
You have completed creating a Hotspot (WISPr) service portal.
NOTE: You can also edit, clone and delete a Hotspot (WISPr) service portal by selecting the
options Configure, Clone and Delete respectively, from the Hotspot (WISPr) tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
162
Services and Profiles
Working with Hotspots and Portals
P
alo
tr
3. User Session
• Session Timeout: Set a time limit (in minutes) after which users will be disconnected
from the hotspot service and will be required to log on again.
• Grace Period: Set the time period (in minutes) during which disconnected users are
allowed access to the hotspot service without having to log on again.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
163
Services and Profiles
Working with Hotspots and Portals
5. Click OK.
You have completed creating a Web Auth service portal.
NOTE: You can also edit, clone and delete a Web Auth service portal by selecting the options
Configure, Clone and Delete respectively, from the Web Auth tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
164
Services and Profiles
Working with Hotspots and Portals
• Authentication URL: Type the authentication interface URL on the third party
authentication server. When a managed AP receives a WeChat logon request from a
client device, it will send the request to this authentication URL and get the authorization
result.
• DNAT Destination: Type the DNAT destination server address to which the controller
will forward HTTP requests from unauthenticated client devices. The DNAT destination
server and the authentication server (above) may or may not be the same server.
• Grace Period: Type the number of minutes during which disconnected users who were
recently connected will be allowed to reconnect to the portal without needing to
re-authenticate. The default grace period is 60 minutes (range is between 1 and 14399
minutes).
• Blacklist: Type network destinations that the controller will automatically block associated
wireless clients from accessing. Use a comma to separate multiple entries.
3. Whitelist: Type network destinations that the controller will automatically allow associated
wireless clients to access. You can add a single entry or multiple entries.
To add a single entry, type the entry in Wall Garden Entry, and then click Add. The entry
you added appears in the table below. To add multiple entries, in a comma-separated
value (CSV) file, type all the network destinations that you want to add to the whitelist, and
then save the CSV file. In the Whitelist section, click Import CSV, and then select the CSV
file you created. Click Open. The entries in the CSV file are added to the whitelist.
4. DNAT Port Mapping: specify at least one pair of source-to-destination port mapping. To
add a port mapping, type the source and destination ports in the boxes provided, and
then click Add. The AP will use this information to drop or forward HTTP requests from
associated clients to specified ports on the DNAT server. For example, if an HTTP request
from a wireless client does not originate from the specified source (from) port, the AP will
discard the HTTP request. By default, a port mapping of 80-80 (source-destination) exists.
5. Click OK.
You have completed creating a WeChat portal.
NOTE: You can also edit, clone and delete a WeChat service portal by selecting the options
Configure, Clone and Delete respectively, from the WeChat tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
165
Services and Profiles
Working with Hotspots and Portals
configuration and services offered, or allow the user to manually select an SSID for which the
user has login credentials.
The controller's Hotspot 2.0 implementation complies with the IEEE 802.11u standard and the
Wi-Fi Alliance Hotspot 2.0 Technical Specification.
See the Hotspot 2.0 Reference Guide for SmartZone for information on configuring Hotspot 2.0
services, including:
• Working with Hotspot 2.0 operator profiles
• Working with Hotspot 2.0 identity providers
• Creating a Hotspot 2.0 online signup portal
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
166
Services and Profiles
Working with Hotspots and Portals
You can also click Create to create a Hotspot 2.0 WiFi operator. See Creating a Hotspot
2.0 WiFi Operator Profile on page 167 for more information.
4. Identity Provider: Choose one or more identity providers. Choose the identity provider.
You can configure an OSU SSID when you add an Identity Provider which enables OSU
and provisioning. Since there may be more than one identity provider per Hotspot 2.0
profiles having its own authentication profile, the No Match and Unspecified mapping could
be duplicated. To avoid duplication, the default identity provider is taken as the correct
configuration for No Match and Unspecified mapping. OSUSSID can be OSEN or OPEN
[Guest].
You can also click Create to create a Hotspot 2.0 WiFi operator. See Creating a Hotspot
2.0 Identity Provider on page 168 for more information.
5. Advanced Options:
• Internet Options: Specify if this HS2.0 network provides connectivity to the Internet.
• Access Network Type: Access network type (private, free public, chargeable public,
etc.), as defined in IEEE802.11u.
• IPv4 Address: Select IPv4 address type availability information, as defined in
IEEE802.11u
• IPv6 Address: Select IPv6 address type availability information, as defined in
IEEE802.11u
• Connection Capabilities: Provides information on the connection status within the
hotspot of the most commonly used communications protocols and ports.
Provide the Protocol Name, Protocol Number, Port Number and Status to Add a
new connection.
• Custom Connection Capabilities: Allows addition of custom connection capability rules.
Up to 21 custom rules can be created.
Provide the Protocol Name, Protocol Number, Port Number and Status to Add a
new connection.
5. Click OK.
You have completed creating a Hotspot 2.0 WLAN profile.
NOTE: You can also edit, clone and delete a Hotspot 2.0 WLAN profile by selecting the options
Configure, Clone and Delete respectively, from the WLAN Profile section in the Hotspot 2.0
tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
167
Services and Profiles
Working with Hotspots and Portals
3. Click Create.
The Creating Hotspot 2.0 WiFi Operator Profile page appears.
Figure 60: Creating a hotspot 2.0 WiFi operator profile
5. Click OK.
Creating a Hotspot 2.0 Identity Provider
The Hotspot 2.0 Identity provider provides authentication, accounting and online sign-up service.
There can be one or more identity providers per Hotspot 2.0 access WLAN.
To configure the HS 2.0 identity provider, you must configure the following:
Network Identifier
Follow these steps to create a Hotspot 2.0 Identity Provider - Network Identifier.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
168
Services and Profiles
Working with Hotspots and Portals
2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Network Identifier.
Online Signup and Provisioning
Follow these steps to create a Hotspot 2.0 Identity Provider - Online Signup and Provisioning.
1. Configure the following:
1. Provisioning Options
• Provisioning Service: The provisioning service is responsible for any subscription
provisioning process in which messages are communicated between the UE and the
SZ resulting in a PPS-MO provisioned into the UE. The provisioning supports both
SOAP-XML and OMA-DM as communication protocols for the process based on the
initial request coming from the UE. The provisioning service supports sign-up;
remediation and policy update flows where the UE is provisioned with a full PPS -MO
or only with internal node/s of the PPS-MO. Administrator can only set External Internal
Provisioning Services. , where the administrator is required to fill the external OSU server
URL.
• Provisioning Protocol: Select communication protocols OMA-DM or SOAP-XML.
2. Online Signup Options
• OSU NAI Realm: This configuration is only for External Provision Service. In case of
Internal Provisioning Service, the NAI realm should be configured per authentication
service, which is available during on-boarding.
• Common Language Icon: This is the default icon presented in the device for this identity
provider in case the device does not find any match for other icons per language in the
table.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
169
Services and Profiles
Working with Hotspots and Portals
• OSU Service Description: This table configures the friendly name, description and icon
per language. This information is presented on the device when it receives ANQP
message which includes OSU providers. Friendly names, which are required to be part
of the OSU certificate is automatically populated in this table. In case description is also
included in the OSU certificate it is automatically populated into the table. Administrators
are required to set the matched icon per language as included in the OSU certificate.
• Whitelisted Domain: Add the domain names of the External Portal domain.
2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Online Signup and Provisioning.
Authentication
Follow these steps to create a Hotspot 2.0 Identity Provider - Authentication.
1. Configure the following:
1. Realm: configure the realm mapping to the authentication service.
2. Auth Service: map the realm to an external RADIUS server which should be pre-configured.
3. Dynamic VLAN ID: type the VLAN ID.
2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Authentication.
Accounting
Follow these steps to create a Hotspot 2.0 Identity Provider - Accounting.
1. Configure the following:
1. Realm: if the authentication's realm is set as remote credential type, administrator should
set this realm here to the customer's external accounting server.
2. Accounting Service: select the accounting service.
2. Click Next.
You have completed creating a Hotspot 2.0 Identity Provider - Accounting.
Review
Review the configuration on the page before committing the changes to the server. Click
Create to create the Hotspot 2.0 Identity Provider.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
170
Services and Profiles
Working with Hotspots and Portals
5. Click OK.
You have completed creating a Hotspot 2.0 WLAN profile.
NOTE: You can also edit, clone and delete a Hotspot 2.0 venue profile by selecting the options
Configure, Clone and Delete respectively, from the Venue Profile section in the Hotspot 2.0
tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
171
Services and Profiles
Working with Hotspots and Portals
agents, an error message appears on the user device. You can add to or remove user agents
from this blacklist.
Following are some of the blocked user agents:
• ZoneAlarm
• VCSoapClient
• XTier NetIdentity
• DivX Player
• Symantec LiveUpdate
• Windows Live Messenger
• StubInstaller
• windows-update-agent
• Windows Live Essentials
• Microsoft Dr. Watson for Windows (MSDW)
• Avast Antivirus Syncer
• Microsoft Background Intelligent Transfer Service (BITS)
• Google Update
• TrendMicro client
• Skype WISPr
1. Go to Services & Profiles > Hotspots & Portals.
2. Select the UA Blacklist tab, and then select the zone for which you want to create the portal.
3. Click Create.
The Creating a UA Blacklist Profile page appears.
Figure 62: Creating a UA Blacklist Profile
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
172
Services and Profiles
Configuring Access Control
5. Click Create.
You have completed creating a UA Blacklist Profile
NOTE: You can also edit, clone and delete a UA blacklist profile by selecting the options
Configure, Clone and Delete respectively, from the UA Blacklist tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
173
Services and Profiles
Configuring Access Control
3. Rate Limiting: Specify and apply rate limit values for the user profile to control the data
rate. Select the Enable check-box to set the Uplink and Downlink rate limit values.
5. To create traffic control rules, click Create in the Traffic Access Control List section, and
then configure Traffic Control Rules as required. For Default Access, select whether to Allow
or Block access if no rule is matched. See Creating a User Traffic Access Control Rule on
page 174 for more information.
6. In Application Recognition and Control, select an Application Policy from the list, or click
Create to create a new policy.
For more information, see Configuring Application Controls on page 186.
7. Click OK to save the User Traffic Profile.
You have completed creating a UTP. You can now assign this traffic profile to a WLAN from the
Wireless LANs page.
NOTE: You can also edit, clone and delete a profile by selecting the options Configure, Clone
and Delete respectively, from the User Traffic tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
174
Services and Profiles
Configuring Access Control
• Source IP: Specify the source IP address to which this rule will apply. To apply this rule
to an IP address range, type the network address and the subnet mask. To apply this rule
to a single IP, clear the Subnet check box, and then enter the IP address.
• Source Port: Specify the source port to which this rule will apply. To apply this rule to a
port range, type the starting and ending port numbers in the two boxes. To apply this rule
to a single port number, clear the Range check box, and then enter the port number.
• Destination IP: Specify the destination IP address to which this rule will apply. To apply
this rule to an IP address range, type the network address and the subnet mask. To apply
this rule to a single IP, clear the Subnet check box, and then enter the IP address.
• Destination Port: Specify the source port to which this rule will apply. To apply this rule
to a port range, type the starting and ending port numbers in the two boxes. To apply this
rule to a single port number, clear the Range check box, and then enter the port number.
• Protocol: Select the network protocol to which this rule will apply. Supported protocols
include TCP, UDP, UDPLITE, ICMP (ICMPv4), ICMPV6, IGMP, ESP, AH, SCTP.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
175
Services and Profiles
Configuring Access Control
• Rule Type: Select one of the rule types from Denial Rules, QoS and Rate Limiting.
• Application Type: Select whether the application type is user defined or system defined.
• Application: select the application for which the rule applies and click OK.
3. Click Create.
The Application Policy is created.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
176
Services and Profiles
Configuring Access Control
NOTE: You can also edit, clone and delete a service by selecting the options Configure, Clone
and Delete respectively, from the OS Policy tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
177
Services and Profiles
Configuring Access Control
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
178
Services and Profiles
Configuring Access Control
NOTE: You can also edit, clone and delete a profile by selecting the options Configure, Clone
and Delete respectively, from the VLAN Pooling tab.
VLAN Pooling
When Wi-Fi is deployed in a high density environment such as a stadium or a university campus,
the number of IP addresses required for client devices can easily run into the thousands. Placing
thousands of clients into a single large subnet or VLAN can result in degraded performance due
to factors like broadcast and multicast traffic. VLAN pooling is adopted to address this problem.
VLAN pooling allows administrators to a deploy pool of multiple VLANs to which clients are
assigned, thereby automatically segmenting large groups of clients into multiple smaller
subgroups, even when connected to the same SSID. As the client device joins the WLAN, the
VLAN is assigned to one of the VLANs in the pool based on a hash of the client’s MAC address.
To use the VLAN pooling feature, you first need to create a VLAN pooling profile, and then you
can assign the profile to a specific WLAN or override the VLAN settings of a WLAN group.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
179
Services and Profiles
Configuring Access Control
NOTE: When SSID Rate Limiting (restricts total usage on WLAN) is enabled, per-user rate
limiting is disabled.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
180
Services and Profiles
Configuring Access Control
4. Click OK.
NOTE: You can also edit, clone and delete a profile by selecting the options Configure, Clone
and Delete respectively, from the Precedence tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
181
Services and Profiles
Configuring Access Control
• Restriction: Select the default action that the controller will take if no rules are matched.
Available options include: Allow only the stations listed below or Block only the
stations listed below.
2. Rules:
• MAC Address: Type the MAC address to which this L2 access policy applies.
3. Click OK.
NOTE: You can also edit, clone and delete a policy by selecting the options Configure, Clone
and Delete respectively, from the L2 Access Control tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
182
Services and Profiles
Configuring Access Control
NOTE: You can also edit, clone and delete a list by selecting the options Configure, Clone and
Delete respectively, from the Blocked Client tab.
NOTE: The whitelist only applies to destinations that are on the wired network, and it will not
work on wireless destinations.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
183
Services and Profiles
Configuring Access Control
You have created the list of whitelisted clients that can access the network.
NOTE: You can also edit, clone and delete the list by selecting the options Configure, Clone
and Delete respectively, from the Client Isolation Whitelist tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
184
Services and Profiles
Configuring Access Control
2. Select the Time Schedule tab, and then select the zone for which you want to create the
schedule.
3. Click Create.
The Create Time Schedule Table page appears.
Figure 74: Creating a Time Schedule Table
NOTE: You can also edit, clone and delete the schedule by selecting the options Configure,
Clone and Delete respectively, from the Time Schedule tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
185
Services and Profiles
Configuring Application Controls
NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the DNS Servers tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
186
Services and Profiles
Configuring Application Controls
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
187
Services and Profiles
Configuring Application Controls
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
188
Services and Profiles
Configuring Application Controls
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
189
Services and Profiles
Configuring Application Controls
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
190
Services and Profiles
Configuring Application Controls
NOTE: You can also edit, clone and delete the application policy by selecting the options
Configure, Clone and Delete respectively, from the User Defined tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
191
Services and Profiles
Configuring Application Controls
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
192
Services and Profiles
Configuring Application Controls
3. The Current Signature Package Info section displays the information about the signature
package file name, size and version.
4. In Upload Signature Package, click Browse to select the file.
5. Click Upload to upload the file. Once the import is complete, the list of system-defined
applications is updated immediately.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
193
Services and Profiles
Authentication
Authentication
You can add AAA servers to the controller in order to use them to authenticate users attempting
to associate with controller-managed APs.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
194
Services and Profiles
Authentication
• Type: Select the type of AAA server that you are creating. Options include RADIUS,
Active Directory and LDAP.
• Backup RADIUS (appears if you clicked RADIUS above): Select the Enable Secondary
Server check box if a secondary RADIUS server exists on the network.
• Global Catalog (appears if you clicked Active Directory above): Select the Enable Global
Catalog support if you the Active Directory server to provide a global list of all objects.
2. Primary Server
• If you selected RADIUS, configure the following options in the Primary Server section:
• IP Address: Type the IP address of the AAA server. Both IPv4 and IPv6 addressing
formats are supported.
• Port: Type the port number of the AAA server. The default RADIUS server port
number is 1812.
• Shared Secret: Type the AAA shared secret.
• Confirm Secret: Retype the shared secret to confirm.
If you have enabled Backup RADIUS to the Secondary Sever, you must provide
similar information as in the primary server.
See RADIUS Service Options on page 198 for more information.
• If you selected Active Directory, configure the following options in the Primary Server
section:
• IP Address: Type the IPv4 address of the AD server.
• Port: Type the port number of the AD server. The default port number (389) should
not be changed unless you have configured the AD server to use a different port.
• Windows Domain Name: Type the Windows domain name assigned to the AD server
(for example, domain.ruckuswireless.com).
• If you selected LDAP, configure the following options:
• IP Address: Type the IPv4 address of the LDAP server.
• Port: Type the port number of the LDAP server. Default is 389.
• Base Domain Name: Type the base DN in LDAP format for all user accounts (for
example, dc=ldap,dc=com).
• Admin Domain Name: Type the admin DN in LDAP format (for example,
cn=Admin;dc=<Your Domain>,dc=com).
• Admin Password: Type the administrator password for the LDAP server.
• Confirm Password: Retype the administrator password to confirm.
• Key Attribute: Type a key attribute to denote users (for example, default: uid)
• Search Filter: Type a search filter (for example, objectClass=Person).
5. Click OK.
You have completed creating a Non-proxy AAA server.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
195
Services and Profiles
Authentication
NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Non-Proxy (AP Authenticator) tab.
5. Click Test.
If the test was unsuccessful, there are two possible results (other than success) that will be
displayed to inform you if you have entered information incorrectly: Admin invalid or User
name or password invalid. These results can be used to troubleshoot the reasons for failure
to authenticate administrators with an AAA server through the controller.
You have completed testing the non-proxy AAA servers that you created.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
196
Services and Profiles
Authentication
NOTE: You must also configure the Trusted CA certificates to support TLS
encryption.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
197
Services and Profiles
Authentication
NOTE: You must also configure the Trusted CA certificates to support TLS
encryption.
5. Advanced Options - Domain name: Type the whitelisted domain name that you want to
add.
6. User Traffic Profile Mapping:
a. Type a Group Attribute Value.
b. Select a User Role from the drop-down list.
c. Click Add.
The mapped user profile is listed.
5. Click OK.
You have completed creating a Proxy AAA server.
NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Proxy (SZ Authenticator) tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
198
Services and Profiles
Authentication
Option Description
IP Address Type the IP address of the RADIUS server. Both
IPv4 and IPv6 protocols are supported.
Port Type the port number of the RADIUS server.
The default RADIUS server port number is 1812
and the default RADIUS Accounting server port
number is 1813.
Shared Secret Type the RADIUS shared secret.
Confirm Secret Retype the shared secret to confirm.
If you have a secondary RADIUS server on the network that you want to use as a backup, select
the Enable Secondary Server check box, and then configure the settings below.
Option Description
Backup RADIUS Select Enable Secondary Server.
When a secondary RADIUS server is enabled
and the primary RADIUS server becomes
unavailable, the secondary Automatic Fallback
Disable server takes over the handling of
RADIUS requests. When the primary server
becomes available again, it takes back control
over RADIUS requests from the secondary
server. If you want to prevent the primary server
from retaking control over RADIUS requests
from the secondary server, select the
Automatic Fallback Disable check box.
IP Address Type the IP address of the secondary AAA
server. IPv4 and IPv6 addressing formats are
supported.
Port Type the port number of the secondary AAA
server port number. The default RADIUS server
port number is 1812 and the default RADIUS
Accounting server port number is 1813.
Shared Secret Type the AAA shared secret.
Confirm Secret Retype the shared secret to confirm.
These options define the health monitoring settings of the primary and secondary RADIUS
servers, when the controller is configured as RADIUS proxy for RADIUS Authentication and
Accounting messages.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
199
Services and Profiles
Authentication
Option Description
Response Window Set the time (in seconds) after which, if the AAA
server does not respond to a request, the
controller will initiate the zombie period (see
below). Response Window
If the primary AAA server does not respond to
RADIUS messages sent after Response
Window expires, the controller will forward the
retransmitted RADIUS messages to the
secondary AAA server.
Zombie Period Set the time (in seconds) after which, if the AAA
server does not respond to ANY packets during
the zombie period, it will be considered to
inactive or unreachable.
An AAA server that is marked zombie (inactive
or unreachable) will be used to proxy with a low
priority. If there are other live AAA servers, the
controller will attempt to use these servers first
instead of the zombie AAA server.
The controller will only proxy requests to a
zombie server only when there are no other live
servers. Any request that is sent as a proxy to
an AAA server will continue to be sent to that
AAA server until the home server is marked
inactive or unreachable. At that point, the
request will fail over to another server, if a live
AAA server is available. The default Zombie
Period is 40 seconds.
Revive Interval Set the time (in seconds) after which, if no
RADIUS messages are sent as proxy to the
AAA server after it has been marked as inactive
or unreachable, the controller will mark the AAA
server as active again (and assume that it has
become reachable again). The default Revive
Interval is 120 seconds.
No Response Fail Click Yes to respond with a reject message to
the NAS if no response is received from the
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
200
Services and Profiles
Authentication
Option Description
RADIUS server. Click No to skip sending a
response.
NOTE: To ensure that the RADIUS fail-over mechanism functions correctly, either accept the
default values for the Response Window, Zombie Period, and Revive Interval, or make sure that
the value for Response Window is always higher than the value for RADIUS NAS request timeout
multiplied by the value for RADIUS NAS max number of retries. For third party APs, you must
ensure that the configured Response Window on the controller is higher than the RADIUS NAS
request timeout multiplied by the RADIUS value. The maximum number of retries is configured
at the 3rd party controller/AP.
Options Description
Maximum Outstanding Requests (MOR) Set the maximum outstanding requests per
server. Type 0 to disable it, or set a value
between 10 and 4096.
Threshold (% of MOR) Set a percentage value of the MOR at which
(when reached) the controller will generate an
event. Threshold (% of MOR)
For example, if the MOR is set to 1000 and the
threshold is set to 50%, the controller will
generate an event when the number of
outstanding requests reaches 500.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
201
Services and Profiles
Authentication
5. Click Test.
If the controller was able to connect to the authentication server and retrieve the configured
groups/attributes, the information appears at the bottom of the page. If the test was
unsuccessful, there are two possible results (other than success) that will be displayed to
inform you if you have entered information incorrectly: Admin invalid or User name or
password invalid. These results can be used to troubleshoot the reasons for failure to
authenticate administrators with an AAA server through the controller.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
202
Services and Profiles
Authentication
NOTE: To support 802.1X with Active Directory, an external RADIUS server (such as NPS) must
be used.
NOTE: IDM Provisioned username (also called local cache credential) is relevant only in secure
access after Onboarding.
NOTE: 802.1X (MSCHAPv2 via built-in RADIUS using AD-NPS), WebAuth, and WISPr support
AD authentication from SmartZone release in 3.2.
NOTE: 802.1X, WebAuth, and WISPr support LDAP authentication against from SmartZone
release in 3.2.
Non-proxy Mode
In the Non-proxy mode, authentication requests are sent directly by AP and not through the
controller. The local database is stored on the controller, therefore, authentication sources such
as local database and IDM-provisioned local databases are not supported.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
203
Services and Profiles
Authentication
(*) From the configuration it may seem like non-proxy RADIUS is supported in WISPr, but the
call flow goes through the controller.
NOTE: Zero-IT Onboard and HS2.0 Onboard are supported only if the controller sends the
authentication requests.
Profile Configuration
The following table details proxy and non-proxy AAA server configurations against various
platforms.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
204
Services and Profiles
Authentication
NOTE:
From
SmartZone
3.4, Role
can
contain
UTP.
Therefore,
, when you
assign a
role, you
also get
the ACL
and Rate
Limiting
policies.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
205
Services and Profiles
Authentication
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
206
Services and Profiles
Authentication
NOTE: In dynamic ACL and Rate limit, since ACL and rate limit are associated with a UTP,
assigning a UTP also assigns an ACL or rate limit.
NOTE: From
SmartZone release
3.4, UTP contains
ACL and rate limit.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
207
Services and Profiles
Authentication
configure a UTP
without a rate
limit,you effectively
only have an ACL.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
208
Services and Profiles
Authentication
PAP/CHAP Support
The following table details PAP and CHAP support for various authentication features.
NOTE: NPS
interface (AD)
is required
for
WebAuthenticaiton
(CHAP) and
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
209
Services and Profiles
Authentication
802.1X
(MSCHAPv2).
NOTE: NPS
interface (AD)
is required
for
WebAuthenticaiton
(CHAP) and
802.1X
(MSCHAPv2).
Non-proxy Mode
Active Directory No Yes* Yes No
RADIUS Yes Yes* Yes Yes
LDAP No Yes* Yes No
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
210
Services and Profiles
Accounting
. It is a global setting for all WebAuth WLANs on the AP. The default is CHAP.
Accounting
Creating Non-Proxy Accounting AAA Servers
A non proxy AAA server is used when the APs connect to the external AAA server directly.
1. Go to Services & Profiles > Accounting.
2. Select the Non-Proxy tab, and then select the zone for which you want to create the AAA
server.
3. Click Create.
The Create AAA Server page appears.
Figure 88: Creating an AAA Server
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
211
Services and Profiles
Accounting
• Type: Select the type of AAA server that you are creating. Options include RADIUS,
Active Directory and LDAP.
• Backup RADIUS (appears if you clicked RADIUS above): Select the Enable Secondary
Server check box if a secondary RADIUS server exists on the network.
2. If you selected RADIUS, configure the following options in the Primary and Secondary
server sections:
• IP Address: Type the IP address of the AAA server.
• Port: Type the port number of the AAA server. The default RADIUS server port number
is 1813.
• Shared Secret: Type the AAA shared secret.
• Confirm Secret: Retype the shared secret to confirm.
5. Click OK.
You have completed creating a Non-proxy Accounting AAA server.
For information on how to test this server, see Testing AAA Servers on page 201
NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Non-Proxy tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
212
Services and Profiles
Bonjour
5. Click OK.
You have completed creating a Proxy Accounting AAA server.
For information on how to test this server, see Testing AAA Servers on page 201
NOTE: You can also edit, clone and delete an AAA server by selecting the options Configure,
Clone and Delete respectively, from the Proxy tab.
Bonjour
Bonjour is Apple's implementation of a zero-configuration networking protocol for Apple devices
over IP.
Bonjour allows OS X and iOS devices to locate other devices such as printers, file servers and
other clients on the same broadcast domain and use the services offered without any network
configuration required.
Multicast applications such as Bonjour require special consideration when being deployed over
wireless networks. Bonjour only works within a single broadcast domain, which is usually a small
area. This is by design to prevent flooding a large network with multicast traffic. However, in
some situations, a user may want to offer Bonjour services from one VLAN to another.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
213
Services and Profiles
Bonjour
SmartZone provides two features for controlling how and where Bonjour services are available
to clients:
• Bonjour Gateway on page 214: Bridge Bonjour services from one VLAN to another.
• Bonjour Fencing on page 216: Limit the range in physical space at which Bonjour services are
available to clients.
Bonjour Gateway
Bonjour Gateway policies enable APs to provide Bonjour services across VLANs.
The controller's Bonjour gateway feature provides an mDNS proxy service configurable from
the web interface to allow administrators to specify which types of Bonjour services can be
accessed from/to which VLANs.
In order for the Bonjour Gateway to function, the following network configuration requirements
must be met:
• The target networks must be segmented into VLANs.
• VLANs must be mapped to different SSIDs.
• The controller must be connected to a VLAN trunk port.
Additionally, if the VLANs to be bridged by the gateway are on separate subnets, the network
has to be configured to route traffic between them.
The following requirements and limitations should be taken into consideration before enabling
the Bonjour Gateway feature:
• Bonjour policy deployment to an AP takes effect after the AP joins the controller.
• Some APs of one local area link must be in one subnet. The switch interfaces connected to
these APs must be configured in VLAN-trunk mode. Only by doing so can the designated
AP receive all the multicast Bonjour protocol packets from other VLANs.
• Dynamic VLANs are not supported.
• Some AP models are incompatible with this feature due to memory requirements.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
214
Services and Profiles
Bonjour
4. Click OK.
NOTE: You can also edit, clone and delete the policy by selecting the options Configure, Clone
and Delete respectively, from the Gateway tab.
You may now continue to apply this Bonjour gateway policy to an AP or AP group, as described
in Applying a Bonjour Gateway Policy to an AP or AP Group.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
215
Services and Profiles
Bonjour
Bonjour Fencing
Bonjour Fencing provides a mechanism to limit the scope of Bonjour (mDNS) service discovery
in the physical/spatial domain.
While Bonjour Fencing is related to Bonjour Gateway, they are two separate features designed
for different purposes. Bonjour Gateway bridges mDNS services across VLANs, and is useful
because Bonjour is designed as a same-VLAN protocol. Bonjour Fencing limits the range of
Bonjour service discovery within physical space, which is useful because logical network
boundaries (e.g. VLANs) do not always correlate well to physical boundaries within a building/floor.
The following considerations should be taken into account before deploying Bonjour fencing
policies:
• Bonjour fencing is not supported on Mesh APs.
• Switch interfaces to which APs are connected must be configured in VLAN trunk mode so
that Bonjour traffic gets forwarded across VLANs based on Bonjour Gateway Policies.
• Bonjour fencing is implemented at the AP, not at the controller.
• Fencing policies can be applied on a zone level only, and cannot be configured per AP group.
• In order for a wired fencing policy to work properly, wireless fencing for the same mDNS
service should also be enabled. If wired fencing is enabled but wireless is disabled, APs that
are not the "closest AP" will be unable to determine whether the source of the mDNS
advertisement was wired or wireless.
• Bonjour fencing will work for local breakout scenarios, but will not work for tunnel based
configuration.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
216
Services and Profiles
Bonjour
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
217
Services and Profiles
Bonjour
NOTE: You can also edit, clone and delete the policy by selecting the options Configure, Clone
and Delete respectively, from the Fencing tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
218
Services and Profiles
Working with Tunnels and Ports
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
219
Services and Profiles
Working with Tunnels and Ports
4. Tunnel Encryption: Select the Enable tunnel encryption check box if you want managed
APs to decrypt 802.11 packets, and then use an AES encrypted tunnel to send them to
the controller. By default, when WLAN traffic is tunneled to the controller, only the
management traffic is encrypted; data traffic is unencrypted.
5. WAN Interface MTU: Set the maximum transmission unit (MTU) for the tunnel to either
Auto (default) or Manual (a specific size 850 to 1500 bytes). MTU is the size of the largest
protocol data unit that can be passed on the controller network.
6. Click OK.
NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the Ruckus GRE tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
220
Services and Profiles
Working with Tunnels and Ports
NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the Soft GRE tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
221
Services and Profiles
Working with Tunnels and Ports
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
222
Services and Profiles
Working with Tunnels and Ports
b. ESP Proposal Type: Click Default to use the default Encapsulating Security Payload
(ESP) SA proposal type or click Specific to manually configure the ESP proposal. If you
clicked Specific, you will need to configure the following settings:
• Encryption Algorithm: Options include 3DES, AES128, AES192, AES256, and NONE.
• Integrity Algorithm: Options include MD5, SHA1, AES-XCBC, SHA256, SHA384,
and SHA512.
• DH Group: Options for Diffie-Hellman groups for ESP include None, modp768,
modp1024, modp1536, modp2048, modp3072, modp4096, modp6144, and
modp8192.
6. Rekey Options
a. Internet Key Exchange: To set time interval at which the IKE key renews, select a time
unit (day, hour, or minute) from the drop-down list, and then type a number in the box.
To disable IKE rekey, select the Disable check box. SmartZone 100/Virtual SmartZone
Essentials for Release 3.4 Administrator Guide 82 Configuring the Wireless Network
Configuring Access Points.
b. Encapsulating Security Payload: To set time interval at which the ESP key renews,
select a time unit (day, hour, or minute) from the drop-down list, and then type a number
in the box. To disable ESP rekey, select the Disable check box.
7. Certificate Management Protocol
a. DHCP Option 43 Sub Code for CA/RA Address: Set the DHCP Option 43 subcode
that will be used to discover the address of the CA/RA server on the network. The
default subcode is 8.
b. CA/RA Address: Type the IP address or FQDN of the CA/RA server. If you use the IP
address, the IP address format that you must enter will depend on the IP mode that is
configured on the controller.
c. Server Path: Type the path to the X.509 certificate on the CA/RA server.
d. DHCP Option 43 Sub Code for Subject Name of CA/RA: Set the DHCP Option 43
subcode that will be used to discover the subject name of the CA/RA server on the
network. The default subcode is 5.
e. Subject Name of CA/RA: Type an ASCII string that represents the subject name of the
CA/RA server.
8. Advanced Options
a. DHCP Option 43 Sub Code for Security Gateway: Set the DHCP Option 43 subcode
that will be used to discover the address of the security gateway on the network. The
default subcode is 7.
b. Retry Limit: Set the number of times that the controller will attempt to discover the
address of the security gateway. The default retry count is 5. Accepted values are 0
(disable) to 16.
c. Replay Window: Set the ESP replay window (in packets). The default size is 32 packets.
Accepted values are 0 (disable) to 32 packets.
d. IP Compression: To enable IP Payload Compression Protocol (IPComp) compression
before encryption, click Enable. The default value is Disable.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
223
Services and Profiles
Working with Tunnels and Ports
e. Force NAT-T: To enforce UDP encapsulation of ESP packets, click Enable. The default
value is Disable.
f. Dead Peer Detection: By default, the IKE protocol runs a health check with remote peer
to ensure that it is alive. To disable this health check, click Disable.
g. NAT-T Keep Alive Interval: To set the keep alive interval (in seconds) for NAT traversal,
type a value in the box. The default keep alive interval is 20 seconds. Accepted values
are 1 to 65536. To disable the keep alive interval, click Disable.
h. FailOver Options: To configure the failover settings when APs are unable to connect,
configure the following:
i. Retry Period: Set the number of days (minimum 3 days) during which APs will keep
attempting to connect. To keep try indefinitely, select the Forever check box.
j. Retry Interval: Set the interval (in minutes) between each retry attempt. The default retry
interval is 1 minute. Accepted values are from 1 to 30 minutes.
k. Retry Mode: If you want APs to fall back to the specified primary security gateway, click
Revertive. If you want APs to maintain connectivity with the security gateway to which
they are currently connected, click Non-revertive.
9. Click OK.
NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the IPsec GRE tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
224
Services and Profiles
Working with Tunnels and Ports
e l i f orP
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
225
Services and Profiles
Working with Tunnels and Ports
VLAN as the native VLAN, configure the AP Trunk port’s VLAN Untag ID with the native
VLAN used throughout your network.
c. VLAN Members: Type the VLAN IDs that you want to use to tag WLAN traffic that will
use this profile. You can type a single VLAN ID or a VLAN ID range (or a combination
of both). The valid VLAN ID range is 1 to 4094.
d. Enable Dynamic VLAN: Select this check box if you want the controller to assign VLAN
IDs on a per-user basis. Before enabling dynamic VLAN, you need to define on the
RADIUS server the VLAN IDs that you want to assign to users.
NOTE: This option is only available when Type is set to Access Port and 802.1X
authentication is set to MAC-based Authenticator.
3. Guest VLAN: If you want to assign a device that fails authentication to still be able to access
the Internet but to internal network resources, select this check box.
NOTE: This check box only appear when the Enable Dynamic VLAN check box is selected.
4. 802.1X
• MAC-based Authenticator: If you select this authenticator, each MAC address host is
individually authenticated. Each newly-learned MAC address triggers an EAPOL
request-identify frame.
• Port-based Authenticator: If you select this authenticator, only a single MAC host must
be authenticated for all hosts to be granted access to the network.
5. Authenticator
a. Authentication Server: Select the check-box and a controller from the drop-down menu
to use the controller as a proxy authentication server.
b. Accounting Server: Select the check-box and a controller from the drop-down menu
to use the controller as a proxy accounting server.
c. Enable MAC authentication bypass: Select this check-box if you want to use the device
MAC address as access credentials (username and password).
6. RADIUS Options
a. NAS ID: Set the NAS ID for the AP to communicate with the RADIUS server. Options
include using the AP MAC address or any User-defined address.
b. Delimiter: If AP MAC is selected to configure the NAS ID, then you can choose between
Dash or Colon as delimiters to separate.
7. Click OK.
NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the Ethernet Port tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
226
Services and Profiles
Working with Tunnels and Ports
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
227
Services and Profiles
Working with Tunnels and Ports
4. Preserved DiffServ: Configure up to eight (8) entries in the preserved DiffServ list. The
Preserved DiffServ list allows the preservation of values that have been already marked in
incoming packets either in uplink or downlink traffic.
5. Click OK.
NOTE: You can also edit, clone and delete the profile by selecting the options Configure, Clone
and Delete respectively, from the DiffServ tab.
DHCP Relay
DHCP relay agents are hosts that are used to forward DHCP packets between clients and
servers when they are not on the same physical subnet.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the DHCP Relay tab.
You will be able to view the details of the DHCP relay agents.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
228
Services and Profiles
Working with Tunnels and Ports
NOTE: The Flexi-VPN option is only available if the Access VLAN ID is 1, and when VLAN
Pooling, Dynamic VLAN and Core Network VLAN options are disabled.
NOTE: You can only apply 1024 WLAN IDs to a Flexi-VPN profile.
Flexi-VPN supports IPv4 addressing formats and Ruckus GRE tunnel protocol. It does not
support IPv6 addressing formats.
3. Select a virtual data plane for which you want to enable the Flexi-VPN feature, and then select
the Enable Flexi-VPN check-box.
4. Click OK.
You have successfully enabled the Flexi-VPN feature on the selected vDP.
You can configure the roaming criteria for a vDP so that it uses one of these two options - UE
subnet or VLAN ID to access another vDP to connect to, within a network. Before this, you must
ensure that the L3 roaming feature is enabled in the vDP.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Forwarding Rules (vSZ-D) tab.
The page with options to configure the Flexi-VPN and L3 Roaming features appears.
Figure 99: Enabling L3 Roaming
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
229
Services and Profiles
Working with Tunnels and Ports
NOTE: A fresh controller software installation or upgrade from a version that does not support
L3 roaming resets the L3 roaming configuration and it remains disabled. You must enable L3
roaming on a vDP again.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
230
Services and Profiles
Working with Tunnels and Ports
Subnet or Add VLAN ID page appears, respectively, depending on the roaming criteria you
chose.
6. Type the UE Subnet IP address or the VLAN ID as appropriate.
7. Click OK.
8. Click OK again.
In L3 Roaming Profiles, the following information about the vDP is displayed:
• vSZ-D: Displays the name of the virtual data plane.
• Version: Displays the version of the vDP.
• Activate: Displays whether L3 roaming is enabled or disabled.
• UE Subnet or VLAN ID: Depending on the global settings you choose for the roaming
criteria, the UE subnet IP address or the VLAN ID is displayed.
Tunnel Encryption
You can use the tunnel encryption feature to encrypt data that needs to be transmitted to a
private network, through a public network which does not support the protocol of the private
network. This feature is available in vSZ-H and vSZ-E.
1. Go to Services & Profiles > Tunnels and Ports.
2. Select the Tunnel Encryption (vSZ-D) tab.
The Tunnel Encryption (vSZ-D) page appears.
Figure 101: Tunnel Encryption (vSZ-D)
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
231
Services and Profiles
Location Services
3. In Global Setting, select the Enable forwarding multicast packet on tunnel mode
check-box.
4. Click OK. The form is submitted and multicast packet forwarding is enabled.
You have successfully enabled multicast forwarding for data packets in the tunnel mode.
Location Services
If your organization purchased the Ruckus Wireless Smart Positioning Technology (SPoT) location
service, the controller must be configured with the venue information that is displayed in the
SPoT Administration Portal.
After completing purchase of the SPoT location service, you will be given account login information
that you can use to log into the SPoT Administration Portal. The Admin Portal provides tools for
configuring and managing all of your venues (the physical locations in which SPoT service is
deployed). After a venue is successfully set up, you will need to enter the same venue information
in the controller.
1. Go to Services & Profiles > Location Services.
The Location Services page appears.
Figure 103: Location Services
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
232
Services and Profiles
Location Services
2. Click Create.
The Create LBS Server page appears.
Figure 104: Creating an LBS Server
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
233
Services and Profiles
DHCP
NOTE: You can also edit, clone and delete the service by selecting the options Configure, Clone
and Delete respectively, from the Location Services tab.
DHCP
DHCP functionality on SZ-managed APs allows customers to reduce costs and complexity by
removing the need for an extra box (DHCP/NAT router) to provide IP addresses to clients.
In highly distributed environments, particularly those with only a few APs per site, the ability for
an AP or a set of APs to provide DHCP/NAT support to local client devices simplifies deployment
by providing all-in-one functionality on the AP, which eliminates the need for a separate router
and DHCP server for each site. It also eases site management by providing central control and
monitoring of the distributed APs and their clients.
Three general DHCP scenarios are supported:
• SMB Single AP: DHCP is running on a single AP only. This AP also functions as the Gateway
AP.
• SMB Multiple APs (<12): DHCP service is running on all APs, among which two of the APs
will be Gateway APs. These two Gateway APs will provide the IP addresses as well as Internet
connectivity to the clients via NAT.
• Enterprise (>12): For Enterprise sites, an additional on site vDP will be deployed at the remote
site which will assume the responsibilities of performing DHCP/NAT functions. Therefore,
DHCP/NAT service will not be running on any APs (they will serve clients only), while the
DHCP/NAT services are provided by the onsite vDP.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
234
Services and Profiles
DHCP
• Bonjour Gateway
• Bonjour Fencing
• Client Isolation: If any WLAN within a zone uses a "Manual-Only" client isolation whitelist,
DHCP cannot be enabled. Only Auto and Hybrid options are supported for zones with
DHCP enabled.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
235
Services and Profiles
DHCP
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
236
Services and Profiles
DHCP
5. Click OK.
You have created a DHCP address pool. You can now apply this address pool to a DHCP
service, as described in Configuring DHCP Service Settings on page 237.
NOTE: You can also edit, clone and delete the address pool by selecting the options Configure,
Clone and Delete respectively, from the Pool tab.
4. Click Edit DHCP Service on AP. The DHCP Settings wizard appears.
Figure 107: DHCP Settings wizard
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
237
Services and Profiles
DHCP
5. On the first page of the wizard (Base Settings), configure the DHCP Configuration as follows:
• Enable on Each AP: Each AP in this zone runs its own DHCP server instance. This option
is typically used when APs are at different sites and roaming is not required.
• Enable on Multiple APs: Designate which APs will provide DHCP/NAT service. This option
is typically used when multiple APs are at the same site and roaming is required. This
option also allows you to choose whether to automatically or manually specify which APs
will provide DHCP service.
6. On the next wizard screen, (Select Pools), select up to four DHCP pools from which to assign
client IP addresses.
Figure 108: Selecting Pools
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
238
Services and Profiles
DHCP
NOTE: If you have not already created DHCP pools, you can do so from within the wizard.
Click the Plus (+) icon and configure the IP address pools as described in Creating a DHCP
Pool on page 235.
NOTE: If you selected Auto Select AP on the first wizard screen, this configuration screen
will be skipped.
8. On the Select APs wizard screen, select the AP(s) that you want to set as the primary and
secondary DHCP servers (if you previously selected Enable on Multiple APs).
Figure 109: Selecting APs
9. Click Next.
10. On the Review screen, review your settings to make sure everything is correct. Once you
are satisfied with your settings, click OK to confirm.
Figure 110: Review DHCP settings
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
239
Services and Profiles
DHCP
You have configured the DHCP server settings and applied them to an AP (or multiple APs).
These APs will now provide DHCP/NAT functionality and assign IP addresses to wireless clients
from the DHCP address pools you specified.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
240
241
• Types of Reports
• Managing Report Generation
• Rogue Access Points
• Viewing AP Client Statistics
• Ruckus AP Tunnel Stats
Types of Reports
The controller provides the following types of reports:
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
241
Working with Reports
Managing Report Generation
NOTE: Global filter settings does not apply to the Reports feature.
As reports are segmented by individual administrators, each administrator’s reports are unique
and applies only to them.
Creating Reports
To create a new report:
1. From the left pane, select Report > Report Generation. Figure 111: Report Generation
Screen on page 242 appears.
Figure 111: Report Generation Screen
2. Click Create, Figure 112: Create Reports Screen on page 242 appears.
Figure 112: Create Reports Screen
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
242
Working with Reports
Managing Report Generation
3. Enter the required parameters as explained in Table 32: Report Parameters on page 243.
4. Click OK.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
243
Working with Reports
Managing Report Generation
Time Filter
Time Interval Defines the time interval at Select the required time
which to generate the report. interval.
Time Filter Defines the time duration for Select the required time filter.
which to generate the report.
Schedules
Enable/Disable Specifies the scheduled time By default the option is
when a report must be disabled. Select Enable and
generated. select the Interval, Hour and
Minute. You can add multiple
schedules.
Email Notification
Enable/Disable Triggers an email notification By default the option is
when the report is generated. disabled. Select Enable and
click the Add New and enter
the email address. You can
add multiple email addresses.
Export Report Results
Export Report Results, Uploads the report results to By default the option is
Enable/Disable an FTP server. disabled. Select Enable and
select the FTP Server.
NOTE: You can also edit or delete a report by selecting the options Configure or Delete
respectively.
Generating Reports
To generate a report:
1. From the left pane, select Report > Report Generation. Figure 111: Report Generation
Screen on page 242 appears.
2. Select the required report from the list and click Generate. The Report Generated form
appears.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
244
Working with Reports
Rogue Access Points
3. Click OK, the report will be generated and listed in the Report Results area.
4. Select the required format from the Result Links column and click Open.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
245
Working with Reports
Viewing AP Client Statistics
Table 34: AP Client Statistics Report Attributes on page 246 contains historical client statistics
report based on the UE session statistics.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
246
Working with Reports
Ruckus AP Tunnel Stats
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
247
Working with Reports
Ruckus AP Tunnel Stats
Table 36: Ruckus GRE report attributes on page 248 contains the report based on the statistics
for Ruckus GRE. Each entry contains the 15 minutes cumulative data.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
248
Working with Reports
Ruckus AP Tunnel Stats
Table 38: SoftGRE Report Attributes on page 249 contains the report based on the statistics for
SoftGRE. Each entry contains the 15 minutes cumulative data.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
249
Working with Reports
Ruckus AP Tunnel Stats
Table 40: SoftGRE + IPsecReport Attributes on page 250 contains the report based on the
statistics for access point IPsec. Each entry contains the 15 minutes cumulative data.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
250
Working with Reports
Ruckus AP Tunnel Stats
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
251
Troubleshooting
Troubleshooting Client Connections
Troubleshooting 9
In this chapter:
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
252
Troubleshooting
Troubleshooting Client Connections
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
253
Troubleshooting
Troubleshooting through Spectrum Analysis
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
254
Troubleshooting
Troubleshooting through Spectrum Analysis
The 2.4GHz band spans from 2400 - 2480 GHz and 5GHz band spans from 5.15 - 5.875
GHz.
You can select and view the spectrum analysis trends in these graphs:
• Spectrum Usage: This chart uses a color-based view to show collections of data points
over time. As more data samples are measured at a specific frequency and amplitude
coordinate, the color shown at that coordinate will change. If you choose to view colors
by amplitude, the warm colors depict higher amplitude and cool colors lower amplitudes.
If you view the colors by density, the warm colors depict a high number of samples at a
given coordinate and cool colors show low number of samples at a given coordinate.
• Real-Time FFT : This chart is a second-by-second (2sec) update of measured data across
the band. If you view by Amplitude (signal strength), then the chart displays both average
and maximum amplitudes of energy measured across the band for that sample period. If
you view by Utilization (duty cycle), then the chart displays the percentage (%) of time at
which the frequency is utilized at an amplitude above N. The amplitude threshold is
configurable but the default is -85dBm.
• Swept Spectrogram: This chart displays a waterfall of color over time, where each horizontal
line in the waterfall represents one sample period (e.g. 2 seconds), and the full waterfall
display spans 2 minutes of time (60 sample bins of 2sec each). There are two display
options for the spectrogram chart:
• Amplitude: Shows both average and maximum amplitude of energy measured across
the band for that sample period.
• Utilization: Shows the percentage of time at which the frequency is utilized at an
amplitude above N. The amplitude threshold is configurable but the default is -85dBm.
5. After you select the parameters that you want to use to view the graphs, click Start.
6. Click Stop to terminate viewing spectrum analysis trends.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
255
Administering the Controller
Managing Administrator and Roles
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
256
Administering the Controller
Managing Administrator and Roles
NOTE: You can also edit and delete the group configuration by selecting the options Configure,
and Delete respectively, from the Groups tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
257
Administering the Controller
Managing Administrator and Roles
3. Password: Type the password that this administrator will use (in conjunction with the
Account Name) to log on to the controller.
4. Confirm Password: Type the same password as above.
5. Phone: Type the phone number of this administrator.
6. Email: Type the email address of this administrator.
7. Job Title: Type the job title or position of this administrator in your organization.
8. Click OK.
NOTE: You can also edit and delete the admin account by selecting the options Configure, and
Delete respectively, from the Administrator tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
258
Administering the Controller
Managing Administrator and Roles
2. Type: Select the type of RADIUS server that you are using. Options include:
• RADIUS: Click this option to use a Remote Authentication Dial-In User Service (RADIUS)
server on the network for authenticating controller administrators.
• TACACS+: Click this option to use a Terminal Access Controller Access-Control System
Plus (TACACS+) server on the network for authentication controller administrators.
3. Realm: Type the realm (or realms) to which the RADIUS server belongs. If the RADIUS
server belongs to multiple realms, use a comma (,) to separate the realm names.
4. Backup RADIUS: Select the Enable Secondary Server to back up the RADIUS server
configuration.
a. Primary Server: Type the IP address, port, shared secret for the primary server that
needs to be backed up.
b. Secondary Server: Type the IP address, port, shared secret for the secondary server
to which the back must be done.
c. Failover Policy at NAS:'
• Request Timeout: Type the timeout period (in seconds) after which an expected
RADIUS response message is considered to have failed.
• Max Number of Retries: Type the number of failed connection attempts after which
the controller will fail over to the backup RADIUS server.
• Reconnect Primary: Type the number of minutes after which the controller will attempt
to reconnect to the primary RADIUS server after failover to the backup server.
NOTE: You can also edit, clone and delete the server by selecting the options Configure, Clone
and Delete respectively, from the Administrator tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
259
Administering the Controller
Backing Up and Restoring Clusters
NOTE: You can also edit and delete the list by selecting the options Configure and Delete
respectively, from the Access Control List tab.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
260
Administering the Controller
Backing Up and Restoring Clusters
4. Click Yes.
The cluster restore process may take several minutes to complete. When the restore process
is complete, the controller logs you off the web interface automatically.
ATTENTION: Do not refresh the controller web interface while the restore process is in
progress. Wait for the restore process to complete successfully.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
261
Administering the Controller
Backing Up and Restoring Clusters
Backing Up and Restoring the Controller's Network Configuration from an FTP Server
In addition to backing up and restoring the controller's network configuration from its own
database, the controller supports backup and restore of its network configuration from an FTP
server using the CLI.
This section describes the requirements for backing up and restoring the controller's network
configuration from an FTP server, the information that is included in the backup file, and how to
perform the backup and restore process.
To back up and restore the controller's network configuration from an FTP server, the controller
must have already been set up and in service. In case of a multi-node cluster, all the nodes in
the cluster must be in service.
The following table lists the network configuration that is backed up from the control and data
planes when you perform a backup procedure to an FTP server.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
262
Administering the Controller
Backing Up and Restoring Clusters
4. Enter backup network to back up the controller network configuration, including the control
plane and data plane information.
The controller creates a backup of its network configuration on its database.
Figure 120: Run backup network
5. Enter show backup-network to view a list of backup files that have been created.
Verify that the Created On column displays an entry that has a time stamp that is approximate
to the time you started the backup.
Figure 121: Enter the show backup-network command
6. Enter copy backup-network {ftp-url}, where {ftp-url} (remove the braces) is the
URL or IP address of the FTP server to which you want to back up the cluster configuration.
The CLI prompts you to choose the number that corresponds to the backup file that you
want to export to the FTP server.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
263
Administering the Controller
Backing Up and Restoring Clusters
7. Enter the number of the backup file that you want to export to the FTP server.
The controller encrypts the backup file, and then exports it to the FTP server. When the export
process is complete, the following message appears on the CLI:
Succeed to copy to remote FTP server
Successful operation
Figure 122: Succeed to copy to remote FTP server indicates that you have
exported the backup file to the FTP server successfully
8. Using an FTP client, log on to the FTP server, and then verify that the backup file exists.
The file format of the backup file is
network_<YYYYMMDDHHmmss>_<controller-version>.bak.
For example, if you created the backup file on October 24th 2013 at 02:40:22 and the
controller version is 2.5.0.0.402, you should see a file named
network_20131024024022_2.5.0.0.402.bak on the FTP server.
CAUTION: Restoring a backup file to the controller requires restarting all of the controller
services.
Follow these steps to restore a backup file of the controller's network configuration that you
previously uploaded to an FTP back to the controller.
1. Log on to the controller from the CLI. For more information, see the corresponding Command
Line Interface Reference Guide for your controller platform.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
264
Administering the Controller
Backing Up and Restoring Clusters
3. Enter show cluster-state to display the statuses of the node and the cluster.
Before continuing to the next step, verify that both the node and the cluster are in service.
Figure 124: Verify that both the node and the cluster are in service
4. Enter the following command to log on to the FTP server and check for available backup files
that can be copied to the controller:
copy <ftp-url> backup-network
5. If multiple backup files exist on the FTP server, the CLI prompts you to select the number
that corresponds to the file that you want to copy back to the controller.
If a single backup file exists, the CLI prompts you to confirm that you want to copy the existing
backup file to the controller.
When the controller finishes copying the selected backup file from the FTP server back to
the controller, the following message appears: Succeed to copy the chosen file
from the remote FTP server
6. Enter show backup-network to verify that the backup file was copied back to the controller
successfully.
Figure 125: Verify that the backup file was copied to the controller successfully
7. Run restore network to start restoring the contents of the backup file to the current controller.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
265
Administering the Controller
Backing Up and Restoring Clusters
The CLI displays a list of backup files, and then prompts you to select the backup file that
you want to restore to the controller.
8. Enter the number that corresponds to the backup file that you want to restore.
Figure 126: Enter the number that corresponds to the backup file that you want to
restore
The CLI displays the network configuration that the selected backup file contains.
If the serial number of the current controller matches the serial number contained in one of
the backup files, the CLI automatically selects the backup file to restore and displays the
network configuration that it contains.
9. Type yes to confirm that you want to restore the selected backup file. The controller starts
the restore process and performs the following steps:
a) Stop all services.
b) Back up the current network configuration.
This will enable the controller to roll back to the current configuration, in case there is an
issue with the restore process.
c) Clean up the current network configuration.
The controller deletes its previous network configuration, including static routes, name server,
user defined interfaces, etc.
10. Restore the network configuration contained in the selected backup file.
11. Restart all services.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
266
Administering the Controller
Backing Up and Restoring Clusters
When the restore process is complete, the following message appears on the CLI: All
services are up!
Figure 127: The controller performs several steps to restore the backup file
12. Do the following to verify that the restore process was completed successfully:
a) Run show cluster-state to verify that the node and the cluster are back in service.
b) Run show interface to verify that all of the network configuration settings have been restored.
Figure 128: Verify that the node and cluster are back in service and that the network
configuration has been restored successfully
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
267
Administering the Controller
Backing Up and Restoring Clusters
You have completed importing and applying the network configuration backup from the FTP
server to the controller.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
268
Administering the Controller
Backing Up and Restoring Clusters
A system configuration backup does not include control plane settings, data plane settings, and
user-defined interface settings.
1. Go to Administration > Backup and Restore.
2. Select the Configuration tab.
3. In System Configuration Backup History, click Backup.
The following confirmation message appears: Are you sure you want to back up
the controller’s configuration?
4. Click Yes.
A progress bar appears as the controller creates a backup of the its database. When the
backup process is complete, the progress bar disappears, and the backup file appears under
the System Configuration Backup History section.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
269
Administering the Controller
Backing Up and Restoring Clusters
5. Click OK.
4. After you verify the controller is able to connect to the FTP server successfully, click OK to
save the FTP server settings.
You have completed configuring the controller to export the configuration backup file to an FTP
server.
NOTE: Take note of the backup version that you are using. At the end of this procedure, you
will use the backup version to verify that the restore process was completed successfully.
4. Click Yes. The following message appears: System is restoring. Please wait...
When the restore process is complete, the controller logs you off the web interface
automatically.
5. Log on to the controller web interface.
Check the web interface pages and verify that the setting and data contained in the backup
file have been restored successfully to the controller.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
270
Administering the Controller
Upgrading the Controller
CAUTION: Although the software upgrade process has been designed to preserve all controller
settings, Ruckus Wireless strongly recommends that you back up the controller cluster before
performing an upgrade. Having a cluster backup will ensure that you can easily restore the
controller system if the upgrade process fails for any reason.
CAUTION: Ruckus Wireless strongly recommends that you ensure that all interface cables are
intact during the upgrade procedure.
CAUTION: Ruckus Wireless strongly recommends that you ensure that the power supply is not
disrupted during the upgrade procedure.
If you are managing a SCG200 controller, you can also perform system configuration backup,
restore, and upgrade from the controller command line interface.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
271
Administering the Controller
Upgrading the Controller
NOTE: The Upgrade History tab displays information about previous cluster upgrades.
4. In Upload, select the Run Pre-Upgrade Validations check box to verify if the data migration
was successful. This option allows you to verify data migration errors before performing the
upgrade.
5. Click Browse to select the patch file.
6. Click Upload to upload the controller configuration to the one in the patch file.
The controller uploads the file to its database, and then performs file verification. After the file
is verified, the Patch for Pending Upgrade section is populated with information about the
upgrade file. If data migration was unsuccessful, the following error is displayed: Exception
occurred during the validation of data migration. Please apply the
system configuration backup and contact system administrator.
7. You can now:
• Click Upgrade to start the upgrade process without backing up the current controller
cluster or its system configuration, or
• Click Backup & Upgrade to back up the controller cluster and system configuration before
performing the upgrade.
When the upgrade (or backup-and-upgrade) process is complete, the controller logs you off the
web interface automatically. When the controller log on page appears again, you have completed
upgrading the controller.
In the Current System Information section, check the value for controller version. If the firmware
version is newer than the firmware version that controller was using before you started the
upgrade process, then the upgrade process was completed successfully.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
272
Administering the Controller
Upgrading the Controller
NOTE: APs periodically send scheduled configuration requests to the controller, including the
firmware version. Therefore, when an AP joins a zone for the first time, the firmware version is
verified by the controller. If the firmware version is different from that which is configured for the
zone, the controller responds with a request to upgrade it, after which the AP initiates a request
to upgrade the firmware using HTTP.
NOTE: APs periodically send scheduled configuration requests to the controller, including
the firmware version. Therefore, when an AP joins a zone for the first time, the firmware version
is verified by the controller. If the firmware version is different from that which is configured
for the zone, the controller responds with a request to upgrade it, after which the AP initiates
a request to upgrade the firmware using HTTP.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
273
Administering the Controller
Upgrading the Controller
• If you have an FTP server, back up the entire cluster and upload the backup files from all the
nodes in a cluster to a remote FTP server. See Backing Up to an FTP Server on page 345
for remote backup instructions and Restoring from an FTP Server on page 347 for remote
restore instructions.
You have successfully updated the AP models and AP firmware with the patch file, without
having to upgrade the controller software.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
274
Administering the Controller
Upgrading the Controller
3. In Patch File Upload, click Browse to select the patch file (.ximg file).
4. Click Upload.
The controller uploads the file to its database, and then performs file verification. After the file
is verified, the Patch for Pending Upgrade section is populated with information about the
upgrade file.
The following upgrade details are displayed:
• Patch File Name: Displays the name of the patch file.
• Patch File Size: Displays the size of the patch file.
• Patch Version: Displays the version of the patch file.
5. In Data Planes, choose a patch file version from the Select upgrade version.
6. Click Apply to apply the patch file version to the virtual data plane.
The following information about the virtual data plane is displayed after the patch file upgrade
is completed.
• Name: Displays the name of the virtual data plane.
• DP MAC Address: Displays the MAC IP address of the data plane.
• Firmware: Displays the version of the data plan that has been upgraded.
• Registration State: This field displays whether all licenses pertaining to the data plane are
approved.
• Upgrade Status: Displays the completion stats of the patch file upgrade for the virtual data
plane.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
275
Administering the Controller
Managing Licenses
Managing Licenses
Depending on the number of Ruckus Wireless APs that you need to manage with the controller,
you may need to upgrade the controller license as your network expands.
The maximum number of access points that the controller can manage is controlled by the
license file that came with the controller. If the number of access points on the network exceeds
the limit in the license file, you will need to obtain an additional license file and upload it to the
controller.
NOTE: For information on obtaining additional license files, contact Ruckus Wireless Support
or an authorized Ruckus Wireless reseller.
The maximum number of access points that a license supports depends on its stock-keeping
unit (SKU).
NOTE: The option to import a license file manually into the controller is only available if the
controller is using the cloud license server.
1. Obtain the license file. You can do this by logging on to your Ruckus Wireless Support account,
going to the license management page, and then downloading the license file (the license file
is in .bin format).
2. Log on to the controller web interface, and then go to Administration > Licenses.
3. Select the Installed Licenses tab.
4. Select the node for which you are uploading the license file and click Upload.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
276
Administering the Controller
Managing Licenses
The Upload License page appears where you must provide the following information:
• Select Controller: Select the node for which you are uploading the license file.
• Select License File: Click Browse, locate the license file (.bin file) that you downloaded
from your Ruckus Wireless Support account, and then select it.
The page refreshes, and the information displayed changes to reflect the updated information
imported from the SmartLicense platform.
You have completed manually synchronizing the controller with the license server.
NOTE: You can upload and download license files only if the controller is using the Ruckus
Wireless cloud license server.
4. Click Download. Your web browser downloads the license files from the controller.
5. When the download is complete, go to the default download folder that you have configured
for your web browser, and then verify that the binary copy of the license files (with .bin
extension) exists.
You have completed downloading copies of the controller licenses.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
277
Administering the Controller
Managing Licenses
4. Click OK.
5. Click Sync Now and the controller saves the selected license server configuration, deletes
all of its saved license data, and then automatically synchronizing the license information with
the selected license server.
You have completed configuring the license server that the controller will use.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
278
Administering the Controller
ZoneDirector to SmartZone Migration
You have successfully assigned a license bandwidth to the virtual data plane.
NOTE: Only ZD versions 9.13, 9.13.1, 9.13.2 and 9.13.3 are supported.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
279
Administering the Controller
Monitoring Administrator Activities
• Date and Time: Date and time when the alarm was triggered
• Administrator: Name of the administrator who performed the action
• Source IP: Displays the IP address of the device form which the administrator manages
the controller.
• Browser IP: IP address of the browser that the administrator used to log on to the controller.
• Action: Action performed by the administrator.
• Resource: Target of the action performed by the administrator. For example, if the action
is Create and the object is Hotspot Service, this means that the administrator created a
new hotspot service.
• Description: Displays additional details about the action. For example, if the administrator
created a new hotspot service, this column may show the following: Hotspot
[company_hotspot] .
Click to export the administrator activity list to a CSV file. You can view the default
download folder of your web browser to see the CSV file named clients.csv. Use a
spreadsheet application (for example, Microsoft® Excel®) to view the contents of the CSV
file.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
280
281
• Viewing Events
• Sending SNMP Traps and Email Notifications for Events
• Configuring Event Threshold
• Configuring Alarms
Viewing Events
An event is an occurrence or the detection of certain conditions in and around the network. An
AP being rebooted, an AP changing its IP address, and a user updating an AP's configuration
are all examples of events.
Go to Events and Alarms > Events.
The Events page appears displaying the following information:
You can also click the icon to apply filters, to display events based on time and severity.
• Date and Time: Displays the date and time when the event occurred
• Code: Displays the event code (see the Alarm and Event Reference Guide for your controller
platform more information).
• Type: Displays the type of event that occurred (for example, AP configuration updated).
• Severity: Displays the severity level assigned to the events such as Critical, Debug,
Informational, Warning, Major etc.
• Activity: Displays additional details about the event, including (if available) the specific
access point, control plane, or data plane that triggered the event.
NOTE: Click to export the event details to a CSV file. Check the default download folder
of your web browser and look for a file named events.csv and view it using a spreadsheet
application (for example, Microsoft Excel®).
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
281
Managing Events and Alarms
Configuring Event Threshold
You can also manually trigger SNMP traps without generating events using CLI. You can use
the #trigger-trap <event code> command to trigger traps for respective events with
their default attributes.
You can acquire the status of a specific client MAC address by using the query
RUCKUS-CTRL-MIB. For more information, see the SmartZone SNMP MIB Reference Guide.
1. Go to Events and Alarms > Events.
2. Click the Event Management tab.
The Event Management page appears displaying the following information:
• Email Notification: Select the Enable check box, and then type an email address or email
addresses in the Mail To box. If you want to send notifications to multiple recipients, use
a comma to separate the email addresses. Then, click OK.
• Events: View the table and select the events for which you want to send traps or email
notifications (or both). Select the Enable or Disable options from the drop-down menu,
and configure the following:
• Enable SNMP Notification: Click this link to enable SNMP trap notifications for all selected
events.
• Enable Email: Click this link to enable email notifications for all selected events.
• Enable DB Persistence: Click this link to enable saving of all selected events to the
controller database. If an event is already currently enabled, it will stay enabled after
you click this link.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
282
Managing Events and Alarms
Configuring Alarms
Configuring Alarms
Alarms are a type of event that typically warrants your attention. Alarms are generated by managed
access points and the controller system (control plane and data plane).
Go to Events and Alarms > Alarms.
The Alarms page appears displaying the following information:
• Date and Time: Displays the date and time when the alarm was triggered.
• Code: Displays the alarm code (see the Alarm and Reference Guide for your controller
platform for more information).
• Alarm Type: Displays the type of alarm event that occurred (for example, AP reset to factory
settings).
• Severity: Displays the severity level assigned to the events such as Critical, Major, Minor
and Warning.
• Status: Indicates whether the alarm has already been cleared or still outstanding.
• Activity: Displays additional details about the alarm, including (if available) the specific
access point, control plane, or data plane that triggered the alarm.
• Acknowledged On: Displays the date and time when the administrator acknowledge the
alarm.
• Cleared By: Displays information about who cleared the alarm.
• Cleared On: Displays the date and time when the alarm was cleared.
• Comments: Displays administrator notes recorded during alarm management.
NOTE: Click to export the alarms details to a CSV file. Check the default download folder
of your web browser and look for a file named alarms.csv and view it using a spreadsheet
application (for example, Microsoft Excel®).
Clearing Alarms
Clearing an alarm removes the alarm from the list but keeps it on the controller's database.
To clear an alarm:
1. Select the alarm form the list and click Clear Alarm. The Clear Alarm page appears.
2. Type your comments and select Apply.
Acknowledging Alarms
Acknowledging an alarm lets other administrators know that you have examined the alarm. After
you acknowledge an alarm, it will remain on the list of alarms and will show the date and time
that you acknowledged it.
To acknowledge an alarm:
1. Select the alarm from the list and click Acknowledge Alarm.
This message appears:
Are you sure you want to acknowledge the selected alarms?
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
283
Managing Events and Alarms
Configuring Alarms
.
2. Select Yes.
Applying Filters
You can view a list of alarms by date, time, severity and status.
1.
Click the icon.
The Apply Filters page appears. Configure the following:
1. Severity: Select the severity level by which you want to filter the list of alarms.
2. Status: Select the status by which you want to filter the list of alarms.
3. Date and Time: Select the alarms by their start and end dates.
2. Click OK.
All the alarms that meet the filter criteria are displayed on the Alarms page and the display
changes to Filter On.
You can export the alarms into a CSV file by clicking the icon.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
284
285
Diagnostics 12
In this chapter:
• Applying Scripts
• Applying AP CLI Scripts
• Viewing and Downloading Logs
• Viewing RADIUS Proxy Settings
Applying Scripts
New AP models and firmware updates are supported without the need to upgrade the controller
image by using AP patch files and diagnostic scripts.
1. Go to Administration > Diagnostics > Scripts.
2. Select the Patch/Diagnostic Scripts tab.
3. Select the Upload to current node check-box.
4. Click Browse to select a script that you want to upload to the controller.
5. Click Upload.
The script is listed in the System Uploaded Scripts section.
If you have uploaded a patch script, it is displayed in the System Uploaded Patch Scripts
section with the following information:
• Name of the patch file
• Patch file description
• Supported AP firmware version
• AP model number
Click Delete to delete scripts.
6. Click Apply Patch to apply the patch file to the AP model or firmware as appropriate.
You have successfully applied scripts to the controller AP.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
285
Diagnostics
Viewing and Downloading Logs
You have successfully completed downloading log files/snapshot logs from the controller.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
286
Diagnostics
Viewing and Downloading Logs
Application Description
API Stands for application program interface (API), this provides an interface
for customers to configure and monitor the system
AUT Manages the sessions in the controller's TTG module
CaptivePortal Performs portal redirect for clients and manages the walled garden and
blacklist
Cassandra The controller's database server that stores most of the run-time
information and statistical data
CNR An application that obtains TTG configuration updates and applies the
settings to related modules
Configurer Performs configuration synchronization and cluster operations (for
example, join, remove, upgrade, backup, and restore)
Diagnostics An interface that customers can use to upload Ruckus Wireless scripts
for performing troubleshooting or applying software patches
ElasticSearch Scalable real-time search engine used in the controller
Memcached The controller's memory cache that stores client authentication
information for fast authentication or roaming
MemProxy Replicates MemCached entries to other cluster nodes
Mosquitto A lightweight method used to carry out messaging between LBS and
APs
NC The Node Controller, which monitors all of the controller's TTG
processes
Northbound Performs UE authentication and handles approval or denial of UEs to
AP
RadiusProxy Sets the RADIUS dispatch rules and synchronizes configuration to each
cluster node
SMF An application that monitors the health of TTG processes
SNMP Provides a framework for the monitoring devices on a network. The
SNMP manager is the system used to control and monitor the activities
of network hosts using SNMP.
SubscriberManagement A process for maintaining local user credentials for WISPr authentication
SubscriberPortal Internal portal page for WISPr (hotspot)
System Collects and sends log information from all processes
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
287
Diagnostics
Viewing RADIUS Proxy Settings
Application Description
Web Runs the controller’s management web server
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
288
289
Appendix
A
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D
Communication
The table below lists the ports that must be opened in the network firewall to ensure that the
SCG/vSZ-D/SZ/vSZ (controller), managed APs, and RADIUS servers can communicate with each
other successfully.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
289
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D Communication
be upgraded successfully
to the new firmware, open
both ports 11443 and 91 in
the network firewall.
23233 UDP and AP Data plane Yes GRE tunnel (required only
TCP when tunnel mode is GRE
over UDP)
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
290
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D Communication
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
291
Ports to Open for AP-SCG/SZ/vSZ/vSZ-D Communication
NOTE: The destination interfaces are meant for three interface deployments. In a single interface
deployment, all the destination ports must be forwarded to the combined management/control interface
IP address.
SmartZone 100 and Virtual SmartZone Essentials Administrator Guide for Release 3.5.1
292
Index
802.11 118 application policies (continued)
802.11w MFP 118 creating 187, 191
deleting 187, 191
editing 187, 191
A application policy 175
aaa server 196, 201–202 creating 175
testing 196, 201 applications 155
AAA server authentication 194 control 155
Access Point Configuration 94 monitoring 155
administration 256–259 recognition 155
access control 259 Applying a WLAN Template 65
creating 259 Applying WLAN Template 124
deleting 259 Applying Zone Template 88
editing 259 Applying Zone Templates 64
access control list 259 Approving APs 36
accounts 257 APs 67
creating 257 Assigning Certificates to Services 56
deleting 257 authentication compatibility 202
editing 257
radius server 258 B
cloning 258
creating 258 Background Scanning 74
deleting 258 backing up 262
editing 258 FTP 262
user groups 256 backing up configuration 262
creating 256 ftp 262
deleting 256 backup 260
editing 256 Band Balancing 118
administrator activity 279 blocking clients 182
Alarm 50 cloning 182
Acknowledging 50 creating 182
Clearing 50 deleting 182
alarms 20, 283 editing 182
acknowledging 283 bonjour application 214
clearing 283 bonjour fencing 216
filters 283 bonjour fencing policy 216
AP Client Statistics 246 cloning 216
AP Firmware Version 88, 125 creating 216
AP groups 67, 76 deleting 216
cloning 76 editing 216
deleting 76 bonjour gateway policy 214
editing 76 cloning 214
managing 76 creating 214
AP Groups 76 deleting 214
AP Health 21 editing 214
AP Registration Rule 37 Bypassing Apple CNA 118
Clone 37
Create 37
Delete 37
C
Edit 37 Certificate Signing Request 56
AP Status 89 Certificates 55
AP Zones 68 Change AP Firmware 123
application control 186 Changing AP Firmware Version 125
application policies 187, 191 Changing the Administrator Password 17
cloning 187, 191 ChannelFly 74
Chassis View 42 Critical AP Tagging 38
Client Admission Control 119
client isolation whitelist 183
cloning 183
D
creating 183 Data Planes 40
deleting 183 dhcp pool 235
editing 183 cloning 235
Client Load Balancing 119 creating 235
Client Number Report 241 deleting 235
Client Number vs Airtime Report 241 editing 235
cluster backup 260 dhcp relay 228
creating 260 dhcp service 234
cluster configuration 268–271 dhcp settings 237
backing up 268 diagnostics 285–286, 288
downloading 271 ap cli scripts 285
ftp 270 diagnostic scripts 285
restoring 270 logs 286
scheduling 269 patch scripts 285
Cluster Node 21 radius proxy 288
Cluster Node Health Metrics 21 diffserv profile 227
Cluster Nodes 42 cloning 227
Cluster Redundancy 42–43 creating 227
Cluster SwitchOver 88, 125 deleting 227
cluster versions 273 editing 227
roll back 273 DNS server profile 185
communication ports 289 cloning 185
Configuring Access Points 89 creating 185
deleting 89 deleting 185
moving 89 editing 185
Configuring Client Admission Control 86 dynamic psk 149, 151–152
Configuring FTP Server Settings 35 generating 151
Creating 35 importing 152
Deleting 35 viewing 151
Editing 35
Configuring SCI Settings 31
Creating 31 E
Deleting 31
Editing Swap Configuration 97
Editing 31
Editing System Time 28
Configuring SMTP Server Settings 35
ethernet port profile 224
Configuring SNMP Agent Settings 31
cloning 224
Creating 31
creating 224
Deleting 31
deleting 224
Editing 31
editing 224
Configuring SNMP v2 Agent 32
Ethernet Port Type 85
Configuring SNMP v3 Agent 32
Event 50
Configuring the Control Plane 44
events 281–282
Deleting 44
email notification 281
Restarting 44
events threshold 282
Shutting Down 44
configuring 282
Configuring the Remote Syslog Server 29
snmp traps 281
Continuously Disconnected APs Report 241
viewing 281
Control Planes 40
Exporting Zone Template 64
copyright information 9
External DPSK 154
Creating a WLAN Group 101
Extracting a WLAN Template 124
Creating CSR 56
Extracting a Zone Template 87
Cloning 56
Deleting 56
Editing 56
Creating New Zone 87
F L
Failed Client Associations Report 241 L2 access control 181
Fast BSS Transition 118 cloning 181
Filtering Events 50 creating 181
firewall ports 289 deleting 181
flexi vpn 228 editing 181
enabling 228 layer 3 roaming 229–230
forwarding 231 enabling 230
multicast packets 231 roaming criteria 229
legal 9
license 276–278
G downloading 277
Generating Reports 244 importing 276
Global Filters 18 license bandwidth 278
guest access portal 158 license server 278
cloning 158 configuring 278
configuring 158 managing 276
creating 158 synchronising 277
deleting 158 viewing 276
LLDP Attributes 84
local user 134
H cloning 134
configuring 134
Health 20
creating 134
Hierarchy Overview 67
deleting 134
Hospot (WISPr) 160
location services 232
hotspot 2.0 identity provider 168
cloning 232
creating 168
creating 232
hotspot 2.0 services 165
deleting 232
hotspot 2.0 venue profile 170
editing 232
cloning 170
logging off 17
configuring 170
creating 170
deleting 170 M
hotspot 2.0 wlan profile 166
cloning 166 Managed Access Points 94
configuring 166 Managing AP Certificates 57
creating 166 Managing APs 98
deleting 166 Managing Report Generation 242
hotspot portal 160 Managing WLANs 123
cloning 160 Maps 20, 23
creating 160 Marking Rouge Access Points 245
deleting 160 migration 279
editing 160 ZoneDirector to SmartZone 279
Mobility Domain ID 120
Model-Based Settings 82
I Monitoring Cluster Settings 50
Monitoring Zones and AP Groups 86
Importing New Certificates 55
Moving Single Access Point 97
Deleting 55
Editing 55
Importing Zone Templates 65 N
Interface and Routing 41
ipsec 221 Network Settings 50
cloning 221 New Client Associations Report 241
creating 221 non-proxy accounting server 211
deleting 221 cloning 211
editing 221 creating 211
deleting 211
editing 211
non-proxy auth server 196 ruckus gre (continued)
testing 196 creating 219
non-proxy authentication server 194 deleting 219
cloning 194 editing 219
creating 194 Ruckus GRE Tunnels 247
deleting 194
editing 194
notifications 20
S
Setting Filters 18
O Setting the Northbound Portal Password 31
Setting Up the Controller 14
OS policy 176 severity 20
cloning 176 Signature Package 192
creating 176 soft gre 220
deleting 176 cloning 220
editing 176 creating 220
OS policy rule 177 deleting 220
creating 177 editing 220
SoftGRE IPsec Tunnels 250
SoftGRE Tunnels 248
P subscription package 136
Port Settings 85 configuring 136
Portal-based WLANs 120 creating 136
ports to open 289 deleting 136
precedence profile 180 Summary 50
cloning 180 Support Log 95
creating 180 Swapping 97
deleting 180 Swapping Access Points 95
editing 180 Swapping APs 95
Prioritizing AP Registration Rules 38 Switchover Cluster 123
proxy accounting server 212 System 67
cloning 212 System Cluster Overview 39
creating 212 system logs 287
deleting 212 available logs 287
editing 212 System Resource Utilization Report 242
proxy authentication server 196
cloning 196 T
creating 196
deleting 196 Tagging Critical APs 38
editing 196 time schedule 184
cloning 184
creating 184
R deleting 184
RADIUS service 198 editing 184
Rate Limiting Ranges 121 Top Access Points 24
Rebalancing APs 48 Top Clients 26
Report 242 Top WLANs 26
Creating 242 trademarks 9
Deleting 242 Traffic & Health 50
Editing 242 Traffic Analysis 24
restore 260 troubleshooting 252, 254
restoring 264 client connections 252
FTP 264 spectrum analysis 254
restoring cluster 261 Trusted CA Certificates 58
roles 133 Deleting 58
applying to users 133 Editing 58
ruckus gre 219 Importing 58
cloning 219 tunnel encryption 231
Tunnel UDP Port 39
TX/RX Bytes Report 242 web auth portal 162
Types of Reports 241 cloning 162
configuring 162
creating 162
U deleting 162
ua blacklist 171 Web Interface Features 15
cloning 171 wechat portal 164
configuring 171 cloning 164
creating 171 configuring 164
deleting 171 creating 164
upgrading 271–274 deleting 164
ap patch file 274 wifi operator profile 167
controller 271 creating 167
pre-upgrade check 272 wired clients 130–131
verifying 273 deauthenticating 131
virtual data plane 274 deauthorizing 131
Upgrading AP Firmware Version 88 viewing information 130
Uploading the Signature Package 192 viewing summary 130
user defined applications 190 wireless client 129
cloning 190 unblocking 129
creating 190 wireless clients 126, 128–129
deleting 190 blocking 129
editing 190 deauthenticating 128
User Role 132–133 deauthorizing 128
802.1x Authentication 133 deleting 129
Active Directory Authentication 132 viewing information 128
user roles 131 viewing summary 126
cloning 131 wlan 202
configuring 131 WLAN 102
creating 131 cloning 102
deleting 131 configuring 102
user traffic profile 173 creating 102
cloning 173 deleting 102
configuring 173 WLAN Groups 100–101
creating 173 WLAN Schedule Profile 123
deleting 173 WLAN Schedule Profiles 122
user traffic rule 174 WLAN Template 123
creating 174 Applying 123
Extracting 123
WLAN Templates 65
V Cloning 65
Creating 65
Validating the Signature Package 193
Deleting 65
Viewing AP Certificates 57
Editing 65
Viewing Modes 89, 100
WLANs 100
Viewing Rogue Access Points 245
Working With Access Points 67
Viewing System Settings 28
Working with CSR 56
vlan pooling 179
VLAN Pooling 76
vlan pooling profile 178 Z
cloning 178
creating 178 Zone Affinity 38
deleting 178 Zone Templates 59
editing 178 Cloning 59
Creating 59
Deleting 59
W Editing 59
Zones 67, 100
Warnings 19
Zones and AP groups 68
Warnings and Notifications 19
cloning 68
Zones and AP groups (continued) Zones and AP groups (continued)
deleting 68 managing 68
editing 68