9.8 ZoneDirector 9.8 User Guide - Rev A - 20140614
9.8 ZoneDirector 9.8 User Guide - Rev A - 20140614
9.8 ZoneDirector 9.8 User Guide - Rev A - 20140614
ZoneDirector
Disclaimer
THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN (MATERIAL) IS PROVIDED FOR GENERAL
INFORMATION PURPOSES ONLY. RUCKUS AND ITS LICENSORS MAKE NO WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, WITH REGARD TO THE MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, OR THAT THE
MATERIAL IS ERROR-FREE, ACCURATE OR RELIABLE. RUCKUS RESERVES THE RIGHT TO MAKE CHANGES OR
UPDATES TO THE MATERIAL AT ANY TIME.
Limitation of Liability
IN NO EVENT SHALL RUCKUS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA OR USE, INCURRED BY YOU OR ANY
THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT OR TORT, ARISING FROM YOUR ACCESS TO, OR USE
OF, THE MATERIAL.
Trademarks
Ruckus Wireless, Ruckus, the bark logo, ZoneFlex, FlexMaster, ZoneDirector, SmartMesh, Channelfly, Smartcell,
Dynamic PSK, and Simply Better Wireless are trademarks of Ruckus Wireless, Inc. in the United States and other
countries. All other product or company names may be trademarks of their respective owners.
Contents
10
11
11 Troubleshooting
Troubleshooting Failed User Logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Fixing User Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
If WLAN Connection Problems Persist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Measuring Wireless Network Throughput with SpeedFlex . . . . . . . . . . . . . . . . . . . . . . . 392
Using SpeedFlex in a Multi-Hop Smart Mesh Network . . . . . . . . . . . . . . . . . . . . . . . . 396
Allowing Users to Measure Their Own Wireless Throughput . . . . . . . . . . . . . . . . . . . . 398
Diagnosing Poor Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Starting a Radio Frequency Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Using the Ping and Traceroute Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Generating a Debug File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Viewing Current System and AP Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Packet Capture and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Local Capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Streaming Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Importing a Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Enabling Remote Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Restarting an Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Restarting ZoneDirector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Index
12
13
Document Conventions
Document Conventions
Table 1 and Table 2 list the text and notice conventions that are used throughout
this guide.
Table 1.
Convention
Description
monospace
monospace bold
italics
Table 2.
14
Text conventions
Example
Notice conventions
Notice Type
Description
Note
Caution
Warning
Related Documentation
Related Documentation
In addition to this User Guide, each ZoneDirector documentation set includes the
following:
Online Help: Provides instructions for performing tasks using the web interface.
The online help is accessible from the web interface and is searchable.
Release Notes: Provide information about the current software release, including
new features, enhancements, and known issues.
Documentation Feedback
Ruckus Wireless is interested in improving its documentation and welcomes your
comments and suggestions. You can email your comments to Ruckus Wireless at:
[email protected]
When contacting us, please include the following information:
Document title
Document part number (on the cover page)
Page number (if appropriate)
For example:
ZoneDirector 9.8 User Guide
Part number: 800-70599-001 Revision A
Page 88
15
Documentation Feedback
16
In this chapter:
Overview of ZoneDirector
ZoneDirector Physical Features
Introduction to the Ruckus Wireless Network
Ensuring That APs Can Communicate with ZoneDirector
Installing ZoneDirector
Accessing ZoneDirectors Command Line Interface
Using the ZoneDirector Web Interface
Registering Your Product
17
Overview of ZoneDirector
Overview of ZoneDirector
Ruckus Wireless ZoneDirector serves as a central control system for Ruckus
ZoneFlex Access Points (APs). ZoneDirector provides simplified configuration and
updates, wireless LAN security control, RF management, and automatic coordination of Ethernet-connected and mesh-connected APs.
Using ZoneDirector in combination with Ruckus Wireless ZoneFlex APs allows
deployment of a Smart Mesh network, to extend wireless coverage throughout a
location without having to physically connect each AP to Ethernet. In a Smart Mesh
network, the APs form a wireless mesh topology to route client traffic between any
member of the mesh and the wired network. Meshing significantly reduces the cost
and time requirements of deploying an enterprise-class WLAN, in addition to
providing much greater flexibility in AP placement.
ZoneDirector also integrates network monitoring, sophisticated user access
controls, integrated Wi-Fi client performance tools, highly configurable guest access
features and advanced security features within a single system.
User authentication can be accomplished using an internal user database, or
forwarded to an external Authentication, Authorization and Accounting (AAA) server
such as RADIUS or Active Directory. Once users are authenticated, client traffic is
not required to pass through ZoneDirector, thereby eliminating bottlenecks when
higher speed Wi-Fi technologies are used.
This user guide provides complete instructions for using the Ruckus Wireless web
interface, the wireless network management interface for ZoneDirector. With the
web interface, you can customize and manage all aspects of ZoneDirector and your
ZoneFlex network.
18
ZoneDirector 1100
This section describes the following physical features of ZoneDirector 1100:
Buttons, Ports, and Connectors
Front Panel LEDs
Figure 1. ZoneDirector 1100
Label
Description
Power
10/100/1000 Ethernet
19
Label
Description
Console
Reset
20
LED Label
State
Meaning
Power (embedded on
the Power button)
Solid Green
Off
Status
Solid Green
Normal state.
Flashing Green
Red
Flashing Red
LED Label
State
Meaning
Ethernet Link
Solid Green or
Amber
Flashing Green or
Amber
Off
Green
Amber
Ethernet Rate
21
ZoneDirector 3000
This section describes the following physical features of ZoneDirector 3000:
Buttons, Ports, and Connectors
Front Panel LEDs
Figure 2. ZoneDirector 3000
Label
Meaning
Power
F/D
22
Label
Meaning
Reset
USB
Console
10/100/1000 Ethernet
LED Label
State
Meaning
Power
Green
Off
Solid Green
Normal state.
Flashing Green
Solid Red
Flashing Red
Status
23
LED Label
State
Meaning
Ethernet Link
Solid Green or
Amber
Flashing Green or
Amber
Off
Amber
Green
Ethernet Rate
24
ZoneDirector 5000
This section describes the following physical features of ZoneDirector 5000:
Front Panel Features
Front Panel (Bezel Removed)
Control Panel
Rear Panel Features
Figure 3. ZoneDirector 5000 Front Panel
Feature
Description
Control Panel
USB Port
Not used.
Remove this bezel lock to remove the front bezel and gain
access to the hard drive bays.
25
Table 6.
Number
Feature
Control panel
Control Panel
Figure 5. Control panel buttons and indicators
26
9 10
11 12
Table 7.
Number
Feature
Power button
Chassis ID button
10
11
12
Table 8.
LED Status
Definition
Off
Green On
Green Blinking
Amber On
Amber Blinking
Non-critical alarm
27
Table 9.
28
8 9 10 11
12
Number
Feature
10
11
12
LED State
NIC State
Green/Amber (Left)
Off
10Mbps
Green
100Mbps
Amber
1000Mbps
On
Active connection
Blinking
Green (Right)
29
30
31
7 If this is the first time that the AP is registering with ZoneDirector, it will attempt
to register with the ZoneDirector device that has the lowest AP load. The AP
computes the load by subtracting the current number of APs registered with
ZoneDirector from the maximum number of APs that ZoneDirector is licensed
to support.
If the AP does not receive a response from any ZoneDirector device on the network,
it goes into idle mode. After a short period of time, the AP will attempt to discover
ZoneDirector again by repeating the same discovery cycle. The AP will continue to
repeat this cycle until it successfully registers with a ZoneDirector.
32
NOTE: If you use this method, make sure that you do not change the IP address
of ZoneDirector after the AP discovers and registers with it. If you change the
ZoneDirector IP address, the AP will no longer be able to communicate with it and
will be unable to rediscover it.
33
URL / IP Address
Decimal
Length
Hexadecimal
Length
Sub-option
Code
FlexMaster
http://192.168.10.1/
intune/server (URL)
33
21
01
ZoneDirector
0C
03
Most commonly used DHCP servers such as Microsoft DHCP and ISC DHCP
servers support vendor class DHCP option spaces and mapping of those option
spaces to option 60. While you can achieve encapsulating TLVs in option 43 by hard
coding the DHCP option 43 value, Ruckus Wireless recommends using vendor class
option spaces - especially when you have more than one vendor type on the network
and need option 43 to be supported for different vendor type DHCP clients.
The following example describes how you can encapsulate option 43 using DHCP
vendor class option spaces to provide two ZoneDirector IP addresses:
192.168.0.10 and 192.168.0.20.
34
35
36
Figure 7. Select the 015 DNS Domain Name check box, and then type your company domain
name in String value
37
Figure 8. Select the 006 DNS Servers check box, and then type your DNS servers IP address
in the Data entry section
38
After you register the ZoneDirector IP addresses with your DNS server, you have
completed this procedure. APs on the network should now be able to discover
ZoneDirector on another subnet.
Ports
NAT Considerations
Beginning with version 9.2, ZoneDirector can be deployed in a private network
behind a NAT (Network Address Translation) device. When ZoneDirector is
deployed on an isolated private network where NAT is used, administrators can
39
manually configure a port-mapping table on the NAT device to allow remote access
into ZoneDirector. This allows APs to establish an LWAPP connection with ZoneDirector, as well as allowing remote HTTPS and SSH management access to
ZoneDirector. Table 11 lists the ports that must be open for trans-NAT communications.
Specifically, the following ports must be mapped to ZoneDirectors private IP
address on the NAT devices port mapping table: ports 21, 22, 80, 443, 12222,
12223.
Note that there are some limitations with this configuration, including:
SpeedFlex performance test tool will not work (ZoneDirector needs to know the
IP addresses of the APs).
Deploying two ZoneDirectors behind the same NAT in a Smart Redundancy
configuration requires creation of two port forwarding rules (one for each
ZoneDirector physical IP address), and that the APs are configured with both
ZoneDirectors public IP addresses as primary and secondary ZD IPs.
An active ZoneDirector behind NAT will be unable to perform upgrades to the
standby ZoneDirector on the other side of the NAT device.
40
Installing ZoneDirector
Firewall Ports that Must be Open for ZoneDirector Communications
Installing ZoneDirector
Basic installation instructions are included in the Quick Start Guide that shipped with
your ZoneDirector. The steps are summarized below:
1 Connect and discover ZoneDirector using UPnP (Universal Plug and Play).
On Windows 7, you may need to Turn on network discovery in the Network
and Sharing Center > Advanced Sharing Settings.
2 Double-click the ZoneDirector icon when UPnP displays it, or
3 Point your web browser to ZoneDirectors IP address (default: 192.168.0.2).
4 Run the Setup Wizard to create an internal and (optionally) a guest WLAN.
5 Distribute APs around your worksite, connect them to power and to your LAN.
6 Begin using your ZoneFlex network.
Figure 9. Discover ZoneDirector using UPnP
41
42
Stop bits: 1
Flow control: None
Figure 11. Configure a terminal client
43
When you first log into your ZoneDirector using the web interface,
the Dashboard appears, displaying a number of widgets containing
indicators and tables that summarize the network and its current
status. Each indicator, gauge or table provides links to more
focused, detailed views on elements of the network.
TIP: You can minimize (hide) any of the tables or indicators on the
Dashboard, then reopen them by means of the Add Widget options
in the lower left corner.
Widgets
Tabs
Buttons
Workspace
The large area to the right of the buttons will display specific sets
of features and options, depending on which tab is open and which
button was clicked.
Toolbox
Help and Log Clicking Help launches the online Help - which is an HTML-based
Out
subset of the information contained in this User Guide. Click Log
Out to exit the web interface.
44
NOTE: Some indicators may not be present upon initial view. The Add Widgets
feature, located at the bottom left area of the screen, enables you to show or hide
indicators. See Using Indicator Widgets.
NOTE: You can sort the information (in ascending or descending order) that
appears on the dashboard by clicking the column headers. Some widgets (such as
Currently Managed APs) can also be customized to hide columns so that the tables
do not run off the page. Click the Edit Columns button to customize the widget
according to your preferences.
45
46
Adding a Widget
To add a widget:
1 Go to the Dashboard.
2 Click the Add Widgets link located at the bottom left corner of the Dashboard
page.
47
Figure 13. The Add Widgets link is at the bottom-left corner of the Dashboard
The Add
Widgets
Link
48
Figure 14. The widget icons appear at the top-left corner of the Dashboard
Widget
icons
Removing a Widget
To remove a widget from the Dashboard, click the
icon for any of the widgets
currently open on the Dashboard. The Dashboard refreshes and the widget that you
removed disappears from the page.
49
50
Like the Dashboard, you can drag and drop Widgets onto the Real Time Monitoring
page to customize the information you want to see.
Figure 17. The Real Time Monitoring screen
51
Bytes Transmitted: Total bytes received by all APs being managed by ZoneDirector.
Packets Received: Total packets received by all APs being managed by ZoneDirector.
Packets Transmitted: Total packets transmitted by all APs being managed by
ZoneDirector.
NOTE: Real Time Monitoring should be closed when not in use, as it can impact
ZoneDirector performance.
Figure 19. The Refresh icon on all widgets is disabled when auto refresh is stopped
52
NOTE: To ensure that all registration information for all of your APs is included, be
sure to register after all APs have been installed. If you register ZoneDirector before
installing the APs, the registration will not include AP information.
To register your ZoneDirector:
1 Click the Product Registration link in the Support widget on the Dashboard, or
2 Go to Administer > Registration.
3 Enter your contact information on the Registration page, and click Apply.
4 The information is sent to a CSV file that opens in a spreadsheet program (if you
have one installed). This file includes the serial numbers and MAC addresses of
your ZoneDirector and all known APs, and your contact information.
5 Save the CSV file to a convenient location on your local computer.
6 Click the link on the Registration page to upload the CSV file (https://
support.ruckuswireless.com/register). If you do not already have a Support
account login, first click the https://support.ruckuswireless.com/
get_access_now link to create a support account, and then click the register link
to upload the CSV file to Ruckus Support.
Figure 20. Support Widget on the Dashboard
53
54
In this chapter:
System Configuration Overview
Changing the Network Addressing
Creating Static Route Entries
Enabling Smart Redundancy
Configuring the Built-in DHCP Server
Controlling ZoneDirector Management Access
Setting the System Time
Setting the Country Code
Changing the System Log Settings
Setting Up Email Alarm Notifications
Enabling Network Management Systems
Configuring DHCP Relay
Enabling Bonjour Gateway
55
56
Figure 22.
57
IPv6 Configuration
ZoneDirector supports IPv6 and dual IPv4/IPv6 operation modes. If both IPv4 and
IPv6 are used, ZoneDirector will keep both IP addresses. Ruckus ZoneFlex APs
operate in dual IPv4/v6 mode by default, so you do not need to manually set the
mode for each AP.
58
If you enable IPv6, you have the option to manually configure an IP address in IPv6
format (128 bits separated by colons instead of decimals) or to choose Auto
Configuration. If you choose Manual, you will need to enter IP Address, Prefix
Length and Gateway.
Table 12. Default static IPv4 and IPv6 addresses
AP default IP address
IPv4
192.168.0.1
192.168.0.2
IPv6
fc00::1
fc00::2
59
Figure 24. Enabling IPv6 automatically changes other fields to allow IPv6 addresses
60
into regardless of which ZoneDirector is the active unit. This shared management
IP address must be configured identically on both ZoneDirectors (see Configuring
ZoneDirector for Smart Redundancy).
To enable an additional management interface:
1 Go to Configure > System.
2 Locate the Management Interface section and click the check box next to
Enable IPv4 Management Interface or Enable IPv6 Management Interface.
3 Enter the IP Address, Netmask and Access VLAN information for the additional
interface. (If IPv6, enter Prefix Length instead of Netmask).
4 (Optional) If you want to configure this management interface with a different
gateway from the gateway configured under Device IP Settings, select Default
gateway is connected with this interface, and enter the gateway IP address
in the field provided. Enable this option if you want to change the default gateway
of the ZoneDirector to be in your management subnet. Changing the default
gateway to be in the management subnet will cause all traffic to be routed via
this gateway.
5 Click Apply to save your settings.
6 If the Management Interface is to be shared by two Smart Redundancy
ZoneDirectors, repeat steps 1-5 for the other ZoneDirector.
61
62
63
Figure 27. A static route is needed when APs are reachable only through a non-default
gateway
64
NOTE: This feature is only available using two ZoneDirectors of the same model
and number of licensed APs. You can not enable Smart Redundancy using a
ZoneDirector 3000 as the primary and a ZoneDirector 1100 as the backup unit, for
example.
When two ZoneDirectors are connected in a Smart Redundancy configuration, the
Standby ZD will send heartbeats and the Active will send discovers, at 6 second
intervals. If after 15s, no reply is seen, the ZDs will make a decision if it is
disconnected with its peer, and the Standby ZD will change to Active.
When the two ZoneDirectors are communicating again, one Active ZD will change
to the Standby role and an auto-synchronization process will be started. There is a
timestamp to judge sync from which ZD, to sync the latest one to the peer. The
timestamp is updated by configuration behavior. They will continue trying to communicate, sending discover messages every 6 seconds to peers, until the ZDs are
communicating again, when they will determine Active/Standby roles based on: 1)
most managed APs, and/or 2) lower MAC address.
65
2 Go to Configure > System, and set a static IP address under Device IP Settings,
if not already configured.
3 Click Apply. You will need to log in again using the new IP address (if changed).
4 On the same Configure > System page, locate the Smart Redundancy section.
Figure 28. Enable Smart Redundancy
66
NOTE: If you want to use the same SSL certificate for both devices in a Smart
Redundancy pair, you can back up the certificate/private key from one device and
import it into the other. See Working with SSL Certificatesfor more information.
NOTE: If you have two ZoneDirectors of the same model and license level, Ruckus
Wireless recommends using the Smart Redundancy feature. If you have two
ZoneDirectors of different models or different license levels, you can use Limited ZD
Discovery to provide limited redundancy; however, this method does not provide
synchronization of the user database.
67
NOTE: If you disable Smart Redundancy after it has been enabled, both
ZoneDirectors will revert to active state, which could result in unpredictable network
topologies. Therefore, Ruckus Wireless recommends first factory resetting the
standby ZoneDirector before disabling Smart Redundancy.
NOTE: If the active and standby ZoneDirector are on different IP subnets, APs need
to know the IP addresses of both ZoneDirectors to quickly find the active
ZoneDirector after a Smart Redundancy failover. You can do this by configuring the
IP addresses of both devices on the Configure > Access Points > Limited ZD
Discovery page. Specify one ZoneDirector as Primary, the other as Secondary.
Alternatively you can specify the IP addresses of both ZoneDirectors through DHCP
Option 43 (see Option 2: Customize Your DHCP Server).
The Failover button can be used to force a role reversal making the standby
ZoneDirector the active unit. This widget also displays the state (active, standby or
disconnected) of both devices, as well as their IP addresses and the Management
IP address, if configured.
68
Note that before you can enable the built-in DHCP server, ZoneDirector must be
assigned a manual (static) IP address. If you configured ZoneDirector to obtain its
IP address from another DHCP server on the network, the options for the built-in
DHCP server will not be visible on the System Configuration page.
69
70
Figure 32. To view current DHCP clients, click the click here link
71
72
73
74
Channel Optimization
If your Country Code is set to United States, an additional configuration option,
Channel Optimization, is shown. This feature allows you to choose whether additional DFS (Dynamic Frequency Selection) channels in the 5 GHz band should be
available for use by your APs.
Note that these settings only affect Ruckus Wireless APs that support the extended
DFS channel list. Channel Optimization settings are described in the following table.
Table 13. Channel Optimization settings for US Country Code
Setting
Description
Optimize for
Compatibility
75
Description
Optimize for
Interoperability
Optimize for
Performance
NOTE: If you are located in the United States and have a DFS-capable ZoneFlex
AP that is expected to serve as a Root AP (or eMAP), with a non-DFS-capable Mesh
AP as its downlink, you will need to set the Channel Optimization setting to "Optimize
for Compatibility." This is due to the DFS-capable AP's ability to use more channels
than the non-DFS-capable APs, which could result in the RAP choosing a channel
that is not available to the MAP. Alternatively, manually set the channel for the Root
AP to one of the non-DFS channels. Specifically, choose one of the following
channels: 36, 40, 44, 48, 149, 153, 157, 161, 165.
The channels available for AP use are the following:
Optimize for Compatibility: 36, 40, 44, 48, 149, 153, 157, 161, 165 (non-DFS
channels).
Optimize for Interoperability: non-DFS channels plus channels 52, 56, 58, 60.
Optimize for Performance: all DFS/non-DFS channels, including 100, 104, 108,
112, 116, 120, 124, 128, 132, 136, 140.
Channel Mode
Some countries restrict certain 5 GHz channels to indoor use only. For instance,
Germany restricts channels in the 5.15 GHz to 5.25 GHz band to indoor use. When
ZoneFlex Outdoor APs and Bridges with 5 GHz radios (ZoneFlex 7762, 7782, 7761CM and 7731) are set to a country code where these restrictions apply, the AP or
76
Bridge can no longer be set to an indoor-only channel and will no longer select from
amongst a channel set that includes these indoor-only channels when SmartSelect
or Auto Channel selection is used, unless the administrator configures the AP to
allow use of these channels.
For instance, if the AP is installed in a challenging indoor environment such as a
warehouse, the administrator may want to allow the AP to use an indoor-only
channel. These channels can be enabled for use through the AP CLI or ZoneDirector
web interface by configuring Configure > System > Country Code > Channel Mode
and checking Allow indoor channels (allows ZoneFlex Outdoor APs to use
channels regulated as indoor use only. If you have a dual-band ZoneFlex Indoor
AP functioning as a RAP with dual-band ZoneFlex Outdoor APs functioning as
MAPs, the mesh backhaul link must initially use a non-indoor-only channel. Your
ZoneFlex Outdoor MAPs may fail to join if the mesh backhaul link is using a restricted
indoor-only channel.
77
78
information and sends it to the syslog server, from which it can be collected
by the third party software and sent it to the firewall for access restriction
based on client association information.
4 Click Apply to save your settings. The changes go into effect immediately.
Figure 38. The Log Settings options
79
4 You must also ensure that syslog delivery is enabled on the Configure > System
page and that the Priority level in Remote Syslog Advanced Settings is set
to Info or All.
Figure 39. Enable client association logs in syslog for firewall integration
The flow of user data from the end point to the firewall will use the following path:
1 The user authenticates to an authentication server via AP.
2 ZoneDirector verifies the users identity.
3 After the station authenticates successfully and gets an IP address, ZoneDirector
generates a syslog message.
4 The log is sent to a syslog server in real time.
5 The script on the syslog server extracts user information from the log message
and sends it to the firewall.
A similar flow can be used to remove user mappings if the station sends a disconnect
message.
80
Log format
The log format consists of the following fields:
operation: Indicates whether to add, delete or update client association information.
sta_ip: Indicates the IP address of station.
sta_name: Indicates the stations account name supplied by the client when
being authenticated. The user name is used for 802.1X and Web Auth WLANs.
The MAC address of the client will be used as the user name for Open, MAC
Address and 802.1X + MAC Address WLAN types.
sta_mac: The stations MAC address.
sta_oriip: Only takes effect when the operation is update in order to indicate
the original IP of the station.
ap_mac: Shows the MAC address of the AP to which the station is currently
connected.
seq: Indicates the sequence number of the log message. It is increased by one
after a log is sent. The UDP packet can be adjusted to the right order by this
field in the log server.
sta_ostype: Indicates the stations OS type. Will be filled with unknown if the
OS type is unobtainable.
Examples
Add:
operation=add;seq=1;sta_ip=192.168.120.16;sta_mac=60:36:dd:19:17:ac;zd/
ap=00:0c:29:11:5a:0b/58:93:96:29:4c:60;sta_ostype=Windows7/
Vista;sta_name=60:36:dd:19:17:ac;stamgr_handle_remote_ipc
Delete:
operation=del;seq=4;sta_ip=192.168.120.30;sta_mac=60:36:dd:19:17:ac;zd/
ap=00:0c:29:11:5a:0b/58:93:96:29:4c:60;sta_ostype=Windows 7/
Vista;sta_name=60:36:dd:19:17:ac;stamgr_sta_log_disconnect
Update:
operation=update;seq=2;sta_ip=192.168.120.30;sta_oriip=192.168.120.16;sta_mac=60:36:dd:19:17:ac;zd/ap=00:0c:29:11:5a:0b/
58:93:96:29:4c:60;sta_ostype=Windows 7/
Vista;sta_name=60:36:dd:19:17:ac;stamgr_handle_remote_ipc
81
82
83
Description
SMTP Authentication Username Type the user name provided by your ISP or mail
administrator. This might be just the part of your
email address before the @ symbol, or it might
be your complete email address. If you are using
a free email service (such as Hotmail or Gmail),
you typically have to type your complete email
address.
SMTP Authentication Password Type the password that is associated with the
user name above.
Confirm SMTP Authentication
Password
84
6 To verify that ZoneDirector can send alarm messages using the SMTP settings
you configured, click the Test button.
If ZoneDirector is able to send the test message, the message Success!
appears at the bottom of the Email Notification page. Continue to Step 7
If ZoneDirector is unable to send the test message, the message Failed!
appears at the bottom of the Email Notification page. Go back to Step 5, and
then verify that the SMTP settings are correct.
7 Click Apply. The email notification settings you configured become active
immediately.
Figure 41. The Alarm Settings page
NOTE: If the Test button is clicked, ZoneDirector will attempt to connect to the mail
server for 10 seconds. If it is unable to connect to the mail server, it will stop trying
and quit.
NOTE: When the alarm email is first enabled, the alarm recipient may receive a flood
of alarm notifications. This may cause the mail server to treat the email notifications
as spam and to temporarily block the account.
85
NOTE: ZoneDirector sends email notifications for a particular alert only once, unless
(1) it is a new alert of the same type but for a different device, or (2) existing alert
logs are cleared.
86
You can now allow guest pass generators to deliver guest pass codes to guests
using the SMS button when generating a new guest pass. (You must also enter a
phone number for receiving the SMS messages for each guest pass created.)
Figure 42. Configuring SMS Settings
87
88
89
90
Both SNMPv2 and SNMPv3 can be enabled at the same time. The SNMPv3
framework provides backward compatibility for SNMPv1 and SNMPv2c management applications so that existing management applications can still be used to
manage ZoneDirector with SNMPv3 enabled.
NOTE: For a list of the MIB variables that you can get and set using SNMP, check
the related SNMP documentation on the Ruckus Wireless Support Web site at
http://support.ruckuswireless.com/documents.
91
SHA: Secure Hash Algorithm, message hash function with 160-bit output.
92
93
If you select SNMPv3, enter up to four trap receiver IP addresses along with
authentication method passphrase and privacy (encryption) settings.
4 Click Apply to save your changes.
Figure 47. Enabling SNMPv2 trap notifications
94
Description
ruckusZDEventAPJoinTrap
ruckusZDEventSSIDSpoofTrap
ruckusZDEventMACSpoofTrap
95
96
Trap Name
Description
ruckusZDEventRogueAPTrap
ruckusZDEventAPLostTrap
ruckusZDEventAPLostHeartbeatTrap
ruckusZDEventClientAuthFailBlock
Trap
ruckusZDEventClientJoin
ruckusZDEventClientJoinFailed
ruckusZDEventClientJoinFailedAPB
usy
ruckusZDEventClientDisconnect
ruckusZDEventClientRoamOut
ruckusZDEventClientRoamIn
Description
ruckusZDEventClientAuthFailed
ruckusZDEventClientAuthorization
Failed
ruckusZDEventAPcoldstart
ruckusZDEventAPwarmstart
ruckusZDEventAPclientValve
ruckusZDEventAPCPUvalve
ruckusZDEventAPMEMvalve
ruckusZDEventSmartRedundancyChan
getoActive
ruckusZDEventSmartRedundancyActi
veConnected
ruckusZDEventSmartRedundancyActi
veDisconnected
ruckusZDEventSmartRedundancyStan
dbyConnected
ruckusZDEventSmartRedundancyStan
dbyDisconnected
97
98
99
Figure 50. Enabling DHCP Relay agent for a Tunnel Mode WLAN
100
In order for the Bonjour Gateway to function, the following network configuration
requirements must be met:
1 The target networks must be segmented into VLANs.
2 VLANs must be mapped to different SSIDs.
3 The controller must be connected to a VLAN trunk port.
Additionally, if the VLANs to be bridged by the gateway are on separate subnets the
network has to be configured to route traffic between them.
101
102
103
104
Assume a network with three VLANs mapped to separate SSIDs, all on separate
subnets or multicast domains. The three segments host different devices for
different users:
Classroom SSID (VLAN 100): WEP authentication, includes an iMac desktop for
file sharing and iOS Sync for backup, and an Apple TV attached to a projector.
Teachers SSID (VLAN 200): 802.1X authentication for a MacBook and iPad,
needs to have access to all classroom resources.
Students SSID (VLAN 300): Students have a separate SSID with no authentication, they must be able to backup their iPads to the classroom iMac but should
not have access to the Apple TV or File Sharing services.
Figure 54. Sample Bonjour Gateway configuration for a classroom scenario
In this example, the teacher gains access to AirPlay, AirPrint, iCloud Sync and File
Sharing, while students are given access to iCloud Sync and AirPrint only.
105
106
In this chapter:
Configuring Self Healing Options
Configuring Wireless Intrusion Prevention
Controlling Network Access Permissions
Using an External AAA Server
107
108
ChannelFly
The main difference between ChannelFly and Background Scanning is that ChannelFly determines the optimal channel based on real-time statistical analysis of actual
throughput measurements, while Background Scanning uses channel measurement and other techniques to estimate the impact of interference on Wi-Fi capacity
based on progressive scans of all available channels.
NOTE: If you enable ChannelFly, Background Scanning can still be used for
adjusting radio power and rogue detection while ChannelFly manages the channel
assignment. Both can not be used at the same time for channel management.
Benefits of ChannelFly
With ChannelFly, the AP intelligently samples different channels while using them for
service. ChannelFly assesses channel capacity every 15 seconds and changes
channel when, based on historical data, a different channel is likely to offer higher
capacity than the current channel. Each AP makes channel decisions based on this
historical data and maintains an internal log of channel performance individually.
When ChannelFly changes channels, it utilizes 802.11h channel change announcements to seamlessly change channels with no packet loss and minimal impact to
performance. The 802.11h channel change announcements affect both wireless
clients and Ruckus mesh nodes in the 2.4 GHz and/or 5 GHz bands.
Initially (in the first 30-60 minutes) there will be more frequent channel changes as
ChannelFly learns the environment. However, once an AP has learned about the
environment and which channels are most likely to offer the best throughput
potential, channel changes will occur less frequently unless a large measured drop
in throughput occurs.
ChannelFly can react to large measured drops in throughput capacity in as little as
15 seconds, while smaller drops in capacity may take longer to react to.
Disadvantages of ChannelFly
Compared to Background Scanning, ChannelFly takes considerably longer for the
network to settle down. If you will be adding and removing APs to your network
frequently, Background Scanning may be preferable. Additionally, if you have clients
that do not support the 802.11h standard, ChannelFly may cause significant
connectivity issues during the initial capacity assessment stage.
109
You can enable/disable ChannelFly per band. If you have 2.4 GHz clients that do
not support 802.11h, Ruckus recommends disabling ChannelFly for 2.4 GHz but
leaving it enabled for the 5 GHz band.
To configure the self healing options:
1 Go to Configure > Services.
2 Review and change the following self-healing options:
Automatically adjust AP radio power to optimize coverage where
interference is present: Enable automatic radio power adjustment based
on Background Scanning.
Automatically adjust 2.4 GHz channels using
-
Background Scanning
ChannelFly
Background Scanning
ChannelFly
3 Click the Apply button in the same section to save your changes.
Figure 55. Self Healing options
110
NOTE: ChannelFly channel selection data is persistent across reboots for the
following APs only: 7982, 7782, 7782-x, 7781-CM, SC-8800-S. It is not persistent
across power cycles for any AP.
Background Scanning
Using Background Scanning, ZoneDirector regularly samples the activity in all
Access Points to assess RF usage, to detect rogue APs and to determine which
APs are near each other for mesh optimization.
These scans sample one channel at a time in each AP so as not to interfere with
network use. This information is then applied in AP Monitoring and other ZoneDirector monitoring features. You can, if you prefer, customize the automatic scanning
of RF activity, deactivate it if you feel it's not helpful, or adjust the frequency, if you
want scans at greater or fewer intervals. Note that Background Scanning must be
enabled for ZoneDirector to detect rogue APs on the network.
To configure Background Scanning:
1 Go to Configure > Services.
2 In the Background Scanning section, configure the following options:
Run a background scan on the 2.4 GHz radio every [ ]: Select this check
box enter the time interval (1~65535 seconds, default is 20) that you want to
set between each scan.
Run a background scan on the 5 GHz radio every [ ]: Select this check
box enter the time interval (1~65535 seconds, default is 20) that you want to
set between each scan.
NOTE: If you want to disable Background Scanning, clear the check box; this
should result in a minor increase in AP performance, but removes the detection of
rogue APs from ZoneDirector monitoring. You can also decrease the scan frequency,
as less frequent scanning improves overall AP performance.
3 Click the Apply button in the same section to save your settings.
111
NOTE: You can also disable Background Scanning on a per-WLAN basis from the
Configure > WLANS page. To disable scanning for a particular WLAN, click the
Edit link next to the WLAN for which you want to disable scanning, open Advanced
Options, and click the check box next to Disable Background Scanning.
To see whether Background Scanning is enabled or disabled for a particular AP, go
to Monitor > Access Points, and click on the APs MAC address. The access point
detail screen displays the Background Scanning status for each radio.
112
Load Balancing
Enabling load balancing can improve WLAN performance by helping to spread the
client load between nearby access points, so that one AP does not get overloaded
while another sits idle. The load balancing feature can be controlled from within
ZoneDirectors web interface to balance the number of clients per radio on adjacent
APs. Adjacent APs are determined by ZoneDirector at startup by measuring the
RSSI during channel scans. After startup, ZoneDirector uses subsequent scans to
update the list of adjacent radios periodically and when a new AP sends its first scan
report. When an AP leaves, ZoneDirector immediately updates the list of adjacent
radios and refreshes the client limits at each affected AP.
Once ZoneDirector is aware of which APs are adjacent to each other, it begins
managing the client load by sending desired client limits to the APs. These limits are
soft values that can be exceeded in several scenarios, including: (1) when a clients
signal is so weak that it may not be able to support a link with another AP, and (2)
when a clients signal is so strong that it really belongs on this AP.
The APs maintain these desired client limits and enforce them once they reach the
limits by withholding probe responses and authentication responses on any radio
that has reached its limit.
113
114
Figure 58. Enable Load Balancing across adjacent APs by radio type
115
Band Balancing
Band balancing balances the client load on radios by distributing clients between
the 2.4 GHz and 5 GHz radios. This feature is enabled by default and set to a target
of 25% of clients connecting to the 2.4 GHz band. To balance the load on a radio,
the AP encourages dual-band clients to connect to the 5 GHz band when the
configured percentage threshold is reached.
116
Figure 60. Distributing clients between the 2.4 and 5 GHz radios
117
118
4 Click the Apply button in the same section to save your changes.
ZoneDirector enables AeroScout RFID tag detection on all its managed APs that
support this feature.
Figure 62. Enabling AeroScout Tag detection
NOTE: Tag locations are not accurate if the 2.4 GHz band is noisy or if the AP setup
is not optimal (according to AeroScout documents). For more information on
AeroScout Tags and the AeroScout Engine, refer to your AeroScout documentation.
119
2 Scroll down to the Ekahau Settings section (near the bottom of the page).
3 Select the Enable Ekahau tag detection check box.
4 Enter the Ekahau Controller IP address and Ekahau Controller Port.
5 Click the Apply button in the same section to save your changes.
ZoneDirector enables Ekahau tag detection on all its managed APs that support
this feature.
Figure 63. Enabling Ekahau tag detection
120
A low severity event is now triggered each time a client connects with an RSSI lower
than the threshold value entered. Go to Monitor > All Events/Activities to monitor
these events.
Tunnel Configuration
Only WLANs with Tunnel Mode enabled are affected. See Advanced Options in
the WLAN configuration section for information on enabling Tunnel Mode.
To configure data encryption and filtering for tunneled WLANs:
1 Go to Configure > Services.
2 Scroll down to the bottom of the page and locate the Tunnel Configuration
section.
3 Enable the check boxes next to the features you want to enable:
Enable tunnel encryption for tunneled traffic: By default, when WLAN
traffic is tunneled to ZoneDirector, only the control traffic is encrypted while
data traffic is unencrypted. When this option is enabled, the Access Point will
decrypt 802.11 packets and then use an AES-encrypted tunnel to send them
to ZoneDirector.
Block multicast traffic from network to tunnel: Prevents [all/non-wellknown] multicast traffic from propagating on the tunnel.
121
Block broadcast traffic from network to tunnel except ARP and DHCP:
Prevents all broadcast traffic other than Address Resolution Protocol and
DHCP packets.
Enable Proxy ARP of tunnel WLAN with rate limit threshold __.:
Reduces broadcast neighbor discovery packets (ARP and ICMPv6 Neighbor
Solicit) over tunnels. When ZoneDirector receives a broadcast ARP request
for a known host, it acts on behalf of the known host to send out unicast
ARP replies at the rate limit specified. If ZoneDirector receives a broadcast
ARP request for an unknown host, it will forward it to the tunnel to all APs
according to the rate limit threshold set in the Packet Inspection Filter (see
Packet Inspection Filter).
4 Click Apply in the same section to save your changes.
Figure 65. Set tunnel configuration parameters for all WLANs with tunnel mode enabled.
122
123
DoS Protection
Two options are provided to protect the wireless network from Denial of Service
attacks.
To configure the DoS protection options:
1 Go to Configure > WIPS.
2 In the Denial of Service (DoS) section, configure the following settings:
Protect my wireless network against excessive wireless requests: If this
capability is activated, excessive 802.11 probe request frames and management frames launched by malicious attackers will be discarded.
Temporarily block wireless clients with repeated authentication failures for [ ] seconds: If this capability is activated, any clients that repeatedly
fail in attempting authentication will be temporarily blocked for a period of
time (10~1200 seconds, default is 30). Clients temporarily blocked by the
Intrusion Prevention feature are not added to the Blocked Clients list under
Monitor > Access Control.
3 Click Apply to save your changes.
124
125
SSID-Spoofing: These are rogue access points that are beaconing the same
SSID name as a ZoneDirector-managed access point. They pose a threat as
someone may be attempting to use them as a honey pot to attract your clients
into their network to attempt hacking or man-in-the-middle attacks to exploit
passwords and other sensitive data.
Same-Network: These are rogue access points that are detected by other
access points as transmitting traffic on your internal network. They are detected
by ZoneDirector-managed access points seeing packets coming from a 'similar'
MAC address to one of those detected from an over the air rogue AP. Similar
MAC addresses are +-5 MAC address lower or higher than the detected over
the air MAC address.
MAC-spoofing: These are rogue access points that are beaconing the same
MAC address as a ZoneDirector-managed access point. They pose a threat as
someone may be attempting to use them as a honey pot to attract your clients
into their network to attempt hacking or man-in-the-middle attacks to exploit
passwords and other sensitive data.
The last type of malicious rogue device is User Marked. These are devices that
are manually marked as malicious rogues by a ZoneDirector administrator using the
Mark as Malicious button on the Monitor > Rogue Devices page.
To configure intrusion detection and prevention options:
1 In the Intrusion Detection and Prevention section, configure the following
settings:
Enable report rogue devices: Enabling this check box allows ZoneDirector
to include rogue device detection in logs and email alarm event notifications.
-
Report all rogue devices: Send alerts for all rogue AP events.
Report only malicious rogue devices of type: Select which event types to
report.
Protect the network from malicious rogue access points: Enable this
feature to automatically protect your network from network connected rogue
APs, SSID-spoofing APs and MAC-spoofing APs. When one of these rogue
APs is detected (and this check box is enabled), the Ruckus AP automatically
begins sending broadcast de-authentication messages spoofing the rogues
BSSID (MAC) to prevent wireless clients from connecting to the malicious
rogue AP. This option is disabled by default.
2 Click the Apply button that is in the same section to save your changes.
126
See Detecting Rogue Access Points for more information on monitoring and
handling rogue devices.
127
If the built-in DHCP server is enabled, ZoneDirector will generate an event when
it detects any other DHCP server on the network.
If the built-in DHCP server is disabled, ZoneDirector will generate events when
it detects two or more DHCP servers on the network. You will need to find these
DHCP servers on the network, determine which ones are rogue, and then
disconnect them or shut down the DHCP service on them.
The Rogue DHCP Server Detection feature is enabled by default. If it is disabled,
use the following procedure to re-enable:
To enable rogue DHCP server detection on ZoneDirector (enabled by default)
1 Go to Configure > WIPS.
2 In the Rogue DHCP Server Detection section, select the Enable rogue DHCP
server detection check box.
3 Click the Apply button that is in the same section.
You have completed enabling rogue DHCP server detection. Ruckus Wireless
recommends checking the Monitor > All Events/Activities page periodically to
determine if ZoneDirector has detected any rogue DHCP servers. When a rogue
DHCP server is detected, the following event appears on the All Events/Activities
page:
Rogue DHCP server on [IP_address] has been detected
If the check box is cleared, ZoneDirector will not generate these events.
NOTE: Rogue DHCP server detection only works on the ZoneDirectors
management IP subnet.
128
129
130
131
132
133
134
135
6 To change the order in which rules are implemented, select the order from the
drop-down menu in the Order column. You can also Edit or Clone rules from
the Action column. To delete a rule, select the box next to the rule and click
Delete.
7 Click OK to save the white list.
136
Isolate wireless client traffic from all hosts on the same VLAN/subnet:
Prevent clients from communicating with any other hosts on the same subnet
or VLAN other than those listed on the Client Isolation Whitelist. If this option
is chosen, you must select a Whitelist from the drop-down list of those you
created on the Configure > Access Control page.
4 Click OK to save your changes.
137
www.corporate.com This will block access to the host web server at the
organization corporate.com i.e. the FQDN. It will not block access to any other
hosts such as ftp, ntp, smtp, etc. at the organization corporate.com.
corporate.com this will block access to all hosts at the domain corporate.com i.e. it will block access to www.corporate.com, ftp.corporate.com,
smtp.corporate.com, etc.
corporate This will block access to any FQDN containing the text corporate
in any part of the FQDN. Care should be taken to use as long as possible string
for matching to prevent inadvertently blocking sites that may contain a shorter
string match i.e. if the rule is net then this will block access to any sites that
have the text net in any part of the FQDN or .net as the FQDN suffix.
*.corporate.com This is an invalid rule. Wildcard * and other regular expressions cannot be used in any part of the FQDN.
www.corporate.com/games - This is an invalid rule. The filter cannot parse and
block access on text after the FQDN, i.e., in this example it cannot filter the microsite /games.
Notes:
Many global organizations have both a .com suffix and country specific suffix
such as .co.uk, .fr, .au.etc. To block access to say the host web server in
all regional specific web sites for an organization a rule like www.corporate
could be used.
Many global organizations use distributed content delivery networks such as
Akamai. In such cases creating a rule such as www.corporate.com may not
prevent access to the entire site. Further investigation of the content network
behavior may need to be undertaken to fully prevent access.
138
139
140
141
142
143
3 Click the current number, which is also a link. The Clients page (on the Monitor
tab) appears, showing the first 15 clients that are currently connected to
ZoneDirector. If there are more than 15 currently active clients, the Show More
button at the bottom of the page will be active. To display more clients in the list,
click Show More. When all active clients are displayed on the page, the Show
More button disappears.
4 To block any listed client devices, follow the next set of steps.
144
Figure 81. Click the Delete button to temporarily delete a client. The client will be able to
reconnect.
NOTE: The user can reconnect at any time, which, if this proves to be a problem,
may prompt you to consider Permanently Blocking Specific Client Devices.
145
146
147
Active Directory
In Active Directory, objects are organized in a number of levels such as domains,
trees and forests. At the top of the structure is the forest. A forest is a collection of
multiple trees that share a common global catalog, directory schema, logical
structure, and directory configuration. In a multi-domain forest, each domain
contains only those items that belong in that domain. Global Catalog servers provide
a global list of all objects in a forest.
ZoneDirector support for Active Directory authentication includes the ability to query
multiple Domain Controllers using Global Catalog searches. To enable this feature,
you will need to enable Global Catalog support and enter an Admin DN (distinguished name) and password.
Depending on your network structure, you can configure ZoneDirector to authenticate users against an Active Directory server in one of two ways:
Single Domain Active Directory Authentication
Multi-Domain Active Directory Authentication
148
For single domain authentication, admin name and password are not required.
149
2 The default port changes to 3268, and the fields for Admin DN and password
appear. The default port number (3268) should not be changed unless you have
configured your AD server to use a different port.
Global Catalog queries are directed to port 3268, while ordinary searches are
received through port 389. If the port binds to 389, even with Global Catalog
server, the search includes only a single domain directory partition. If the port
binds to port 3268, the search includes all directory partitions in the forest.
If the server attempting to bind over port 3268 is not a Global Catalog server,
the server refuses the bind.
3 Leave the Windows Domain Name field empty to search all domains in the
forest.
NOTE: Do NOT enter anything in the Windows Domain Name field. If you enter a
Windows Domain Name, the search will be limited to that domain, rather than the
whole forest.
4 Enter an Admin DN (distinguished name) in Active Directory format
([email protected]).
5 Enter the admin Password, and re-enter the same password for confirmation.
NOTE: The Admin account need not have write privileges, but must able to read
and search all users in the database.
6 Click OK to save changes.
7 To test your authentication settings, see Testing Authentication Settings.
150
LDAP
ZoneDirector supports several of the most commonly used LDAP servers, including:
OpenLDAP
Apple Open Directory
Novell eDirectory
Sun JES (limited support)
To enable LDAP user authentication for all users
1 Click the Edit link next to LDAP on the Configure > AAA Servers page. The
Editing LDAP form appears.
2 Enter the IP address and Port of your LDAP server. The default port (389) should
not be changed unless you have configured your LDAP server to use a different
port.
3 Enter a Base DN in LDAP format for all user accounts.
4 Format: cn=Users;dc=<Your Domain>,dc=com
5 Enter an Admin DN in LDAP format.
Format: cn=Admin;dc=<Your Domain>,dc=com
6 Enter the Admin Password, and reenter to confirm.
151
152
Mouse over
show more
Group Extraction
By using the Search Filter, you can extract the groups to which a user belongs, as
categorized in your LDAP server. Using these groups, you can attribute Roles within
ZoneDirector to members of specific groups.
For example, in a school setting, if you want to assign members of the group
students to a Student role, you can enter a known students name in the Test
Authentication Settings section, click Test, and return the groups that the user
belongs to. If everything is configured correctly, the result will display the groups
associated with the student, which should include a group called student (or
whatever was configured on your LDAP server).
Next, go to the Configure > Roles page, create a Role named Student, and enter
student in the Group Attributes field. Then you can select which WLANs you want
this Role to have access to, and decide whether this Role should have Guest Pass
generation privileges and ZoneDirector administration privileges. From here on, any
user associated to the Group student will be given the same privileges when he/
she is authenticated against your LDAP server.
To configure user roles based on LDAP group:
1 Point ZoneDirector to your LDAP server:
Go to Configure > AAA Servers
Click Edit next to LDAP
153
7 Go to Configure > Roles, and create a Role based on this User Group (see
Creating New User Roles).
Click the Create New link in the Roles section.
In the Group Attributes field, enter Group attributes exactly as they were
returned from the Test Authentication Settings dialog.
Specify WLAN access, Guest Pass generation and ZoneDirector administration privileges as desired for this Role.
At this point, any user who logs in and is authenticated against your LDAP server
with the same Group credentials will automatically be assigned to this Role.
154
must enter the MAC addresses of each client on the AAA server, and any clients
attempting to access your WLAN with a MAC address not listed will be denied
access.
A RADIUS/RADIUS Accounting server can be used with 802.1X, MAC authentication, Web authentication (captive portal) and Hotspot WLAN types.
To configure a RADIUS / RADIUS Accounting server entry in ZoneDirector:
1 Go to Configure > AAA Servers.
2 Click the Create New link under Authentication/Accounting Servers.
3 Select Radius or Radius Accounting for the AAA server type.
4 Choose PAP or CHAP according to the authentication protocol used by your
RADIUS server.
5 Enter the IP Address, Port number and Shared Secret.
6 Click OK to save changes.
155
156
157
158
You have completed configuring the WLAN to authenticate users by MAC address
from a RADIUS server.
159
160
RADIUS Attributes
Ruckus products communicate with an external RADIUS server as a RADIUS client.
Packets from Ruckus products are called access-request or accounting-request
messages. The RADIUS server, in turn, sends an access-challenge, accessaccept or access-reject message in response to an access-request, and an
accounting-response message in response to an accounting-request.
RADIUS Attribute Value Pairs (AVP) carry data in both the request and the response
messages. The RADIUS protocol also allows vendor specific attributes (VSA) to
extend the functionality of the protocol. The following tables list the RADIUS
attributes used in these messages between ZoneDirector and the RADIUS/RADIUS
Accounting server based on which type of authentication is used for the WLAN.
Table 93 lists the attributes used in authentication, and Table 16 lists those used in
accounting.
ZoneDirector will terminate a user session if it receives a Change of AuthorizationDisconnect Message (COA-DM) from the RADIUS server. The COA-DM message
may be used when a client changes service levels. For instance, a new user may
initially connect to a free, low-rate service on one WLAN. When they purchase
access on a higher-rate service, RADIUS will send a COA-DM message to ZoneDirector, causing the user to re-connect to an alternative WLAN. COA-DM may also
be used to remove a client if a user exceeds their total bandwidth allowance or time
on the network.
Notation ==> below indicates this value is generated external to AP/ZoneDirector.
In the case of EAP payload, this is generated by a wireless client and encapsulated in the RADIUS access-request packet.
In the case of a state attribute, it indicates that an access-request packet is a
response to the last received access-challenge packet by copying the state
AVP unmodified.
As for the class attribute, it is parsed and stored from an access-accept packet
and then subsequently used in accounting-request packets.
161
162
163
164
165
166
167
168
6 Click OK.
7 Repeat this procedure for additional users or groups.
Figure 94. On the Microsoft IAS page, right-click the user/group and select Properties.
169
Figure 96. On the Authentication tab of the Edit Dial-in Profile dialog, select Unencrypted
authentication (PAP, SPAP)
170
TACACS+
Terminal Access Controller Access-Control System Plus (TACACS+) is an Authentication, Authorization and Accounting protocol used to authenticate ZoneDirector
administrators. ZoneDirector admins can be assigned any of the same three
administration privilege levels that can be set manually on the Configure > Roles
page:
Super Admin (Perform all configuration and management tasks)
Operator Admin (Change settings affecting single AP's only)
Monitoring Admin (Monitoring and viewing operation status only)
TACACS+ is an extensible AAA protocol that provides customization and future
development features, and uses TCP to ensure reliable delivery. The daemon should
listen at port 49 which is the "login" port assigned for the TACACS protocol.
To authenticate ZoneDirector admins using a TACACS+ AAA server:
1 Go to Configure > AAA Servers.
2 In Authentication/Accounting Servers, click Create New.
3 Enter a Name for the TACACS+ server, and select TACACS+ for Type.
4 Enter the servers IP address and do not change the Port setting from the default
port 49 (in general).
5 In TACACS+ Service, enter a string of up to 64 characters. This name must
match the name of the service configuration table on the TACACS+ server. Click
OK to save your changes.
171
Once your TACACS+ server is configured on the AAA Servers page, you can select
it from the list of servers used to authenticate ZoneDirector administrators on the
Administer > Preferences page.
172
173
1 On the Configure > AAA Servers page, locate the Test Authentication Settings
section.
2 Select the authentication server that you want to use from the Test Against
drop-down menu.
3 In User Name and Password, enter an Active Directory, LDAP or RADIUS user
name and password.
4 Click Test.
If ZoneDirector was able to connect to the authentication server and retrieve the
configured groups/attributes, the information appears at the bottom of the page.
The following is an example of the message that will appear when ZoneDirector
authenticates successfully with the server:
Success! Groups associated with this user are {group_name}.
This user will be assigned a role of {role}.
If the test was unsuccessful, there are three possible results (other than success)
that will be displayed to inform you if you have entered information incorrectly:
Admin invalid
User name or password invalid
Search filter syntax invalid (LDAP only)
These results can be used to troubleshoot the reasons for failure to authenticate
users from an AAA server through ZoneDirector.
174
In this chapter:
Overview of Wireless Networks
About Ruckus Wireless WLAN Security
Creating a WLAN
Creating a New WLAN for Workgroup Use
Customizing WLAN Security
Working with WLAN Groups
Deploying ZoneDirector WLANs in a VLAN Environment
Working with Hotspot Services
Creating a Hotspot 2.0 Service
Working with Dynamic Pre-Shared Keys
Enabling the Bypass Apple CNA Feature
175
176
Model
Max WLANs
ZoneDirector 1100
128
ZoneDirector 3000
1024
ZoneDirector 5000
2048
On older single-band APs (ZF 7025), the maximum number of WLANs deployable
per AP radio is eight. If an AP is in mesh mode, the maximum number of WLANs
deployable per radio is six, since the mesh uses two SSIDs.
On newer single-band APs (ZF 7321, 7341, 7343), and all dual-band ZoneFlex APs,
the maximum number of service WLANs deployable per AP radio is 27. These APs
support maximum 32 SSIDs per radio, but five are reserved (two mesh SSIDs and
one each for monitor, recovery and scan).
CAUTION! Deploying a large number of WLANs per AP will have a performance
impact. Ruckus Wireless recommends deploying no more than eight WLANs per
AP radio.
177
Creating a WLAN
All client authentication options (Open, 802.1X, MAC, and 802.1X+MAC) are
detailed in Creating a WLAN, and you can learn how to apply them to your WLANs
in the same section.
Creating a WLAN
To create a new WLAN:
1 Go to Configure > WLANs. The first table displays all WLANs that have already
been created in ZoneDirector.
2 In the top section (WLANs), click Create New. The Create New workspace
displays the following:
Figure 100. Creating a new WLAN
The WLAN Create New workspace includes the following configuration options
used to customize your new WLAN. The individual options are explained in detail in
the next section, beginning with General Options.
Table 17. Create new WLAN options
178
Option
Description
General Options
Creating a WLAN
General Options
Description
WLAN Usages
Authentication Options
Encryption Options
Options
Advanced Options
3 When you finish, click OK to save the entries. This WLAN is ready for use.
4 You can now select from these WLANs when assigning roles to users, as detailed
in Creating New User Roles.
General Options
Name/ESSID: Type a short name for this WLAN. The SSID must contain between
1 and 32 characters. Allowable characters include printable ASCII characters
from space (char 32) to ~ (char 126). A space can be used in the name, but the
name cannot begin or end with a space character. If a space is included at the
beginning or end of the ESSID, it will be automatically removed. If a disallowed
ASCII character (not within the range 32-126) is included, an error message will
appear.
179
Creating a WLAN
WLAN Usage Types
In general, the WLAN name is the same as the advertised SSID (the name of
the wireless network as displayed in the clients wireless configuration
program). However, you can also separate the ESSID from the WLAN name
by entering a name for the WLAN in the first field, and a broadcast SSID in
the second field. In this way, you can advertise the same SSID in multiple
locations (controlled by the same ZoneDirector) while still being able to
manage the different WLANs independently. Each WLAN name must be
unique within ZoneDirector, while the broadcast SSID can be the same for
multiple WLANs.
Description: Enter a brief description of the qualifications/purpose for this WLAN,
e.g., Engineering or Voice.
180
Creating a WLAN
Authentication Method
Autonomous WLANs
The Autonomous WLAN usage type supports Open authentication and WPA2
(WPA2/WPA-Mixed), WEP or no encryption only. In this configuration, client authentication/association requests are processed at the access point and are not
forwarded to ZoneDirector. The AP maintains connections to authorized clients and
continues providing wireless service after disconnection from ZoneDirector.
NOTE: If AP Auto Recovery is enabled (Configure > Access Points > Access Point
Policies), the APs will reboot after the specified time. Therefore Auto Recovery
should be disabled if at least one Autonomous WLAN is configured.
There are several limitations of autonomous WLANs, including:
ZoneDirector displayed client statistics may be incorrect.
Stations may be disconnected when an unreachable ZoneDirector becomes
reachable again, as ZoneDirector will re-deploy all WLAN services to AP radios.
Client capacity limits defined on ZoneDirector will not be applied on Autonomous
WLAN APs, and clients may be disconnected upon reconnecting to ZoneDirector if those limits are reached.
The following features are not supported with Autonomous WLANs:
Zero-IT, Dynamic PSK, Dynamic VLAN, Web Auth, Accounting server, Tunnel
Mode, Grace Period, Force DHCP, Client Fingerprinting, Auto Proxy, Service
Schedules.
ZoneDirectors Blocked Clients list will not be enforced on Autonomous
WLANs when a Layer 2 ACL is assigned. To force blocking of these clients,
copy individual clients to the assigned L2 ACL.
Authentication Method
Authentication Method defines the method by which users are authenticated
prior to gaining access to the WLAN. The level of security should be determined
by the purpose of the WLAN you are creating.
Open [Default]: No authentication mechanism is applied to connections. Any
encryption method can be used.
181
Creating a WLAN
Fast BSS Transition
Encryption Options
Encryption choices include WPA2, WPA-Mixed, WEP-64, WEP-128 and None.
WPA2 is the only encryption method certified by the Wi-Fi Alliance and is the
recommended method.
WEP has been proven to be easily circumvented, and Ruckus Wireless recommends
against using WEP if possible.
Method
WPA: Standard Wi-Fi Protected Access with either TKIP or AES encryption.
NOTE: The WiFi Alliance has mandated the removal of WPA+TKIP as a valid WLAN
encryption method for WiFi certification. Therefore, as of release 9.8, ZoneDirector
no longer allows the creation of new WPA or TKIP WLANs. Existing WPA WLANs
will retain their settings after upgrading to ZoneDirector version 9.8, however some
configuration settings will no longer be available (greyed out).
WPA2: Enhanced WPA encryption that complies with the 802.11i security
standard.
WPA-Mixed: Allows mixed networks of WPA and WPA2 compliant devices. Use
this setting if your network has a mixture of older clients that only support WPA
and TKIP, and newer client devices that support WPA2 and AES. **Note that
selection of WPA-Mixed disables the ability to use Zero-IT for this WLAN.
182
Creating a WLAN
Encryption Options
WEP-64: Provides a lower level of encryption, and is less secure, using shared
key 40-bit WEP encryption.
WEP-128: Provides a higher level of encryption than WEP-64, using a shared
104-bit key for WEP encryption. However, WEP is inherently less secure than
WPA2.
None: No encryption; communications are sent in clear text.
CAUTION! If you set the encryption method to WEP-64 (40 bit) or WEP-128 (104
bit) and you are using an 802.11n AP for the WLAN, the WLAN will operate in
802.11g mode.
CAUTION! If you set the encryption algorithm to TKIP, the AP will only be able to
support up to 26 clients. When this limit is reached, additional clients will be unable
to associate with the AP.
WEP Key/Passphrase
WEP Key: WEP methods only. Click in the Hex field and type the required key
text. If the key is for WEP-64 encryption, the key text must consist of 10
hexadecimal characters. If it is for WEP-128 encryption, enter a key 26 characters in length. Alternatively, click Generate to have ZoneDirector automatically
generate a WEP key.
183
Creating a WLAN
Encryption Options
Passphrase: WPA-PSK methods only. Click in this field and type the text of the
passphrase used for authentication.
Options
Web Authentication: [Available only with Open authentication.] Click the check
box to require all WLAN users to complete a web-based login to this network
each time they attempt to connect (see Activating Web Authentication).
Authentication Server: When Web Authentication is active, use this option to
designate the server used to authenticate web-based user login. When 802.1X
or MAC Address authentication is active, use this option to designate the server
used to authenticate users (without web authentication). Options include Local
Database, RADIUS server, Active Directory and LDAP. When one of these
authentication server types is selected (other than Local Database), you will
need to point ZoneDirector to the proper authentication server configured on the
Configure > AAA Servers page (see Using an External Server for User
Authentication).
Wireless Client Isolation: Enable Wireless Client Isolation to prevent all communication between WLAN clients and other local resources, unless they are
specifically allowed in a white list. A Client Isolation White List must first be
created on the Configure > Access Control page before appearing here (see
Configuring Client Isolation White Lists).
Zero-IT Activation: Enable this option to activate ZoneDirector's share in the
automatic new user process, in which the new user's PC is easily and quickly
configured for WLAN use. For more information, see Enabling Automatic User
Activation with Zero-IT.
Dynamic PSK: Dynamic PSK is available when you have enabled Zero-IT
Activation. When a client is activated, ZoneDirector provisions the user with a
pre-shared key. This per-user key does not expire by default. If you want to set
an expiration for Dynamic PSKs, you can do so from the drop-down menu further
down the page. For more information, see Working with Dynamic Pre-Shared
Keys.
Priority: Set the priority of this WLAN to Low if you would prefer that other WLAN
traffic takes priority. For example, if you want to prioritize internal traffic over guest
WLAN traffic, you can set the priority in the guest WLAN configuration settings
to Low. By default all WLANs are set to high priority.
184
Creating a WLAN
Advanced Options
Advanced Options
The advanced options can be used to configure special WLANs; for example, you
might want to create a special WLAN for VoIP phone use only, or create a student
WLAN that should be time-controlled to provide access only during school hours.
Accounting Server: If you added a RADIUS Accounting server on the AAA servers
page, select the RADIUS Accounting server from the drop-down list, and then
set the accounting update interval in Send Interim-Update every x minutes.
Valid Interim-Update values are 0-1440. Setting the value to 0 disables periodic
interim updates to the accounting server, but client IP changes are still sent to
the RADIUS Accounting server.
Access Controls: Toggle this drop-down list to select Access Control Lists (L2
or L3/L4), Device Policy and Precedence Policy to apply to this WLAN. An access
control entry must be created before being available here. For more information,
see Controlling Network Access Permissions.
Enable Role based Access Control Policy: This feature allows different user
groups to have different access policies based on their user roles using the same
WLAN. See Role Based Access Control Policy.
Call Admission Control (Disabled by default): Enable Wi-Fi Multimedia Admission
Control (WMM-AC) to support Polycom/Spectralink VIEW certification. When
enabled, the AP announces in beacons if admission control is mandatory or not
for various access categories and admits only the traffic streams it can support
based on available network resources. When network resources are not sufficient to provide this level of performance, the new traffic stream is not admitted.
Call Admission Control is effective only when both AP and the client support
WMM-AC. Ruckus APs are capable of handling hundreds of simultaneous
clients, but when it comes to VoIP traffic, the number of VoIP calls needs to be
policed to ensure adequate voice/video quality. Ruckus recommends limiting
bandwidth allocation to six calls (four active calls and two reserved for roaming)
on the 2.4 GHz radio and 10 calls on the 5 GHz radio (seven active and three
reserved for roaming). Enable this feature if you want this WLAN to serve as a
VoIP WLAN to support Spectralink phones. (You will also need to enable Call
Admission Control on any APs supporting this WLAN from the Configure >
Access Points page.)
Rate Limiting: Rate limiting controls fair access to the network. When enabled,
the network traffic throughput of each network device (i.e., client) is limited to
the rate specified in the traffic policy, and that policy can be applied on either the
185
Creating a WLAN
Advanced Options
uplink or downlink. Toggle the Uplink and/or Downlink drop-down lists to limit
the rate at which WLAN clients upload/download data. The Disabled state
means rate limiting is disabled; thus, traffic flows without prescribed limits.
Multicast Filter: When enabled for a WLAN, all client multicast traffic will be
dropped at the AP. Broadcast and unicast frames remain unchanged.
Access VLAN: By default, all wireless clients associated with APs that ZoneDirector is managing are segmented into a single VLAN (with VLAN ID 1). If you
want to tag this WLAN traffic with a different VLAN ID, enter a valid VLAN ID (24094) in the box. Select the Enable Dynamic VLAN check box to allow
ZoneDirector to assign VLAN IDs on a per-user basis. Before enabling dynamic
VLAN, you need to define on the RADIUS server the VLAN IDs that you want to
assign to users. See How Dynamic VLAN Works for more information.
Hide SSID: Activate this option if you do not want the ID of this WLAN advertised
at any time. This will not affect performance or force the WLAN user to perform
any unnecessary tasks.
Tunnel Mode: Select this check box if you want to tunnel the WLAN traffic back
to ZoneDirector. Tunnel mode enables wireless clients to roam across different
APs on different subnets. If the WLAN has clients that require uninterrupted
wireless connection (for example, VoIP devices), Ruckus Wireless recommends
enabling tunnel mode.
NOTE: Note that Wireless Distribution System (WDS) clients, for example,
MediaFlex 7211/2111 adapters, do not work when the ZoneDirector WLAN is in
Tunnel Mode.
NOTE: When tunnel mode is enabled on a WLAN, multicast video packets are
blocked on that WLAN. Multicast voice packets, however, are allowed.
Proxy ARP: When enabled on a WLAN, the AP provides proxy service for stations
when receiving neighbor discovery packets (e.g., ARP request and ICMPv6
Neighbor Solicit messages), and acts on behalf of the station in delivering ARP
replies. When the AP receives a broadcast ARP/Neighbor Solicit request for a
known host, the AP replies on behalf of the host. If the AP receives a request for
an unknown host, it forwards the request at the rate limit specified in the Packet
Inspection Filter.
186
Creating a WLAN
Advanced Options
DHCP Relay: Enable DHCP Relay agent to convert broadcast DHCP messages
to unicast in Tunnel Mode WLANs. For more information, see Configuring DHCP
Relay.
Background Scanning: Background scanning enables the Ruckus Wireless
access points to continually scan for the best (least interference) channels and
adjust to compensate. However, disabling Background Scanning may provide
better quality (lower latency) for time-sensitive applications like voice conversations. If this WLAN will be used primarily as a voice network, select this check
box to disable Background Scanning for this WLAN. You can also disable
Background Scanning per radio (see Background Scanning).
Load Balancing: Client load balancing between APs is disabled by default on all
WLANs. To disable load balancing for this WLAN only (when enabled globally),
check this box. Ruckus Wireless recommends disabling load balancing on VoIP
WLANs. For more information, see Load Balancing.
Band Balancing: Client band balancing between the 2.4 GHz and 5 GHz radio
bands is disabled by default on all WLANs. To disable band balancing for this
WLAN only (when enabled globally), check this box. For more information see
Band Balancing.
Max Clients: Limit the number of clients that can associate with this WLAN per
AP radio (default is 100). You can also limit the total number of clients per AP
using the AP Groups settings. See Modifying Model Specific Controls for more
information.
802.11d: The 802.11d standard provides specifications for compliance with
additional regulatory domains (countries or regions) that were not defined in the
original 802.11 standard. Enable this option if you are operating in one of these
additional regulatory domains. For optimal performance of Apple iOS devices, it
is recommended that you enable this option. Please be aware that some legacy
embedded devices such as wireless barcode scanners may not operate properly
if this option is enabled. This option is enabled by default for any WLANs created
on ZoneDirector version 9.6 or later, and disabled by default for any WLANs
created running earlier versions. If upgrading from a previous version to 9.6 or
later, existing WLANs will retain their original settings.
DHCP Option 82: When this option is enabled and an AP receives a DHCP
request from a wireless client, the AP will encapsulate additional information
(such as VLAN ID, AP name, SSID and MAC address) into the DHCP request
packets before forwarding them to the DHCP server. The DHCP server can then
187
Creating a WLAN
Advanced Options
use this information to allocate an IP address to the client from a particular DHCP
pool based on these parameters. See also DHCP Option 82 for information on
enabling this option for Ethernet ports.
Force DHCP: Enable this option to force clients to obtain a valid IP address from
DHCP within the specified number of seconds. This prevents clients configured
with a static IP address from connecting to the WLAN. Additionally, if a client
performs Layer 3 roaming between different subnets, in some cases the client
sticks to the former IP address. This mechanism optimizes the roaming experience by forcing clients to request a new IP address.
Client Tx/Rx Statistics: Enable this option to ignore unauthorized client statistics
and report only statistics from authorized clients in device view and other reports.
This can be useful for service providers who are more interested in accounting
statistics (after authorization) than in all wireless client statistics. For example, a
Hotspot WLAN can be configured to allow unauthorized clients to connect and
traverse any walled garden web pages without adding to transmission statistics
(until after authorization).
Application Visibility: Enable this option to allow APs to collect client application
data, which can then be consolidated for use by the Applications and Top 10
Applications by Usage widgets on the Dashboard.
NOTE: Supported APs: R700, 7982, 7372/52, 7055, 7782/81, SC-8800 series.
When Application Visibility is enabled, the Apply Policy group option becomes
available. Use this option to apply an Application Denial Policy to this WLAN
(see Configuring Application Denial Policies).
Client Fingerprinting: When this option is enabled ZoneDirector will attempt to
identify client devices by their Operating System, device type and Host Name,
if available. This makes identifying client devices easier in the Dashboard, Client
Monitor and Client Details screens.
Service Schedule: Use the Service Schedule tool to control which hours of the
day, or days of the week to enable/disable WLAN service. For example, a WLAN
for student use at a school can be configured to provide wireless access only
during school hours. Click on a day of the week to enable/disable this WLAN for
the entire day. Colored cells indicate WLAN enabled. Click and drag to select
specific times of day. You can also disable a WLAN temporarily for testing
purposes, for example.
188
Creating a WLAN
Advanced Options
NOTE: This feature will not work properly if ZoneDirector does not have the correct
time. To ensure ZoneDirector always maintains the correct time, configure an NTP
server and point ZoneDirector to the NTP servers IP address, as described in Setting
the System Time.
189
Creating a WLAN
Advanced Options
190
191
6 Type a descriptive name for this WLAN, and then click OK. This new WLAN is
ready for use by selected users.
7 You can now assign access to this new WLAN to a limited set of internal users,
as detailed in Creating New User Roles.
192
Figure 103. Viewing WLAN security configurations from the Monitor > WLANs page
193
194
802.1X EAP + MAC Address allows the use of both authentication methods
on the same WLAN.
5 Depending on your Authentication Option Method selection, review and
reconfigure the related Encryption Options.
6 Review the Advanced Options to change any settings as needed.
7 When you are finished, click OK to apply your changes.
NOTE: Replacing your WPA configuration with 802.1X requires the users to make
changes to their Ruckus wireless connection configurationwhich may include the
importation of certificates.
195
CAUTION! If your wireless network is using EAP/external RADIUS server for client
authentication and you have Windows Vista clients, make sure that they are
upgraded to Vista Service Pack 1 (SP1). SP1 includes fixes for client authentication
issues when using EAP/external RADIUS server.
196
1 Create a WLAN service (for example, Guest Only Service) that provides guestlevel access only.
2 Create a WLAN group (for example, Guest Only Group), and then assign Guest
Only Service (WLAN service) to Guest Only Group (WLAN group).
3 Assign APs on the 1st Floor (where visitors need wireless access) to your Guest
Only Group.
Any wireless client that associates with APs assigned to the Guest Only Group will
get the guest-level access privileges defined in your Guest Only Service. APs on
the 2nd and 3rd Floors can remain assigned to the Default WLAN Group and provide
normal-level access.
NOTE: Creating WLAN groups is optional. If you do not need to provide different
WLAN services to different areas in your environment, you do not need to create a
WLAN group.
NOTE: A default WLAN group called Default exists. The first 27 WLANs that you
create are automatically assigned to this Default WLAN group.
NOTE: A WLAN Group can include a maximum of 27 member WLANs. For dual
radio APs, each radio can be assigned to only one WLAN Group (single radio APs
can be assigned to only one WLAN Group).
The maximum number of WLAN groups that you can create depends on the
ZoneDirector model.
Table 18. Maximum number of WLAN groups by ZoneDirector model
ZoneDirector Model
ZoneDirector 1100
128
ZoneDirector 3000
1024
ZoneDirector 5000
2048
197
2 In the WLAN Groups section, click Create New. The Create New form appears.
3 In Name, type a descriptive name that you want to assign to this WLAN group.
For example, if this WLAN will contain WLANs that are designated for guest
users, you can name this as Guest WLAN Group.
4 In Description (optional), type some notes or comments about this group.
5 Under Group Settings, select the check boxes for the WLANs that you want
to be part of this WLAN group.
6 In the VLAN override settings, choose whether to override the VLAN configured
for each member WLAN. Available options include:
No Change: Click this option if you want the WLAN to keep the same VLAN
tag (default: 1).
Tag: Click this option to override the VLAN configured for the WLAN service.
7 Click OK. The Create New form disappears and the WLAN group that you
created appears in the table under WLAN Groups.
You may now assign this WLAN group to an AP.
Figure 104. WLAN group
198
3 In WLAN Group, click Override Group Config and select the WLAN group to
which you want to assign the AP. Each AP (or radio, on dual radio APs) can only
be a member of a single WLAN group.
4 Click OK to save your changes.
Figure 105. Assign a WLAN group to an AP
199
200
You must ensure that switch ports are configured properly to pass the VLAN traffic
necessary for ZoneDirector, AP and client communications. In the sample VLAN
scenario above, the switch ports would need to be configured as follows:
Corp VLAN: 20
Guest VLAN: 30
Management VLAN: (optional)
Some common VLAN scenarios include:
WLANs assigned to specific VLANs; ZD and APs with no management VLAN
WLANs assigned to specific VLANs; ZD and APs within their own single
management VLAN
WLANs assigned to specific VLANs; ZD and APs are configured for management
VLAN, but are different VLANs and there is an L3 connection between (typical
branch/remote office deployments)
WLANs assigned to specific VLANs; ZD or APs only (not both) configured with
management VLAN (again typically with a L3 connection between ZD and APs)
The following factors need to be taken into consideration:
Default/Native VLAN configuration
Where the DHCP/DNS servers sit in the architecture
If tunneling is used for WLANs
201
202
203
204
How It Works
1 User associates with a WLAN on which Dynamic VLAN has been enabled.
205
2 The AP requires the user to authenticate with the RADIUS server via
ZoneDirector.
3 When the user completes the authentication process, ZoneDirector sends the
join approval for the user to the AP, along with the VLAN ID that has been
assigned to the user on the RADIUS server.
4 User joins the AP and is segmented to the VLAN ID that has been assigned to
him.
Type ID
Expected Value
(Numerical)
Tunnel-Type
64
VLAN (13)
Tunnel-Medium-Type
65
802 (6)
Tunnel-Private-Group-Id
81
VLAN ID
Here is an example of the required attributes for three users as defined on Free
RADIUS:
0018ded90ef3
User-Name = user1,
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-802,
Tunnel-Private-Group-ID = 0014
00242b752ec4
206
User-Name = user2,
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-802,
Tunnel-Private-Group-ID = 0012
013469acee5
User-Name = user3,
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-802,
Tunnel-Private-Group-ID = 0012
NOTE: The values in bold are the users' MAC addresses.
207
ages, such as Chillispot, are available on the Internet. For a list of open source
and commercial captive portal software, visit http://en.wikipedia.org/wiki/
Captive_portal#Software_Captive_Portals, and
RADIUS Server: A Remote Authentication Dial-In User Service (RADIUS) server
through which users can authenticate.
For installation and configuration instructions for the captive portal and RADIUS
server software, refer to the documentation that was provided with them. After
completing the steps below, you will need to edit the WLAN(s) for which you want
to enable Hotspot service.
ZoneDirector supports up to 32 WISPr Hotspot service entries, each of which can
be assigned to multiple WLANs.
To create a Hotspot service:
1 Go to Configure > Hotspot Services.
2 Click Create New. The Create New form appears.
3 In Name, enter a name for this hotspot service. (You will need to choose this
name from a list when creating a WLAN to serve this hotspot service.)
4 In WISPr Smart Client Support, select whether to allow WISPr Smart Client
support:
None: (default).
Enabled: Enable Smart Client support.
NOTE: The WISPr Smart Client is not provided by Ruckus - you will need to provide
Smart Client software/hardware to your users if you select this option.
Only WISPr Smart Client allowed: Choose this option to allow only clients
that support WISPr Smart Client login to access this hotspot. If this option is
selected, a field appears in which you can enter instructions for clients
attempting to log in using the Smart Client application.
Smart Client HTTP Secure: If Smart Client is enabled, choose whether to
authenticate users over HTTP or HTTPS.
5 In Login Page (under Redirection), type the URL of the captive portal (the page
where hotspot users can log in to access the service).
6 Configure optional settings as preferred:
208
In Start Page, configure where users will be redirected after successful login.
You could redirect them to the page that they want to visit, or you could set
a different page where users will be redirected (for example, your company
website).
In User Session, configure session timeout and grace period, both disabled
by default.
-
Session Timeout: Specify a time limit after which users will be disconnected and required to log in again.
Grace Period: Allow disconnected users a grace period after disconnection, during which clients will not need to re-authenticate. Enter a number
in minutes, between 1 and 144,000.
7 In Authentication Server, select the AAA server that you want to use to
authenticate users.
Options include Local Database and any AAA servers that you configured on
the Configure > AAA Servers page. If a RADIUS server is selected, an
additional option appears: Enable MAC authentication bypass (no redirection). Enabling this option allows users with registered MAC addresses
to be transparently authorized without having to log in. A user entry on the
RADIUS server needs to be created using the client MAC address as both
the user name and password. The MAC address format can be configured
in one of the formats listed in MAC Authentication with an External RADIUS
Server.
8 In Accounting Server (if you have an accounting server set up), select the server
from the list and configure the frequency (in minutes) at which accounting data
will be retrieved.
9 In Wireless Client Isolation, choose whether clients connected to this Hotspot
WLAN should be allowed to communicate with one another locally. See
Advanced Options in the Creating a WLAN section for a description of the
same feature for non-Hotspot WLANs.
10 Configure optional settings as preferred:
In Location Information, enter Location ID and Location Name WISPr
attributes, as specified by the Wi-Fi Alliance.
209
210
NOTE: If ZoneDirector is located behind a NAT device and signed certificates are
used with portal authentication, a static entry must be added to the DNS server to
resolve ZoneDirectors private IP address to its FQDN. Otherwise, client browsers
may enter an infinite redirect loop and be unable to reach the login page. Before the
signed certificate gets added the client gets redirected to the IP address of the ZD
instead of the FQDN.
211
212
Abbreviation
Description
sip
mac
Description
lid
uip
dn
uid
The users login ID (passed in the UAM login forms user name
parameter).
client_mac
SSID
Loc
vlan
reason
The reason for redirection; can be empty for first redirect, failed for
auth failure, or logout when client logs off.
213
Enabling Hotspot 2.0 service on ZoneDirector requires the following three steps:
Create a Service Provider Profile
Create an Operator Profile
Create a Hotspot 2.0 WLAN
Description
Name
Description
214
Description
Name
Description
215
216
Option
Description
Venue Information
ASRA Option
Internet Option
IP Address Type
HESSID
WAN Metrics
Connection Capability
Description
217
2 In the WLANs section, look for the WLAN that you want to assign as a HS2.0
WLAN, and then click the Edit link that is on the same row. The Editing (WLAN
name) form appears.
3 In Type, click Hotspot 2.0.
NOTE: 802.1X EAP is the only authentication method and WPA2/AES is the only
encryption method available when you select Hotspot 2.0 for WLAN type.
4 In Hotspot 2.0 Operator, select the name of the Operator profile that you
created previously.
5 In Authentication Server, select the RADIUS server used to authenticate users.
6 Optionally, enable Proxy ARP for this Hotspot 2.0 WLAN (see Advanced
Options under Creating a WLAN.)
If Proxy ARP is enabled, you also have the option to disable downstream
group-addressed frame forwarding by selecting the DGAF option. This
option prevents stations from forwarding group-addressed (multicast/broadcast) frames and converts group-addressed DHCP and ICMPv6 router
advertisement packets from layer 2 multicast to unicast.
7 Click OK to save your changes.
218
219
Each DPSK is bound to the MAC address of an authorized device - even if that
PSK is shared with another user, it will not work for any other machine.
Since each device has its own DPSK, you can also associate a user (or device)
name with each key for easy reference.
Each DPSK may also have an expiration date - after that date, the key is no
longer valid and will not work.
DPSKs can be created and removed without impacting any other device on the
WLAN.
If a hacker manages to crack the DPSK for one client, it does not expose the
other devices which are encrypting their traffic with their own unique DPSK.
DPSKs can be created in bulk and manually distributed to users and devices, or
ZoneDirector can auto-configure devices with a DPSK when they connect to the
network for the first time using Zero-IT Activation (see Enabling Automatic User
Activation with Zero-IT).
220
221
NOTE: If you change the dynamic PSK expiration period, the new expiration period
will only be applied to new PSKs. Existing PSKs will retain the expiration period that
was in effect when the PSKs were generated. To force expiration, go to Monitor >
Generated PSK/Certs.
222
223
NOTE: The MAC address column shows 00:00:00:00:00:00 for all users. When a user
accesses the WLAN using the dynamic PSK that has been assigned to him, the
MAC address of the device that he used will be permanently associated with the
dynamic PSK that he used.
To enable wireless users to access the wireless network, you need to send them
the following information:
WLAN Name: This is the WLAN with which they are authorized to access and
use the dynamic PSK that you generated (passphrase).
Passphrase: This is the network key that the user needs to enter on his WLAN
configuration client to access the WLAN.
Expiration: (Optional) This is the date when the passphrase/network key will
expire. After this date, the user will no longer be able to access the WLAN using
the same passphrase/network key.
Alternatively, you can allow users to automatically self-provision their clients using
Zero-IT, as described in Enabling Automatic User Activation with Zero-IT.
224
225
2 Locate the Bypass Apple CNA Feature section at the bottom of the page.
3 Select any or all of the following WLAN types for which you want to bypass the
Apple CNA feature:
Web Authentication
Guest Access
Hotspot service
4 Click Apply to save your changes.
Figure 119. Enabling the Bypass Apple CNA Feature
226
In this chapter:
Adding New Access Points to the Network
Working with Access Point Groups
Reviewing Current Access Point Policies
Importing a USB Software Package
Managing Access Points Individually
Optimizing Access Point Performance
227
228
NOTE: By default, Ruckus Wireless APs will attempt to obtain an IP address via
DHCP as soon as they are connected to the network. If you do not want the AP to
automatically request an IP address, you must first configure a static IP address
using the AP web interface or CLI before connecting them to your network.
4 Connect each AP to a power source.
NOTE: If the Ruckus Wireless APs that you are using are PoE-capable and power
sources are not convenient, they will draw power through the Ethernet cabling if
connected to a PoE-ready hub or switch.
229
230
Max AP Groups
ZoneDirector 1100
32
ZoneDirector 3000
256
ZoneDirector 5000
512
231
232
Setting
Description
Name
Description
Channel Range
Settings
To limit the available channels for 2.4 GHz, 5 GHz Indoor and
5 GHz Outdoor channel selection, deselect any channels that
you do not want the APs to use.
Channelization
Select Auto, 20MHz or 40MHz channel width for either the 2.4
GHz or 5 GHz radio.
Channel
Tx Power
Allows you to manually set the transmit power on all 2.4 GHz
or 5 GHz radios (default is Auto).
WLAN Group
Setting
Description
IP Mode
Location Based
Service
ChannelFly
Model Specific Control Use this section to configure max clients, LEDs and port
settings for all APs of each specific model that are members of
the group. See Modifying Model Specific Controls.
Group Settings
233
Figure 122. Editing the System Default access point group settings
234
1 In Group Settings, click Add more Access Points to this group (or Add more
Access Points from System Default group to this group).
2 Select the APs you want to add, and click Add to this group. The AP is added
to the Members list above.
3 Click OK to save your changes.
To move an AP from the current AP group to another group:
1 Click the check box next to any AP you want to move (to select all APs in the
group, click the check box at the top of the column).
2 Select the target AP group from the drop-down list, and click Move To. The AP
disappears from the current group list.
3 Click OK to save your changes.
Figure 123. Modify AP group membership
235
NOTE: For the internal heater to be operational, ZoneFlex 7762 APs must be
powered by the supplied PoE injector and its associated power adapter or a
standard 802.3at PSE. For the PoE Out port to be operational, ZoneFlex 7762 APs
must be powered by the supplied PoE injector and its associated power adapter.
PoE Out Ports: Enable PoE out ports (specific ZoneFlex AP models only).
NOTE: If your ZoneDirector country code is set to United Kingdom, an additional
Enable 5.8 GHz Channels option will be available for outdoor 11n APs. Enabling
this option allows the use of restricted C-band channels. These channels are
disabled by default and should only be enabled by customers with a valid license
to operate on these restricted channels.
Disable Status LEDs: When managed by ZoneDirector, you can disable the
external LEDs on certain ZoneFlex models, such as the 7300 series APs. This
can be useful if your APs are installed in a public location and you dont want to
draw attention to them.
External Antenna: External antenna configuration is available for the 5 GHz radio
on the ZoneFlex 7762, and for the 2.4 and 5 GHz radios on the 7782-E APs.
Once enabled, enter a gain value in the range of 0 to 90dBi.
Radio Band: (ZoneFlex 7321 only) Select 2.4 GHz or 5 GHz radio band for the
7321 APs.
Port Settings: See Configuring AP Ethernet Ports.
236
5 Deselect the check box next to Enable to disable this LAN port entirely. All ports
are enabled by default.
6 Select DHCP_Opt82 if you want to enable this option for this port (see DHCP
Option 82).
7 For any enabled ports, you can choose whether the port will be used as a Trunk
Port, an Access Port or a General Port. The following restrictions apply:
All APs must be configured with at least one Trunk Port.
For single port APs (e.g., ZoneFlex R300), the single LAN port must be a
trunk port and is therefore not configurable.
For ZoneFlex 7025/7055, the LAN5/Uplink port on the rear of the AP is
defined as a Trunk Port and is not configurable. The four front-facing LAN
ports are configurable.
For all other APs, you can configure each port individually as either a Trunk
Port, Access Port or General Port. (See Designating Ethernet Port Type for
more information.)
8 (If Smart Mesh is not enabled), choose whether this port will serve as an 802.1X
Authenticator or Supplicant, or leave 802.1X settings disabled (default). (See
Using Port-Based 802.1X for more information.)
9 Click Apply to save your changes.
237
Figure 124. The ZoneFlex 7982 has two Ethernet ports, LAN1 and LAN2
238
Figure 125. The ZoneFlex 7025/7055 has four front-facing Ethernet ports and one rear port
239
DHCP Option 82
The DHCP Relay Agent Information Option (Option 82) allows a DHCP Relay Agent
to insert specific identification information into a request that is being forwarded to
a DHCP server.
When this option is enabled for an Ethernet port or a WLAN SSID, additional
information will be encapsulated in DHCP option 82 and inserted into DHCP request
packets. This option supports the ability for a service provider to allocate IP
addresses intelligently by considering information on the origin of the IP allocation
request.
240
241
VLAN, and all egress traffic is untagged. If configured as a Trunk Port, all untagged
ingress traffic is the configured Untag VLAN (by default, 1), and all VLAN-tagged
traffic on VLANs 1-4094 will be seen when present on the network.
The default Untag VLAN for each port is VLAN 1. Change the Untag VLAN to:
Segment all ingress traffic on this Access Port to a specific VLAN.
Redefine the Native VLAN on this Trunk Port to match your network configuration.
Trunk Ports
Trunking is a function that must be enabled on both sides of a link. If two switches
are connected together, for example, both switch ports must be configured as trunk
ports.
The Trunk Port is a member of all the VLANs that exist on the AP/switch and carries
traffic for all those VLANs between switches.
Access Ports
All Access Ports are set to Untag VLAN 1 by default. This means that all Access
Ports belong to the native VLAN and are all part of a single broadcast domain. To
remove ports from the native VLAN and assign them to specific VLANs, select
Access Port and enter any valid VLAN ID in the VLAN ID field (valid VLAN IDs are
2-4094).
The following table describes the behavior of incoming and outgoing traffic for
Access Ports with VLANs configured.
Table 24. Access Ports with VLANs configured
242
VLAN Settings
General Ports
General ports are user-specified ports that can have any combination of up to 20
VLAN IDs assigned. Enter multiple valid VLAN IDs separated by commas or a range
separated by a hyphen.
Port-based mode
MAC-based mode
Trunk Port
Access Port
General Port
243
Authenticator: Select the RADIUS server from the list. A RADIUS server
must be selected to set this port as a MAC-based authenticator.
5 Enable MAC authentication bypass: Enable this option to allow AAA server
queries using the MAC address as both the user name and password. If MAC
authentication is unsuccessful, the normal 802.1X authentication exchange is
attempted.
244
Figure 127. Enabling Guest VLAN and Dynamic VLAN on a MAC-based 802.1X Authenticator
port
245
246
247
248
Prefer Primary ZD: Enable this option if you want APs to revert to the
primary ZoneDirectors control after connection to the primary controller
is restored.
Keep AP's setting: Click this option if you want to preserve the Management VLAN settings as configured on the AP. Note that Management
VLAN on the AP is disabled by default.
VLAN ID: Enter a valid VLAN ID to segment management traffic into the
VLAN specified. Valid VLAN IDs are 1-4094.
NOTE: If you change the Management VLAN ID here, you also need to set the
Management VLAN ID that ZoneDirector needs to use on the Configure > System
Settings page. Otherwise, ZoneDirector and the APs will be unable to communicate
via the Management VLAN.
Load Balancing: Balances the number of clients across adjacent APs (see
Load Balancing).
Tunnel MTU: Use this field to set the Maximum Transmission Unit for tunnel
packets between ZoneDirector and APs. The MTU is the size of the largest
protocol data unit (in bytes) that can be passed. Supported MTU values range
from 850 to 1500 (default is 1500). Note that changing this setting to a value
less than 1280 will affect IPv6 connectivity.
Auto Recovery: Set an AP auto recovery time in minutes, after which APs
will reboot in attempt to reconnect to ZoneDirector. Default is 30 minutes.
3 Click Apply to save and apply your settings.
249
Figure 130. Setting global AP policies on the Configure > Access Points page
250
251
The imported APs will be placed into AP Groups according to the settings that were
backed up from the primary controller. If the original AP Group or WLAN Group name
does not exist on the destination controller, the AP will be placed in the System
Default AP Group/WLAN Group.
Additionally, you must make sure that the maximum number of APs is not exceeded.
Table 26. Max APs by ZoneDirector model
Model
ZoneDirector 1100
150
ZoneDirector 3000
500
ZoneDirector 5000
1000
252
3 Once an LWAPP tunnel between the AP and ZoneDirector has been established,
ZoneDirector automatically pushes the corresponding USB drivers, network
connection scripts and configuration files to the AP.
4 The AP saves the files to its persistent storage.
5 Disconnect the wired network connection, then reboot the AP.
6 After reboot, the AP detects the appropriate drivers on its persistent storage,
goes through the 3G/4G/LTE network connection process and establishes an
LWAPP tunnel with ZoneDirector.
7 ZoneDirector pushes the 802.11 wireless configuration to the AP.
8 The AP implements the 802.11 wireless configuration and is ready to provide
802.11 wireless services.
9 A wireless client connects to the APs 802.11 wireless service, and the data traffic
is tunneled to ZoneDirector through the LWAPP tunnel.
Figure 131. Importing a USB software package
253
254
IP Address
255
Netmask
Gateway
19 If you select Override Group Config in the Port Setting section, a new section
opens where you can customize the Ethernet port behavior for this AP. Enabling
this will override the AP Group settings made on Configuring AP Ethernet Ports.
256
257
Figure 134. Setting the Venue Name for a Hotspot 2.0 service AP
258
3 When the heat map appears, look for the Signal (%) scale in the upper right
corner of the map.
4 Note the overall color range, especially colors that indicate low coverage.
5 Look at the floorplan and evaluate the current coverage. You can make
adjustments as detailed in the following procedure.
Improving AP RF Coverage
1 Click and drag individual AP markers to new positions on the Map View floorplan
until your RF coverage coloration is optimized. There may be a need for additional
APs to fill in large coverage gaps.
2 When your adjustments are complete, note the new locations of relocated AP
markers.
3 After physically relocating the actual APs according to the Map View placements,
reconnect the APs to a power source.
4 To refresh the ZoneDirector Map View, run a full-system RF Scan, as detailed in
Starting a Radio Frequency Scan.
5 When the RF scan is complete and ZoneDirector has recalibrated the Map View,
you can assess your changes and make further adjustments as needed.
Adjusting AP Settings
1 Go to Configure > Access Points.
2 Review the Access Points table and identify an AP that you want to adjust.
3 Click the Edit button in that AP row.
4 Review and adjust any of the following Editing (AP) options:
259
260
In this chapter:
Reviewing the ZoneDirector Monitoring Options
Importing a Map View Floorplan Image
Using the Map View Tools
Evaluating and Optimizing Network Coverage
Reviewing Current Alarms
Reviewing Recent Network Events
Moniting WLAN Status
Reviewing Current User Activity
Monitoring Individual Clients
Monitoring Access Point Status
Monitoring Individual APs
Monitoring Mesh Status
Detecting Rogue Access Points
Monitoring System Ethernet Port Status
Monitoring AAA Server Statistics
Monitoring Location Services
261
262
Requirements
A floorplan image in .GIF, .JPG or .PNG format
The image should be monochrome or grayscale.
The file size should be no larger than 200kb in size.
The floorplan image should be (ideally) no larger than 10 inches (720 pixels) per
side.
263
Figure 135. The Create New form for importing a floorplan image
264
1
7
9
4
10
5
11
There are a number of helpful features built into the Map View, as noted here and
marked in the above illustration:
1 Map drop-down list: Select the floorplan to view from the Map drop-down list.
2 Coverage and Show Rogue APs box: For Coverage, selecting 2.4 GHz enables
a signal strength view of your placed 2.4 GHz APs. Selecting 5 GHz displays the
signal coverage of 5 GHz radios. Selecting either 2.4 or 5 GHz opens the Signal
(%) legend on the right side of the Map View. See item number 8 below for the
description of the Signal%. For Show Rogue APs, selecting Yes displays the
detected rogue APs in the floorplan.
265
3 Unplaced APs area: As noted in Importing a Map View Floorplan Image, when
you first open the Map View, newly placed APs appear in this area. If they are
approved for use (see Adding New Access Points to the Network), you can drag
them into the correct location in the floorplan. Unplaced APs are available across
all of the floor plans you upload. Thus, you can toggle between maps (see
number 1) and place each AP on the appropriate map. For the various AP icon
types, see AP Icons.
4 Access Points, Rogue APs, and Clients box: This lower left corner box displays
the number of active APs, any rogue (unapproved or illegitimate) APs, and all
associated clients.
5 Search text box: Enter a string, such as part of an AP's name or MAC address,
and the map is filtered to show only the matching results. Clearing the search
value returns the map to its unfiltered view.
6 Floorplan area: The floorplan displays in this main area. You can manipulate the
size and angle of the floorplan by using the tools on this screen. Note the following
icons:
Click this icon, and then click an AP from the floorplan to remove
that AP.
Click this icon to rotate the floorplan. When clicked, rotation
crosshairs appear in the center of the map; click and hold these
crosshairs and move your cursor to rotate the view.
Refresh the floorplan.
7 Signal (%): This colored legend displays the signal strength coverage when you
selected either 2.4 GHz or 5 GHz for Coverage (see #2 above). See Evaluating
and Optimizing Network Coverage for more information.
8 Upper slider: The upper slider is a zoom slider, allowing you to zoom in and out
of the floorplan. This is helpful in exact AP marker placement, and in assessing
whether physical obstructions that affect RF coverage are in place.
9 Lower slider: The bottom slider is the image contrast slider, allowing you to dim
or enhance the presence of the floorplan. If you have trouble seeing the floorplan,
move the slider until you achieve a satisfactory balance between markers and
floorplan details.
10 Scale legend: To properly assess the distances in a floorplan, a scaler has been
provided so that you can place APs in the most precise location.
266
11 Open Space Office drop-down list: Open Office Space refers to the methodology
used to compute RF coverage/signal% (i.e., heat map) based on the current
environment.
AP Icons
Each AP marker has variable features that help indicate identity and status:
A normal AP marker displays the
description of the AP and the number
of users that are currently associated
with the AP.
An unplaced AP marker displays a ?
(question mark) above the icon.
A rogue AP displays a smaller red icon
imprinted with a bug.
A bug icon with a lock on it indicates
a rogue AP with security enabled.
In a Smart Mesh network, an isolated
AP displays a red X above the icon.
When Smart Mesh is enabled, a
circled number appears next to the AP
icon to indicate that it is a Mesh AP.
The number indicates the number of
hops from this Mesh AP to the Root
AP.
When Smart Mesh is enabled, a blue
square with an arrow indicates that it
is a Root AP with active downlinks.
Dotted lines that connect this AP to
other APs indicate the active
downlinks.
When Smart Mesh is enabled, a gray
square (dimmed) with an arrow
indicates that it is a Root AP without
any active downlinks.
267
268
3 Review the contents of this table. The Activities column is especially informative.
4 If a listed alarm condition has been resolved, click the now-active Clear link to
the right. You also have the option of clicking Clear All to resolve all alarms at
one time.
269
270
271
272
Click the Show Details button to display detailed application or port usage
percentages.
273
Active Clients
The Active Clients table displays a list of active wireless clients. You can customize
the columns displayed by clicking the Edit Columns button. You can also delete,
block, run SpeedFlex and test connectivity using the action icons in this table.
Inactive Clients
The Inactive Clients table displays a list of inactive clients and can be used to view
usage statistics of recently disconnected clients.
Events/Activities
The Events/Activities table displays a client-specific subset of the events listed on
the All Events/Activities page.
274
275
Description
Applications/Ports and
Application Performance
Charts
General
Events
276
277
278
Description
MAC Address
279
Device Name
Description
Location
Model
Status
280
Mesh Mode
IP Address
VLAN
Channel
Clients
Bonjour Gateway
Application Capability
Action
Export to CSV
The Currently Managed APs table can be exported as a CSV file, which can be
opened in a spreadsheet program such as Microsoft Excel. Once you have finished
editing which columns you want to display, the option to Export to CSV appears.
If the search box is empty, all APs will be saved to the CSV file. If you enter text in
the search box, only the APs currently matching the search text will be exported.
Figure 145. Saving a managed AP list as a CSV file
281
Events/Activities
This table displays an AP-related subset of the information on the Monitor > All
Events/Activities page.
282
Description
General
Info
Actions
WLANs
Radio 802.11(a/n or b/g/n) Displays details on the 2.4 GHz (g/n) and 5 GHz (a/n)
radios. Transmission statistics are totals since last radio
restart. Airtime % statistics represent the time spent
sending and receiving 802.11 frames, plus the time spent
waiting for non-802.11 interference to avoid collision. Free
airtime is 100% - total. High numbers indicate contention
in the channel.
LAN Port Configuration
283
Performance
Neighbor APs
Mesh-related Information
Sensor Information
Clients
Events
RF Pollution FAQ
What is RF Pollution?
RF Pollution is a linear index used to describe the level of performanceimpacting RF contention and interference that an AP is experiencing. It distills
several low-level mac and phy-level error metrics into a single parameter. Values
284
285
286
Spectrum Analysis
Spectrum analysis provides two real time views of the RF environment using data
generated by the AP to chart power levels across the 2.4 and 5GHz frequency
bands.
Instantaneous Samples View (top view): The instantaneous samples plot
provides a real time display of signal power across the entire 2.4 or 5GHz
frequency bands. The plot is color-coded based on the signal power within each
part of the frequency band. Red represents stronger signals while weaker signals
are closer to blue.
CDF of Samples View (bottom view): This graph displays the concentration of
signal power readings within each portion of the frequency band in a cumulative
distribution format. The CDF plot is color-coded based upon the frequency with
which each point is observed during consecutive spectral sweeps of the entire
2.4/5Ghz frequency band. Frequently occurring points are marked red, moderately occurring points are marked yellow, and occasionally occurring points are
marked green.
To view spectrum analysis data for an access point:
1 Go to Monitor > Access Points and click the MAC address of the AP to view
the AP detailed information page.
2 Click the Spectrum Analysis icon in the Actions table. (APs that do not support
this feature do not display this icon).
3 The Spectrum Analysis display opens in a new window.
4 Select 2.4G or 5G to choose the frequency band for which spectrum analysis
data will be collected and click Start Monitoring to begin.
287
Figure 149. APs that support spectrum analysis display an extra icon in the Actions table
288
Neighbor APs
ZoneDirector uses several calculations to determine which APs are in proximity to
one another. This information can be useful in planning or redesigning your Smart
Mesh topology or in troubleshooting link performance issues.
Details on neighbor APs include:
Access Point: The APs description, if configured, or the MAC address if no name
or description is available.
Channel: The channel that the neighbor AP is currently using.
Signal (dB): Signal strength.
Path Score (status): A higher score indicates better performance over the link
between this AP and its neighbor. Note that only ZoneFlex APs of the same radio
type can mesh with one another. If the AP is of a different radio type than the
one you are currently viewing, this field will display N/A (Unknown).
289
Orientation
This sensor displays the mounting orientation of the AP. Three orientations are
possible:
Desktop/Horizontal Mount
Ceiling/Horizontal Mount
Wall/Vertical Mount
Figure 151. AP orientation sensor information
Temperature
This sensor displays the temperature statistics as reported by the AP.
Figure 152. AP temperature sensor information
290
291
1 Go to Monitor > Rogue Devices. (You can also click the #of Rogue Devices
link from the Devices Overview widget on the Dashboard.)
Figure 154. Rogue devices indicator
2 When the Monitor > Rogue Devices page appears, three tables are listed:
Currently Active Rogue Devices: Lists all currently detected rogue APs.
Known/Recognized Rogue Devices: Lists rogue APs that have been marked
as known, typically neighbor APs.
User Blocked Rogue Devices: Lists devices that have been marked as
malicious by the user.
3 Review the Currently Active Rogue Devices table. The following types of Rogue
APs generate an alarm when ZoneDirector detects them (if the alarm has been
enabled from the Configure > Alarms page):
AP: A normal rogue AP. This rogue AP has not yet been categorized as
malicious or non-malicious.
malicious AP (SSID-spoof): A malicious rogue AP that uses the same SSID
as ZoneDirectors AP, also known as an Evil-twin AP.
malicious AP (MAC-spoof): A malicious rogue AP that has the same BSSID
(MAC) as one of the virtual APs managed by ZoneDirector.
malicious AP (Same-Network): A malicious rogue AP that is connected to the
same wired network.
malicious AP (User-Blocked): A rogue AP that has been marked as malicious
by the user.
4 To mark an AP as malicious, click Mark as Malicious. This AP will now be
blocked and listed in the User Blocked Rogue Devices table. The malicious rogue
AP protection mechanism (enabled from the Configure > WIPS > Intrusion
Detection and Prevention page) is automatically applied to all rogue APs
categorized as malicious, whether user-blocked or another type.
5 If a listed AP is part of another, known neighbor network, click Mark as Known.
This identifies the AP as posing no threat, while copying the record to the Known/
Recognized Rogue Devices table.
292
6 To locate rogue APs that do pose a threat to your internal WLAN, click the Map
View
icon for a device to open the Map View.
7 Open the Map View, and look for rogue AP icons
their location.
You can now find the rogue APs and disconnect them. Or, if a rogue AP is actually
a component of a neighboring network, you can mark it as known.
NOTE: If your office or worksite is on a single floor in a multistory building, your
upper- and lower-floor neighbors' wireless access points may show up on the Map
View, but seemingly in your site. As the Map View cannot locate them in vertical
space, you may need to do a bit more research to determine where the AP is located
and if it should be marked as Known.
NOTE: To assist in physically locating rogue devices, click the plus sign (+) icon
next to a detected rogue AP. This expands a list to display which ZoneFlex APs have
detected this rogue, sorted according to signal strength.
293
294
295
296
297
298
In this chapter:
Enabling Automatic User Activation with Zero-IT
Adding New User Accounts to ZoneDirector
Managing Current User Accounts
Creating New User Roles
Managing Automatically Generated User Certificates and Keys
Using an External Server for User Authentication
Activating Web Authentication
299
300
You have completed enabling Zero-IT for this WLAN. At this point, any user with the
proper credentials (username and password) and running a supported operating
system can self-provision his/her wireless client to securely access your wireless
LANs.
301
302
You have completed Zero-IT configuration for this user. Repeat this procedure to
automatically configure all additional users of your internal WLAN.
303
304
This section describes the procedures for managing users using ZoneDirectors
internal user database. For authentication using an external AAA server, see Using
an External Server for User Authentication.
305
Figure 163. The Create New form for adding users to the internal database
306
307
Allow All WLANs: You have two options: (1) Allow Access to all WLANs,
or (2) Specify WLAN Access. If you select the second option, you must
specify the WLANs by clicking the check box next to each one. This option
requires that you create WLANs prior to setting this policy. See Creating a
WLAN.
Guest Pass: If you want users with this role to have the permission to
generate guest passes, enable this option.
NOTE: When creating a guest pass generator Role, you must ensure that this Role
is given access to the Guest WLAN. If you create a Role and allow guest pass
generation, but do not allow the Role access the relevant WLAN, members of the
Guest Pass Generator Role will still be unable to generate guest passes for the
Guest WLAN.
Administration: This option allows you to create a user role with ZoneDirector administration privileges - either full access or limited access.
5 When you finish, click OK to save your settings. This role is ready for assignment
to authorized users.
6 If you want to create additional roles with different policies, repeat this procedure.
308
309
310
When using the internal user database, automatically generated user certificates
and keys are deleted whenever the associated user account is deleted from the
user database. In the case of using Windows Active Directory, LDAP or RADIUS as
an authentication server, you can delete the generated user keys and certificates by
following these steps:
1 Go to Monitor > Generated PSK/Certs. The Generated PSK/Certs page
appears.
2 Select the check boxes for the PSKs and Certificates that you want to delete.
3 Click Delete to delete the selected items.
The selected PSKs and Certificates are deleted from the system.
A user with a deleted PSK or a deleted certificate will not be able to connect to the
wireless network without obtaining a new key or a new certificate.
311
Active Directory: If you select this option, you also need to enter the IP
address of the AD server, its port number (default is 389), and its Windows
Domain Name.
LDAP: If you select this option, you also need to enter the IP address of
the LDAP server, its port number (default is 389), and its LDAP Base DN.
RADIUS: If you select this option, you also need to enter the IP address
of the RADIUS server, its port number (default is 1812), and its shared
secret.
RADIUS Accounting: If you select this option, you also need to enter the
IP address of the RADIUS Accounting server, its port number (default is
1813), and its shared secret.
4 Additional options appear depending on which AAA server Type you have
selected. See the respective server type for more information.
5 Click OK to save this server entry. The page refreshes and the AAA server that
you added appears in the list of authentication and accounting servers.
Note that input fields differ for different types of AAA server. ZoneDirector only
displays the option to enable Global Catalog support if Active Directory is chosen,
for example, and only offers backup RADIUS server options if RADIUS or RADIUS
Accounting server is chosen. Also note that attribute formats vary between AAA
servers.
NOTE: If you want to test your connection to the authentication server, enter an
existing user name and password in the Test Authentication Settings panel, and
then click Test. If testing against a RADIUS server, this feature uses PAP or CHAP
depending on the RADIUS server configuration and the choice you made in RADIUS/
RADIUS Accounting. Make sure that either PAP or CHAP is enabled on the Remote
Access Policy (assuming Microsoft IAS as the RADIUS server) before continuing
with testing authentication settings.
312
Figure 166. The Create New form for adding an authentication server
313
3 When the Editing (WLAN_Name) form appears, locate the Web Authentication
option. See Figure 167.
4 Click the check box to Enable captive portal/Web authentication.
5 Select the preferred authentication server from the Authentication Server dropdown menu.
6 Click OK to save this entry.
Repeat this enabling process for each WLAN to which you want to apply web
authentication.
Figure 167. Activating captive portal/web authentication
314
In this chapter:
Configuring Guest Access
Creating a Guest Access Service
Creating a Guest WLAN
Using the BYOD Onboarding Portal
Working with Guest Passes
315
316
Redirect to the following URL: Redirect the user to a specified web page
(entered into the text box) prior to forwarding them to their destination. When
guest users land on this page, they are shown the expiration time for their
guest pass.
7 Customize any of the following optional configuration settings:
Web Portal Logo: Upload a logo to replace the Ruckus logo.
Guest Access Customization: Enter text to display on the welcome page.
Restricted Subnet Access: See Configuring Guest Subnet Access.
8 Click Apply to save your settings.
Figure 168. Configuring Guest Access
317
You can create up to 22 subnet access rules, which will be enforced both on the
ZoneDirector side (for tunneled/redirect traffic) and the AP side (for local-bridging
traffic).
To create a guest access rule for a subnet:
1 Go to Configure > Guest Access.
2 Edit or create a new Guest Access Service.
3 Scroll down to the bottom and expand the Restricted Subnet Access section.
4 Click Create New to create a new subnet restriction. Text boxes appear under
the table columns in which you can enter parameters that define the access rule.
5 Under Description, type a name or description for the access rule that you are
creating.
6 Under Type, select Deny if this rule will prevent guest users from accessing
certain subnets, or select Allow if this rule will allow them access.
7 Under Destination Address, type the IP address and subnet mask (format:
A.B.C.D/M) on which you want to allow or deny users access.
8 If you want to allow or restrict subnet access based on the application, protocol,
or destination port used, click the Advanced Options link, and then configure
the settings.
9 Click OK to save the subnet access rule.
Repeat Steps 4 to 9 to create up to 22 subnet access rules.
318
319
8 If you want your internal wireless traffic to have priority over guest traffic, set the
Priority to Low.
9 Under Advanced Options, select the options to enable for this WLAN. For more
information on WLAN advanced options, see Advanced Options.
Optionally, enable a Grace Period (disabled by default) and enter a value in
minutes to allow disconnected users a grace period after disconnection,
during which users will not need to re-authenticate.
10 Click OK to save your changes.
Figure 170. Create a Guest Access WLAN
320
3 Enable the check box next to Onboarding Portal to enable Zero-IT device
registration from the Guest Portal.
4 Select one of the following options to display when connecting to the Onboarding
Portal:
Guest Pass + Device Registration: Show both buttons.
Device Registration: Show Zero-IT Device Registration button only.
5 If Guest Pass is enabled, configure Guest Pass options as described in Working
with Guest Passes.
6 Click Apply.
Figure 171. Enable Onboarding Portal
When a client connects to the Open Guest WLAN for the first time, the Ruckus
Onboarding Portal page is displayed. The screen displays the following three
options:
Guest Access
Register Device (download Zero-IT activation file)
Both
321
If the user clicks the Guest Access button, the process is the same as when
connecting to a Guest WLAN and all settings on the Guest Access configuration
page will be put into effect.
Figure 173. Guest Access welcome and terms of use screens
If the user clicks the Register Device button, the web page will be redirected to the
WLAN Connection Activation page, from which the user can enter user name and
password to activate this device. A Zero-IT activation file is generated for download
once the client is registered with ZoneDirector.
322
Figure 174. Activate device using the WLAN Connection Activation screen, and download
activation file
After running the downloaded Zero-IT file, the device will be configured with the
settings to automatically connect to the secure internal/corporate WLAN.
NOTE: You may need to manually switch from the guest WLAN to the secure WLAN
after activation (on some mobile devices).
NOTE: You may need to manually delete any previously installed Zero-IT activation
files before a new one can be run. On some devices (including some Android
versions), the activation file will not run if an older an existing package of the same
name with a conflicting signature is already installed.
323
NOTE: ZoneDirector 1100 can support up to 1,250 combined total DPSK users
and guest passes in the internal database. ZoneDirector 3000 can support up to
10,000 total DPSK users and guest passes. ZoneDirector 5000 can support up to
20,000 guest passes and 10,000 DPSKs. When the maximum number of users that
ZoneDirector supports has been reached, the web interface may be slower in
responding to requests.
324
325
Figure 175. The Guest Pass Generation section on the Guest Pass page
Guest Pass
Generation URL
326
327
328
NOTE: If printing the guest pass, make sure that your computer is connected to a
local or network printer before starting.
To generate a single guest pass:
1 On your computer, start your web browser.
2 In the address or location bar, type the URL of the ZoneDirector Guest Pass
Generation page:
https://{zonedirector-hostname-or-ipaddress}/guestpass
3 In User Name, type your user name.
4 In Password, type your password.
5 Click Log In. The Guest Information page appears. On this page, you need to
provide information about the guest user to enable ZoneDirector to generate the
guest pass.
329
330
generated the random key OVEGS-RZKKF, you can change it to joeguest-key. Customized keys must be between one and 16 ASCII characters.
NOTE: Each guest pass key must be unique and is distributed on all guest WLANs.
Therefore, you cannot create the same guest pass for use on multiple WLANs.
Remarks (optional): Type any notes or comments. For example, if the guest
user is a visitor from a partner organization, you can type the name of the
organization.
Sharable: Use this option to allow multiple users to share a single guest pass.
Session: Enable this check box and select a time increment after which
guests will be required to log in again. If this feature is disabled, connected
users will not be required to re-log in until the guest pass expires.
7 Click Next. The Wireless Access Portal page appears.
8 Choose whether to activate this guest pass for either yourself or a guest, and
click Next.
9 The Request a Guest Pass page appears.
10 Enter the guest User Name and Password, and click Log In.
11 The Guest Pass Generated page appears. This page presents the guest pass
code and a list of options for delivering this code to your guest(s). Options include
email (if you configured an email address for the guest), SMS (if you configured
a phone number for the guest) and Print Instructions.
12 If you want to print out the guest access instructions, select the guest pass
instructions that you want to print out from the drop-down menu. If you did not
create custom guest pass printouts, select Default.
13 Click Print Instructions. A new browser page appears and displays the guest
pass instructions. At the same time, the Print dialog box appears.
14 Select the printer that you want to use, and then click OK to print the guest pass
instructions.
You have completed generating and delivering a guest pass for your guest user.
331
332
NOTE: Before starting, make sure that your computer is connected to a local or
network printer.
To generate and print multiple guest passes at the same time:
1 On your computer, start your web browser.
2 In the address or location bar, type the URL of the ZoneDirector Guest Pass
Generation page:
https://{zonedirector-hostname-or-ipaddress}/guestpass
3 In User Name, type your user name.
4 In Password, type your password.
5 Click Log In. The Guest Information page appears. On this page, you need to
provide information about the guest users to enable ZoneDirector to generate
the guest passes.
6 On the Guest Information page, fill in the following options:
Creation Type: Click Multiple.
Valid for: Specify the time period during which the guest passes will be valid.
Do this by typing a number in the blank box, and then selecting a time unit
(Days, Hours, or Weeks).
WLAN: Select one of the existing WLANs with which the guest users will be
allowed to associate.
Number: Select the number of guest passes that you want to generate.
ZoneDirector will automatically populate the names of each user (BatchGuest-1, Batch-Guest-2, and so on) to generate the guest passes.
NOTE: Each guest pass key must be unique and is distributed on all guest WLANs.
Therefore, you cannot create the same guest pass for use on multiple WLANs.
333
Profile (*.csv): If you have created a Guest Pass Profile (see Creating a Guest
Pass Profile), use this option to import the file.
Sharable: Configure this option if you want to allow multiple users to share
a single guest pass (default: 1; not shared).
Session: Enable this check box and select a time increment after which
guests will be required to log in again. If this feature is disabled, connected
users will not be required to re-log in until the guest pass expires.
Figure 180. Generating multiple guest passes at once
NOTE: If you want to be able to identify the guest pass users by their names (for
monitoring or auditing purposes in a hotel setting, for example), click Choose File,
and upload a guest pass profile instead. See Creating a Guest Pass Profile below
for more information.
7 Click Next. The Guest Pass Generated page appears, displaying the guest pass
user names and expiration dates.
8 In Select a template for Guest Pass instructions, select the guest pass
instructions that you want to print out. If you did not create custom guest pass
printouts, select Default.
9 Print the instructions for a single guest pass or print all of them.
To print instructions for all guest passes, click Print All Instructions.
334
To print instructions for a single guest pass, click the Print link that is in the
same row as the guest pass for which you want to print instructions.
A new browser page appears and displays the guest pass instructions. At the
same time, the Print dialog box appears.
10 Select the printer that you want to use, and then click OK to print the guest pass
instructions.
You have completed generating and printing guest passes for your guest users. If
you want to save a record of the batch guest passes that you have generated, click
the here link in Click here to download the generated Guest Passes record, and
then download and save the CSV file to your computer.
335
336
337
Description
{GP_GUEST_NAME}
{GP_GUEST_KEY}
338
Token
Description
{GP_ELSEIF_EFFECTIVE_FROM
_FIRST_USE} or
{GP_ENDIF_EFFECTIVE} token.
{GP_VALID_DAYS}
{GP_VALID_TIME}
{GP_GUEST_WLAN}
339
340
341
342
In this chapter:
Overview of Smart Mesh Networking
Smart Mesh Networking Terms
Supported Mesh Topologies
Deploying a Wireless Mesh via ZoneDirector
Understanding Mesh-related AP Statuses
Using the ZoneFlex LEDs to Determine the Mesh Status
Using Action Icons to Configure and Troubleshoot APs in a Mesh
Setting Mesh Uplinks Manually
Troubleshooting Isolated Mesh APs
Best Practices and Recommendations
343
344
Term
Definition
Mesh Node
Root AP (RAP)
Term
Definition
Mesh AP (MAP)
Hop
The number of wireless mesh links a data packet takes from one
Mesh AP to the Root AP. For example, if the Root AP is the uplink of
Mesh AP 1, then Mesh AP 1 is one hop away from the Root AP. In
the same scenario, if Mesh AP 1 is the uplink of Mesh AP 2, then
Mesh AP 2 is two hops away from the Root AP. A maximum of 8
hops is supported.
Standard Topology
The standard Smart Mesh topology consists of ZoneDirector and a number of Root
APs and Mesh APs. In this topology, ZoneDirector and the upstream router are
connected to the same wired LAN segment. You can extend the reach of your
wireless network by forming and connecting multiple mesh trees (see Figure 185)
to the wired LAN segment. In this topology, all APs connected to the wired LAN are
considered Root APs, and any AP not connected to the wired LAN is considered
a Mesh AP.
345
346
347
Use the Monitor > Mesh page to see a tree diagram of your Smart Mesh network.
Icon
Meaning
Root AP (RAP)
Mesh AP (MAP)
eMesh AP (eMAP)
You can also view the role of any AP in your mesh network from the Monitor >
Access Points page or from the Mesh Topology widget on the Dashboard.
348
349
350
7 In the Mesh Settings section, click Apply to save your settings and enable Smart
Mesh.
You have completed enabling mesh capability on ZoneDirector. You can now start
provisioning and deploying the APs that you want to be part of your wireless mesh
network.
351
3 After the AP has been provisioned, disconnect it from the wired network, unplug
the power cable, and then move the device to its deployment location.
If you want the AP to be a Root AP, reconnect it to the wired network using
one of its Ethernet ports, and then power it on. When the AP detects
ZoneDirector again through its Ethernet port, it will set itself as a Root AP,
and then it will start accepting mesh association requests from Mesh APs.
If you want the AP to be a Mesh AP, power it on but do not reconnect it to
the wired network. When it does not detect ZoneDirector through its Ethernet
port within 90 seconds, it will search for other Root APs or Mesh APs and,
once mesh neighbor relationships are established, form a mesh tree.
NOTE: After an AP in its factory default state has been provisioned, you need to
reboot it to enable mesh capability.
NOTE: If you are located in the United States and have a DFS-capable AP that is
expected to serve as a Root AP (or eMAP), with a non-DFS-capable Mesh AP as
its downlink, you will need to set the channel for the Root AP to one of the non-DFS
channels. Specifically, choose one of the following channels: 36, 40, 44, 48, 149,
153, 157, 161, 165. This is due to the DFS-capable APs ability to use more channels
than the non-DFS-capable AP, which could result in the RAP choosing a channel
that is not available to the MAP. Alternatively, go to Configure > System > Country
Code, and set the Channel Optimization setting to Optimize for Compatibility.
Repeat Steps 1 to 3 for each AP that you want to be part of your wireless mesh
network. After you complete provisioning and deploying all mesh nodes, verify that
the wireless mesh has been set up successfully.
352
3 Verify that a mesh network has been formed by checking if dotted lines appear
between the mesh nodes. These dotted lines identify the neighbor relationships
that have been established in the current mesh network.
NOTE: If your mesh spans multiple ZoneDirectors, it is possible for a node to be
associated to a different ZoneDirector than its parent or children.
Figure 189. Dotted lines indicate that these APs are part of the wireless mesh network
The symbols next to the AP icons indicate whether the AP is a Root AP, Mesh AP
or eMAP. Refer to the following table:
An AP with the upward pointing arrow is a Root AP.
353
Description
Recommended Action
Connected
AP is connected to
ZoneDirector, but mesh is
disabled
AP is connected to
ZoneDirector via its Ethernet
port
354
WLAN LED
When Smart Mesh is enabled, the behavior of the WLAN LED indicates downlink
status. Refer to the table below for a complete list of possible LED colors and
behaviors for Root APs and Mesh APs, and the mesh status that they indicate.
LED Color/Behavior
Solid green
355
Root AP / eMAP
Mesh AP
Solid green
N/A
Connected to a Root AP or
another Mesh AP
Signal quality is good
N/A
Connected to a Root AP or
another Mesh AP
Signal quality is fair or poor
N/A
Off
Description
Solid green
356
Root AP / eMAP
Mesh AP
No Mesh AP is connected
Solid green
Connected to a Root AP
Signal quality is good
Connected to a Root AP
Signal quality is fair
Icon Name
Action
System Info
Configure
Mesh View
SpeedFlex
Troubleshoot
Restart
357
Icon
Icon Name
Action
Recover
Allow
RF Info
358
NOTE: Do not manually set a Mesh AP as a Root AP. Only APs that are connected
to ZoneDirector via Ethernet (and on the same LAN segment) should be configured
as Root APs. Mis-configuring a Mesh AP or an eMAP as a Root AP can cause the
AP to become isolated, or, in the case of eMAP, can result in a network loop.
To set the mesh uplink for an AP manually:
1 On the ZoneDirector web interface, click the Configure tab.
2 On the menu, click Access Points.
3 In the Access Points table, find the AP you want to restrict, and click Edit under
the Actions column. The editing form appears below your selection.
4 Under Advanced Options > Uplink Selection, select the Manual radio button.
The other APs in the mesh appear below the selection.
5 Select the check box for each AP that the current AP can use as uplink.
NOTE: If you set Uplink Selection for an AP to Manual and the uplink AP that you
selected is off or unavailable, the AP status on the Monitor > Access Points page
will appear as Isolated Mesh AP.
6 Click OK to save your settings.
359
Possible Reason
360
Status
Possible Reason
Config error
361
2 Under Mesh Settings, copy the contents of the Mesh Name and Mesh
Passphrase fields into a text editor.
Figure 191. The Mesh Name and Mesh Passphrase you will use to configure the AP
362
2 Log into the AP via SSH using the same user name and password that you use
to log into the ZoneDirector web interface.
3 Enter the command set meshcfg ssid <current_ssid>, where
current_ssid is the SSID that the mesh network is currently using.
4 Enter the command set meshcfg passphrase
<current_passphrase>, where current_passphrase is the passphrase that
the mesh network is currently using.
NOTE: To paste text into PuTTY, press ctrl+v to paste, then click the right mouse
button.
5 Enter the command set mesh auto.
6 If there are multiple ZoneDirectors on the network, you may need to specify which
ZoneDirector the AP should connect to, using the command set director
ip <ZoneDirectors IP address>.
7 If a management VLAN is used for ZoneDirector-AP management traffic, enter
the following command: set ipaddr wan vlan <vlan ID>.
8 Enter the command reboot to restart the AP with the new configuration
changes.
9 Close the SSH client.
You have completed recovering the isolated mesh AP. You should be able to manage
this AP again shortly. Please wait at least 15 minutes (to allow the mesh network to
stabilize), and then try managing this AP again via ZoneDirector.
363
364
10
In this chapter:
Changing the ZoneDirector Administrator User Name and Password
Changing the Web Interface Display Language
Upgrading ZoneDirector and ZoneFlex APs
Working with Backup Files
Restoring ZoneDirector to Default Factory Settings
Working with SSL Certificates
Using an External Server for Administrator Authentication
Upgrading the License
365
Admin Name: Delete the text in this field and type the new administrator
account name (used solely to log into ZoneDirector via the web interface).
Password/Confirm Password: Delete the text in both fields and type the
same text for a new password.
3 Click Apply to save your settings. The changes go into effect immediately.
366
367
NOTE: This only affects how the ZoneDirector web interface appears, and does
not modify either the operating system or web browser settings.
3 Click Apply to save your settings. The changes go into effect immediately.
NOTE: If ZoneDirector is running a software version or earlier than version 9.6 and
you want to upgrade to version 9.8, you will need to upgrade it to version 9.6 first,
and then upgrade it to version 9.8. If you try to upgrade directly to 9.8 from a version
earlier than 9.6, the upgrade will fail (see ZoneFlex 9.8 Release Notes for more
information).
1 Go to Administer > Upgrade.
2 Under the Software Upgrade section, click Browse. The Browse dialog box
appears.
3 Browse to the location where you saved the upgrade package, and then click
Open.
4 When the upgrade file name appears in the text field, the Browse button
becomes the Upgrade button.
5 Click Upgrade.
ZoneDirector will automatically log you out of the web interface, run the upgrade,
and then restart itself. When the upgrade process is complete, the Status LED on
ZoneDirector is steadily lit. You may now log back into the web interface as
Administrator.
368
NOTE: The AP uses FTP to download firmware updates from ZoneDirector. If you
have an access control list (ACL) or firewall between ZoneDirector and the AP, make
sure that FTP traffic is allowed to ensure that the AP can successfully download the
firmware update.
Figure 193. The Upgrade page
369
4 Browse to the location where you saved the upgrade package, and then click
Open.
5 When the upgrade file name appears in the text field, the Browse button
becomes the Upgrade button.
6 Click Upgrade. The backup ZoneDirector is upgraded first.
7 When the backup ZoneDirector upgrade is complete, the backup ZoneDirector
reboots and becomes active (begins accepting AP requests), while the original
active ZoneDirector enters backup state and begins its own upgrade process.
8 All APs are now associated to the original backup ZoneDirector (which is now
the active ZoneDirector), and begin upgrading AP firmware to the new version.
9 Each AP reboots after upgrading.
370
371
Restore everything, except system name and IP address settings (for failover
deployment at the same site): Select this option to import settings saved from
a primary to a backup ZoneDirector for Smart Redundancy deployment.
NOTE: In addition to system name and IP address, this option restores everything
except for the following configuration settings: 1.) VLAN settings. 2.) Management
IP address and VLAN settings. 3.) Smart Redundancy settings. 4.) DHCP server
settings. 5.) Session timeout. 6.) Limited ZD Discovery and Management VLAN
settings in Access Point Policies.
Restore only WLAN settings, access control list, roles, and users (use this as
a template for different sites): Select this option if you want to use the backup
file as a configuration template.
5 Click the Restore button.
ZoneDirector restores the backup file. During this process, ZoneDirector automatically logs you out of the web interface. When the restore process is complete,
ZoneDirector automatically restarts and your wireless network will be ready for use
again.
Figure 195. Select the restore level for restoring from a backup file
372
373
374
375
After the reset is complete, the Status LED blinks red, then blinks green, indicating
that the system is in factory default state.
After you complete the Setup Wizard, the Status LED will be steady green.
376
If you wish to access ZoneDirector from a public network via the internet
you must use a Fully Qualified Domain Name (FQDN).
If you use a familiar name, this name will be shown in the browsers URL
whenever accessing ZoneDirector (i.e., administrator interface, standard
captive portal and guest access captive portal).
Subject Alternative Name: (Optional) Select either IP or DNS from the menu
and enter either alternative IP addresses or alternate DNS names.
Organization*: Type the complete legal name of your organization (for
example, Ruckus Wireless, Inc.). Do not abbreviate your organization
name.
Organization Unit: (Optional) Type the name of the division, department, or
section in your organization that manages network security (for example,
Network Management).
Locality/City*: Type the city where your organization is legally located (for
example, Sunnyvale).
377
5 Go to a certificate authority's web site and follow the instructions for purchasing
an SSL certificate.
6 When you are prompted for the certificate signing request, copy and paste the
content of the text file that you saved to your local computer, and then complete
the certificate purchase.
After the certificate authority approves your CSR, you will receive the SSL certificate
via email. The following is an example of a signed certificate that you will receive
from a certificate authority:
-----BEGIN CERTIFICATE----MIIFVjCCBD6gAwIBAgIQLfaGuqKukMumWhbVf5v4vDANBgkqhkiG9w0B
AQUFADCBsDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJ
bmMuMR8wHQYDVQQLBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6
Ly9vY3NwLnZlcmlzaWduLmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL1NW
UlNlY3VyZS1haWEudmVyaXNpZ24uY29tL1NWUlNlY3VyZTIwMDUtYWlh
378
LmNlcjBuBggrBgEFBQcBDARiMGChXqBcMFowWDBWFglpbWFnZS9naWYw
ITAfMAcGBSsOAwIaBBRLa7kolgYMu9BSOJsprEsHiyEFGDAmFiRodHRw
Oi8vbG9nby52ZXJpc2lnbi5jb20vdnNsb2dvMS5naWYwDQYJKoZIhvcN
AQEFBQADggEBAI/S2dmm/kgPeVAlsIHmx751o4oq8+fwehRDBmQDaKiBvVXGZ5ZMnoc3DMyDjx0SrI9lkPsn223CV
3UVBZo385g1T4iKwXgcQ7WF6QcUYOE6HK+4ZGcHermFf3fv3C1FoCjq+zEu8ZboUf3fWbGprGRA+MR/dDI1dTPtSUG7/zWjXO5jC//
0pykSldW/q8hgO8kq30S8JzCwkqrXJfQ050N4TJtgb/
YC4gwH3BuB9wqpRjUahTiK1V1ju9bHB+bFkMWIIMIXc1Js62JClWzwFgaGUS2DLE8xICQ3wU1ez8RUPGn
wSxAYtZ2N7zDxYDP2tEiO5j2cXY7O8mR3ni0C30=
-----END CERTIFICATE----7 Copy the content of the signed certificate, and then paste it into a text file. Save
the file.
You may now import the signed certificate into ZoneDirector. Refer to the following
section for instructions.
379
3 If your ZoneDirector certificate was issued by an intermediate CA, then you must
also import the intermediate CAs certificate (as well as all other intermediate CA
certificates in the path to the root CA). In that event, you would receive
intermediate CA certificate download instructions from the certificate vendor. To
import an intermediate certificate:
After selecting the end certificate, click on the intermediate certificate import
option.
Click on the Import button to reveal the Import Intermediate Certificates form.
Click on Browse button and select the file containing the intermediate
certificate (PEM format) to upload it.
If there are no additional intermediate certificates, click the Import button to
install the uploaded certificate.
4 Alternatively, you can simplify this process by appending the intermediate CA
certificate(s) to the ZoneDirector certificate file. Then, you just need to import a
single file. The intermediate certificate(s) will be imported automatically. In this
case, you will see multiple ---BEGIN CERTIFICATE--- and ---END CERTIFICATE-- pairs in the file.
380
381
Generate a new private key with a specified key length (either 1024 or 2048 bits).
Use this option if your previous private key has been compromised or you need
to use a stronger key.
Note that a new certificate must be generated and installed afterwards.
Figure 201. SSL Certificate Advanced Options
382
383
Cisco private attribute (if your network is using a Cisco access control server)
-
Vendor ID: 9
group_attr2
group_attr3 ...
384
385
Support Entitlement
Upgrading the License with Smart Redundancy
Support Entitlement
The Support Entitlement license allows you to extend the period for which you are
allowed to continue upgrading your ZoneDirector when newer versions are released.
If your support contract has expired, you can contact Ruckus Support (https://
support.ruckuswireless.com/contact-us) or your Ruckus reseller to purchase a new
support entitlement. This file will be delivered via email, after which you can import
the new entitlement file into your ZoneDirector.
To import a new Support entitlement file:
1 Go to Administer > Support.
386
Support Entitlement
Upgrading the License with Smart Redundancy
2 In the Support Service section, click Choose File to import a new support
upgrade file.
3 Once the new support entitlement is applied, click Check Entitlement to display
the entitlement status, service purchased, serial number, start date, end date
and AP numbers allowed by the new entitlement.
Figure 203. Uploading a Support entitlement file
387
Support Entitlement
Upgrading the License with Smart Redundancy
388
Troubleshooting
11
In this chapter:
Troubleshooting Failed User Logins
Fixing User Connections
Measuring Wireless Network Throughput with SpeedFlex
Diagnosing Poor Network Performance
Starting a Radio Frequency Scan
Using the Ping and Traceroute Tools
Viewing Current System and AP Logs
Packet Capture and Analysis
Importing a Script
Enabling Remote Troubleshooting
Restarting an Access Point
Restarting ZoneDirector
389
390
391
392
NOTE: The following procedure describes how to run SpeedFlex from the
ZoneDirector web interface to measure a wireless clients throughput. For
instructions on how to run SpeedFlex from a wireless client (for users), refer to
Allowing Users to Measure Their Own Wireless Throughput.
393
mance test can continue. Click the OK button on the message, download
the appropriate SpeedFlex version (Windows, Mac or Android) from http:/
/<ZoneDirector-IP-Address>/perf, and email it to the user, or
instruct the user to go to http://<ZoneDirector-IP-Address>/
perf to download and install it. (See Allowing Users to Measure Their Own
Wireless Throughput.) After SpeedFlex is installed and running on the client,
click Start again to continue with the wireless performance test.
A progress bar appears below the speedometer as SpeedFlex generates traffic to
measure the downlink or uplink throughput. One throughput test typically runs for
10-30 seconds. If you are testing both Downlink and Uplink options, the two tests
take about one minute to complete.
When the tests are complete, the results appear below the Start button. Downlink
and uplink throughput results are displayed along with packet loss percentages.
Figure 205. The SpeedFlex interface
394
Figure 206. Click the download link for the target clients operating system
Figure 207. A progress bar appears as SpeedFlex measures the wireless throughput
395
Figure 208. When the test is complete, the tool shows the uplink and downlink throughput and
packet loss percentage
396
397
398
This indicates that SpeedFlex was successfully started. Keep the command
prompt window open.
7 On the SpeedFlex Wireless Performance Test interface, click the Start button
again. A progress bar appears below the speedometer as the tool generates
traffic to measure the downlink throughput from the AP to the client. The test
typically runs from 10 to 30 seconds.
When the test is complete, the results appear below the Start button. Information
that is shown includes the downlink throughput (in Mbps) between your wireless
device and the AP, as well as the packet loss percentage during the test.
If the packet loss percentage is high (which indicates poor wireless connection), try
moving your wireless device to another location, and then run the tool again.
Alternatively, contact your network administrator for assistance.
399
CAUTION! This operation will interrupt active network connections for all current
users.
3 Open the Dashboard or go to Monitor > Map View to review the scan results.
This will include rogue device detection, and an updated coverage evaluation.
Figure 211. The Diagnostics page
400
Figure 212. Launching the Ping/Traceroute Troubleshooting window from the Dashboard
The Network Connectivity window opens. Click Ping to ping the IP address or Trace
Route to diagnose the number of hops to the IP address.
Figure 213. Network Connectivity dialog
You can also access the Ping and Traceroute tools by clicking the troubleshooting
icon
for an AP or client on the Monitor > Access Points and Monitor > Wireless
Clients pages, or via the Toolbox drop-down menu available from any page in the
web interface.
401
402
403
404
cleared and begins filling. Due to memory limitations, the capture files are cleared
after they are retrieved by the Save command and before each new capture session,
and they are not retained on the AP between reboots.
In streaming capture mode, packet data from the 2.4 GHz and 5 GHz radios are
available simultaneously on AP interfaces wlan100 and wlan101, respectively. The
streams can be accessed using Wiresharks remote interface capture option. The
Windows version of Wireshark (e.g., v1.2.10) supports this option. Linux versions
may not.
Both output modes support packet filtering. In local capture mode, the AP accepts
a packet filter expression and applies it before storing the file. In streaming mode,
Wireshark accepts a capture filter expression and sends it to a daemon running on
the AP, which applies it before streaming. Both modes allow compound filter
expressions conforming to the pcap-filter syntax, which is described at http://
www.manpagez.com/man/7/pcap-filter/.
Local Capture
To capture packets to a local file for external analysis:
1 Choose 2.4 GHz or 5 GHz radio (you can only capture packets on one radio at
a time).
2 Select one or more APs from the list and click Add to Capture APs. The APs
you selected are moved from the Currently Managed APs table on the left side
to the new Capture APs table on the right.
3 Select Local Mode to save the packet capture to a local file.
4 Click Start to begin capturing packets. Click Stop to end the capture, and click
Save to save the packet capture to a local file.
5 Extract the pcap file(s) from the pcap.zip file and open in Wireshark or other
packet analyzer.
Streaming Mode
To view streaming packets in real time using Wiresharks remote capture:
1 Choose 2.4 GHz or 5 GHz radio.
2 Select the AP you want to view and click Add to Capture APs.
3 Select Streaming Mode and click Start.
4 Launch Wireshark.
5 Go to Capture Options.
405
Figure 217. Click Start to begin packet capture; click Remove to remove APs from the list
406
Bit
RX Indicator
31
30
unassigned
28-29
27
26
25
unassigned
24
unassigned
23
HW Upload Data
22
20-21
RTS enabled
19
unassigned
Calibrating
18
unassigned
Limitation: The AP can report RX EVM values or the RX LDPC indicator, but not
both. When packet capture is invoked from the ZD UI, the software selects RX EVM
values. Therefore, the RX LDPC indicator is not reported, and the LDPC indicator
valid bit will be zero. The RX LDPC indicator is available when invoking packet
capture from the AP command line interface.
407
Importing a Script
Streaming Mode
Importing a Script
The Import Scripts feature can be used to help Ruckus Support in diagnosing
customer network issues remotely by allowing the administrator to upload a Ruckuscreated script to ZoneDirector themselves. If instructed to do so by Ruckus Support,
go to Administer > Diagnostics > Import Scripts and click Choose File to upload
a script to ZoneDirector.
408
Restarting ZoneDirector
Streaming Mode
Restarting ZoneDirector
There are three restart options: [1] to disconnect and then reconnect the Ruckus
ZoneDirector from the power source, [2] to follow this procedure which simultaneously shuts down ZoneDirector and all APs, then restarts all devices, and [3] a restart
of individual APs (detailed in Restarting an Access Point.)
NOTE: If you have made any configuration changes, Ruckus Wireless recommends
shutting down ZoneDirector to ensure that all configuration changes are saved and
remain after reboot. Performing a Restart may cause ZoneDirector to lose
configuration changes if you forgot to click Apply after making changes and navigate
away from a configuration page, for example.
To restart ZoneDirector (and all currently active APs):
1 Go to Administer > Restart.
2 When the Restart / Shutdown features appear, click Restart.
You will be automatically logged out of ZoneDirector. After a minute, when the
Status LED is steadily lit, you can log back into ZoneDirector.
Figure 219. The Restart/Shutdown page
409
Restarting ZoneDirector
Streaming Mode
410
12
In this chapter:
Choosing the Right AP Model for Your Mesh Network
Calculating the Number of APs Required
Placement and Layout Considerations
Signal Quality Verification
Mounting and Orientation of APs
Best Practice Checklist
411
412
413
414
Ensure Signal >= 25%: The Signal value under Neighbor APs that shows
Connected should be 25% or better. If it is lower, you need to bring the AP
closer, or move it to avoid an obstruction, such that the Signal value becomes
25% or better. For a more conservative design, you may use 35% as your Signal
benchmark.
Ensure Minimum 2 Uplink options for every MAP: In addition, under Neighbor
APs, it is best practice that there exists an alternate path for this mesh uplink.
This alternate path should also have a Signal of 25% or better. Stated differently,
there should be at least 2 possible links that the MAP can use for uplink, and
both should have a Signal value of 25% or better. For a more conservative design,
you may use 35% as your Signal benchmark.
Figure 221. Check the signal quality from the ZoneDirector web interface
415
416
417
418
419
420
Index
Symbols
340
Numerics
11n Only Mode 232
802.11d 187
802.11k 190
802.11r 182
802.1X
authenticator 243
supplicant 245
user requirements 196
WLAN security 196
802.1X EAP
option values 182
Windows OS requirements 196
802.1X EAP + MAC Address Authentication 182
A
AAA servers 311
Access Controls 185
Access Point Policy approval 229
Access Point Policy options 248
Access Points
managing individually 254
monitoring 279
monitoring individually 283
sensor information 290
working with AP Groups 231
Accounting Server 185
ACL 185
ACLs
Management ACL 71
Action Icons 281
Actions
individual APs 283
Active Client Detection 120
Active Directory 148, 311
Adjusting AP Settings
Map View 259
328
Authentication Server 184
Authentication Servers
external 311
internal user database 305
Authentication settings
testing 173
Authenticator 243, 244
Authenticator (MAC-based) 244
Authenticator (Port-based) 244
Auto encryption algorithm 183
Auto Recovery 249
Automatic AP Approval 228, 229, 248,
358
Automatically Generated User Certificates
and Keys
managing 310
Autonomous WLAN 181
Auto-Proxy 189
Auto-Refresh
stopping and starting 52
421
B
Background Scanning 108, 111, 187
Backup/Restore ZoneDirector 370
Band Balancing 116, 187
Band Selection (ZoneFlex 7321) 236,
255
Blocked clients
reviewing a list 146
Blocking client devices 143
Blocking specific client devices 145
Bonjour Gateway 100, 280
Buttons (Web interface)
explained 44
Bypass Apple CNA Feature
Apple CNA Bypass 225
C
Call Admission Control 185, 233, 255
Captive Portal 207
Changing an Existing User Account 306
Changing the event log level 78
Channel 232, 254
Channel Mode 76
Channel optimization 75
Channel Range Settings 232, 254
ChannelFly 109, 233
Channelization 232, 254, 260
Client Device Type 47
Client devices
monitoring 143
permanently blocking WLAN access
145
reviewing a list of blocked clients 146
temporarily disconnecting 144
Client Fingerprinting 188
Client Isolation White Lists 135
Client Tx/Rx Statistics 188
Clients
monitoring 276
Controlling Guest Pass Generation Privileges 326
Country Code 74
Create New options
Authentication Servers 311
Create New User
internal database 305
create user 304
Creating a Guest Pass Generation User
role 326
422
D
Dashboard
overview 262
Dashboard (Web interface)
explained 44
Deleting a User Record 307
Delivering Guest Passes via Email 339
Delivering Guest Passes via SMS 340
Denial of Service (DoS) Protection 124
Description
New WLAN creation 180
option values 180
Detecting rogue Access Points 291
Device Access Policies 133
Device Name 254
Devices Overview 46
DGAF 218
DHCP 68
network address option 58
server customization 33
DHCP clients
viewing 70
DHCP Option 82 187, 240
DHCP Relay 98, 187
DHCP server
configuring 68
Diagnostics
tools 400
disabling status LEDs 236
Disconnecting specific client devices 144
Disconnecting users from the WLAN 390
DNS Server
Registering ZoneDirector 35
Downlink Throughput 284
Downlink Traffic 278
downstream group-addressed frame forwarding 218
Dynamic PSK 184, 300
expiration 221
Dynamic VLAN 186, 244
E
EAP
using the built-in server 195
EAP-MD5 160
Ekahau 119
Email
Guest Passes 339
Email alarm notification
activation 83
Email Guest Passes 339
Encryption Options 182
Estimated Capacity 278, 284
Ethernet port status 246
Event Log Level 78
Events
monitoring 284
Events and alarms 77
External Antenna 255
external antenna 236
External IP 280
F
Factory default state
restoring ZoneDirector 374
Fail Over 64
Failed user connections 390
Failover
force 68
Fast BSS Transition 182
Firewall
open ports 39
Firewall Integration 79
Firmware upgrade 368
FlexMaster
enabling 98
Performance Monitoring 89
Floorplan
adding to Map View 258
Force DHCP 188
G
Graphic file formats
guest user login page 336
Graphic file specifications
guest user login page 336
Group Extraction 153
Group Settings 233
Guest Access Customization 336
Guest Access WLAN 180
Guest Pass
custom 337
SMS Delivery 86
Guest Pass Access
managing 316
Guest Passes
Email Delivery 339
SMS 340
Guest user login page
adding a graphic 336
editing the welcome text 336
Guest users
login page customization 336
Guest VLAN 244
H
Hide SSID
New WLAN creation 186
Hotspot 207
configuration 208
WISPr Smart Client 208
Hotspot 2.0 213
AP Venue Settings 257
Operator Profile 215
Service Provider Profile 214
WLAN 217
Hotspot 2.0 WLAN 180
Hotspot Service (WISPr) WLAN 180
423
I
Import Scripts 408
Importing the floorplan image 263
Improving AP RF coverage 259
Inactivity timeout 189
installation 41
Internal Heater
enabling 235
internal heater 235
Internal user database
using for authentication 305
Intrusion Detection and Prevention 125
IP Address 280
IP Mode 233
L
L2/MAC Access Control 130
L3/L4 Access Control 131
LAN Port Configuration
monitoring 283
Language
changing the Web interface language
367
LDAP 151, 161, 311
LEDs 20, 23
License Upgrade 385
Limited ZD Discovery 248
Load Balancing 113, 187, 249
Location Based Service 233
Location Services
Monitoring 296
Log
All Events/Activities 77
Log settings
changing 77
overview 77
Login failures 390
Login page
guest use 336
Logs
sorting contents 77
viewing 402
M
MAC Authentication 158, 182
RADIUS 158
MAC authentication bypass 209, 244
malicious AP 292
424
Management ACL 71
Management VLAN 249
Managing current user accounts 306
Map View
adding a floorplan 258
adjusting AP positions and settings 259
importing a floorplan 263
placing AP markers on a floorplan 264
requirements (graphics) 263
tools 265
Maps
importing a floorplan image 263
Max Clients 187, 235, 249
max clients per AP 235
Mesh Mode 260, 280
Mesh recovery SSID 361
Mesh Topology 46
Mesh Topology Detection 351
Mesh-related Information 284
Microsoft Windows
EAP requirements 196
Model Specific Control 233
Monitor
overview 262
Monitoring
individual clients 276
Real Time 50
Monitoring AP status 279
Monitoring Client Devices 143
Monitoring individual APs 283
Monitoring Location Services 296
Monitoring wired clients 279
Monitoring ZoneDirector
overview 262
Most Active Client Devices 46
Most Frequently Used Access Points 46
Most Recent System Activities 46
Most Recent User Activities 46
Multicast Filter 186
N
Name/ESSID
New WLAN creation 179
option values 179
Neighbor APs 284, 289
Network addressing
changing 57
Network Connectivity 401
Network Diagnostics 400
O
Optimizing network coverage 268
Option 82 240
orientation 290
Overview
Map view 262
P
Packet capture and analysis 404
Packet Inspection Filter 123
Passphrase
New WLAN creation 184
Performance Analysis
monitoring APs 284
Performance test 392
Ping 400
Placing the Access Point markers 264
PoE Out Ports
enabling 236
PoE Out ports 236
Policies
Access Point-specific 248
Poor network performance
diagnosis 399
Port-based 802.1X
Authenticator 244
authenticator 243
Dynamic VLAN 244
guest VLAN 244
MAC-based Authenticator 244
Port-based Authenticator 244
supplicant 245
Potential Throughput 278
Precedence Policies 142
Prefer Primary ZD 249
Preference tab
use 366
Priority 184, 260
Proxy ARP 122, 186, 218
PSK
Setting key expiration 221
PSK lifetime settings 221
R
Radar Avoidance Pre-Scanning 117
Radio Band (ZoneFlex 7321) 236, 255
Radio frequency scans
starting a scan 399
Radio Resource Management 190
radio statistics 283
RADIUS 153, 154, 311
using an external server 195
using for authentication 311
RADIUS / RADIUS Accounting 154
RADIUS attributes 161
RAPS 117
Rate Limiting 185
RBAC 185
Real Time Monitoring 50, 262
Recent events
overview 269
Recovery SSID 361
Redundancy 64
Registration 53
remote syslog advanced settings 82
Remote Troubleshooting 408
restarting a ZoneDirector 408
Restarting an Access Point 408
Restoring AP configuration settings only
373
Restoring archived settings 370
Reviewing AP policies 248
Reviewing current alarms 269
RF
see also 'Radio frequencies'
RF Pollution 284
RFID tags 118
Rogue Access Points 125
Rogue APs
detecting 291
Rogue DHCP Server Detection 127
Role Based Access Control Policy 185,
309
Roles
creating 307
Roles options
Allow all WLANs 307
Description 307
Group attributes 307
Guest Pass 307
Name 307
425
S
Scanning radio frequencies 399
Security 177
overview 176, 177
Security configuration
reviewing 192
Sensor information 284, 290
Service Schedule 188
Session Timeout
admin 367
Setting Dynamic Pre-Shared Key expiration 221
Smart Redundancy 47, 64
Configuration 65
license upgrade 386
SMS
Guest Passes 86
SMS Guest Passes 340
SNMP
enabling SNMP agent 90
enabling SNMP trap notifications 93
trap notifications 95
SNMPv2 91
SNMPv3 92
Spectralink Compatibility 233, 255
Spectralink VIEW certification 233
Spectrum Analysis 287
SpeedFlex 392
SPoT 233, 296
SSL Certificate
importing 379
Standard Usage WLAN 180
Status LEDs
disabling 236
status LEDs 236
Supplicant 245
Support 46
Support Entitlement 386
Syslog Firewall Integration 79
System log 77
System Logs 77
System Overview 46
TKIP
option values 183
Toolbox 44, 50, 401
Tools
Map View 265
Traceroute 400
transmission statistics 283
Troubleshooting
diagnosing poor network performance
399
manually Scanning radio frequencies
399
problems with user connections 390
restarting the ZoneDirector 408
reviewing current activity 272
reviewing current alarms 269
reviewing recent events 269
users cannot connect to WLAN 390
Tunnel configuration 121
Tunnel Mode 186
configuration 121
Tunnel MTU 249
Tx Power 232, 254, 260
U
Upgrading
with Smart Redundancy 369
ZoneDirector software 368
ZoneFlex APs 368
Upgrading the license 385
Uplink Selection 260
Uplink Throughput 284
Uplink Traffic 278
Usage Summary 46
User authentication options
Active Directory 311
RADIUS 311
User Defined Applications 139
Users
adding new accounts 304
creating new roles 307
disconnecting a user from the WLAN
390
T
Tabs (Web interface)
explained 44
Temperature 290
Testing authentication settings 173
Timeout interval 367
426
390
Using Active Directory 311
Using an external RADIUS server 195
Using Map View to assess network performance 258
Using the built-in EAP server 195
Using the Map View 265
V
Verifying/Approving New APs 229
VLAN
New WLAN creation 186
VLANs
deploying a ZoneDirector WLAN 200
W
Walled Garden 210
Web Authentication 184
activating 313
Web interface
changing the language 367
Generated PSK/Certs page 311
Roles and Policies 307
Web interface buttons
explained 44
Web interface Dashboard
explained 44
Web interface tabs
explained 44
Web interface workspaces
explained 44
Web Portal
customizing 336
WEP
WLAN Security 196
WEP Key
New WLAN creation 183
WEP-128
option values 183
WEP-64
option values 183
WEP-based security
user requirements 196
Whitelist 135
Widgets 44, 46
Wireless Client Isolation 184, 209
Wireless networks
overview 30, 176
Z
Zero IT 30, 176, 195, 310, 371
enabling 300
Zero IT Activation
New WLAN creation 184
Zero-IT
for clients without Ethernet ports 304
ZoneDirector
changing network addressing 57
Installation 41
Monitoring options overview 262
overview 18
Physical features 19
restarting the device 408
restoring backup file contents 370
restoring to a factory default state 374
upgrading software 368
WLAN security explained 177
ZoneDirector management access 71
ZoneDirector wireless LAN
deploying in a VLAN environment 200
ZoneFlex 7321
427
428
429