Creating an Open Network (No Authentication)
You can create a network that allows users to join the network without going through any authentication process.
CAUTION: RUCKUS strongly advises against creating an open network. Wireless communication on an open network is not secure and information (including sensitive data, such as personal information, credit card information, and so on) that your users send over or through the network can easily be intercepted.Follow these steps to create an open network.
- From the navigation pane, click Networks.
The Add Network dialog box is displayed.
- Complete the settings on the
Network Details page.
- Network Name: Enter a name (up to 32 characters) that you want assign to the network.
- Description: Enter a description (up to 64 characters) to help you identify the network using.
- Network Type: Click Open Network.
- (Optional) In the Settings page, toggle the Use Cloudpath Server button to ON and to add Cloudpath server.
- Select a Cloudpath server from the drop down or click Add Server. When you click Add Server, the Add Cloudpath Server dialog box appears.
- Complete the following to add Cloudpath server.
- Add the name of the sever in the Sever Name field.
- Choose Cloud or On-premise in the Deployment Type section.
- In the Radius Authentication Server section, enter the IP address and the port number in the IP Address and Port respective fields.
- In the Radius Accounting Server section, toggle the button to ON to configure the RADIUS shared secret.
- In the Radius Shared secret field, configure the shared secret.
- Click OK.
The Venues page is displayed.
- Select the venues in which you want to activate this network.
- To activate the network in all of your venues, click Activate on all venues.
- To activate the network in a specific venue, locate the venue from the list, and set the switch to ON in the Activated column. The Select APs on venue<venue-name> page is displayed.
- In the Select APs on venue <venue-name> screen, complete the
- Click the radio button next to All APs to activate this network on all current and future APs at this venue. You can also choose a radio band of 2.4 GHz, 5 GHz, or both.
- Click the radio button next
to Select specific
AP groups to activate this network on specific AP groups
including any AP that is added to selected AP groups in the future. An
option to allow the network to be activated on any APs not assigned to any
group is displayed. When selected by clicking the box, two
more options display:
- In the VLAN option, click the edit (pencil) icon to edit the VLAN number. The default is VLAN 1.
- In the Radios option, select a radio band of 2.4 GHz, 5 GHz, or both.
- Click the clock icon under
Schedule to configure the schedule for the network in the selected venue.
The Schedule for Network <network-name> in Venue <venue-name> dialog appears.
- Check one of the Network Availability options:
- 24/7: Network is available 24/7.
- Custom schedule: Network schedule is customized as per the your requirement. You can configure the schedule for Monday through Sunday and from midnight to midnight (from 00:00 hours through 23.59 hours).
Returns to Add Network dialog box.
The Summary page is displayed.
- To configure advanced options for the network, click
Advanced Network Settings. The
Advanced Network Settings dialog box is displayed.
- (Optional) In the VLAN Pooling section, toggle the button to ON. Select a VLAN pool from the drop-down or click Add Pool to add a VLAN pool. When the Add VLAN Pool dialog box appears, complete the Pool Name, Description, and VLANs fields.
- In the VLAN ID field, enter the VLAN ID.
- In the Load Control
section, complete the following configuration:
- Select the Max Rate from the list, based on which load will be controlled over the network.
- Calibrate the maximum number of clients per radio.
- If you want to enable load balancing between 2.4 GHz and 5 GHz radios, select the button.
- If you want to enable load balancing between APs, select the button.
- In the
Access Control section, you can define a user device policy by clickingSet up a Policy. By default, the
Allow Connections only from MAC addresses listed below option (green) is enabled. You can choose to change this to
Block Connections from MAC addresses listed below by clicking the option (red) provided. Click
Add to add a MAC address. The
Add MAC address
dialog box is displayed. Enter the MAC address and click
Clear list to clear the MAC address list.
Note: As an admin user, you can assign a single policy of each type to the network as the default policy or as part of the Network and Venue activation. This action overrides the default network policy.
- In the
Access Control section, you can define a user traffic policy by clickingSet up a Policy. The
Traffic Policy dialog box is displayed.
Note: By default, the Allow Traffic option (green) is enabled. You can choose to change this to Block Traffic by clicking the option (red).
- To create a new traffic rule, click the
Add Rule. The
Add Traffic Access Rule dialog box is displayed. You can create rules for upstream traffic only.
- Enter a description for the rule.
- You can create a rule to allow or block upstream traffic by selecting the Allow Traffic or Block Traffic option, respectively.
- Select the protocol that you want to use for the new traffic rule from the
Protocol list. The following protocols are available for use:
- TCP: Transmission Control Protocol
- UDP: User Datagram Protocol
- UDPLITE: Lightweight User Datagram Protocol, which is a connectionless protocol that allows even a damaged data payload to be delivered rather than being discarded.
- ICMP (ICMPV4): Internet Control Message Protocol, which is an error-reporting protocol used by network devices to generate error messages to the source IP address, when issues in the network prevent delivery of IP packets.
- IGMP: Internet Group Management Protocol, which is a communications protocol used by hosts on IPv4 networks to establish multicast group memberships.
- ESP:Encapsulating Security Payload is a protocol which provides the authentication, integrity, and confidentially of network packets in IPv4 and IPv6 networks.
- AH: Authentication Header protocol, which is used to authenticate SNMP.
- SCTP: Stream Control Transmission Protocol is a communications protocol which operates at the transport layer.
- Specify the source address in the Source field. You can either specify a range (a network address and a subnet mask) or you an specify a source IP address. Also, specify a port number or a range of ports (for example, 22-34) for the source.
- Specify the destination address in the
Destination field. You can either specify a range (a network address and a subnet mask) or you an specify a destination IP address. Also, specify a port number or a range of ports (for example, 22-34) for the destination.
Note: If you choose ICMP (ICMPv4), the option to specify source and destination ports is not available.
Create. The rule that you created is displayed in the
Note: The rule that you create initially is displayed in a row with the priority set to 1 by default. When you create a second rule, it is displayed with the priority set to 1, and the previous rule is displayed in the second row with the priority set to 2. When you have created multiple rules, you can use the up and down arrows to move rows up or down to set the desired priority of the rules. The edit and delete links options at the end of each row enables you to edit or delete rules. When you click the edit button, the Add Traffic Access Rule dialog box is displayed where you can edit any of the rule properties.
OK in the
dialog box, added all the required rules.
You return to the Advanced Network Settings dialog box, where are can set the Traffic Policy button to ON or OFF, activating or de-activating the traffic policy that you created. The Edit option allows you to navigate to the Traffic Policy dialog box, where you can edit the policy that you created. The Clear button allows you to delete the traffic policy.
- To add a device and OS access
policy, toggle the Device & OS Access
Policy option to ON.
- Choose a device and OS access policy from the Select policy drop down.
- Click Add to add a device and OS access policy. The Add Device & OS Access Policy dialog box appears.
- Complete the following:
- Policy Name: Enter the name of the policy.
- Description: Enter description for the policy.
- Default Access: Select either Allow or Block.
- Click Add Rule and then complete the following:
- Rule Name: Enter the name of the rule.
- Action: Select either Allow Devices or Block Devices.
- Device Type: Select a device type from the list of devices.
- OS Vendor: Select the OS vendor for the devices.
- Rate Limit: Configure the late limit using the sliders: From client and To client.
- VLAN: Enter the VLAN ID.
- Click ADD to add the rule to the device and OS access policy for the network .
- Toggle the Application Access Policy option to
ON to select or add an application access policy.
Choose a policy from the drop-down or click Add to create
a policy. In the Add Application Access Policy dialog box,
complete the folllowing.
- Policy Name: Enter a policy name.
- Descriptop: Add the policy description, and then
- Click Add Rule to access the Add
Application Rule dialog box and configure the
- Rule Name: The name of the rule.
- Rule Type: System defined or user defined.
- Application Category: The category of application.
- Application Name: The name of the application.
- Access Control: Block application, rate limit or QoS.
- Toggle the DNS Proxy option to ON to add DNS proxy. In the DNS Proxy page, click Add Rule to access the Add DNS Proxy Rule page. Enter a domain name and IP address in the appropriate fields and click Add.
- Toggle the
Wi-Fi Calling option to
ON and click
Select Profiles to select a Wi-Fi calling profile.
By default, the Wi-Fi Calling is set to OFF
- Toggle Client Isolation option to ON to prevent clients on the same network from communicating with each other.
- Toggle the Automatic support for VRRP/HSRP switch to ON to enable this feature.
- Toggle the Anti-spoofing switch to ON to configure the ARP request rate limit and DHCP request rate limit.
- In Force
DHCP : Select this check box to force clients to obtain a valid
IP address from a DHCP server. This prevents clients configured with a static IP
address from connecting to the network. If a client performs Layer 3 roaming between different subnets, in some cases the client sticks to the former IP address. This mechanism optimizes the roaming experience by forcing clients to request a new IP address.
- In Hide SSID: Select this check box if you do not want the ID of this network advertised at any time. This will not affect performance or force the network user to perform any unnecessary tasks.
- In Enable OFDM only (Disables 802.11b): Enabling this option disables CCK rates of 1, 2, 5.5, and 11 Mbps, so no 802.11b-only clients can connect. Beacons and probe responses will be transmitted at 6 Mbps, and data frames at 6, 9, 18, 24, 36, 48, and 54 Mbps. Enforcing higher minimum data rates increases overall network throughput capacity, but reduces the distance at which clients are able to remain connected.
- In Enable logging client data to external syslog: Select this check box to allow client data to be logged in all venues that have the external syslog server enabled. The box is unchecked by default. Refer to the page for details about configuring the external syslog server for a venue.
- In BSS Min Rate: Use this option to configure the minimum transmission rate supported by the network. If OFDM Only is enabled, the only valid options are 12 Mbps and 24 Mbps, with Mgmt Tx frames fixed at 6 Mbps. This option can also be used to prevent 11b clients from connecting, and to allow greater client density with higher data rates.
- In Mgt Tx Rate: This option is only available if both OFDM Only and BSS Min Rate are disabled. (Otherwise, the Mgmt Tx Rate is defined by those settings.) Use this setting to configure the rate at which management frames are sent. The default is 6 Mbps.
- Enable 802.11k neighbor reports: Enhances roaming by providing a list of neighbor APs to the client device.
- Enable 802.11r Fast BSS Transition: 802.11r Fast BSS Transition fast roaming protocol.
- Check the Enable 802.11k neighbor reports check box to enable this feature.
- Client Inactivity Timeout: Client will be disconnected from the network if it is inactive for more than the time interval specified. The timeout period can range from 60 through 1000 seconds.
- Directed MC/BC Threshold: Directed multicast/broadcast threshold.
- Click OK in the Advanced Network Setting dialog box and you return to the Add Network dialog box. Click the Create button to create the Wi-Fi network. The newly created Wi-Fi network is displayed in the Networks window, with the Overview tab displaying an overview diagram of the Wi-Fi network with various network properties. To view and edit all the network settings that you entered while creating the network, click the Edit Network link on the top-right corner of the Network page. You can make the required changes and click the Save button to enable the edits.
- (Optional) Toggle the Airtime Decongestion switch to ON to enable this feature.
- (Optional) Toggle the Join RSSI Threshold switch to ON and set the RSSI threshold.
- (Optional) Toggle the Transient Client Management switch to ON and set the parameters for Join Wait Time, Join Expire Time, and Join Wait Threshold.
- (Optional) Toggle the Optimized Connectivity Experience (OCE) switch to ON and set the parameters for Broadcast Probe Response Delay and RSSI-Based Association Rejection Threshold.