Wireless Networks Overview
This feature enables access management and network security by implementing any of the authentication methods mentioned in this topic. Create an authentication-based wireless network to deploy services at your venue. The setup process varies based on network type and chosen authentication method for user access.
- Pre-Shared Key: Requires users to enter the passphrase (that you have defined for the network) to connect to RUCKUS One. Refer to Creating a Network That Uses a Pre-Shared Key.
- Enterprise AAA: Uses the 802.1X standard and WPA2 security protocols to authenticate users using an authentication server on the network. This authentication method requires an AAA server on the network. Refer to Creating a Network That Uses an Enterprise AAA Server.
- Hotspot 2.0 Access: Enable users to automatically and securely connect to Wi-Fi networks while roaming by supporting multiple roaming partners over a single SSID.
- Captive
Portal: Uses a third-party captive portal and authentication
service to authenticate users. There are six methods that can be used to gain
access through the captive portal:
- Click-Through: Allows users to accept terms and conditions to access the network. Refer to Creating a Network That Uses a Captive Portal with Click-Through.
- Self Sign In: Allows users to access the network temporarily using a social media account, or register their details and get a personal password. Refer to Creating a Network That Uses a Captive Portal with Self Sign In.
- Cloudpath Captive Portal: Users connect through an enhanced captive portal experience with Cloudpath. Refer to Creating a Network That Uses a Cloudpath Captive Portal.
- Host Approval: Allows users to register their details in the portal including their host email. A host must approve the guest request to provide the temporary network credentials to the guest user. Refer to Creating a Network That Uses a Captive Portal with Host Approval.
- Guest Pass: Allows users to access the network temporarily using a personal password which they receive in advance from the network administration staff. Refer to Creating a Network That Uses a Captive Portal with a Guest Pass.
- Third-Party Captive Portal (WISPr): Allows users to access the network through a third-party captive portal, authenticated by a RADIUS server. Refer to Creating a Network That Uses a Third-Party Captive Portal (WISPr Feature).
- Open (not recommended): Allows users to access the network without any authentication. Refer to Creating an Open Network.
Note:
Demonstration of Wireless Network Authentication Methods. This video walks you through the Wireless Network feature page and demonstrates how to access the wireless network authentication method.