Creating a Network That Uses a Third-Party Captive Portal (WISPr Feature)
Learn how to create a network that allows users to access the network through a third-party captive portal, authenticated by a RADIUS server.
The login credentials used in the captive
portal are validated using AAA on a RADIUS server.
Note: The licensing and subscription may
vary from each 3rd-party WISPr provider. For more details, refer to individual
partner documents. This is not included with the RUCKUS One subscription.
Complete the following steps to create a captive portal network that uses the
third-party authentication option.
On the navigation bar, click
Wi-Fi > Wi-Fi
Networks > Wi-Fi Networks
List.
The Networks
page is displayed.
Click Add Wi-Fi
Network. Alternatively, select an existing Third-Party Captive
Portal (WISPr Feature) Wi-Fi network setting that you want to copy and click
Clone
at the top of the table.
The Create New
Network page is displayed.
Complete the settings on the
Network Details page.
Name: Type a name (up to 32 characters) that you want
assign to the network.
Set different
SSID: Use this option to configure the SSID different
from the network name.
Description: Enter an optional description to help you
identify the network using up to 64 characters.
Type: Click Captive
Portal.
When the network type is selected, a structure diagram of a Captive Portal type of network displays.
Click
Next.
The Portal
Type page is displayed.
Click
3rd Party Captive Portal (WISPr).
To access the network, users connect through a 3rd party captive portal,
authenticated by a RADIUS server.
The 3rd-Party Captive Portal type of network diagram appears.
Click
Next.
The Settings
page is displayed.
In the Portal Provider
field, select a name of the provider from the drop-down list.
Based on Portal
Provider selection, the Captive Portal
URL or Region field is displayed.
Captive Portal URL: Enter the vendor's complete
URL for the above selected the Portal Provider.
It is recommended to copy URL from the vendor's configuration.
Region:
Select a region for the above selected the Portal
Provider from the drop-down list.
Select the Redirect Users to
check box and enter a valid URL.
You can redirect users to your
company website or another URL after they log in successfully. If the check box
is not selected, users are sent to the page they originally requested.
In the Integration Key
field, a password is displayed. Click Copy Key to copy
this password to your vendor's configuration to allow it to connect to RUCKUS One.
For the Secure your
network option, select one of the following options:
None
(default): No encryption method is used.
Pre-Share Key
(PSK): Select Pre-Share Key
(PSK) and select a Security
Protocol for the network.
WPA2
(Recommended) (default): Encrypts traffic using
the WPA2 standard, which complies with the IEEE 802.11i security
standard. Select WPA2
(Recommended) and enter a passphrase of at least
eight characters in length in the Passphrase field.
WPA3: The WPA3 standard has several security
enhancements when compared to WPA2. Select WPA3 and enter a passphrase of at least eight
characters in length in the SAE
Passphrase field.
The IEEE
802.11ax (Wi-Fi 6E) and IEEE 802.11be (Wi-Fi 7) APs support
only WPA3. The 6 GHz radios are supported with WPA3
only.
WPA2/WPA3
mixed mode: Allows mixed networks of WPA2- and
WPA3-compliant devices ensuring compatibility. Select WPA2/WPA3
mixed mode and in the WPA2
Passphrase and WPA3 SAE
Passphrase fields, enter a passphrase of at
least eight characters each in length.
WPA: It can be configured if you have older
devices that do not support WPA2. These devices were
manufactured before 2006. RUCKUS recommends that you upgrade or
replace the older devices. 6 GHz radios are supported with WPA3
only.
WEP (Unsafe): RUCKUS does not recommend
using WEP to secure your wireless network because it might be
insecure and could be exploited easily. RUCKUS One offers WEP to
enable customers with old devices (that are difficult or
expensive to replace) to continue using those devices to connect
to the wireless network. If you must use WEP, do not use the
devices using WEP to transmit sensitive information over the
wireless network. 6 GHz radios are supported with WPA3 only.
Note: Due to security concerns, WEP will no longer be
supported for users. However, this change will not impact
existing networks that currently utilize WEP.
OWE
Encryption: Opportunistic Wireless Encryption (OWE)
provides encrypted communications for open Wi-Fi networks without
needing passwords. Select this option if you do not want users to
authenticate with a password.
OWE Transition
mode: Enables a seamless transition from Open
unencrypted WLANs to OWE WLANs without adversely impacting the end user
experience. The OWE Transition
mode setting is not visible unless OWE
Encryption is enabled.
Note: The OWE transition
mode allows STAs that do not support OWE authentication to access
the network in open authentication mode, while OWE-capable STAs can
use OWE authentication mode.
The migration to an
enhanced open Wi-Fi network is done gradually, with user devices
also upgrading over time. In OWE Transition mode, an AP creates two
SSIDs: SSID1 (broadcast) for open authentication and SSID2 (hidden)
for OWE authentication (read only). Non-OWE devices connect to
SSID1, while OWE-capable devices initially connect to SSID1 but are
then associated with SSID2 for secure access.
If SSID1 is deleted
or OWE
Transition mode is disabled, SSID2 will also be
deleted. Cloning SSID1 creates two new WLANs.
Note: SSID1 and
SSID2 co-exist as a pair and a maximum of 6 WLANs can be created per
venue, per AP group.
Select the Enable MAC auth
bypass check box to enable MAC base authentication method.
Check the Enable
RUCKUS DHCP service check box to automatically create and assign
a new DHCP-Guest Service and DHCP Pool for those Guest WLAN-related venues that
do not have a specified DHCP Service. Please refer to the DHCP Service at each
Venue for more information.
In the Walled Garden box, enter the network destinations (URLs or IP
addresses) that users can access without going through authentication. A walled
garden is a limited environment to which an unauthenticated user is given access
for the purpose of setting up an account. After the account is established, the
user is allowed out of the walled garden.
A walled garden is a limited
environment to which an unauthenticated user is given access for the purpose of
setting up an account. After the account is established, the user is allowed out
of the walled garden.
Enter each destination in
a new line. The following are the accepted formats for destinations:
IP address (for example,
10.11.12.13)
IP address range (for
example,10.11.12.13-10.11.12.15)
CIDR (for example,
10.11.12.13/28)
IP address and mask (for
example, 10.11.12.13 255.255.255.0)
Website FQDN (for
example, www.ruckus.com)
Website FQDN with a
wildcard (for example, *.amazon.com;*.com)
In the Authentication Service section
automatically the selected Portal Provider primary and
secondary servers are filled.
Check the Accept All Connections option to enable the
Accept All Connections feature.
By default, the Accept All Connections features is
disabled. You must disable Enable MAC auth bypass to enable he Accept
All Connections feature.
In the Accounting Service section
automatically the selected Portal Provider primary and
secondary servers are filled.
Click Show more
settings.
By default, the
VLAN sub-tab is displayed. Each sub-tab includes
additional Wi-Fi configuration options to configure the settings of your
preference. Refer to Configuring Additional Settings for a Wi-Fi Network to configure each of the available settings.
Note:
Demonstration of
Advanced Settings for a Wi-Fi Network. This video explains
advanced settings for a Wi-Fi network and walks you through the process
of configuring them.
Complete the following steps to
configure a venue:
Select the venues in
which you want to activate this network:
To activate the
network in all of your venues, select the check box beside
Venue at the top of the table and click
Activate.
To activate the
network in a specific venue, locate the venue from the list, and
set the switch to ON in the Activated
column.
The APs,
Radios, Scheduling,
and Tunnel of the selected venue is displayed
in the table.
Select
Venues
By default, this network
configuration is applicable for all APs and all radio bands supported by
the APs. To select specific AP groups or modify the radio bands that
will broadcast this network, complete one of the following steps:
Click All
APs in the APs column. The
Select APs dialog box is displayed. To
activate this network on all current and future APs at this
venue. You can also choose to remove or add any AP-supported
radio bands in the Radio
Band drop-down list giving you the flexibility
of broadcasting this network only on the selected radio
bands.Select
APs Dialog Box
Click Select
specific AP groups to activate this network on
specific AP groups including any AP that is added to selected AP
groups in the future. The APs not
assigned to any group option is displayed. After
APs not assigned to any group is selected,
VLAN and Radio Band
options are displayed: Select
specific AP groups
In the VLAN option, by default VLAN-1 is selected.
Click the icon and configure the VLAN or VLAN
pool for the selected AP group.
In the
Radio Band option, remove or add any
AP-supported radio bands in the drop down list for the selected
AP group.
Click Apply.
By default, this network
configuration is scheduled for 24/7. To configure the
Scheduling, complete the following steps:
Click 24/7 in the Scheduling
column. The Schedule for Network
<network-name> in Venue <venue-name>
dialog box is displayed. You can also choose a schedule of 24/7
or follow below steps to customize the schedule.Schedule for Network Dialog Box
Click Custom
Schedule.
Network schedule is customized as per
your requirement. You can configure the schedule for Monday
through Sunday and from midnight to midnight (from 00:00 hours
through 23.59 hours). For more information, click See
tips. The Network Scheduler
Tips dialog box opens, displaying different
configuration tips in the form of animated GIFs.
Click OK to close the Network Scheduler
Tips dialog box.
Click Apply.
The Tunnel
column shows the tunneling service or profile associated with each
active network. By default, Tunnel is
set to Local
Breakout when the venue is not linked to any SD-LAN or
SoftGRE tunneling service. The SD-LAN
Tunneling option is available only in networks
containing RUCKUS Edge
devices.