Creating a Network That Uses a Third-Party Captive Portal (WISPr Feature)

Learn how to create a network that allows users to access the network through a third-party captive portal, authenticated by a RADIUS server.

The login credentials used in the captive portal are validated using AAA on a RADIUS server.
Note: The licensing and subscription may vary from each 3rd-party WISPr provider. For more details, refer to individual partner documents. This is not included with the RUCKUS One subscription.
Complete the following steps to create a captive portal network that uses the third-party authentication option.
  1. On the navigation bar, click Wi-Fi > Wi-Fi Networks > Wi-Fi Networks List.
    The Networks page is displayed.
  2. Click Add Wi-Fi Network. Alternatively, select a Third-Party Captive Portal (WISPr Feature) network setting that you want to copy and click Clone at the top of the table.
    The Create New Network page is displayed.
  3. Complete the settings on the Network Details page.
    • Name: Type a name (up to 32 characters) that you want assign to the network.
    • Set different SSID: Use this option to configure the SSID different from the network name.
    • Description: Enter an optional description to help you identify the network using up to 64 characters.
    • Type: Click Captive Portal.
    When the network type is selected, a structure diagram of a Captive Portal type of network displays.
  4. Click Next.
    The Portal Type page is displayed.
  5. Click 3rd Party Captive Portal (WISPr).
    To access the network, users connect through a 3rd party captive portal, authenticated by a RADIUS server.
    The 3rd-Party Captive Portal type of network diagram appears.
  6. Click Next.
    The Settings page is displayed.
  7. In the Portal Provider field, select a name of the provider from the drop-down list.
  8. Based on Portal Provider selection, the Captive Portal URL or Region field is displayed.
    • Captive Portal URL: Enter the vendor's complete URL for the above selected the Portal Provider. It is recommended to copy URL from the vendor's configuration.
    • Region: Select a region for the above selected the Portal Provider from the drop-down list.
  9. Select the Redirect Users to check box and enter a valid URL.
    You can redirect users to your company website or another URL after they log in successfully. If the check box is not selected, users are sent to the page they originally requested.
  10. In the Integration Key field, a password is displayed. Click Copy Key to copy this password to your vendor's configuration to allow it to connect to RUCKUS One.
  11. For the Secure your network option, select one of the following options:
    • None (default): No encryption method is used.
    • Pre-Share Key (PSK): Select Pre-Share Key (PSK) and select a Security Protocol for the network.
      • WPA2 (Recommended) (default): Encrypts traffic using the WPA2 standard, which complies with the IEEE 802.11i security standard. Select WPA2 (Recommended) and enter a passphrase of at least eight characters in length in the Passphrase field.
      • WPA3: The WPA3 standard has several security enhancements when compared to WPA2. Select WPA3 and enter a passphrase of at least eight characters in length in the SAE Passphrase field.

        The IEEE 802.11ax (Wi-Fi 6E) and IEEE 802.11be (Wi-Fi 7) APs support only WPA3. The 6 GHz radios are supported with WPA3 only.

      • WPA2/WPA3 mixed mode: Allows mixed networks of WPA2- and WPA3-compliant devices ensuring compatibility. Select WPA2/WPA3 mixed mode and in the WPA2 Passphrase and WPA3 SAE Passphrase fields, enter a passphrase of at least eight characters each in length.
      • WPA: It can be configured if you have older devices that do not support WPA2. These devices were manufactured before 2006. RUCKUS recommends that you upgrade or replace the older devices. 6 GHz radios are supported with WPA3 only.
      • WEP (Unsafe): RUCKUS does not recommend using WEP to secure your wireless network because it might be insecure and could be exploited easily. RUCKUS One offers WEP to enable customers with old devices (that are difficult or expensive to replace) to continue using those devices to connect to the wireless network. If you must use WEP, do not use the devices using WEP to transmit sensitive information over the wireless network. 6 GHz radios are supported with WPA3 only.
        Note: Due to security concerns, WEP will no longer be supported for users. However, this change will not impact existing networks that currently utilize WEP.
    • OWE Encryption: Opportunistic Wireless Encryption (OWE) provides encrypted communications for open Wi-Fi networks without needing passwords. Select this option if you do not want users to authenticate with a password.
  12. Select the Enable MAC auth bypass check box to enable MAC base authentication method.
  13. Check the Enable RUCKUS DHCP service check box to automatically create and assign a new DHCP-Guest Service and DHCP Pool for those Guest WLAN-related venues that do not have a specified DHCP Service. Please refer to the DHCP Service at each Venue for more information.
  14. In the Walled Garden box, enter the network destinations (URLs or IP addresses) that users can access without going through authentication. A walled garden is a limited environment to which an unauthenticated user is given access for the purpose of setting up an account. After the account is established, the user is allowed out of the walled garden.
    A walled garden is a limited environment to which an unauthenticated user is given access for the purpose of setting up an account. After the account is established, the user is allowed out of the walled garden.
    Enter each destination in a new line. The following are the accepted formats for destinations:
    • IP address (for example, 10.11.12.13)
    • IP address range (for example,10.11.12.13-10.11.12.15)
    • CIDR (for example, 10.11.12.13/28)
    • IP address and mask (for example, 10.11.12.13 255.255.255.0)
    • Website FQDN (for example, www.ruckus.com)
    • Website FQDN with a wildcard (for example, *.amazon.com;*.com)
  15. In the Authentication Service section automatically the selected Portal Provider primary and secondary servers are filled.
  16. Check the Accept All Connections option to enable the Accept All Connections feature.
    By default, the Accept All Connections features is disabled. You must disable Enable MAC auth bypass to enable he Accept All Connections feature.
  17. In the Accounting Service section automatically the selected Portal Provider primary and secondary servers are filled.
  18. Click Show more settings.

    By default, the VLAN sub-tab is displayed. Each sub-tab includes additional Wi-Fi configuration options to configure the settings of your preference. Refer to Configuring Additional Settings for a Wi-Fi Network to configure each of the available settings.

    Note:

    Demonstration of Advanced Settings for a Wi-Fi Network. This video explains advanced settings for a Wi-Fi network and walks you through the process of configuring them.

    Click to play video in full screen mode.

  19. Click Next.
    The Venues page is displayed.
  20. Complete the following steps to configure a venue:
    1. Select the venues in which you want to activate this network:
      • To activate the network in all of your venues, select the check box beside Venue at the top of the table and click Activate.
      • To activate the network in a specific venue, locate the venue from the list, and set the switch to ON in the Activated column.

      The APs, Radios, Scheduling, and Tunnel of the selected venue is displayed in the table.

      Select Venues
    2. By default, this network configuration is applicable for all APs and all radio bands supported by the APs. To select specific AP groups or modify the radio bands that will broadcast this network, complete one of the following steps:
      1. Click All APs in the APs column. The Select APs dialog box is displayed. To activate this network on all current and future APs at this venue. You can also choose to remove or add any AP-supported radio bands in the Radio Band drop-down list.
        Select APs Dialog Box
      2. Click Select specific AP groups to activate this network on specific AP groups including any AP that is added to selected AP groups in the future. The APs not assigned to any group option is displayed. After APs not assigned to any group is selected, VLAN and Radio Band options are displayed:
        Select specific AP groups
      3. In the VLAN option, by default VLAN-1 is selected. Click the icon and configure the VLAN or VLAN pool for the selected AP group.
      4. In the Radio Band option, remove or add any AP-supported radio bands in the drop down list for the selected AP group.
      5. Click Apply.
    3. By default, this network configuration is scheduled for 24/7. To configure the Scheduling, complete the following steps:
      1. Click 24/7 in the Scheduling column. The Schedule for Network <network-name> in Venue <venue-name> dialog box is displayed. You can also choose a schedule of 24/7 or follow below steps to customize the schedule.
        Schedule for Network Dialog Box
      2. Click Custom Schedule.
      3. Network schedule is customized as per your requirement. You can configure the schedule for Monday through Sunday and from midnight to midnight (from 00:00 hours through 23.59 hours). For more information, click See tips. The Network Scheduler Tips dialog box is displayed.
        Network Scheduler Tips
      4. Click OK to close the Network Scheduler Tips dialog box.
      5. Click Apply.
    4. The Tunnel column shows the tunneling service or profile associated with each active network. By default, Tunnel is set to Local Breakout when the venue is not linked to any SD-LAN or SoftGRE tunneling service. The SD-LAN Tunneling option is available only in networks containing RUCKUS Edge devices.
  21. Click Next.
    The Summary page is displayed.
  22. Review the settings that you configured.
  23. Click Finish.