Skip to main content

Ruckus Flex Configuration

Configure Ruckus Flex (formerly Ruckus Unleashed) controller-less access points with IronWifi for distributed WiFi management. This guide covers AAA server configuration, external captive portal setup, walled garden configuration for guest access, WPA2/WPA3-Enterprise deployment, and CLI configuration options for advanced settings.

Overview

Ruckus Flex is a controller-less wireless solution where one AP acts as the master controller. It supports:

  • External RADIUS authentication
  • External captive portal
  • WPA2/WPA3-Enterprise
  • Guest network isolation

Prerequisites

In Ruckus Flex:

  • Ruckus Flex network with master AP
  • Ruckus Flex firmware 200.7 or later
  • Access to Flex web interface or CLI
  • Administrative credentials

In IronWifi Console (complete these first):

  1. Create a Network

    • Navigate to Networks and click Create Network
    • Note the RADIUS server details:
      • RADIUS Server IP
      • RADIUS Authentication Port (1812)
      • RADIUS Accounting Port (1813)
      • Shared Secret
  2. Create a Captive Portal

    • Navigate to Captive Portals and click Create Captive Portal
    • Select Vendor: Ruckus
    • Note the Splash Page URL provided
    • Copy the Walled Garden domains list

Ruckus Flex Configuration

Step 1: Access Flex Web Interface

  1. Connect to the Flex network
  2. Open browser and navigate to the master AP IP (default: unleashed.ruckuswireless.com or 192.168.0.1)
  3. Log in with admin credentials

Step 2: Configure RADIUS Server

  1. Navigate to Admin & Services > Services > AAA Servers

  2. Click Create New

  3. Configure Authentication Server:

    • Name: IronWifi
    • Type: RADIUS
    • Auth Method: PAP
    • IP Address: Your IronWifi RADIUS IP
    • Port: 1812
    • Shared Secret: Your RADIUS secret
  4. Configure Accounting Server:

    • Accounting Server: Enable
    • IP Address: Same as authentication
    • Port: 1813
    • Shared Secret: Same secret
  5. Click OK to save

Step 3: Create WLAN for Enterprise Authentication

  1. Navigate to WiFi Networks

  2. Click Create

  3. Configure Basic Settings:

    • Name/SSID: Your network name
    • Type: Standard Usage
  4. Configure Security:

    • Authentication Method: 802.1X EAP
    • Encryption Method: WPA2
    • Algorithm: AES
    • Authentication Server: IronWifi
  5. Click OK to save

Step 4: Create Guest WLAN with Captive Portal

  1. Navigate to WiFi Networks

  2. Click Create

  3. Configure Basic Settings:

    • Name/SSID: Guest WiFi
    • Type: Guest Access
  4. Configure Security:

    • Authentication Method: Open
    • Encryption: None (or WPA2-Personal for basic security)
  5. Configure Guest Access:

    • Guest Access Service: Enable
    • Authentication Type: WISPr or External Captive Portal

Step 5: Configure External Captive Portal

  1. In Guest WLAN settings, go to Guest Access section

  2. Configure:

    • Guest Access Service: Enabled
    • Portal Type: External
    • Authentication Server: IronWifi
  3. Configure Portal Settings:

    • Start Page: External URL
    • Start URL: Your IronWifi Splash Page URL
    • Redirect to Start URL: After guest authentication

Step 6: Configure Walled Garden

In the Guest WLAN settings:

  1. Find Walled Garden section

  2. Add the following required entries:

    • *.ironwifi.com
    • *.ironwifi.net
    • splash.ironwifi.com
    • 107.178.250.42
  3. If using social login providers, add their domains:

ProviderRequired Entries
Google*.google.com, *.googleapis.com, *.gstatic.com, accounts.google.com
Facebook*.facebook.com, *.fbcdn.net, connect.facebook.net, facebook.com
LinkedIn*.linkedin.com, *.licdn.com, linkedin.com
Twitter/X*.twitter.com, *.twimg.com, twitter.com, *.x.com, x.com
Apple*.apple.com, *.icloud.com, appleid.apple.com
Microsoft/Azure AD*.microsoft.com, *.microsoftonline.com, *.msftauth.net, login.microsoftonline.com
Stripe*.stripe.com, js.stripe.com
PayPal*.paypal.com, *.paypalobjects.com
Twilio (SMS)*.twilio.com
  1. Click OK to save

Configuration via CLI

Access Flex CLI via SSH for advanced configuration:

Configure RADIUS Server

ruckus# config
ruckus(config)# aaa-server IronWifi
ruckus(config-aaa)# type radius
ruckus(config-aaa)# ip 1.2.3.4
ruckus(config-aaa)# port 1812
ruckus(config-aaa)# secret your-shared-secret
ruckus(config-aaa)# end

Configure WLAN with 802.1X

ruckus# config
ruckus(config)# wlan "Enterprise-WiFi"
ruckus(config-wlan)# ssid "Enterprise-WiFi"
ruckus(config-wlan)# authentication-method 802.1x-eap
ruckus(config-wlan)# encryption-method wpa2
ruckus(config-wlan)# algorithm aes
ruckus(config-wlan)# aaa IronWifi
ruckus(config-wlan)# end

Configure Guest WLAN

ruckus# config
ruckus(config)# wlan "Guest-WiFi"
ruckus(config-wlan)# ssid "Guest-WiFi"
ruckus(config-wlan)# type guest
ruckus(config-wlan)# guest-access
ruckus(config-wlan-guest)# portal-type external
ruckus(config-wlan-guest)# start-url https://us-east1.ironwifi.com/...
ruckus(config-wlan-guest)# end

Configuration Summary

RADIUS Settings

SettingValue
Server IPIronWifi RADIUS IP
Auth Port1812
Acct Port1813
SecretYour shared secret

Enterprise WLAN Settings

SettingValue
SecurityWPA2-Enterprise
Authentication802.1X EAP
RADIUS ServerIronWifi

Guest WLAN Settings

SettingValue
Portal TypeExternal
Start URLIronWifi Splash Page
Walled GardenIronWifi domains

Testing

Once configuration is complete, verify everything is working properly:

Check AAA Server Status

  1. Navigate to Admin & Services > Services > AAA Servers
  2. Verify IronWifi server shows as configured
  3. Check connection status

Test Enterprise Authentication

  1. Connect device to Enterprise WLAN
  2. Enter credentials when prompted
  3. Verify authentication in IronWifi Console

Test Guest Portal

  1. Connect device to Guest WLAN
  2. Browser should redirect to splash page
  3. Complete authentication
  4. Verify in IronWifi Console logs

Check Connected Clients

  1. Navigate to Clients
  2. View connected clients
  3. Verify authentication status

Troubleshooting

If you encounter issues during setup or operation, use this reference to diagnose and resolve common problems:

SymptomPossible CauseSolution
RADIUS timeoutNetwork connectivity issueVerify AP can reach IronWifi RADIUS server, check firewall rules
RADIUS timeoutIncorrect server IPCheck server IP address in AAA server configuration
Auth rejectedWrong shared secretVerify shared secret matches exactly in both systems (case-sensitive)
Auth rejectedIncorrect portsEnsure ports 1812 (auth) and 1813 (acct) are configured
Portal not redirectingGuest access disabledVerify guest access service is enabled in WLAN settings
Portal not redirectingPortal URL wrongCheck that captive portal Start URL is correct
Portal not redirectingDNS issuesEnsure DNS is working properly on client devices
Cannot complete authenticationMissing walled garden domainsVerify all required IronWifi domains are in walled garden
Cannot complete authenticationHTTPS/SSL issuesCheck HTTPS works properly, verify certificates
Cannot complete authenticationBrowser cacheClear browser cache or test in incognito/private mode
Social login failuresMissing provider domainsAdd all social provider domains to walled garden
Social login failuresOAuth not configuredVerify OAuth is configured in IronWifi Console
SSL errorCertificate issueAdd all required domains to walled garden
No redirect after authRADIUS server issueReview Flex event logs and IronWifi authentication logs

Review Logs

For detailed error information:

  1. Check Flex event logs in web interface
  2. Review IronWifi authentication logs: AnalyticsAuthentication Logs
  3. Check RADIUS communication in system logs

Advanced Configuration

This section covers optional advanced features for enhanced functionality:

VLAN Assignment

  1. In WLAN settings, configure VLAN:

    • VLAN ID: Specify VLAN for this WLAN
    • Dynamic VLAN: Enable for RADIUS-assigned VLANs
  2. Configure VLAN attributes in IronWifi user/group settings

Rate Limiting

  1. In WLAN settings, find Rate Limiting
  2. Configure:
    • Downlink Rate Limit: Max download speed
    • Uplink Rate Limit: Max upload speed

Access Control

  1. Configure Access Control in WLAN settings
  2. Set allowed/denied MAC addresses
  3. Configure time-based access if needed

Best Practices

  1. Firmware Updates: Keep Flex firmware current
  2. Strong Secrets: Use complex RADIUS shared secrets
  3. Monitoring: Check Flex dashboard regularly
  4. Backup Config: Export configuration before changes
  5. Test Changes: Verify in lab before production
  6. Documentation: Record all configuration settings