Ruckus SmartZone - OpenRoaming with RadSec
Configure RadSec (RADIUS over TLS) on Ruckus SmartZone and Virtual SmartZone controllers for secure OpenRoaming authentication with IronWifi. This guide covers CA chain and client certificate installation, RadSec proxy authentication service creation, Hotspot 2.0 profile configuration, and WLAN deployment.
Quick Start
- Enable RadSec and OpenRoaming in IronWifi Console
- Download certificate bundle
- Import CA chain and client certificate to SmartZone (Administration > Certificates)
- Create RadSec proxy authentication service
- Create Hotspot 2.0 profile with OpenRoaming OIs
- Create WLAN and assign Hotspot 2.0 profile
Prerequisites
In Ruckus SmartZone:
- Ruckus SmartZone or Virtual SmartZone (vSZ) controller
- SmartZone firmware 5.x or later
- Ruckus access points with Hotspot 2.0 support
In IronWifi Console (complete these first):
- Create or select a Network in the IronWifi Console
- Enable OpenRoaming from the dropdown menu
- Enable RadSec from the dropdown menu
- Download the certificate bundle (ZIP file containing Root CA, Intermediate CA, client certificate, and private key)
SmartZone Certificate Configuration
Step 1: Import Trusted CA Chain
- Log in to SmartZone web interface
- Navigate to Administration > Certificates
- Go to SZ Trusted CA Certificates/Chain (external)
- Click + Import
- Configure:
- Name:
IW Trusted PKI Chain - Root CA Certificate: Upload
iw-rsa-root-ca.cert.pem - Intermediate Root CA Certificates: Add
iw-rsa-radsec-signing-ca.cert.pem
- Name:
- Click OK to save
Step 2: Import Client Certificate
- Go to SZ Client Certificates
- Click + Import
- Configure:
- Name:
IronWifi-RadSec-Client - Certificate File: Upload
client.cert.pem - Private Key File: Upload
client.key.pem - Passphrase: Leave empty (or enter if set)
- Name:
- Click OK to save
Verify Certificates
After import, verify both certificates appear:
- Trusted CA Chain: IW Trusted PKI Chain
- Client Certificate: IronWifi-RadSec-Client
RadSec Proxy Configuration
Step 3: Create RadSec Authentication Service
- Navigate to Services & Profiles > Authentication
- Click Create > Proxy (SZ Authenticator)
- Configure General Settings:
- Name:
IronWifi-RadSec - Description: IronWifi RadSec OpenRoaming
- Service Protocol: RadSec
- Name:
Step 4: Configure Primary Server
-
In the authentication service, configure:
- Primary Server IP/FQDN:
radsec.ironwifi.com - Port: 2083
- Shared Secret: Leave empty (RadSec uses certificates)
- Primary Server IP/FQDN:
-
Configure RadSec Settings:
- RadSec: Enable
- CN/SAN Identity:
radsec.ironwifi.com - CA Chain Certificate: Select
IW Trusted PKI Chain - Client Certificate: Select
IronWifi-RadSec-Client
Step 5: Configure Accounting (Optional)
- Enable Accounting
- Configure:
- Accounting Server:
radsec.ironwifi.com - Accounting Port: 2083
- Use same RadSec settings: Yes
- Accounting Server:
Step 6: Save Configuration
- Review all settings
- Click OK to create the authentication service
Hotspot 2.0 Configuration
Step 7: Create Hotspot 2.0 Venue Profile
- Navigate to Services & Profiles > Hotspot 2.0 > Venue
- Click Create
- Configure:
- Name:
IronWifi-Venue - Venue Group: Business
- Venue Type: Unspecified
- Venue Name: Your Organization Name
- Name:
Step 8: Create Hotspot 2.0 Operator Profile
- Go to Operator
- Click Create
- Configure:
- Name:
IronWifi-Operator - Operator Name: IronWifi
- Domain Name:
ironwifi.net
- Name:
Step 9: Create NAI Realm Profile
- Go to Identity Provider > Realms
- Click Create
- Configure:
- Name:
IronWifi-Realm - Realm:
ironwifi.com - EAP Method: EAP-TTLS
- Auth Method: PAP
- Name:
Step 10: Create Hotspot 2.0 Profile
-
Go to Hotspot 2.0 Profiles
-
Click Create
-
Configure General:
- Name:
IronWifi-Passpoint - Operator: Select
IronWifi-Operator - Venue: Select
IronWifi-Venue - Internet Access: Yes
- Access Network Type: Free public network
- Name:
-
Configure Roaming Consortium:
- Add OI:
5A03BA0000(WBA OpenRoaming Settled) - Add OI:
5A03BA0200(WBA OpenRoaming Settlement-free) - Add OI:
004096(Cisco OpenRoaming)
- Add OI:
-
Configure NAI Realm:
- Select
IronWifi-Realm
- Select
-
Click OK to save
WLAN Configuration
Step 11: Create WLAN with Passpoint
- Navigate to Wireless LANs
- Click Create
- Configure General:
- Name:
OpenRoaming - SSID:
OpenRoaming - Zone: Select your zone
- Name:
Step 12: Configure Authentication
- In WLAN settings, go to Authentication
- Configure:
- Method: 802.1X EAP
- Authentication Service: Select
IronWifi-RadSec
Step 13: Configure Encryption
- Go to Encryption
- Configure:
- Method: WPA2
- Algorithm: AES
Step 14: Enable Hotspot 2.0
- Go to Hotspot 2.0
- Enable Hotspot 2.0
- Select Hotspot 2.0 Profile:
IronWifi-Passpoint
Step 15: Save and Deploy
- Click OK to save WLAN
- Configuration deploys to APs in the zone
Complete Configuration Summary
Authentication Service
| Setting | Value |
|---|---|
| Type | RadSec Proxy |
| Server | radsec.ironwifi.com |
| Port | 2083 |
| CA Chain | IW Trusted PKI Chain |
| Client Cert | IronWifi-RadSec-Client |
Hotspot 2.0 Profile
| Setting | Value |
|---|---|
| Internet | Yes |
| Network Type | Free public |
| Domain | ironwifi.net |
| Roaming OIs | 5A03BA0000, 5A03BA0200, 004096 |
| NAI Realm | ironwifi.com (EAP-TTLS) |
Verification
Check RadSec Status
- Navigate to Monitor > System
- Check Authentication Service status
- Verify RadSec connection is active
Check WLAN Status
- Go to Monitor > Wireless LANs
- Verify WLAN is broadcasting
- Check AP status
Test Client Connection
- Connect Passpoint-enabled device
- Device should auto-discover via ANQP
- Verify authentication in:
- SmartZone Client Monitor
- IronWifi Console Logs
CLI Verification
Access SmartZone CLI:
# Check authentication service
show running-config aaa
# Check RadSec status
show aaa radius-server status
# Check certificates
show certificate
Troubleshooting
RadSec Connection Issues
-
TLS Handshake Failure
- Verify CA chain is complete
- Check client certificate validity
- Ensure server CN matches
-
Connection Timeout
- Verify port 2083 is open
- Check DNS resolution for radsec.ironwifi.com
- Test network connectivity
-
Certificate Errors
- Re-import certificates
- Verify certificate chain order
- Check certificate expiration
Authentication Failures
-
RADIUS Reject
- Check NAI realm matches IronWifi config
- Verify user credentials
- Review IronWifi authentication logs
-
No Response
- Check RadSec service status
- Verify server reachability
- Review SmartZone logs
Hotspot 2.0 Issues
-
Network Not Discovered
- Verify HS2.0 enabled on WLAN
- Check roaming consortium OIs
- Verify client Passpoint support
-
ANQP Failures
- Review AP debug logs
- Verify profile assignments
- Check domain configuration
Debug Commands
# Enable debug logging
debug aaa radius
debug hotspot enable
# Check logs
show log
# Check client status
show client summary
Common Errors
| Error | Cause | Solution |
|---|---|---|
| TLS verify failed | CA not trusted | Re-import CA chain |
| Connection refused | Port blocked | Open port 2083 |
| No matching realm | NAI mismatch | Check realm config |
| Cert expired | Outdated certificate | Download new bundle |
Best Practices
- Firmware Updates: Keep SmartZone updated for best RadSec support
- Certificate Management: Monitor expiration, plan renewal
- Zone Organization: Use zones for logical AP groupings
- Monitoring: Enable alerts for RadSec failures
- Testing: Verify with multiple Passpoint devices
- Backup: Export configuration regularly
Related Topics
- OpenRoaming Overview - Main OpenRoaming configuration guide
- RadSec Overview - Understanding RadSec technology
- Ruckus Passpoint - Passpoint configuration details
- Passpoint Overview - Understanding Passpoint technology