Ruckus - Passpoint Configuration
Configure Passpoint (Hotspot 2.0) on Ruckus SmartZone, ZoneDirector, or Ruckus Cloud to enable automatic WiFi authentication through IronWiFi's cloud RADIUS service. This provides seamless WPA2/WPA3-Enterprise connections with optional RadSec encryption.
Supported Platforms
- Ruckus SmartZone - SmartZone 100/144, Virtual SmartZone
- Ruckus ZoneDirector - ZoneDirector 1200, 3000, 5000
- Ruckus Cloud - Cloud-managed access points
Prerequisites
In Ruckus:
- Ruckus access points with Hotspot 2.0 support
- SmartZone 3.0+ or ZoneDirector 9.8+
In IronWiFi Console (complete these first):
- Log in to IronWiFi Management Console
- Navigate to Networks > select your network
- Enable Passpoint
- For RadSec (recommended), enable RadSec option
- Note the following:
- RADIUS/RadSec server address
- Port (for RADIUS, 2083 for RadSec)
{AUTH_PORT} - Shared secret or certificate details
SmartZone Configuration
SmartZone Web Interface
Step 1: Configure AAA Server
- Log in to SmartZone web interface
- Go to Services & Profiles > Authentication
- Click Create to add new AAA server:
- Name: IronWiFi
- Type: RADIUS (or RadSec)
- Primary Server IP: IronWiFi RADIUS address
- Port: (or 2083 for RadSec)
{AUTH_PORT} - Shared Secret: Your RADIUS secret
For RadSec:
- Service Protocol: RadSec
- CN/SAN Identity: RadSec server hostname
- Upload CA certificate from IronWiFi console
Step 2: Create Hotspot 2.0 Profile
- Go to Services & Profiles > Hotspot Services > Hotspot 2.0
- Click Create
- Configure:
General:
- Name: IronWiFi-Passpoint
- Internet Access: Available
- Network Type: Free public network
Operator:
- Operator Name: Your organization (lang: eng)
- Domain Names:
ironwifi.net
Venue:
- Venue Group: Business
- Venue Type: Unspecified
Roaming Consortium: Click Add and enter:
- (WBA OpenRoaming)
5A03BA0000 - (Cisco OpenRoaming)
004096
NAI Realm: Click Add:
- Realm:
ironwifi.com - EAP Method: EAP-TTLS
- Auth Type: PAP, MSCHAPV2
- Save the profile
Step 3: Create WLAN
-
Go to Wireless LANs
-
Click Create
-
Configure:
- Name: Passpoint-Network
- SSID: Your SSID name
- Zone: Select appropriate zone
- Authentication: 802.1X EAP
- AAA Server: IronWiFi
- Hotspot 2.0 Profile: IronWiFi-Passpoint
-
Save WLAN
SmartZone CLI Configuration
ZoneDirector Configuration
Web Interface Setup
-
Log in to ZoneDirector
-
Go to Configure > AAA Servers
-
Add RADIUS server with IronWiFi details
-
Go to Configure > Hotspot Services
-
Create Hotspot 2.0 profile:
- Enable Hotspot 2.0
- Configure operator, domain, venue information
- Add roaming consortium OIs
- Configure NAI realm
-
Go to Configure > WLANs
-
Create WLAN with:
- 802.1X authentication
- Hotspot 2.0 profile attached
Ruckus Cloud Configuration
Cloud Portal Setup
- Log in to Ruckus Cloud
- Navigate to WiFi Networks
- Create new network or edit existing
Enable Passpoint
-
In network settings, find Hotspot 2.0
-
Enable and configure:
- Access Network Type
- Venue information
- Operator details
- Domain names
- Roaming Consortium OIs
- NAI Realms
-
Configure RADIUS with IronWiFi server details
-
Save and sync to access points
RadSec Configuration (Recommended)
RadSec provides encrypted RADIUS communication:
IronWiFi Setup
- In IronWiFi console, enable RadSec for your network
- Download the certificate bundle
- Note the RadSec server hostname and port (2083)
SmartZone RadSec Setup
- Go to Services & Profiles > Authentication
- Create new server with:
- Type: RadSec
- Server IP/FQDN: RadSec hostname from IronWiFi
- Port: 2083
- CN/SAN Identity: Server hostname
- Upload CA certificate from IronWiFi
- Save configuration
Troubleshooting
Passpoint Not Working
- Verify Hotspot 2.0 is enabled on WLAN
- Check AP firmware supports Hotspot 2.0
- Verify client device Passpoint support
- Review ANQP query responses
Authentication Failures
- Test RADIUS connectivity:
ruckus# test aaa IronWiFi user@ironwifi.com password - Check shared secret
- Review IronWiFi authentication logs
- Verify NAI realm matches user credentials
Debug Commands
RadSec Issues
- Verify certificate is correctly uploaded
- Check CN/SAN matches server certificate
- Ensure port 2083 is not blocked
- Test TLS connectivity
Related Topics
Same vendor
Standards & reference
Was this page helpful?