Ruckus vSZ (formerly vSCG)

The configuration process of vSZ (Virtual Smart Zone) is similar to configuration of Ruckus ZoneDirector

Tested versions:

ModelTypeFirmware versionDescriptionLimitations
vSCGAP + controllerRuckOS 3.0.4virtual controllerno speed control

1.  RADIUS (AAA) servers setting

Go to Configuration >  AP Zones to set the authentication service of RADIUS servers and click the corresponding AP Zones name. Then select AAA and set the authentication access (auth) and accounting service (acct). Use the following parameter table:


authentication serviceaccounting service
NameSOCIFI-authSOCIFI-acct
TypeRADIUSRADIUS Accounting
Backup RADIUS

checked Enable backup RADIUS support

Primary Server
IP address<IP_primary_radius_server_by_geozone>
Port18121813
Shared Secretsocifi
Confirm Secretsocifi
Backup Server
IP address<IP_secondary_radius_server_by_geozone>
Port18121813
Shared Secretsocifi 
Confirm Secretsocifi


We recommend to use this set of RADIUS servers:
 


 List of RADIUS according to your location:
 For North America

RADIUS Server 1

rad-1-use-1.socifi.com or IP address: 52.7.148.174, Radius shared secret: socifi

RADIUS Server 2

rad-2-use-1.socifi.com or IP address: 52.55.217.23, Radius shared secret: socifi

 For Europe and Africa

RADIUS Server 1

rad-1-euw-1.socifi.com or IP address: 52.209.184.212, Radius shared secret: socifi

RADIUS Server 2

rad-2-euw-1.socifi.com or IP address: 52.50.155.202, Radius shared secret: socifi

 For Asia-Pacific

RADIUS Server 1

rad-1-euw-1.socifi.com or IP address: 52.209.184.212, Radius shared secret: socifi

RADIUS Server 2

rad-2-euw-1.socifi.com or IP address: 52.50.155.202, Radius shared secret: socifi

In order to have the Radius communication working fine, the IP addresses (above) and the ports 1812 Auth and 1813 Acc must be accessible.


RADIUS Access:

RADIUS Accounting:


2.   Hotspot setting

In your AP Zone select Hotspot (WISPr) and create a new Hotspot Portal using this table:

General
NameSOCIFI-hotspot
Redirection 
Smart client SupportEnable
Logon URLExternal
Redirect unauthenticated user to the URL for authenticationhttp://connect.socifi.com/
Start Page (after user is authenticated)Redirect to the URL that user intends to visit
User Section
Session Timeoutany value - it is dynamically change per user from SOCIFI Captive portal
Grace perriodit is not used by SOCIFI
Location information
Location IDit is not used by SOCIFI
Location Nameit is not used by SOCIFI
Walled Gardenfilled by Walled Garden list (listed bellow)

Enter following Walled garden ranges:

If you are a customer with the White Label solution, please add your custom domain (for example *.mycustomdomain.com) to the Walled Garden list.

*.socifi.com
*.facebook.com
*.akamaihd.net
*.akamai.net
*.edgecastcdn.net
twitter.com
*.twitter.com
*.twimg.com
*.fastly.net
*.li-cdn.net
*.cloudfront.net
facebook.com
*.fbcdn.net
*.instagram.com
*.cdninstagram.com
instagram.com
*.linkedin.com
*.licdn.com
linkedin.com

facebook.com and twitter.com (Yes, twice. Once with and once without the asterisk)

 If you are you using Ruckus equipment, don't forget to set CDN IP ranges to the Walled Garden List.

 

Due to Ruckus firmware behavior end-user devices might not be able to reach some (mainly CDN and cloud) domains from walled garden list. This can cause wrong rendering of the captive portal.

The new IP ranges (indented in the list below) were added on April 2018.
Actual list of Amazon CloudFront (CDN) IPs is here: http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/LocationsOfEdgeServers.html (direct link to IPs list in JSON format: https://ip-ranges.amazonaws.com/ip-ranges.json) 

As a workaround you have to add static IP's shown bellow to adjust firmware behavior and to be able to start monetizing your network immediately.

Work-around solution is to add the following IP ranges to the Walled Garden List:

13.32.0.0/15
13.35.0.0/16
13.54.63.128/26
13.59.250.0/26
34.195.252.0/24
35.162.63.192/26
52.15.127.128/26
52.46.0.0/18
52.52.191.128/26
52.57.254.0/24
52.66.194.128/26
52.78.247.128/26
52.84.0.0/15
52.199.127.192/26
52.212.248.0/26
52.220.191.0/26
52.222.128.0/17
54.182.0.0/16
54.192.0.0/16
54.230.0.0/16
54.233.255.128/26
54.239.128.0/18
54.239.192.0/19
54.240.128.0/18
70.132.0.0/18
71.152.0.0/17
99.84.0.0/16
143.204.0.0/16
204.246.164.0/22
204.246.168.0/22
204.246.174.0/23
204.246.176.0/20
205.251.192.0/19
205.251.249.0/24
205.251.250.0/23
205.251.252.0/23
205.251.254.0/24
216.137.32.0/19

 Want to Allow Google+ login?

The new Allow login through social networks does not include the Google login. The reason is that some Android based devices are not redirected to the Captive Portal when the user gets connected to WiFi network. In case you'd like to add it you need to do following:

  1. Check if your hotspot allows DNS names in the Walled garden. Some hotspots can use IP addresses only. See: Why DNS-based Walled Garden (and not IP-based)
  2. Allow Google+ login: Settings > Brand > Authentication > Allow login through social networks > Set on Allow Google login
  3. Add these walled garden domain into existing list:

Google+ Login DNS's

Please adopt same format your Walled garden is already using e.g. with or without the asterisk, separated by comma or space etc.

 For Cisco Meraki, Ruckus, Xirrus
*.googleapis.com
*.googleusercontent.com
*.gstatic.com
*.accounts.youtube.com
*.apis.google.com
*.accounts.google.com
*.l.google.com

The local accounts.google.XX domain must be added into the Walled Garden list. For example accounts.google.co.uk for United Kingdom, accounts.google.com.sg for Singapore, accounts.google.de for Germany etc. Google domains list you can find at https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/List_of_Google_domains.html

 For Open Mesh
googleapis.com,googleusercontent.com,gstatic.com,accounts.youtube.com,apis.google.com,accounts.google.com,l.google.com

The local accounts.google.XX domain must be added into the Walled Garden list. For example accounts.google.co.uk for United Kingdom, accounts.google.com.sg for Singapore, accounts.google.de for Germany etc. Google domains list you can find at https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/List_of_Google_domains.html

 For Mikrotik
/ip hotspot walled-garden
add dst-host=*.googleapis.com
add dst-host=*.googleusercontent.com
add dst-host=*.gstatic.com
add dst-host=*.accounts.youtube.com
add dst-host=*.apis.google.com
add dst-host=*.accounts.google.com
add dst-host=*.l.google.com
add dst-host=accounts.google.com

The local accounts.google.XX domain must be added into the Walled Garden list. For example accounts.google.co.uk for United Kingdom, accounts.google.com.sg for Singapore, accounts.google.de for Germany etc. Google domains list you can find at https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/List_of_Google_domains.html

 For DD-WRT
googleapis.com googleusercontent.com gstatic.com accounts.youtube.com apis.google.com accounts.google.com l.google.com

The local accounts.google.XX domain must be added into the Walled Garden list. For example accounts.google.co.uk for United Kingdom, accounts.google.com.sg for Singapore, accounts.google.de for Germany etc. Google domains list you can find at https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/List_of_Google_domains.html

Related pages:

The Splash Page is not triggered when Android devices connect to WiFi


Pages related to Walled Garden issues


3.   WLAN setting

In your AP Zone select WLAN and create a new WLAN Configuration profile using following parameters:

General Options
Namee.g. SOCIFI_TEST
SSIDe.g. SOCIFI@FREE
WLAN Usage
Authentication TypeHotspot (WISPr)
Authentication Options
MethodOpen
Encryption OptionsNone
Authentication & Accounting Service
Authentication ServiceSOCIFI-auth
Accounting ServiceSOCIFI-acct
Send Interim update every10 minutes
Hotspot Portal
Hotspot (WISPr) PortalSOCIFI-hotspot
Bypass CNAnot checked
Options
Acct Delay Timenot checked
Wireless Client Isolationenable
PriorityHigh
RADIUS Options
NAS IDAP MAC
Called STA IDAP MAC


Under WLAN Group create a new WLAN group if not existing already and select the WLAN profile you've just created. Assign the WLAN profile to APs

4.   Set Northbound Portal Intervace (NBI) password

See the setting the Password example used in SmartCell Gateway 200

 

If Northbound Portal Interface (NBI) is used (API Access) is used

Make sure your Firewall Settings are set correctly.

If you have a Firewall, it may or may not block the communication / connection to SOCIFI Servers (Captive Portal, API endpoints, RADIUS servers).

The following IP Addresses have to be passed thru the Firewall or any other blocking mechanism to successfully reach SOCIFI. Without allowing these IP Addresses to go thru your Firewall, your deployment cannot work properly.

API Access is used by Ruckus, Ubiquiti and ANTlabs devices

VPC:
use-1: 52.44.148.136
euw-1: 52.18.131.55
aps-1: 52.77.200.241
sae-1: 54.233.193.15

non-VPC:
euw-1: 54.246.88.74
use-1: 54.204.47.201    
aps-1: 54.251.110.178    
sae-1: 54.232.124.137


5.   Add a new hotspot to SOCIFI Dashboard

You will need to add MAC addresses of  the controller and all AP's.

 

To add this equipment, please select Ruckus vSZ/vSCG under the settings when adding a new hotspot.

If Northbound Portal Interface (NBI) is used (API Access), enter the NBI Password to SOCIFI Dashboard under vSCG/vSZ API key.
If you have the he newer version of Ruckus (3.5 or above) please enter the Endpoint  (API endpoint)  and Password (API key) to the SOCIFI Dashboard. If the username is set in the controller enter also the User name (API username)

The API Endpoint is the public IP of the controller or WAN IP of the relevant firewall. The port 9080 shall be open respectively forwarded to the controller. If the load balancing or HA is used, please contact the SOCIFI support support@socifi.com




Step 1: Login to SOCIFI Dashboard

Step 2: Click on the "Hotspots" tab on the left sidebar

Step 3: Click on the “Add a new hotspot” button located on the top right corner on the screen (pictured below)

Note: A pop-up window will appear (below)

Step 4: Select the Wi-Fi hardware manufacturer from the drop down menu

Step 5: Enter the serial number or MAC address (depending on the specific equipment manual) of your equipment. You can add multiple hotspots at once.

Step 6: Set your Network location (this step is essential for correct ad targeting)

Step 7: In the pop-up window type your location or just move the marker on the map and click on the save button to confirm the selection. This address is used for ad GEO targeting.

Step 7: Click Save

Note: Newly added hotspot are marked as  (Hotspot pending). After the first user connects to the hotspot via SOCIFI, the status will automatically change and appear as  (Active) within an hour. Get your first connections to test if it works properly.