• In Access Network, select the Tunnel WLAN traffic through Ruckus GRE check box if
you want to tunnel the traffic from this WLAN back to the controller. Tunnel mode enables
wireless clients to roam across different APs on different subnets. If the WLAN has clients
that require uninterrupted wireless connection (for example, VoIP devices), Ruckus Wireless
recommends enabling tunnel mode. When you enable this option, you need to select core
network for tunneling WLAN traffic back to the controller.
• In Core Network Type (only visible if you selected the Tunnel WLAN traffic through
Ruckus GRE check box), select one of the following core network types:
• Bridge
• L3oGRE
• L2oGRE
• TTG+PDG
• PMIPv6
• Mixed Tunnel Mode
• In Authentication Type, click one of the following options:
• Standard usage (For most regular wireless networks): This is a regular WLAN suitable
for most wireless networks.
• Hotspot (WISPr): Click this option if you want to use a hotspot portal that you previously
created. For instructions on how to create a hotspot portal, see Working with Hotspot
(WISPr) Portals on page 58.
• Guest Access + Hotspot 2.0 Onboarding: Click this option if you want guest users
to use this WLAN. After you complete creating this WLAN for guest access, you can
start generating guest passes. For more information, see Working with Guest Users
on page 324.
• Web Authentication: Click this option if you want to require all WLAN users to complete
a web-based logon to this network every time they attempt to connect. For more
information, see Working with Web Authentication Portals on page 64.
• Hotspot 2.0: Click this option if you want a Hotspot 2.0 operator profile that you
previously created to use this WLAN. For more information, see Working with Hotspot
2.0 Services on page 67.
8. In Authentication Options, click the authentication method by which users will be
authenticated prior to gaining access to the WLAN. The level of security should be determined
by the purpose of the WLAN you are creating.
• Open (Default): No authentication mechanism is applied to connections. If WPA or WPA2
encryption is used, this implies WPA-PSK authentication.
• 802.1x EAP: A very secure authentication/encryption method that requires a back-end
authentication server, such as a RADIUS server. Your choice mostly depends on the types
of authentication the client devices support and your local network authentication
environment.
• MAC Address: Authenticate clients by MAC address. MAC address authentication requires
a RADIUS server and uses the MAC address as the user logon name and password. You
have two options for the MAC address format to use for authenticating clients:
• Use user defined text as authentication password (default is device MAC address)
SmartCell Gateway 200/Virtual SmartZone High-Scale for Release 3.4.1 Administrator Guide
118
Managing Global Configuration, AP Tunnel Profiles, Templates, and AP Registration Rules
Working with Zone Templates