Ruckus Wireless ZoneDirector User Guide | Managing a Wireless Local Area Network
22
2
When the
WLANs
workspace appears, you will want to review, then change the secu-
rity options for the internal network. To start, click
Edit
in the internal row.
3
When the
Editing (corporate)
features appear, look at the two main categories—
Authentication Options
and
Encryption Options
.
4
If you click an
Authentication Option Method
such as
Open
,
Shared
, or
802.1x
, differ-
ent sets of encryption options are displayed:
•
Open
allows you to configure a WPA- or WEP-based encryption, or “none” if you're
so inclined. After selecting a WPA or WEP, you can then enter a passphrase or key
text of your choosing.
•
Shared
limits you to WEP-key encryption.
•
802.1x
EAP
allows you to choose from all available encryptions, but you do not
need to create a key or passphrase.
5
Depending on your Authentication Option Method selection, review and reconfigure
the related
Encryption Options
.
6
Review the
Advanced Options
to change any settings as needed. (For example, if you
switch to 802.1x, you'll need to choose an authentication server from the menu.)
7
When you are finished, click
OK
to apply your changes.
Using the built-in EAP server
(
Requires the selection of “Local Database” as the authentication server.
) If you are re-con-
figuring your internal WLAN to use 802.1x/EAP authentication, you normally have to gener-
ate and install certificates for your wireless users. With the built-in EAP server and Zero-IT
Wireless Activation, certificates are automatically generated and installed on the end user's
computer. Users simply follow the instructions provided during the Zero-IT Wireless Activa-
tion process to complete this task. Once it is done, users can connect to the internal WLAN
using 802.1x/EAP authentication.
Authentication with an external RADIUS server
You could use an external RADIUS server for your wireless client 802.1x/EAP authentication.
An EAP-aware RADIUS server is required for this application. Also, you might need to deploy
your own certificates for wireless client devices and for the RADIUS server you are using. In
this case, the Ruckus ZoneDirector works as a bridge between your wireless clients and the
RADIUS server during the wireless authentication process. Ruckus ZoneDirector allows wire-
less clients to access the networks only after successful authentication of the wireless cli-
ents by the RADIUS server.