You are looking at the HTML representation of the XML format.
HTML is good for debugging, but probably is not suitable for your application.
See complete documentation, or API help for more information.
<?xml version="1.0"?>
<api>
  <query-continue>
    <allpages gapfrom="Ruckus ZoneDirector" />
  </query-continue>
  <query>
    <pages>
      <page pageid="596" ns="0" title="Ruckus Standalone">
        <revisions>
          <rev xml:space="preserve">This guide describes the configuration steps to enable an external captive portal in the Ruckus Standalone AP.

This guide was created using the following components:

* AP Model: Ruckus R310
* Firmware version: 102.0.0.0.5

== Hotspot ==

Go to '''Configuration &gt; Hotspot'''  and configure the following options:

* '''Hotspot Service:''' set “Enabled”.
* '''Redirect unauth. user to:''' add the provided captive portal login URL.
* '''After user is authenticated:''' select “Redirect to” and add the provided captive portal URL.
* '''Primary RADIUS Server:''' the RADIUS server IP according to your environment/region.
* '''RADIUS Server Secret:''' the provided RADIUS client secret.

[[File:Hotspot.png|800px]] 

Click in '''Update Settings''' to save the configuration.

=== Walled Garden ===

In the same '''Hotspot''' section, you need to configure the IPs and domains allowed for access for unauthenticated users. In the '''Walled Garden''', click '''Edit Settings'''.

Get the list of hostnames you want to enable to unauthenticated users at our documentation. For each hostname, click '''Add new entry''', set the '''Walled Garden Host''' and click '''Update''' to save.

[[File:Walled Garden.png|800px]]

== Local Subnet ==

You need to setup a local subnet to enable users to have access to the network and then to the Internet. Go to '''Configuration &gt; Local Subnets''' and set the parameters for your subnet.

Example for '''Local Subnet 1''':

* '''Subnet:''' Enable
* '''Local IP Address:''' 192.168.1.1
* '''Subnet Mask:''' 255.255.255.0
* '''DHCP Server:''' Enable
* '''Starting Address:''' 192.168.1.100
* '''Maximum DHCP Users:''' 50
* '''Access VLAN:''' 1

[[File:Local Subnet.png|800px]]

== Wireless Network ==

In the Wireless Network you will configure your SSID and associate it with a hotspot service and a local subnet.

Depending on your firmware version, you will have different menu items to access the Wireless settings, for example:

* Configuration &gt; Wireless
* Configuration &gt; Radio 2.4G
* Configuration &gt; Radio 5G

In the firmware used to write this configuration guide, we have available menu items for each device radio. For documentation purposes, we setup a Wireless Network in the Radio 2.4G, therefore we clicked in the menu '''Configuration &gt; Radio 2.4G'''.

=== Common Settings ===

When you access the page, you will see the wireless '''Common settings'''. You don’t need to change anything here in order to setup the external captive portal.

[[File:4_Common Settings.png|800px]]

=== Wireless ===

Choose one of the available wireless networks, for example '''Wireless 1'''. Apply the following configurations:

* '''Wireless Network:''' define your network name (eg.: CoffeeBean Wi-Fi)
* '''Wireless Availability?''' Enabled
* '''Broadcast SSID:''' Enabled
* '''SSID:''' define your SSID name
* '''Packet Forward:''' select “Local Subnet NAT and Route to WAN”
* '''Hotspot Service:''' select “hotspot0”
* '''Local Subnet:''' select the local subnet configured previously (e.g.: Local Subnet 1)
* '''Insert DHCP option 82?''' Disabled
* '''Client Fingerprinting?''' Disabled
* '''Encryption Method:''' Disabled

Click '''Update Settings''' to save the configuration.

[[File:Wireless.png|800px]]

== Customer Parameters ==

The summary of customer specific parameters is:

* '''Hotspot'''
** '''Redirect unauth. user to:''' add the provided captive portal login URL.
** '''After user is authenticated:''' select “Redirect to” and add the provided captive portal URL.
** '''Primary RADIUS Server:''' the RADIUS server IP according to your environment/region.
** '''RADIUS Server Secret:''' the provided RADIUS client secret
** '''Walled Garden:''' get the list of hostnames you want to enable to unauthenticated users at our documentation.</rev>
        </revisions>
      </page>
      <page pageid="350" ns="0" title="Ruckus Virtual SmartZone">
        <revisions>
          <rev xml:space="preserve">The following guide was created using a Ruckus wireless network with the following components:

* Controller: Ruckus Virtual SmartZone
* Controller System Version: 3.2.1.0.163
* AP: Ruckus ZoneFlex R310
* AP Firmware: 3.2.0.0.593

== Configuring the RADIUS server ==

Configure the CoffeeBean RADIUS server by creating a new AAA Server.

Go to &quot;Configuration &gt; Wireless Network &gt; AAA Servers &gt; Proxy AAA&quot;.

=== RADIUS Authentication ===

For &quot;Authenticaton Service&quot;, click in the &quot;Create New&quot; link and fill the name, such as &quot;AAA-SOCIAL-ID&quot;:

[[File:RuckusSZ AAA policy.png|800px]]

Then fill the following info:

* Service Protocol: RADIUS
* IP Address: the [[Captive_Portal#RADIUS_Server|primary RADIUS server IP]] according to your environment/region
* Port: 1812
* Shared Secret: the provided RADIUS client secret
* Confirm Secret: the provided RADIUS client secret
* Backup RADIUS: check &quot;Enable Secondary Server&quot;
* IP Address: the [[Captive_Portal#RADIUS_Server|secondary RADIUS server IP]] according to your environment/region
* Port: 1812
* Shared Secret: the provided RADIUS client secret
* Confirm Secret: the provided RADIUS client secret

=== RADIUS Accounting ===

For &quot;Accounting Service&quot;, click in the &quot;Create New&quot; link and fill the name, such as &quot;AAA-SOCIAL-ID-ACCT&quot;:

[[File:RuckusSZ RADIUS Accounting.png|800px]]

Then fill the following info:

* IP Address: the [[Captive_Portal#RADIUS_Server|primary RADIUS server IP]] according to your environment/region
* Port: 1813
* Shared Secret: the provided RADIUS client secret
* Confirm Secret: the provided RADIUS client secret
* Backup RADIUS: check &quot;Enable Secondary Server&quot;
* IP Address: the [[Captive_Portal#RADIUS_Server|secondary RADIUS server IP]] according to your environment/region
* Port: 1813
* Shared Secret: the provided RADIUS client secret
* Confirm Secret: the provided RADIUS client secret

=== PAP/CHAP Support ===

You can change PAP/CHAP support accessing AP CLI and running:

  set aaa auth-method pap|chap

It is a global setting for all WebAuth WLANs on the AP. The default is CHAP.

== Configuring the Hotspot (WISPr) ==

Go to &quot;Configuration &gt; Wireless Network &gt; Hotspot (WISPr)&quot;, click in the &quot;Create New&quot; link and fill the Portal Name, such as &quot;CP-SOCIAL-ID&quot;:

[[File:RuckusSZ Hotspot.png|800px]]

Then fill the following info on &quot;Redirection&quot; section:

* Logon URL: select &quot;External&quot; and fill the &quot;Redirect unauthenticated user to the URL for authentication&quot; with the provided captive portal login URL
* Start Page: select &quot;Redirect to the following URL:&quot; and fill the provided captive portal start URL

You can also adjust the &quot;Session Timeout&quot; and &quot;Grace Period&quot; according to your specifications.

=== Walled Garden ===

Allow CoffeeBean Platform URLs and social network URLs by configuring the Hotspot Walled Garden destinations.

Add the entries according to [[Walled_Garden_for_the_Social_Login | Walled Garden for the Social Login]] URLs:

[[File:RuckusSZ Walled Garden.png|800px]]

== Configuring the WLAN ==

Now you need to create a Wireless LAN with the Hotspot (WISPr) previously created.

Go to &quot;Configuration &gt; Wireless Network &gt; WLANs&quot;, click in the &quot;Create New&quot; WLAN Configuration and fill the Name and SSID, such as &quot;WLAN-SOCIAL-ID&quot;:

[[File:RuckusSZ WLAN.png|800px]]

Then fill the following info:

* WLAN Usage &gt; Authentication Type: Hotspot (WISPr)
* Authentication Options &gt; Method: Open
* Encryption Options &gt; Method: None
* Hotspot Portal &gt; Hotspot (WISPr) Portal: the previously Hotspot (WISPr) created (e.g.: &quot;CP-SOCIAL-ID&quot;)
* Hotspot Portal &gt; Authentication Server: check the &quot;Use the Controller as Proxy&quot; and select the previously RADIUS Authentication Server created (e.g.: &quot;AAA-SOCIAL-ID&quot;)
* Hotspot Portal &gt; Accounting Server: check the &quot;Use the Controller as Proxy&quot; and select the previously RADIUS Accounting Server created (e.g.: &quot;AAA-SOCIAL-ID-ACCT&quot;)

[[File:RuckusSZ WLAN Hotspot.png|800px]]

=== WLAN Group ===

You need to associate the previously WLAN with a WLAN Group.

Probably you already have a &quot;Default&quot; one, but you can also create a new one and associate the previously WLAN as a &quot;Member&quot;:

[[File:RuckusSZ WLAN Group.png|800px]]

== Configuring the Access Points ==

You need to associate the WLAN Group previously created/configured to your Access Points.

Go to &quot;Configuration &gt; Wireless Network &gt; APs&quot; and check &quot;AP Groups&quot; section.

Click in the &quot;Create New&quot; AP Group and fill the Name, such as &quot;APG-SOCIAL-ID&quot;:

[[File:RuckusSZ AP Group.png|800px]]

Add the Access Points to the group:

[[File:RuckusSZ AP Group Members.png|800px]]

Then assign the previously WLAN Group by overriding the configuration:

[[File:RuckusSZ AP Group WLAN.png|800px]]

If you prefer, you can also override the WLAN Group for each AP individually.

== Disable MAC Address Encryption ==

The client MAC address is encrypted by default on Ruckus SmartZone. To perform authentication flows you'll need to disable MAC address encryption.

Log in your Ruckus CLI using privileged credentials and run the following commands:

1. Enter in the config mode:

  # config

2. Check if MAC encryption is enabled:

  (config)# do show running-config encrypt-mac-ip
  Encryption MAC and IP: Enabled

3. If encryption is &quot;Enabled&quot;, you can run the following command:

  (config)# no encrypt-mac-ip
  Do you want to continue to disable (or input 'no' to cancel)? [yes/no] yes
  Successful operation</rev>
        </revisions>
      </page>
    </pages>
  </query>
</api>