Ruckus Integration
Configure Ruckus SmartZone, vSZ, and ZoneDirector to authenticate with NetKey RADIUS for DPSK, iPSK, and dynamic VLAN assignment.
Ruckus uses "DPSK" (Dynamic PSK) terminology. This is compatible with NetKey's iPSK when using Ruckus-DPSK-Passphrase attribute.
Prerequisites
- Ruckus SmartZone 5.x/6.x, vSZ, or ZoneDirector
- Access Points adopted and operational
- Network connectivity to NetKey RADIUS
- NetKey Group configured with RADIUS secret
Log in to app.netkey.no → Settings → RADIUS Clients to find your RADIUS server IP/hostname and create a shared secret for your Ruckus controller.
SmartZone Configuration
Add AAA Server
Navigate to Services & Profiles → AAA → AAA Servers
Click Create and configure:
| Name | NetKey-RADIUS |
| Type | RADIUS |
| IP Address | your-radius-server |
| Port | 1812 |
| Shared Secret | Your NetKey RADIUS secret |
Configure Accounting (optional):
| Enable Accounting | Yes |
| Accounting Port | 1813 |
Create WLAN with DPSK
Navigate to WLANs and click Create
Configure WLAN settings:
| Name | Corporate-DPSK |
| SSID | Corporate-WiFi |
| Authentication Type | Standard + MAC Authentication |
| Encryption | WPA2 |
| WPA Version | WPA2 or WPA2/WPA3 |
Enable Dynamic PSK (DPSK):
| DPSK Enabled | Yes |
| DPSK Type | External (RADIUS) |
| Passphrase | Set a fallback PSK (8+ chars) |
Configure MAC Authentication:
| MAC Auth | Enabled |
| MAC Auth Server | NetKey-RADIUS |
| MAC Format | AABBCCDDEEFF (uppercase, no delimiter) |
Ensure NetKey is configured with matching MAC format. Go to Group Settings → RADIUS → MAC Format and select uppercase without delimiter.
DPSK via RADIUS
NetKey returns the device-specific passphrase via Ruckus VSA.
RADIUS Response
Ruckus-DPSK-Passphrase = "UniqueDevicePass123"
Tunnel-Type = VLAN
Tunnel-Medium-Type = IEEE-802
Tunnel-Private-Group-ID = "100"
| Attribute | Description |
|---|---|
Ruckus-DPSK-Passphrase |
The unique PSK for this device |
Ruckus-User-Role |
Optional user role assignment |
Tunnel-Private-Group-ID |
Dynamic VLAN assignment |
NetKey Endpoint Configuration
Create endpoints in NetKey for each device:
Navigate to Clients in NetKey
Click Add Client:
| MAC Address | AA:BB:CC:DD:EE:FF |
| Name | John's Laptop |
| Passphrase | *Generated or custom* |
| VLAN | 100 |
Dynamic VLAN
Configure VLAN pools in SmartZone for dynamic assignment.
Create VLAN Pool
Navigate to Services & Profiles → VLAN Pooling
Create a pool with all allowed VLANs:
| Name | Corporate-VLANs |
| VLANs | 100, 200, 300, 400 |
Assign VLAN Pool to WLAN in Advanced Options
Enable RADIUS Override
In WLAN settings, enable:
| RADIUS Attribute Override | Enabled |
ZoneDirector Configuration
For ZoneDirector appliances, the configuration is similar.
Add AAA Server
Navigate to Configure → AAA Servers
Click Create New:
| Name | NetKey |
| Type | RADIUS |
| IP Address | your-radius-server |
| Port | 1812 |
| Shared Secret | Your secret |
Create DPSK WLAN
Navigate to Configure → WLANs
Create new WLAN with:
| Authentication | Open |
| Encryption | WPA2 |
| DPSK | Enabled |
| External DPSK | NetKey (AAA server) |
Ruckus Unleashed
Unleashed APs support external DPSK with RADIUS.
Access Master AP web interface
Go to Admin & Services → Services → AAA Servers
Add RADIUS server:
| Server Type | Non-Proxy RADIUS |
| IP Address | your-radius-server |
| Port | 1812 |
| Shared Secret | Your secret |
Create WLAN with Dynamic PSK enabled
Select External (AAA/RADIUS) for DPSK type
Testing & Verification
Test RADIUS Connectivity
SmartZone provides built-in RADIUS testing:
Go to Services & Profiles → AAA → AAA Servers
Click on your RADIUS server
Use Test button with a known MAC address
View Connected Clients
Navigate to Monitor → Clients to see:
- Connected devices and their MAC addresses
- Assigned VLAN
- Authentication status
- DPSK status
Troubleshooting
- Check MAC format matches between Ruckus and NetKey
- Verify endpoint exists in NetKey with correct MAC
- Check NetKey Auth Logs for the MAC authentication attempt
- Ensure RADIUS returns Ruckus-DPSK-Passphrase attribute
- Verify RADIUS server is reachable from controller
- Check shared secret matches exactly
- Ensure MAC Auth is enabled on WLAN
- Review SmartZone event logs for RADIUS errors
- Verify VLAN exists in VLAN Pool
- Check RADIUS Attribute Override is enabled
- Ensure Tunnel-Private-Group-ID is returned by NetKey
- Verify switch ports allow the VLAN