<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Method of connecting remote AP to SZ 100 in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41932#M11893</link>
    <description>&lt;P&gt;Here are the ports you need for the SmartZone 100 to communicate with the AP effectively and other things.&lt;/P&gt;&lt;P&gt;AP to SmartZone Control Plane communication&amp;nbsp;needs TCP port 443 for registration using certificate&lt;/P&gt;&lt;P&gt;AP to SmartZone Control Plane SSH Tunnel requires TCP port 22&lt;/P&gt;&lt;P&gt;AP to SmartZone CP for firmware updates and more needs TCP port 91&lt;/P&gt;&lt;P&gt;AP to SZ-CP for time sync requires UDP port 123&lt;/P&gt;&lt;P&gt;AP to RADIUS server if needed requires UDP port 1812 and 1813 and can be changed as needed&lt;/P&gt;&lt;P&gt;AP to SmartZone Data Plane for R-GRE tunnel formation and maintenance needs port 23233 and can be changed as needed in the SZ-100&lt;/P&gt;&lt;P&gt;AP to SmartZone DP for R-GRE traffic transmission of client data requires TCP port 23232.&amp;nbsp; This is not configurable.&lt;/P&gt;&lt;P&gt;IP on SZ-DataPlane needs to be able to reach SZ-Control Plane IP on port 80 for internal communication - Just FYI&lt;/P&gt;
&lt;P&gt;SZ-D to SZ-CP requires ports 443 and 6868 for other services internal to the controller, again these are FYI as both refer to internal controller functions&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Aug 2015 18:19:16 GMT</pubDate>
    <dc:creator>dionis_taveras</dc:creator>
    <dc:date>2015-08-26T18:19:16Z</dc:date>
    <item>
      <title>Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41929#M11890</link>
      <description>Hello everyone!&lt;BR /&gt;I still don't understand the method of connection the remote AP(at branch office, for example) to the SZ 100 controller at main office (or at datacenter).&lt;BR /&gt;Could it be done just with Ruckus devices?&lt;BR /&gt;&amp;nbsp;Or do I need a VPN server at controller side to build tonnels between remote AP and controller?&lt;BR /&gt;Thanks in advance.</description>
      <pubDate>Wed, 26 Aug 2015 17:37:00 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41929#M11890</guid>
      <dc:creator>alexander_moise</dc:creator>
      <dc:date>2015-08-26T17:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41930#M11891</link>
      <description>&lt;P&gt;AP does the tunneling to the controller for the client data.&amp;nbsp; AP needs to be able to communicate with the controller from whichever location the AP is at.&amp;nbsp; Once connected to the controller and proper firewall configuration is in place to allow the required ports, the AP will form a GRE tunnel with the SZ100 and data will be transmitted within this tunnel.&amp;nbsp; VLAN for each WLAN service can be sent to the core (datacenter) for processing of the client data.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 17:51:12 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41930#M11891</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2015-08-26T17:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41931#M11892</link>
      <description>Thanks, Dionis!&amp;nbsp;&lt;BR /&gt;But the question is - what ports&amp;nbsp;&amp;nbsp;on the firewall&amp;nbsp;should I &amp;nbsp;forward to controller?&amp;nbsp;&lt;BR /&gt;And on the AP I need just to input the controller external IP?</description>
      <pubDate>Wed, 26 Aug 2015 17:55:41 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41931#M11892</guid>
      <dc:creator>alexander_moise</dc:creator>
      <dc:date>2015-08-26T17:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41932#M11893</link>
      <description>&lt;P&gt;Here are the ports you need for the SmartZone 100 to communicate with the AP effectively and other things.&lt;/P&gt;&lt;P&gt;AP to SmartZone Control Plane communication&amp;nbsp;needs TCP port 443 for registration using certificate&lt;/P&gt;&lt;P&gt;AP to SmartZone Control Plane SSH Tunnel requires TCP port 22&lt;/P&gt;&lt;P&gt;AP to SmartZone CP for firmware updates and more needs TCP port 91&lt;/P&gt;&lt;P&gt;AP to SZ-CP for time sync requires UDP port 123&lt;/P&gt;&lt;P&gt;AP to RADIUS server if needed requires UDP port 1812 and 1813 and can be changed as needed&lt;/P&gt;&lt;P&gt;AP to SmartZone Data Plane for R-GRE tunnel formation and maintenance needs port 23233 and can be changed as needed in the SZ-100&lt;/P&gt;&lt;P&gt;AP to SmartZone DP for R-GRE traffic transmission of client data requires TCP port 23232.&amp;nbsp; This is not configurable.&lt;/P&gt;&lt;P&gt;IP on SZ-DataPlane needs to be able to reach SZ-Control Plane IP on port 80 for internal communication - Just FYI&lt;/P&gt;
&lt;P&gt;SZ-D to SZ-CP requires ports 443 and 6868 for other services internal to the controller, again these are FYI as both refer to internal controller functions&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 18:19:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41932#M11893</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2015-08-26T18:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41933#M11894</link>
      <description>Thank you!&lt;BR /&gt;But how does it work? AP establishes the connection to SZ via GRE tonnel?&amp;nbsp;&lt;BR /&gt;And then, how does the same remote connection work with ZoneDirector?</description>
      <pubDate>Wed, 26 Aug 2015 20:24:48 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41933#M11894</guid>
      <dc:creator>alexander_moise</dc:creator>
      <dc:date>2015-08-26T20:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41934#M11895</link>
      <description>&lt;P&gt;To put it simply and in a way I can post it in a short reply here, with the SZ, the AP forms two separate tunnels.&amp;nbsp; One is SSH and the other is GRE (if required).&amp;nbsp; &lt;/P&gt;&lt;P&gt;The SSH tunnel is used to communicate with the controller securely and for the AP to download configuration, firmware and send stats, etc..&amp;nbsp; &lt;/P&gt;&lt;P&gt;The GRE tunnel is formed when you chose to send the data of wireless clients to the controller via a GRE tunnel instead of sending it locally to a switch in what we call Local Break Out (LBO).&amp;nbsp; During this process, the AP forms a tunnel with the controller using a Ruckus proprietary process that allows the AP to be behind NAT if needed.&amp;nbsp; The data from the clients is encapsulated into a VLAN and sent via this tunnel to the controller where the VLAN is then removed from the tunnel and sent natively to the switch attached at the core, behind the SZ100 or SCG-200 controller.&amp;nbsp; Effectively, this creates a layer 2 tunnel over layer 3 and preserves the client MAC addresses and other needed information.&amp;nbsp; Which means, that this client can now have IPs from the core DHCP server, be sent to a session manager or gateway, sent to NAT, AAA, Active Directory or whatever you need to do the same way you would do if the client was connected locally to a switch port in your enterprise network.&lt;/P&gt;&lt;P&gt;Here is the datasheet for this controller.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;A href="http://a030f85c1e25003d7609-b98377aee968aad08453374eb1df3398.r40.cf2.rackcdn.com/datasheets/ds-smartzone-100.pdf" rel="nofollow" target="_blank" title="Link http//a030f85c1e25003d7609-b98377aee968aad08453374eb1df3398r40cf2rackcdncom/datasheets/ds-smartzone-100pdf"&gt;http://a030f85c1e25003d7609-b98377aee968aad08453374eb1df3398.r40.cf2.rackcdn.com/datasheets/ds-smart...&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The ZD&amp;nbsp;however uses LWAPP (Lightweight Access Point Protocol) as its tunneling mechanism.&amp;nbsp; That is a bit different than GRE and can be read about briefly in this Wiki page.&lt;/P&gt;&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Lightweight_Access_Point_Protocol" rel="nofollow" title="Link: https://en.wikipedia.org/wiki/Lightweight_Access_Point_Protocol"&gt;https://en.wikipedia.org/wiki/Lightweight_Access_Point_Protocol&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It is a standard protocol a bit older and uses more overhead than SSH which is why it is not being used in our newer controllers today.&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 23:25:12 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41934#M11895</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2015-08-26T23:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41935#M11896</link>
      <description>Thank you very much! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Now I understand the mechanism.&lt;BR /&gt;Also, if we are talking about GRE tonnel, how much users can sz-100 work with? 20000?</description>
      <pubDate>Thu, 27 Aug 2015 07:19:46 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41935#M11896</guid>
      <dc:creator>alexander_moise</dc:creator>
      <dc:date>2015-08-27T07:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41936#M11897</link>
      <description>&lt;P&gt;No problem.&amp;nbsp; The SZ100 is built to handle 1024 APs per Unit and up to 25k clients per unit.&amp;nbsp; However, it can also be cluster with up to three more other units for a total of 3k AP capacity and 60k clients with up to 2k WLAN per node.&amp;nbsp; The infrastructure can grow as needed.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2015 13:33:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41936#M11897</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2015-08-27T13:33:54Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41937#M11898</link>
      <description>Thank you again! Remote AP is connected and working right now!</description>
      <pubDate>Thu, 27 Aug 2015 21:00:18 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41937#M11898</guid>
      <dc:creator>alexander_moise</dc:creator>
      <dc:date>2015-08-27T21:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41938#M11899</link>
      <description>Hehe, It is not the end.:)&lt;BR /&gt;Everything worked fine, until the SZ is connected directly to provider port without any firewall.&lt;BR /&gt;We put SZ behind Mikrotik 2011, open all ports according to the manual. And what happens next: AP migrating -&amp;gt; AP migrated -&amp;gt; AP discovery sucseeded -&amp;gt; AP connected ... one minute passed.. -&amp;gt; AP heartbeat lost -&amp;gt; AP disconnected.</description>
      <pubDate>Sat, 29 Aug 2015 07:55:38 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41938#M11899</guid>
      <dc:creator>alexander_moise</dc:creator>
      <dc:date>2015-08-29T07:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41939#M11900</link>
      <description>Can you check the UDP "session" timers in the Mikrotik? Does it do stateful inspection?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;A quick sniffertrace should point you in the right direction as to what happens..</description>
      <pubDate>Fri, 25 Sep 2015 20:32:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41939#M11900</guid>
      <dc:creator>bas_sanders</dc:creator>
      <dc:date>2015-09-25T20:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: Method of connecting remote AP to SZ 100</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41940#M11901</link>
      <description>Couple of things that could happen here. 

One: 
You could be blocking some ports for FTP passive if you are connecting APs from the internet into your network.  If this is the case, make sure that passive FTP is supported and that you open or allow port range 16384-65000 for FTP passive dynamic port allocation to the AP and SZ data session.

Two:
Your firewall may be blocking or incorrectly routing the traffic to the internal IP of your SZ.

Let me know what you find.  Like Bas stated, a trace may be helpful.  

Regards,</description>
      <pubDate>Mon, 28 Sep 2015 15:35:50 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Method-of-connecting-remote-AP-to-SZ-100/m-p/41940#M11901</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2015-09-28T15:35:50Z</dc:date>
    </item>
  </channel>
</rss>

