cancel
Showing results for 
Search instead for 
Did you mean: 

SZ vSZ Admin Logon with Radius and Default Role Mapping Disabled

ganesh_balarama
RUCKUS Team Member

Configuration for SZ administrator log in using Radius Server (without default role mapping )

STEP-1

Create the Administrator account in SZ under Administration > Admin & Roles > Administrator > Create

The username will be the Vendor Attribute value (RadiusAdmin) configured in AAA under NPS Policy and the Password is the Shared secret used when adding the radius client

ganesh_balarama_0-1692943098950.png

STEP-2

Create a new group in the following format: Ruckus-WSG-User-User1 under Administration > Admin & Roles > Groups > Create > Ruckus-WSG-User-User1

NOTE: Permissions can be set only at the group level and not user basis.

ganesh_balarama_1-1692941655511.png

ganesh_balarama_2-1692941655516.png

ganesh_balarama_3-1692941655521.png

>Now map the RadiusAdmin administrator to the group

ganesh_balarama_4-1692941655526.png

ganesh_balarama_5-1692941655535.png

STEP-3: AAA Configuration for RADIUS Type with Default Role Mapping disabled:

ganesh_balarama_6-1692941655541.png

STEP-4: Configuration in AD

Create a User Group in the AD with the Group name: Ruckus-WSG-User-User1

NOTE: The Group name created in the AD must be as same as the Group Name created in vSZ/SZ.

ganesh_balarama_7-1692941655544.png

STEP-5: Create a new user in the AD and add it to the above user Group

ganesh_balarama_8-1692941655547.png

ganesh_balarama_9-1692941655551.png

STEP-6:  Configuration in NPS

Add vSZ/SZ as the Radius Client in AAA

ganesh_balarama_1-1692944496206.png

STEP-7: Creating Network Policy

ganesh_balarama_10-1692941655556.png

Map the User Group,

ganesh_balarama_11-1692941655560.png

>Select the Authentication method,

ganesh_balarama_12-1692941655566.png

>In Settings, add the below

In Vendor-Specific Attribute, add  Vendor Code as 25053 & AttributeValue as RadiusAdmin

ganesh_balarama_13-1692941655571.png

ganesh_balarama_14-1692941655576.png

ganesh_balarama_15-1692941655578.png

>Review your NPS policy

ganesh_balarama_16-1692941655585.png

STEP-8: Perform AAA Test from the Controller

ganesh_balarama_17-1692941655588.png

STEP-9: Test SZ login and should be allowed access to the Controller 

ganesh_balarama_18-1692941655593.png

1 REPLY 1