02-01-2017 11:08 AM
I believe my Guest Access network broke after upgrading to 200.2.9.13.186. Thinking this might have been related to the November 2016 certificate expiration noted at https://support.ruckuswireless.com/certificate (even though Unleashed is mentioned nowhere), I purchased a certificate, but this certificate is mostly useless as guests are redirected to the IP of the virtual controller as opposed to the FQDN on the imported certificate, so clients get a warning.
What am I missing and how do I resolve?
Thanks.
02-01-2017 11:19 AM
02-01-2017 01:06 PM
Can’t
believe the bug stayed unfixed for months, but thanks for the usual prompt
reply Michael—200.3.9.13.228 appears to resolve the issue.