SmartZone 100 (SZ-100)

SmartZone™ 100 (SZ-100) is the most scalable, resilient, and highest performing Wireless LAN controller within the Ruckus family of WLAN controllers for enterprises around the world. It manages up to 1,024 ZoneFlex Smart Wi-Fi access points, 2,000 WLANs, and 25,000 clients per device. Its unique SmartZone architecture allows the SZ-100 to be deployed in a 3+1 Active-Active cluster. With Active-Active clustering all members (up to 4) of a cluster will actively manage APs in the network, providing enhanced resiliency for high availability requirements. With clustering, the SZ-100 can manage up to 3,000 APs and 60,000 clients.
Smart licensing allows customers to manage all licensing needs online at https://support.ruckuswireless.com. With Smart licensing, customers have the ability to buy and assign licenses at a granular level down to 1 (one) AP license.
Product AP capacity / authentication / feature / function differences between ZoneDirector (9.13) and SmartZone (3.4) controller platforms.
How to enable smart-roam on SmartZone controller via CLI.
What ports/protocols need to be open to permit AP to SmartZone controller communication, and if including NAT?
The "100-fx" command enables 100Base-FX on chassis-based and stackable devices.
Article talks about how to configure an additional port for SSH access, while default port remains 22 for SZ and AP/Switch/Dataplane communication.
The AP port is connecting with 100Mbps speed only when there is auto negotiation on the switch port.
Since there are two dedicated push down buttons on the SmartZone hardware models, it is slightly confusing to find the right button to factory reset the device.
See the packet trace of AP port/protocol communiations for SmartZone connection and conversion.
Steps to download the Support and License File for the SmartZone/vSZ controllers
How to disable a specific radio on an AP
Only the 1/10G SFP+ SR Transceiver on Ruckus price sheet has been tested by our QA on Ruckus SZ appliances.
Only the 100Mbe / 1GigE / 10GigE / 40GigE / 100GigE tranceivers on Ruckus... (continued)
Enable 100M interfaces on FWS devices
This Bulletin describes a condition where upgrading SZ100 to 5.2 from any previous release and changing the AP Zone firmware to 5.2 would cause SZ to become unresponsive.
The Controller software for the vSCG and the SZ has upgrade enforcement built into the controller software (introduced in release 3.0).
During the first 90 days of operation, user is... (continued)
These SmartZone CLI commands can be used to configure VLAN pooling
Failure return when querying 10K listSize using API on SW6.0
Zero-IT support was removed from product in 3.4
SmartZone connection fails due to outbound firewall
Configuration settings combine to determine SmartZone Precedence Policy support.
Full ASCII Unicode Character support is available in SmartZone 3.4+.
These are steps to configure Guest Access on SmartZone SCG/vSZ controllers.
vSZ on 7.0 supports installation on ESXi, Windows Server Hyper-V, KVM CentOS, OpenStack Ubantu and Nutanix hypervisors. For public cloud, it supports installation on AWS, Google Cloud... (continued)
vSZ GUI do not show more than 1K guest passes
How to Enable 100Mb speed on 1Gb Fiber ICX7450-48F-E port?
This article discusses command line options to manually set the AP's Ethernet port at 100 Mbps or 10 Mbps speed
This article explains the procedure to enable SNMP service on SmartZone controller managed APs
Article explains about weak ciphers on SmartZone and whether it can be disable or not
Starting in SZ 3.2 release, AP firmware upgrade is performed using HTTPS port 11443. Earlier releases use HTTP port 91.
To ensure that all APs can be upgraded successfully to the new... (continued)
SmartZone report filenames include a string of digits after the text.
This article outlines the details of these digits.
You can login to SmartZone managed APs directly, with Zone setup field info, or with cluster username password on SCG/vSZ-H APs, or defaults on Staging zone APs.
UDP port 3799 is necessary for RADIUS CoA and DM messages and are ONLY supported in Proxy Mode.
New SmartZone feature provides graphical representation of Airtime Utilization details.
This article provides information on configuring FIPS on SmartZone and AP
Configuration examples for the SmartZone outbound firewall
A summary of the data retention periods for SZ-H and SZ-E.
Description of the operation of 802.1x-MAC option available for WLAN configuration on SZ controller platform
This is a current (for post date) list of FQDN and IP information for ePDG carriers.
CLI Command to show the cluster backup upload and restore on vSZ or SZ platform using CLI (SSH/Serial Access)
This article explains available options if you want to use VLANs for AP management under SZ-100, vSZ, and SC-200.
Airtime details report from controller GUI
Common causes of node join failures are Misconfiguration of Network Settings, Firmware Version Mismatch, Form-Factor Compatibility, Interface Configuration Matching, IP Version... (continued)
Firmware upgrade Procedure for Virtual SmartZone (vSZ)
Unleashed GW/Master Mode AP performs multiple functions, reducing max Client support to 50 or 100 depending upon AP model.
Article explains L2 or same subnet AP discovery feature support for different SmartZone products.
Sponsor Approval is not available in 3.6.x and later firmware versions of SZ. Currently, Sponsor Approval feature can be used by integrating RUCKUS Cloudpath (CP) solution with SZ.
Article explains why Speedflex may not work after upgrading the P300 to 100.1.0.9.108 and higher versions
Using Registration Rules and Provisioning Tags to connect newly joined Access Points to specific Zones in an SmartZone or SCG cluster
SmartZone product vary from large scale appliance or vSZ-H to vSZ-E or SZ-100 single domain services, each with varying number of supported users/features.
How to create and configure schedule AP CLI script
Feature is not supported on SmartZone version 3.5.x and above
ID | Title | Version | Release Date | Edit Date |
---|---|---|---|---|
20210114 | Ruckus AP LLDP Vulnerability (CVE-2015-8011, CVE-2015-8012) | 1.0 | January 14, 2021 | January 14, 2021 |
20240925 | RUCKUS AP Remote Code Execution Vulnerability | 1.2 | October 04, 2024 | October 11, 2024 |
20231128 | CVE-2023-49225: RUCKUS AP Stored Cross-Site Scripting Vulnerability | 1.0 | November 29, 2023 | November 29, 2023 |
20230404 | CVE-2022-47522: Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | 1.0 | April 04, 2023 | April 05, 2023 |
20230208 | CVE-2023-25717: RUCKUS AP Web Vulnerability (RCE/CSRF) | 1.2 | February 08, 2023 | May 18, 2023 |
20211213 | CVE-2021-44228: Apache Log4j Vulnerability | 1.3 | December 13, 2021 | December 17, 2021 |
20210719 | RUCKUS SmartZone Reflective Amplification Attack Vulnerability | 1.0 | July 19, 2021 | July 19, 2021 |
20210511 | RUCKUS AP Aggregation And Fragmentation Attacks Vulnerability (aka “FragAttacks”) | 1.1 | May 11, 2021 | October 15, 2021 |
20210409 | RUCKUS SmartZone Information Disclosure Vulnerability | 1.0 | April 09, 2021 | April 09, 2021 |
20210129 | AP / ZD CLI Passphrase Vulnerability | 1.0 | January 29, 2021 | January 29, 2021 |
20180427 | SmartZone Security Best Practices for Network Security | 1 | April 28, 2018 | April 28, 2018 |
20210108 | RUCKUS AP Arbitrary File Read Vulnerability | 1.0 | January 08, 2021 | January 08, 2021 |
20200302 | Ruckus AP Image Upgrade Vulnerability | 1.0 | March 02, 2020 | March 02, 2020 |
20180516 | Ruckus SmartZone Sensitive Information Disclosure Vulnerability | 1.1 | May 16, 2018 | May 22, 2018 |
20180815 | Linux Kernel TCP Reassembly Algorithm Remote DOS Vulnerability (CVE-2018-5390) | 1.3 | August 15, 2018 | January 16, 2019 |
20180203 | Java JMX and RMI security vulnerabilities (CVE-2017-15708, CVE-2016-8735) | 1 | February 13, 2018 | February 13, 2018 |
20180319 | Security vulnerabilities addressed by NTP (CVE-2016-1549, CVE-2018-7182, CVE-2018-7170, CVE-2018-7184, CVE-2018-7185, CVE-2018-7183) | 1.0 | March 19, 2018 | March 19, 2018 |
20180601 | Vulnerabilities in Openssl (CVE-201703738, CVE-2018-0733, CVE-2018-0739) | 1.0 | June 01, 2018 | June 01, 2018 |
20190815 | TCP SACK Panic - Kernel Vulnerability (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479) | 1.2 | August 15, 2019 | January 08, 2020 |
20190603 | Ruckus SmartZone Privilege Escalation Vulnerability (CVE-2019-11630) | 1.2 | June 03, 2019 | August 12, 2019 |
ID | Title | Version | Release Date | Edit Date |
TSB-2024-002 | TSB-2024-002_RUCKUS-License-Server-Host | 3.3 | 2024-05-08 | 2024-05-14 |
TSB-2024-002 | TSB-2024-002_RUCKUS-License-Server-Host | 3.3 | 2024-05-08 | 2024-05-14 |
TSB-2024-007 | TSB 2024-007 - Upgrade Restriction from SmartZone 6.1.2 Patch-3 to SZ 7.0.0 or 7.1.0 | 1.2 | 2024-11-21 | 2025-01-07 |
This is here to prevent you from accidentally submitting twice.
The page will automatically refresh.