Does Ruckus Unleased fully support 802.11r, 802.11k and 802.11v for best iPhone roaming experience?

  • 1
  • Question
  • Updated 2 months ago
  • (Edited)
I have seen 802.11r and 802.11k somewhere in the configuration but no 802.11 v. I'm interested in this feature for R610, R510 and R310 APs.
Photo of Michael Berger

Michael Berger

  • 2 Posts
  • 0 Reply Likes

Posted 2 months ago

  • 1
Photo of Abilash P R

Abilash P R, Employee

  • 51 Posts
  • 12 Reply Likes
Hi Michael,

802.11v is supported in Unleashed, please enable Smart Roam to steer clients to optimal AP.

ruckus>enable 
ruckus#config 
ruckus(config)#wlan <wlan_name> 
ruckus(config-wlan)#smart-roam 3 
ruckus(config-wlan)#exit 
More about Smart Roam can be found in the following KB.

https://support.ruckuswireless.com/answers/000002277

Regards,
Abilash PR.
Photo of Michael Berger

Michael Berger

  • 2 Posts
  • 0 Reply Likes
Hello Abilash,

Thanks! My understanding was that CLI is not available in Unleashed. How can I enable Smart Roam in Unleashed?
Photo of Abilash P R

Abilash P R, Employee

  • 51 Posts
  • 12 Reply Likes
Hi Michael,

CLI is available in Unleashed, but limited.

Below is session output from Master AP in Unleashed Network ( 2 APs ) running 200.4.9.13.47.

λ ssh [email protected]
Please login: admin
Password:
Welcome to Ruckus Unleashed Network Command Line Interface
ruckus> en
ruckus# config
You have all rights in this mode.
ruckus(config)# wlan test
The WLAN service 'test' has been loaded. To save the WLAN service, type 'end' or 'exit'.
ruckus(config-wlan)# smart-roam 3
The command was executed successfully. To save the changes, type 'end' or 'exit'.
ruckus(config-wlan)# exit
The WLAN service 'test' has been updated and saved.
Your changes have been saved.
ruckus(config)# exit
Your changes have been saved.
ruckus# show wlan name "test"
WLAN Service:
  ID:
    6:
      NAME = test
      Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps
      Tx. Rate of Management Frame(5GHz)   = 6.0Mbps
      Beacon Interval = 100ms
      SSID = test
      Description = test
      Type = Standard Usage
      Authentication = open
      Encryption = wpa2
      Algorithm = aes
      Passphrase = [email protected]#
      FT Roaming = Disabled
      802.11k Neighbor report = Disabled
      Web Authentication = Disabled
      Authentication Server = Disabled
      Called-Station-Id type = wlan-bssid
      Tunnel Mode = Disabled
      Background Scanning = Enabled
      Max. Clients = 100
      Isolation per AP = Disabled
      Isolation across AP = Disabled
      Zero-IT Activation = Disabled
      Priority = High
      Load Balancing = Disabled
      Band Balancing = Disabled
      Dynamic PSK = Disabled
      Rate Limiting Uplink = Disabled
      Rate Limiting Downlink = Disabled
      Auto-Proxy configuration:
        Status = Disabled
      Inactivity Timeout:
          Status = Enabled
          Timeout = 1 Minutes
      VLAN-ID = 1
      Dynamic VLAN = Disabled
      Closed System = Disabled
      Https Redirection = Disabled
      OFDM-Only State = Disabled
      Multicast Filter State = Disabled
      802.11d State = Enabled
      Force DHCP State = Disabled
      Force DHCP Timeout = 10
      DHCP Option82:
          Status = Disabled
          Option82 sub-Option1 = Disabled
          Option82 sub-Option2 = Disabled
          Option82 sub-Option150 = Disabled
          Option82 sub-Option151 = Disabled
      Ignore unauthorized client statistic = Disabled
      STA Info Extraction State = Enabled
      BSS Minrate = Disabled
      Call Admission Control State = Disabled
      PMK Cache Timeout= 720 minutes
      PMK Cache for Reconnect= Enabled
      NAS-ID Type= wlan-bssid
      Roaming Acct-Interim-Update= Disabled
      PAP Message Authenticator = Enabled
      Send EAP-Failure = Disabled
      L2/MAC = No ACLS
      L3/L4/IP Address = No ACLS
      L3/L4/IPv6 Address = No ACLS
      Precedence = Default
      Proxy ARP = Disabled
      Device Policy = No ACLS
      Vlan Pool = No Pools
      Role based Access Control Policy = Disabled
      SmartRoam = Enabled  Roam-factor = 3
      White List = No ACLS
      Application Visibility = disabled
      Apply Policy Group = No_Denys
ruckus#
Hope this helps..!!!

Regards,
Abilash PR.
(Edited)
Photo of Nat Chidambaram

Nat Chidambaram

  • 49 Posts
  • 21 Reply Likes
SmartRoam+ (part of 802.11v) is enabled within the code. So, no need to enable anything separately for SmartRoam+ to work - which prevents "sticky" clients issue.
Photo of Daniel M

Daniel M

  • 41 Posts
  • 7 Reply Likes

So you’re saying even though SmartRoam shows as Disabled in the CLI it’s actually enabled?

Photo of Abilash P R

Abilash P R, Employee

  • 51 Posts
  • 12 Reply Likes
Hi Daniel,

Below is the snippet from 9.9 What's New Document, this feature was introduced in 9.9 and integrated to Unleashed.

9. SmartRoam+

To reduce the battery usage, after associating with an Access Point (AP), mobile devices like Apple’s iPhone and iPad do not scan the environment even though the user may have moved far away from originally associated AP. This would result in poor end user experience.

To solve the above mentioned client stickiness issue the SmartRoam feature was introduced wherein the AP would send ‘dis-associate’ frame to client device which will disconnect the client device. This triggers the client device to find better alternate AP.

SmartRoam+ feature of ZF 9.9 further enhances the Ruckus’ SmartRoam in order to provide better quality of experience for the end user. After associating with an AP if user moves far away from initially connected AP, then the AP will send a BSS Transmission message (part of 802.11v) to the client device. This triggers the client device to start the scanning process to find an AP that can provide better service. The client device scans the environment using the filtered AP neighbor list (part of 802.11k) provided by the original AP. While the client device is scanning the environment it continues to stay connected to the original AP.

After client device chooses a specific AP to connect to it uses 802.11r for faster transition by re-using previously-established 802.1x security keys.

Customer Benefits 
  • Client device roams seamlessly and rapidly
  • End user will have higher quality of experience
  • Client device saves battery from not having to scan all the APs and channels
https://support.ruckuswireless.com/documents/570-zoneflex-9-9-ga-what-s-new

Sorry, I have wrongly interpreted in my previous post.

Regards,
Abilash PR.
(Edited)
Photo of Abilash P R

Abilash P R, Employee

  • 51 Posts
  • 12 Reply Likes
Hi All,

To check if BTM (802.11v) is enabled please use the below command.

"get bss-trans-mgmt wlanid"

Example:
rkscli: get bss-trans-mgmt wlan33
BSS Transition Management:Enabled
OK

To confirm if the clients are 802.11v capable use the below command, in which BTM value should be '1'.

"get station wlanid info"

Example:
rkscli: get station wlan33 info
MAC Addr          AID Rate RSSI VLAN Idle ERP State Flags RecvSigStrength BTM
-------------------------------------------------------------------------
xx:xx:xx:xx:54:4c   1   6M   46    1    0   0  a02b     0             -59 1
xx:xx:xx:xx:43:fc   2   6M   29    1    0   0 4a02b     0             -76 1
OK
Regards,
Abilash PR.
(Edited)