When configuring an802.1X-secured WLAN, RUCKUS systems such asSmartZone,RUCKUS One, orRUCKUS Cloudtypically rely on anexternal RADIUS serverfor user authentication. However, in the event of acontroller failure or connectivity loss to the RADIUS server,RUCKUS APs can continue to authenticate users locally if thelocal user databaseis enabled and configured.
TheLocal Authentication Databaseallows APs or controllers to store a limited set of credentials that can be used when external AAA services are unavailable. This ensurescontinued access and redundancyfor critical WLANs without requiring external dependency. According toRUCKUS One Online Help – WLAN Configuration and AAA Settings, enabling theLocal Authentication Databaseprovides fallback authentication for 802.1X clients during system or connectivity failures.
In contrast, theproxyandnon-proxymodes define how authentication requests are relayed to the RADIUS server, whileDynamic PSK (DPSK)is a separate authentication method that replaces 802.1X with per-user keys.
[References:, RUCKUS One Online Help – WLAN Configuration: AAA Authentication and Fallback Options, RUCKUS Analytics 3.5 User Guide – Client Authentication and WLAN Events, Ruckus Cloud / RUCKUS AI Documentation – Authentication Mode Descriptions, ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit