Are you attempting to use the client MAC address from the browser redirect URL in a custom workflow (hotspot/WISPr) on the Ruckus Virtual SmartZone infrastructure?

 

Do you notice that encrypted text is displayed instead of the client MAC address as seen below?

 

https://<captiveportal-server>/guest/ruckus_secuair_splash.php?nbiIP=10.xx.xx.xx&client_mac=ENC618c410c07b38a2423aa9bbc4f60e1132d0bf93f9f60a7d8
&reason=Un-Auth-Captive&wlanName=TEST&dn=host.domain.com&ssid=TEST&mac=84:18:3a:36:21:30&url=http:%2F%2Fgo.microsoft.com%2Ffwlink%2F%3FLinkID%3D219472%26clcid%3D0x409
&proxy=0&vlan=1&wlan=26&sip=host.domain.com&zoneName=PPrvD96nZGV3g4VcjuM26g_1492591016766&uip=ENC5e0ae99b6d5548edaf874ed5a9bc0b15&_browser=1

 

As a security measure, MAC-IP encryption is enabled by default on the Ruckus infrastructure. Here’s how you can disable this feature and make use of the client MAC address in your workflow.

 

Log into the Ruckus virtual controller CLI as a privileged user and run the following commands to validate the status of this security feature.

 

# show running-config encrypt-mac-ip

 

Output: Encryption MAC and IP: Enabled

 

Enable the config mode and disable the feature by running the following commands as shown below;
You will be prompted to confirm the command execution before proceeding further.

 

# config

 

(config)# no encrypt-mac-ip

 

Prompt: Do you want to continue to disable (or input ‘no’ to cancel)? [yes/no] yes

 

Output: Successful operation

 

Confirm that the feature has been disabled by running the following commands from the config mode as shown below.

 

(config)# do show running-config encrypt-mac-ip

 

Output: Encryption MAC and IP: Disabled

 

After the above change, you would be able to see the client MAC address in the redirect URL on the client browser as seen below.

 

https://<captiveportal-server>/guest/ruckus_secuair_splash.php?nbiIP=10.xx.xx.xx&client_mac=94:65:9C:8F:6D:30&reason=Un-Auth-Captive&wlanName=TEST&dn=host.domain.com&ssid=TEST&mac=84:18:3a:36:21:30&url=http:%2F%2Fgo.microsoft.com%2Ffwlink%2F%3FLinkID%3D219472%26clcid%3D0x409&proxy=0&vlan=1&wlan=26&sip=host.domain.com&zoneName=PPrvD96nZGV3g4VcjuM26g_1492591016766&uip=ENC5e0ae99b6d5548edaf874ed5a9bc0b15&_browser=1

 

Refer the video embedded below for a quick demonstration of the command execution on the Ruckus virtual controller CLI.