MS Switch Access Policies (802.1X) Host Modes

Similar documents
Configuring IEEE 802.1x Port-Based Authentication

IEEE 802.1X Multiple Authentication

Configuring MAC Authentication Bypass

Integrating Meraki Networks with

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

Configuring 802.1X Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication

Configuring 802.1X Port-Based Authentication

IEEE 802.1X VLAN Assignment

Configuring IEEE 802.1x Port-Based Authentication

With 802.1X port-based authentication, the devices in the network have specific roles.

RADIUS Change of Authorization Support

802.1X Authentication Services Configuration Guide, Cisco IOS Release 15SY

Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

RADIUS Change of Authorization

IEEE 802.1X RADIUS Accounting

ISE Version 1.3 Hotspot Configuration Example

ISE Version 1.3 Self Registered Guest Portal Configuration Example

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features

Cisco TrustSec How-To Guide: Phased Deployment Overview

Cisco S802dot1X - Introduction to 802.1X(R) Operations for Cisco Security Professionals.

With 802.1X port-based authentication, the devices in the network have specific roles.

Configuring IEEE 802.1x Port-Based Authentication

Configure Guest Flow with ISE 2.0 and Aruba WLC

Universal Switch Configuration for Cisco Identity Services Engine. Secure Access How-To Guide Series

Configuring Web-Based Authentication

Configuration Guide. For 802.1X VLAN Assignment and MAB. T2600G-28TS _v2_ or Above T2600G-52TS_v2_ or Above

Configuring 802.1X. Finding Feature Information. Information About 802.1X

Chapter 4 Configuring 802.1X Port Security

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

Ruckus ICX Flexible Authentication with Cloudpath ES 5.0 Deployment Guide

Monitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series

P ART 3. Configuring the Infrastructure

Authentication, Authorization, and Accounting Configuration Guide, Cisco IOS Release 15M&T

Example: Setting Up 802.1X for Single Supplicant or Multiple Supplicant Configurations on an EX Series Switch

Security Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

NAC: LDAP Integration with ACS Configuration Example

ForeScout CounterACT. Controller Plugin. Configuration Guide. Version 1.0

IEEE 802.1X with ACL Assignments

Configuring RADIUS Servers

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

802.1x Port Based Authentication

Grandstream Networks, Inc. Captive Portal Authentication via Facebook

Cisco TrustSec How-To Guide: Monitor Mode

Configuring 802.1X Port-Based Authentication

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

Cisco TrustSec How-To Guide: Central Web Authentication

Configuring Web-Based Authentication

Configuring IEEE 802.1X Port-Based Authentication

!! Configuration of RFS4000 version R!! version 2.3!! ip access-list BROADCAST-MULTICAST-CONTROL permit tcp any any rule-precedence 10

Identity Based Network Access

Configuring Security for the ML-Series Card

Grandstream Networks, Inc. Captive Portal Authentication via Facebook

Posture Services on the Cisco ISE Configuration Guide Contents

Central Web Authentication on the WLC and ISE Configuration Example

CWA URL Redirect support on C891FW

Configuring Web-Based Authentication

Universal Wireless Controller Configuration for Cisco Identity Services Engine. Secure Access How-To Guide Series

Configuring RADIUS and TACACS+ Servers

Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth Sr. Technical Marketing Engineer

10 Ways. Cisco Meraki Switches Make Life Easier

Extreme Management Center

Configuring Network Admission Control

Client VPN OS Configuration. Android

Configuring a VAP on the WAP351, WAP131, and WAP371

Configuring Web-Based Authentication

NAC-Auth Fail Open. Prerequisites for NAC-Auth Fail Open. Restrictions for NAC-Auth Fail Open. Information About Network Admission Control

AAA Administration. Setting up RADIUS. Information About RADIUS

Configuring Web-Based Authentication

Grandstream Networks, Inc. Captive Portal Authentication via Facebook

Configuring 802.1X Settings on the WAP351

Setup Adaptive Network Control

Grandstream Networks, Inc. Captive Portal Authentication via Twitter

Web and MAC Authentication

Contents. Introduction. Prerequisites. Requirements

Troubleshooting Cisco ISE

cnpilot Enterprise AP Release Notes

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Configuring Content Authentication and Authorization on Standalone Content Engines

Architecting Network for Branch Offices with Cisco Unified Wireless

Brocade FastIron Flexible Authentication

Encrypted Vendor-Specific Attributes

Auto Identity. Auto Identity. Finding Feature Information. Information About Auto Identity. Auto Identity Overview. Auto Identity, page 1

Nortel Ethernet Routing Switch 5000 Series Configuration Security. Release: 6.1 Document Revision:

Deploying Cisco ISE for Guest Network Access

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

MS120-8 Compact Switch

Index. Numerics. Index 1

RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions

Design Your Network. Design A New Network Infrastructure. Procedure

Wireless Integration Overview

Create Custom Guest Success Pages by Active Directory Group with Cisco Identity Services Engine 1.2

Network Edge Authentication Topology

What Is Wireless Setup

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

Configuring Endpoint Profiling Policies

Cisco Virtual Office: Easy VPN Deployment Guide

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards

Configuring Client Posture Policies

ISE with Static Redirect for Isolated Guest Networks Configuration Example

Transcription:

MS Switch Access Policies (802.1X) Cisco Meraki MS switches offer the ability to configure access policies, which require connecting devices to authenticate against a RADIUS server before they are granted network access. These access policies are typically applied to ports on access-layer switches, to prevent unauthorized devices from connecting to the network. This article outlines what options are available for access policies, how to configure access policies in Dashboard, and configuration requirements for RADIUS servers. As of MS 9.16, changes to an existing access policy will cause a port-bounce on all ports configured for that policy. Host Modes Support for all host modes is now available in MS 10.12. There are four authentication host modes to choose from: Single-Host (Default) With single-host authentication, a connected device will attempt authentication and if it fails to authenticate, the client will be denied access. This mode is recommended for switchports with only one client attached. If multiple devices are connected to the same switchport (for example a device connected via a hub or daisy-chained off of a VoIP phone), only one client will be allowed network access upon successful authentication. All subsequent authentication requests from other clients will be ignored and they will not be granted access as a result. Multi-Domain With multi-domain authentication, one device can be authenticated on each of the data and voice VLANs; if a second device is detected on one of the VLANs, the device will not be granted access. In this mode, Hybrid Authentication is used and Voice VLAN authentication is required. This mode is recommended for switchports connected to a phone with a device behind the phone. Authentication is independent on each VLAN and will not affect the forwarding state of each other. Cisco Meraki switches require the following attribute pairs within the Access-Accept frame to put devices on the voice VLAN: Cisco-AVPair 1

device-traffic-class=voice Multi-Auth With multi-auth, each connected device is required to authenticate. Multiple devices may be connected to each port. After a VLAN is assigned to a host on the port, subsequent hosts must have matching VLAN information or be denied access to the port. Only one client is supported on the voice VLAN. Guest VLANs are not supported in this mode. Multi-Host With multi-host, a single successful authentication will put the port into a forwarding state. All subsequent authentication attempts are ignored. This is recommended in deployments where the authenticated device acts as a point of access to the network, for example, hubs and access points. Access Policy Types There are three options available for an access policy in Dashboard: 802.1X (Default) When an 802.1X access policy is enabled on a switchport, a client that connects to that switchport will be prompted to provide their domain credentials. If the RADIUS server accepts these credentials as valid, their device will be granted access to the network and get an IP configuration. If no authentication is attempted, they will be put on a "guest" VLAN, if one is defined. 802.1X access policies are commonly used in enterprise environments, since they can authenticate against the existing domain userbase. MAC Authentication Bypass (MAB) When a MAB access policy is enabled on a switchport, the client's MAC address is authenticated against a RADIUS server without needing to prompt the user. If the server accepts the MAC as valid credentials for the network, the device will be allowed access. MAB access policies are useful for a more seamless user experience, restricting the network to specific devices without needing to prompt the user. Hybrid Authentication When a hybrid access policy is enabled on a switchport, the client will first be prompted to provide their domain credentials for 802.1X authentication. If 802.1X authentication fails, it will deny the client and will not move to MAB authentication. If the switch does not receive any EAP packets, 802.1X authentication will timeout in 8 seconds, and the client's MAC address will then be authenticated via MAB. If 802.1X authentication timeout and MAB fails, the device will be put on a "guest" VLAN, if one is defined. Hybrid authentication is helpful in environments where not every device supports 802.1X authentication since MAB exists as a failover mechanic. 2

Change of Authorization (CoA) Meraki MS switches support CoA for RADIUS reauthentication and disconnection. For more information, please see the following KB article. URL Redirect Walled Garden (Supported on MS210/225/250/350/410/420/425) By default, URL redirect is enabled with CoA. This can be used to redirect clients to a webpage for authentication. Before authentication, the client will have access to all HTTP resources. The walled garden can be used to limit access to the web server only. This feature will only be enabled if one or more supported switches are in the network. Configurations on this feature will be ignored by unsupported switches. 3

If you do not see these options, make sure to contact Meraki Support for the latest beta firmware. Other RADIUS Features RADIUS Accounting RADIUS Accounting can be enabled to send start, interim-update (default interval of 20 minutes) and stop messages to a configured RADIUS accounting server for tracking connected clients. Meraki s implementation follows the IETF s RFC 2869 standard. As of MS 10.19, device sensor functionality for enhanced device profiling has been added by including CDP/LLDP information the RADIUS Accounting message. RADIUS Testing Meraki switches will periodically send Access-Request messages to these RADIUS servers using identity 'meraki_8021x_test' to ensure that the RADIUS servers are reachable. If unreachable, the switch will failover to the next configured server. RADIUS Monitoring In addition to the mechanism in RADIUS Testing, if all RADIUS servers are unreachable, clients attempting to authenticate will be put on the "guest" VLAN. When the connectivity to the server is regained, the switchport will be cycled to initiate authentication. Please contact Meraki Support to enable this feature. As of MS 9.13, test messages are sent every 30 minutes. Dynamic VLAN Assignment In lieu of CoA, MS switches can still dynamically assign a VLAN to a device by assigned the VLAN passed in the Tunnel-Pvt-Group-ID attribute. For more information, please see the following KB article. Guest VLAN Guest VLANs can be used to allow unauthorized devices access to limited network resources. This is not supported on the voice VLAN/domain. Creating an Access Policy on Dashboard 1. On the Dashboard navigate to Configure > Access Policies. 2. Click on the link Add Access Policy in the main window then click the link to Add a server. 3. Enter the IP address of the RADIUS server, the port (default is 1812), and the secret created earlier. 4. Select the required options, as described above. 5. Click Save changes 4

Apply Access Policy to Switch Ports 1. Navigate to Configure > Switch Ports. 2. Select the port(s) you would like to apply the access policy to and press the Edit button. 3. Convert the port type from trunk to access. Note: you can only apply an Access Policy to an access port. 4. From the Access Policy drop-down box, select the Access Policy you created and press the Update ports button. 5

Additional Resources Dynamic VLAN assignment via 802.1X (RADIUS) for MS Switches Configuring 802.1X Wired Authentication on a Windows 7 Client 6