Network Guys

Share your knowledge!

How to use 802.1x/mac-auth and dynamic VLAN assignment

Hello guys! Today I want to show you how to secure your edge-switches with 802.1x and mac-authentication fallback in combination with HPE comware-based switches. The 802.1x protocol is used for network access control. For devices like printers, cameras, etc. we will use mac-authentication as a fallback. We will also use dynamic VLAN assignment for the connected ports.

Our radius server will be Microsoft NPS. You can activate this role on the Windows server:

802 1x vlan assignment

After the installation, open the NPS console and register the radius server in your Active Directory:

802 1x vlan assignment

add your switches or your management network as a radius-client:

802 1x vlan assignment

the shared secret will be used in the switch configuration. In created two groups within my test environment:

  • “ VLAN2-802.1x ” containing computer accounts
  • “ VLAN3-MAC-Auth ” containing user accounts (username+password = mac-address of the device)

So we will now configure two network policies for our network access control:

802 1x vlan assignment

I also configured a NAS Identifier so no other device can use the radius server. The clients will use their computer certificate so you will need a running internal certification authority. Choose PEAP only as the authentication method:

802 1x vlan assignment

the next step is for our dynamic VLAN assignment. Dot1x devices are bound to VLAN 2:

802 1x vlan assignment

the final dot1x configuration in the NPS:

802 1x vlan assignment

the second network policy is for the mac-based authentication:

802 1x vlan assignment

Comware switches are sending MAC-Auth-requests via PAP (maybe you know how to change it to CHAP):

802 1x vlan assignment

final MAC auth profile:

802 1x vlan assignment

for now we have built up our authentication server. Now let’s go to the switch configuration. You have global configuration parameters and parameters for each interface. The best way is to use interface-range command to be safe at your configuration. Users who cant authenticate, will be forced to VLAN 999 (quarantine VLAN with no gateway). Here are the global parameters with explanations inline:

now we will configure the interfaces: Added 2 entries

the last part is to configure all windows clients to send 802.1x auth data to the cable network. I’ve done this via a global group policy. You can find the settings under Computer Configuration / Policies / Windows Settings / Security Settings / Wired Network (IEEE 802.3) Policies:

802 1x vlan assignment

So how does a working 802.1x-auth looks like?

%Jan 3 01:59:59:531 2013 edge-switch-01 DOT1X/6/DOT1X_LOGIN_SUCC: -IfName=GigabitEthernet1/0/10-MACAddr=0023-2415-42a3-AccessVLANID=1- AuthorizationVLANID=2 -Username= host/PC123.mycompany.local ; User passed 802.1X authentication and came online.

Successful Mac-Authentication of a printer:

%Jan 3 01:31:28:782 2013 de-pad-l19-edg01 MACA/6/MACA_LOGIN_SUCC: -IfName=GigabitEthernet1/0/9-MACAddr=0017-c82d-e9bf-AccessVLANID=1- AuthorizationVLANID=3 -Username= 0017c82de9bf -UsernameFormat=MAC address; User passed MAC authentication and came online.

I tried to draw a flow chart which shows the authentication process, I hope it’s ok for you :)

802 1x vlan assignment

Do you have questions? Feel free to write them into the comments and I will try to answer.

Have a nice and sunny day!

/edit: If you can’t see success and failure events, follow this instruction:  NPS / Radius Server is not logging

/edit 2018-05-14: I corrected the global and interface configuration, we had problems with the old configuration

12 Responses

Thanks for this, I need to setup dynamic VLAN assignment in the near future but for Juniper equipment.

This at least gives me a good starting point, thanks for the write up.

Many thanks for the perfect tutorial on How to use 802.1x/Mac-Auth and dynamic VLAN assignment. Many of us can take help from it. Really nice.

Nice write-up. This was a great starting point for configuring the base for dynamic polices. Thanks!

hi Mike, how ‘s about hybrid port with voice-vlan? does it work?

thanks Tung Duong

we had several problems with this config, currently we are investigating hyprid ports with “port security” command. I will update this post if we have prooved this version.

Can you tell me why I would do this over conventional static VLANs? What are the benefits radius dynamic VLANs?

we have customers which want to divide the network for clients, printers and “special devices”. So you have different group/radius-policies to directly place the devices in the right VLAN. Dynamic VLAN is only a bonus feature which you can use. Of course, you can use only the 802.1x and Mac authentication for security purpose.

I’m on the desktop side of things, so apologies if I use any incorrect terminology here.

Our Infrastructure team are looking at introducing 8021x in our schools. They have a test setup where all 8021x devices pick up a data centre VLAN regardless of which building they’re in – eg 10.100.50.

Each building WIRED has its own unique IP – SchoolA=10.120, SchoolB = 10.130 and so on.

I’ve asked if the 8021x setup can be where 8021x devices in SchoolA will get 10.120.50; SchoolB will get 10.130.50

This would allow us to easily determine which building LaptopA actually is, in the same way as we can with our wired desktops. It also saves on SCCM boundary issues causing applications/updates to be pulled over the WAN rather than the LAN.

It’s been suggested that this may not be possible. Could someone confirm this?

Thanks in advance.

Hello! This is of course possible!

My idea (with examples):

SchoolA=10.120 (Location: Chicago) SchoolB=10.130 (Location: Dallas)

So at Chicago you will have VLAN 333, every device is getting an IP address with 10.120.x.x. At Dallas every device in VLAN 333 is getting an IP address with 10.130.x.x. So the VLAN ID “333” is the same at every school but the DHCP scope and default gateway has it’s own address. So the device is getting the VLAN 333 at every location but another IP address. It’s very simple.

It’s not working if all schools are connected via Layer2 so VLAN333 can’t be a “standalone VLAN” at each geographical location.

Ask me any questions, I will try to help you.

  • Pingback: 802.1x, MAC-Authentication and VLAN assignment at ProCurve/aruba Switches – Network Guy
  • Pingback: Port Auth, Dynamic VLAN and Radius | samuelnotes
  • Pingback: HPE Comware problem with mac authentication and printer - Network Guy

Leave a Reply Cancel reply

Click on the button to load the content from jetpack.wordpress.com.

Load content

This site uses Akismet to reduce spam. Learn how your comment data is processed .

Certificates

ekahau Certified Survey Engineer

Post Categories

Post archives, recent posts.

  • Sophos UTM 9.712-13 HA update problem 14. November 2022
  • Sophos UTM 9.712-12 update released 24. August 2022
  • Aruba OS Switch automatic vlan assignment for aruba APs 5. May 2022
  • Sophos UTM 9.711-5 update released 22. April 2022
  • Sophos UTM 9.710-1 update released 20. March 2022

Recent Comments

  • Sophos Ssl Vpn Client Anmeldung - Login and Portal on Auto-Logon with Sophos SSL VPN Client (OpenVPN)
  • Russell on Install Sophos UTM from USB Stick
  • arno on Problems with incoming mails
  • GigaTech IT on Installing Realtek Driver on ESXi 6.7
  • Sophos User Portal Login Ssl Vpn - Online Login on Auto-Logon with Sophos SSL VPN Client (OpenVPN)

Franky’s Web  Website from my friend Frank. News and Tricks about Microsoft products, primarly Exchange Server

Copyright by networkguy.de

Imprint · Privacy Policy

Networking | Cloud | DevOps | IaC

How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients

IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server is an important element to networking in the real world. User location cannot be predicted as they may be at and out of a desk and up and about should they need to do so. Tying them to a local VLAN may only be helpful if they are bound to desks in those locations, although the most ideal outcome, it is not the most practical.

It is only wise to incorporate IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server in areas where you expect different teams to come to. Meeting rooms could for a moment have the accounting group or the development group meeting there and based on the intelligent and dynamic vlan assignmnet with 802.1x authentication, users port-access are defined their appropriate vlans for their respective access to resources on the network.

How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients.

A typical configuration for a system under IEEE 802.1x Authentication control is shown in the following figure.

In this scenario, “Lady Smith” wishes to use services offered by servers on the LAN behind the switch. There are multiple VLANs with resources available based on user vlan membership. Her laptop computer is connected to a port on the Aruba 2920 Edge Switch that has 802.1x port authentication control enabled.

The laptop computer must therefore act in a supplicant role. Message exchanges take place between the supplicant and the authenticator which is the Aruba 2920 Switch, and the authenticator passes the supplicant’s credentials which is her (Windows Active Directory User Account Credentials) to the authentication server for verification. The NPS Server which is the authentication server then informs the authenticator whether or not the authentication attempt succeeded, at which point “Lady Smith” is either granted or denied access to the LAN behind the switch.

Setup Structure for IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

  • Supplicant: Laptop running Microsoft Windows 10 or Windows 7
  • Authenticator: HP Aruba 2920 Edge Switch
  • Authentication Server: Microsoft NPS (Network Policy Server) running on Windows Server 2012 R2.
  • User Database : Active Directory

For Windows Infrastructure

Create NPS Server – Add Role on Windows Server 2012 R2

  • Create DHCP Scopes for VLANS

Create RADIUS Client on NAC using Network Policy Server

  • Create Network Policies
  • Configure a Network Policy for VLANs
  • Start Wired Auto-Config Service
  • Enable Network Authentication

Create the DHCP Scopes for VLAN100 and VLAN200 Groups

  • Development Group Scope – VLAN 100

SVI: ip address 172.16.80.254 255.255.255.0 Scope Subnet: 172.16.80.1/24

  • Accounting Group Scope – VLAN 200

SVI:ip address 172.16.70.254 255.255.255.0 Scope Subnet: 172.16.70.0/24

Secret Key: secret12

Add Edge Switch Management IP as the RADIUS Client

The Shared Secret Key: secret12 will be used in the Switch Configuration.

Create Network Policy Settings for Accounting Group for VLAN 200

Configuration Example

Here’s an example of how you might consider when configuring Microsoft NPS Server to assign users to a VLAN based on their user group, using NPS for the authentication and authorization of users. This configuration has worked flawlessly on the HP Aruba 2920 Switch. The key to getting this to work is the use of a RADIUS element called: ‘Tunnel-PVT-Group-ID’. This is a RADIUS attribute that may be passed back to the authenticator (i.e. the Aruba 2920 Switch) by the authentication server (i.e. Microsoft NPS Server) when a successful authentication has been achieved. There are a few other elements which need to accompany it, but this is the key element, as it specifies the VLAN number that the user should be assigned to.

The other elements that need to be returned by the NPS Server are as follows:

  • Tunnel-PVT-Group-ID: 200
  • Service-Type: Framed
  • Tunnel-Type: VLAN
  • Tunnel-Medium-Type: 802

For Client Infrastructure

On the Supplicant, Windows 7 or 10 configure the following steps on the Ethernet Adapter to enable IEEE 802.1X Authentication

For Network Infrastructure

Connect Server Infrastructure to VLAN 400

Create VLAN for Accounting Group

Create VLAN for Development Group

Create AAA Configuration on Switch for Radius Authentication

Download the Switch Configuration:

Test the IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

Verify Port-Access with the following user groups – VLAN 100 and VLAN 200

Think of what other clever things you can do from the information below;

Breakdown of Commands for RADIUS Authentication

Verification Commands

Thanks for reading. Please share your thoughts in the comment box below;

Published in Configuring , Design , Installing and Configuring , Networking , Security and Switching

  • 802.1 x authentication step by step aruba
  • 802.1 x authentication step by step cisco
  • 802.1 x wireless authentication step by step
  • 802.1x authentication process
  • 802.1x authentication windows 10
  • 802.1x authentication windows server 2012
  • 802.1x certificate authentication
  • assignment wlc
  • cisco dot1x
  • cisco ise dynamic vlan
  • cisco ise dynamic vlan assignment wlc
  • cisco wireless radius attributes
  • configuration example
  • dynamic vlan assignment cisco 2960 dynamic vlan configuration in packet tracer
  • dynamic vlan assignment with windows radius server
  • dynamic vlan cisco
  • dynamic vlan ruckus
  • meraki dynamic vlan assignment
  • nps mac authentication wired
  • nps policy for mac-based authentication
  • radius multiple vlans
  • vlan radius server
  • vlan steering
  • vmps server

Meraki Community

  • Community Platform Help
  • Contact Community Team
  • Meraki Documentation
  • Meraki DevNet Developer Hub
  • Meraki System Status
  • Technical Forums

802.1X /w Dynamic VLAN Assignment

  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Printer Friendly Page

whistleblower

  • Mark as New
  • Report Inappropriate Content
  • All forum topics
  • Previous Topic

PhilipDAth

  • August 5: [CONTEST CLOSED] Women's Equality Day
  • August 1: Recognizing the July 2024 Members of the Month
  • July 29: Announcing the winners of our Summer Points Contest
  • Interfaces 235
  • Layer 2 257
  • Layer 3 188
  • Community guidelines
  • Cisco privacy
  • Khoros privacy
  • Terms of service

You are using an outdated browser. Please upgrade your browser to improve your experience.

Your browser does not support JavaScript. Please turn it on for the best experience.

Configuration Guide on Dynamic VLAN with the VLAN Assignment function of RADIUS

FAQ view icon

OC200 , OC300 , Omada Software Controller , Omada Cloud-Based Controller

Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device and check either the Datasheet or the firmware section for the latest improvements added to your product.

With the VLAN Assignment feature of RADIUS, the Omada SDN solution can put clients authenticated by different accounts to the corresponding VLANs. In this way, clients will obtain IP addresses from different VLANs, and you don't have to create many SSIDs bound with different VLANs for wireless networks, or bind the PVIDs of the switch ports to specific VLANs for wired networks.

To achieve the above features, you will need the Omada SDN Controller, EAP for wireless assignment, JetStream Switch for wired assignment, and an external RADIUS server. In this article, we will share the configuration guide for below network topology.

802 1x vlan assignment

Step 1. Set up the RADIUS server.

Here we run a FreeRADIUS ® server on a Linux server. For more information on installation and configuration, please refer to the official website: https://freeradius.org/

First, edit the “ clients.conf ” file, set the client IP address as “192.168.0.0/24” and the password as “tplink”.

802 1x vlan assignment

Next, edit the “ users ” file, create two accounts “test10” and “test20” in VLAN10 and VLAN20, respectively.

802 1x vlan assignment

You may also edit the “ eap.conf ” to modify the EAP type for WPA-Enterprise. After configuration, run the RADIUS server to listen for access requests.

Step 2. Create the RADIUS profile.

Go to Authentication --- RADIUS Profile, create a new profile bound with the RADIUS server, and check “Enable VLAN Assignment for Wireless Network” to assign VLANs for wireless clients.

802 1x vlan assignment

Step 3. Create more VLAN for VLAN assignments.

Assuming all Omada devices have been adopted by the controller, go to Settings --- Wired Networks --- LAN, and create two interfaces with VLAN10 and VLAN20.

802 1x vlan assignment

Step 4. VLAN assignment for wireless networks.

Go to Settings – Wireless Networks, and create a new SSID with WPA-Enterprise as below. For differences between WPA-Personal and WPA-Enterprise, please refer to FAQ500 .

802 1x vlan assignment

When connecting your client to the SSID, you will be asked to choose the authentication type of WPA-Enterprise, and enter the account username and password. After successfully authenticating with account “test10”, the client will obtain an IP address from VLAN10, while with account “test20”, it will get that from VLAN20.

Step 5. VLAN assignment for wired networks.

Go to Authentication --- 802.1X and enable the feature, select Authentication Type as “Port Based”, enable “VLAN Assignment” and check the Ports to be authenticated according to your requirements.

Not to click the ports twice to enable MAB for them.

802 1x vlan assignment

Then go to Wired Networks --- LAN --- Profile, create a new port profile, add VLAN10 and VLAN20 to untagged networks, and make sure the 802.1X Control mode is Auto.

802 1x vlan assignment

Then Go to Devices, click your switch, go to Ports, check the authentication ports, and batch edit to change the port profile to the one created just now.

802 1x vlan assignment

For 802.1X authentication, you may need to run TP-Link 802.1X Client Software (click here to download) for authentication. Please refer to FAQ787 and Step 3. For detailed guidance.

Is this faq useful?

Your feedback helps improve this site.

What’s your concern with this article?

  • Dissatisfied with product
  • Too Complicated
  • Confusing Title
  • Does not apply to me

We'd love to get your feedback, please let us know how we can improve this content.

We appreciate your feedback. Click here to contact TP-Link technical support.

Recommend Products

Omada Cloud-Based Controller

Omada Cloud-Based Controller

Omada Software Controller

Omada Software Controller

OC300

Omada Hardware Controller

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >

From Russia?

Get products, events and services for your region.

We have updated our Policies. Read Privacy Policy and Terms of Use here. This website uses cookies to improve website navigation, analyze online activities and have the best possible user experience on our website. You can object to the use of cookies at any time. You can find more information in our privacy policy .

Basic Cookies

These cookies are necessary for the website to function and cannot be deactivated in your systems.

accepted_local_switcher, tp_privacy_base, tp_privacy_marketing, tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple, tp_top-banner, tp_popup-bottom, tp_popup-center, tp_popup-right-middle, tp_popup-right-bottom, tp_productCategoryType

__livechat, __lc2_cid, __lc2_cst, __lc_cid, __lc_cst, CASID

id, VISITOR_INFO1_LIVE, LOGIN_INFO, SIDCC, SAPISID, APISID, SSID, SID, YSC, __Secure-1PSID, __Secure-1PAPISID, __Secure-1PSIDCC, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC, 1P_JAR, AEC, NID, OTZ

Analysis and Marketing Cookies

Analysis cookies enable us to analyze your activities on our website in order to improve and adapt the functionality of our website.

The marketing cookies can be set through our website by our advertising partners in order to create a profile of your interests and to show you relevant advertisements on other websites.

Google Analytics & Google Tag Manager

_gid, _ga_<container-id>, _ga, _gat_gtag_<container-id>

Google Ads & DoubleClick

test_cookie, _gcl_au

cebsp_, _ce.s, _ce.clock_data, _ce.clock_event, cebs

OptanonConsent, _sctr, _cs_s, _hjFirstSeen, _hjAbsoluteSessionInProgress, _hjSessionUser_14, _fbp, ajs_anonymous_id, _hjSessionUser_<hotjar-id>, _uetsid, _schn, _uetvid, NEXT_LOCALE, _hjSession_14, _hjid, _cs_c, _scid, _hjAbsoluteSessionInProgress, _cs_id, _gcl_au, _ga, _gid, _hjIncludedInPageviewSample, _hjSession_<hotjar-id>, _hjIncludedInSessionSample_<hotjar-id>

lidc, AnalyticsSyncHistory, UserMatchHistory, bcookie, li_sugr, ln_or

  • Skip to content
  • Skip to search
  • Skip to footer

Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 Wireless LAN Controller

802 1x vlan assignment

Available Languages

Download options.

  • PDF (2.6 MB) View with Adobe Reader on a variety of devices
  • ePub (2.7 MB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
  • Mobi (Kindle) (2.4 MB) View on Kindle device or Kindle app on multiple devices

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Introduction

This document describes how to configure the Catalyst 9800 WLC and Cisco ISE to assign Wireless LAN (WLAN).

Requirements

Cisco recommends that you have knowledge of these topics:

  • Have basic knowledge of the Wireless LAN Controller (WLC and Lightweight Access Points (LAPs).
  • Have functional knowledge of the AAA server such as Identity Services Engine (ISE).
  • Have a thorough knowledge of wireless networks and wireless security issues.
  • Have functional knowledge on dynamic Virtual LAN (VLAN) assignment.
  • Have basic knowledge of Control and Provisioning for Wireless Access Point (CAPWAP).

Components Used

The information in this document is based on these software and hardware versions:

  • Cisco Catalyst 9800 WLC (Catalyst 9800-CL) that runs firmware release 16.12.4a.
  • Cisco 2800 Series LAP in local mode.
  • Native Windows 10 supplicant.
  • Cisco ISE that runs version 2.7.
  • Cisco 3850 series switch that runs firmware release 16.9.6.

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.

Background Information

Dynamic vlan assignment with radius server.

This document describes the concept of dynamic VLAN assignment and how to configure the Catalyst 9800 wireless LAN controller (WLC) and Cisco Identity Service Engine (ISE) to assign wireless LAN (WLAN) in order to accomplish this for the wireless clients.

In most Wireless Local Area Network (WLAN) systems, each WLAN has a static policy that applies to all clients associated with a Service Set Identifier (SSID). Although powerful, this method has limitations because it requires clients to associate with different SSIDs to inherit different QoS and security policies.

However, the Cisco WLAN solution supports identity networking. This allows the network to advertise a single SSID and allows specific users to inherit different QoS or security policies based on the user credential.

Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user. The task to assign users to a specific VLAN is handled by a RADIUS authentication server, such as Cisco ISE. This can be used, for example, to allow the wireless host to remain on the same VLAN as it moves within a campus network.

Therefore, when a client attempts to associate to a LAP registered with a controller, the WLC passes the credentials of the user to the RADIUS server for validation. Once the authentication is successful, the RADIUS server passes certain Internet Engineering Task Force (IETF) attributes to the user. These RADIUS attributes decide the VLAN ID that must be assigned to the wireless client. The SSID of the client does not matter because the user is always assigned to this predetermined VLAN ID.

The RADIUS user attributes used for the VLAN ID assignment are:

  • IETF 64 (Tunnel Type)—Set this to VLAN.
  • IETF 65 (Tunnel Medium Type)—Set this to 802.
  • IETF 81 (Tunnel Private Group ID)—Set this to VLAN ID.

The VLAN ID is 12-bits and takes a value between 1 and 4094, inclusive. Because the Tunnel-Private-Group-ID is of type string, as defined in RFC2868 for use with IEEE 802.1X, the VLAN ID integer value is encoded as a string. When these tunnel attributes are sent, it is necessary to enter them in the Tag field.

In this section, you are presented with the information to configure the features described in this document.

Network Diagram

This document uses this network setup:

Network Diagram

These are the configuration details of the components used in this diagram:

  • The IP address of Cisco ISE (RADIUS) server is 10.10.1.24.
  • The Management Interface address of the WLC is 10.10.1.17.
  • The internal DHCP server on the controller is used to assign the IP address to wireless clients.
  • This document uses 802.1x with PEAP as the security mechanism.
  • VLAN102 is used throughout this configuration. The username smith -102 is configured to be placed into the VLAN102 by the RADIUS server.

Configuration Steps

This configuration is separated into three categories:

  • Cisco ISE Configuration.
  • Configure the Switch for Multiple VLANs.
  • Catalyst 9800 WLC Configuration.

Cisco ISE Configuration

This configuration requires these steps:

  • Configure the Catalyst WLC as an AAA Client on the Cisco ISE Server.
  • Configure Internal users on Cisco ISE.
  • Configure the RADIUS (IETF) attributes used for dynamic VLAN Assignment on Cisco ISE.

Step 1. Configure the Catalyst WLC as an AAA Client on the Cisco ISE server

This procedure explains how to add the WLC as a AAA client on the ISE server so that the WLC can pass the user credentials to ISE.

Complete these steps:

  • From the ISE GUI, navigate to Administration > Network Resources > Network Devices and select Add .
  • Complete the configuration with the WLC management IP address and RADIUS shared secret between WLC and ISE as shown in the image:

Configuration with the WLC management IP address and Radius shared secret between WLC and ISE

Step 2. Configure internal users on Cisco ISE

This procedure explains how to add the users on the internal user database of Cisco ISE.

  • From the ISE GUI, navigate to Administration > Identity Management > Identities and select Add .
  • Complete the configuration with the username, password, and user group as shown in the image:

Configuration with the username, password, and user group

Step 3. Configure the RADIUS (IETF) attributes used for dynamic VLAN Assignment

This procedure explains how to create an authorization profile and an authentication policy for wireless users.

  • From the ISE GUI, navigate to Policy > Policy Elements > Results > Authorization > Authorization profiles and select Add to create a new profile.
  • Complete the authorization profile configuration with VLAN information for the respective group. This image shows jonathga-VLAN-102 group configuration settings.

Authorization profile configuration with VLAN information

After the authorization profiles are configured, an authentication policy for wireless users needs to be created. You can use a new Custom policy or modify the Default Policy set. In this example, a custom profile is created.

  • Navigate to Policy > Policy Sets and select Add to create a new policy as shown in the image:

Navigate to Policy Sets and select Add

Now you need to create authorization policies for users in order to assign a respective authorization profile based on group membership.

  • Open the Authorization policy section and create policies to accomplish that requirement as shown in the image:

Assign a respective authorization profile based on group membership

Configure the Switch for Multiple VLANs

To allow multiple VLANs through the switch, you need to issue these commands to configure the switch port connected to the controller:

Note : By default, most of the switches allow all VLANs created on that switch via the trunk port. If a wired network is connected to the switch, then this same configuration can be applied to the switch port that connects to the wired network. This enables the communication between the same VLANs in the wired and wireless network.

Catalyst 9800 WLC Configuration

  • Configure the WLC with the Details of the Authentication Server.
  • Configure the VLANs.
  • Configure the WLANs (SSID).
  • Configure the Policy Profile.
  • Configure the Policy tag.
  • Assign the Policy tag to an AP.

Step 1. Configure the WLC with the Details of the Authentication Server

It is necessary to configure the WLC so it can communicate with the RADIUS server to authenticate the clients.

  • From the controller GUI, navigate to Configuration > Security > AAA > Servers / Groups > RADIUS > Servers > + Add and enter the RADIUS server information as shown in the image:

Navigate to Servers and select +Add

  • In order to add the RADIUS server to a RADIUS group, navigate to Configuration > Security > AAA > Servers / Groups > RADIUS > Server Groups > + Add as shown in the image:

Add the RADIUS server to a RADIUS group

  • In order to create an Authentication Method List, navigate to Configuration > Security > AAA > AAA Method List > Authentication > + Add as shown in the images:

Navigate to authentication and select +Add

Step 2. Configure the VLANs

This procedure explains how to configure VLANs on the Catalyst 9800 WLC. As explained earlier in this document, the VLAN ID specified under the Tunnel-Private-Group ID attribute of the RADIUS server must also exist in the WLC.

In the example, the user smith-102 is specified with the Tunnel-Private-Group ID of 102 (VLAN =102) on the RADIUS server.

  • Navigate to Configuration > Layer2 > VLAN > VLAN > + Add as shown in the image:

Navigate to VLAN and select +Add

  • Enter the needed information as shown in the image:

Enter information to create a VLAN

Note : If you do not specify a name, the VLAN automatically gets assigned the name of VLANXXXX, where XXXX is the VLAN ID.

Repeat steps 1 and 2 for all the needed VLANs, once done you can continue to step 3.

  • If you have a port channel in use, navigate to Configuration > Interface > Logical > PortChannel name > General . If you see it configured as Allowed VLAN = All you are done with the configuration. If you see Allowed VLAN = VLANs IDs , add the needed VLANs and after that select Update & Apply to Device .
  • If you do not have port channel in use, navigate to Configuration > Interface > Ethernet > Interface Name > General . If you see it configured as Allowed VLAN = All you are done with the configuration. If you see Allowed VLAN = VLANs IDs , add the needed VLANs and after that select Update & Apply to Device .

This images show the configuration related to the interface setup if you use All or specific VLAN IDs. 

The configuration related to the interface setup if you use ALL VLAN IDs

Step 3. Configure the WLANs (SSID)

This procedure explains how to configure the WLANs in the WLC.

  • In order to create the WLAN. Navigate to Configuration > Wireless > WLANs > + Add and configure the network as needed, as shown in the image:

Navigate to WLANs and select +Add

  • Enter the WLAN information as shown in the image:

Configure the network as needed

  • Navigate to Security tab and select the needed security method. In this case WPA2 + 802.1x as shown in the images:

Select the needed security method

From Security > AAA tab, select the authentication method created on step 3 from Configure the WLC with the Details of the Authentication Server section as shown in the image:

Select the authentication method created previously

Step 4. Configure the Policy Profile

This procedure explains how to configure the Policy Profile in the WLC.

  • Navigate to Configuration > Tags & Profiles > Policy Profile and either configure your default-policy-profile or create a new one as shown in the images:

Navigate to Policy Profile and select +Add

  • From the Access Policies tab assign the VLAN to which the wireless clients are assigned when they connect to this WLAN by default as shown in the image:

Assign the VLAN to the wireless client

Note : In the example provided, it is the job of the RADIUS server to assign a wireless client to a specific VLAN upon successful authentication, therefore the VLAN configured on the policy profile can be a black hole VLAN, the RADIUS server overrides this mapping and assigns the user that comes through that WLAN to the VLAN specified under the user Tunnel-Group-Private-ID field in the RADIUS server.

  • From the Advance tab, enable the Allow AAA Override check box to override the WLC configuration when the RADIUS server returns the attributes needed to place the client on the proper VLAN as shown in the image:

Enable the Allow AAA Override checkbox

Step 5. Configure the Policy Tag

This procedure explains how to configure the Policy tag in the WLC.

  • Navigate to Configuration > Tags & Profiles > Tags > Policy and add a new one if needed as shown in the image:

Navigate to Policy and select +add

  • Add a name to the Policy Tag and select +Add , as shown in the image:

Add a name to the Policy Tag

  • Link your WLAN Profile to the desired Policy Profile as shown in the images:

Link your WLAN Profile to the desire Policy Profile

Step 6. Assign the Policy Tag to an AP

  • Navigate to Configuration > Wireless > Access Points > AP Name > General Tags and assign the relevant policy tag and then select Update & Apply to Device as shown in the image:

Assign the relevant policy tag and select Update & Apply to Device

Caution : Be aware that changing the policy tag on an AP results in the AP disconnecting from the WLC and then reconnecting.

Flexconnect

The Flexconnect feature allows APs to send wireless client data to egress through the AP LAN port when configured as a trunk. This mode, known as Flexconnect Local Switching, allows the AP to segregate client traffic by tagging it in separate VLANs from its management interface.  This section provides instructions on how to configure Dynamic VLAN assignment for the local switching scenario.

Note : The steps outlined in the previous section are applicable to the Flexconnect scenario as well. To complete the configuration for Flexconnect, please do the additional steps provided in this section.

To allow multiple VLANs through the switch, you need to issue the next commands to configure the switch port connected to the AP:

  • Switch(config-if)# switchport mode trunk
  • Switch(config-if)# switchport trunk encapsulation dot1q

Note : By default, most of the switches allow all VLANs created on the switch via the trunk port.

Flexconnect Policy Profile configuration

  • Navigate to  Configuration > Tags & Profiles > Policy Profile > +Add  and create a new policy.

jonathga_0-1706631933656

Note : Starting with the 17.9.x code, the policy-profile appearance has been updated as depicted in the picture.

Screenshot 2024-02-16 at 2.42.25 PM

Note : The VLAN configured on this step is not required to be present on the VLAN list of the WLC. Necessary VLANs are added on the Flex-Profile later, which creates the VLANs on the AP itself.

jonathga_2-1706632026213

Assign the Flexconnect policy profile to a WLAN and Policy tag

Note : A Policy Tag is used to link the WLAN with the Policy Profile. You can either create a new Policy Tag or use the default-policy tag.

jonathga_3-1706632177957

  • Click on the Apply to Device button.

jonathga_6-1706632270590

Configure the Flex Profile

To dynamically assign a VLAN ID via RADIUS on a FlexConnect AP, it is necessary for the VLAN ID mentioned in the Tunnel-Private-Group ID attribute of the RADIUS response to be present on the access points. The VLANs are configured on the Flex profile. 

Screenshot 2024-01-30 at 11.45.19 AM

Note : The native VLAN ID refers management VLAN for the AP, so it must match the native VLAN configuration of the switch the AP is connected to

Screenshot 2024-01-30 at 11.49.19 AM

Note : In step 3 of the section Flexconnect Policy Profile Configuration, you configured the default VLAN assigned to the SSID. If you use a VLAN name on that step, ensure that you use the same VLAN name on the Flex Profile configuration, otherwise, clients are not able to connect to the WLAN.

Flex Site tag configuration

  • Navigate to  Configuration > Tags & Profiles > Tags > Site > +Add,  to create a new site tag .

Picture1

Assign the Policy and Site Tag to an AP.

  • Navigate to  Configuration > Wireless > Access Points > AP Name > General Tags,  assign the relevant policy and site tag and then click  Update & Apply to Device.

Picture2

Caution : Be aware that changing the policy and site tag on an AP results in the AP disconnecting from the WLC and then reconnecting.

Note : If the AP is configured in Local mode (or any other mode) and then it gets a Site Tag with the "Enable Local Site" setting disabled, the AP reboots and comes back in FlexConnect mode

Use this section to confirm that your configuration works properly.

Configure the test client SSID profile using the proper EAP protocol and credentials defined in ISE that can return a Dynamic VLAN assignment. Once you are prompted for a username and password, enter the information of the user mapped to a VLAN on ISE.

In the previous example, notice that smith-102 is assigned to the VLAN102 as specified in the RADIUS server. This example uses this username to receive authentication and to be assigned to a VLAN by the RADIUS server:

Once the authentication is completed, you need to verify that your client is assigned to the proper VLAN as per the RADIUS attributes sent. Complete these steps to accomplish this task:

Verify that your client is assigned to the proper VLAN

From this window, you can observe that this client is assigned to VLAN102 as per the RADIUS attributes configured on the RADIUS server.

From the CLI you can use the show wireless client summary detail to view the same information as shown in the image:

Verify that your client is assigned to the proper VLAN from the CLI

  • From the controller GUI, navigate to Troubleshooting > Radioactive Trace > +Add .
  • Enter the Mac Address of the wireless client.
  • Select Start .
  • Connect the client with the WLAN.
  • Navigate to Stop > Generate > Choose 10 minutes > Apply to Device > Select the trace file to download the log .

This portion of the trace output ensures a successful transmission of RADIUS attributes:

Troubleshoot

There is currently no specific troubleshooting information available for this configuration.

Related Information

  • End User Guide
  • Cisco Technical Support & Downloads

Revision History

Revision Publish Date Comments

TAC Authored

Contributed by Cisco Engineers

  • Jonathan de Jesus Garcia Cisco TAC Engineer
  • Jose Pablo Munoz Cisco TAC Engineer

Was this Document Helpful?

Feedback

Contact Cisco

login required

  • (Requires a Cisco Service Contract )

This Document Applies to These Products

  • Wireless LAN Controller Software

802 1x vlan assignment

IMAGES

  1. configuration_guide_for_802_1x_vlan_assignment_and_mab

    802 1x vlan assignment

  2. MAC+802.1x EAP authentication and Dynamic VLAN assignment with PC

    802 1x vlan assignment

  3. Configure 802.1X Critical VLAN

    802 1x vlan assignment

  4. LAB

    802 1x vlan assignment

  5. Using IEEE 8021x for VLAN Assignment

    802 1x vlan assignment

  6. configuration_guide_for_802_1x_vlan_assignment_and_mab

    802 1x vlan assignment

COMMENTS

  1. IEEE 802.1X VLAN Assignment

    The IEEE 802.1X VLAN Assignment feature is automatically enabled when IEEE 802.1X authentication is configured for an access port, which allows the RADIUS server to send a VLAN assignment to the device port. This assignment configures the device port so that network access can be limited for certain users.

  2. IEEE 802.1X VLAN Assignment [Support]

    The IEEE 802.1X VLAN Assignment feature is available only on Cisco 800, 870, 1800, 2800, and 3800 series integrated switching routers (ISRs) that support switch ports. The fixed-configuration Cisco 1800 series router platforms and the Cisco 870 series routers have integrated 4-port and 8-port switches: The following cards or modules support ...

  3. How to use 802.1x/mac-auth and dynamic VLAN assignment

    The 802.1x protocol is used for network access control. For devices like printers, cameras, etc. we will use mac-authentication as a fallback. We will also use dynamic VLAN assignment for the connected ports. Our radius server will be Microsoft NPS. You can activate this role on the Windows server:

  4. IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius

    How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients. A typical configuration for a system under IEEE 802.1x Authentication control is shown in the following figure. In this scenario, "Lady Smith" wishes to use services offered by servers on the LAN behind the switch.

  5. PDF How To

    use 802.1x VLAN assignment 3 A typical example Consider the 802.1x VLAN assignment solution below. It provides a solution for a school, which has three groups of users: • students • trusted students • staff The requirements are: • a member of one of the three groups can connect to any port on any edge switch, and immediately

  6. MS Switch Access Policies (802.1X)

    It may be necessary to perform dynamic VLAN assignment on a per computer or per user basis. This can be done on your wired network via 802.1X authentication (RADIUS). MS390s and C9300-Ms support multi-vlan assignment, ... (VLANs) 802.1X Control Direction (Wake-on-LAN support)

  7. configuration_guide_for_802_1x_vlan_assignment_and_mab

    In the Global Config section, enable 802.1X and VLAN Assignment globally and click Apply. 5) Choose the menu Network Security > 802.1X > Port Config to load the following page. Select the port 1/0/3-13 which you want to deploy 802.1X VLAN Assignment and set the status for port1/0/3-13 as Enable.

  8. PDF IEEE 802.1X VLAN Assignment

    The IEEE 802.1X VLAN Assignment feature is automatically enabled when IEEE 802.1X authentication is configured for an access port, which allows the RADIUS server to send a VLAN assignment to the device port. This assignment configures the device port so that network access can be limited for certain users.

  9. VLAN assignment via RADIUS using 802.1X authentication on SonicWall

    Scroll down to the 802.1x Settings. Select the mode as 'Auto' and Enable the toggle switch for 'RADIUS VLAN assign'. Leave other options on default. Click OK. Portshield port 5 to interface X0 but do not assign any VLANs to this port. The following additional changes will be required on the NPS policy for VLAN assignment.

  10. 802.1X /w Dynamic VLAN Assignment

    For straight 802.1x assignment of a VLAN when a user first connects to the network, CoA isn't required. Enabling CoA configures the switch to listen for CoA messages from the RADIUS server. This allows some more advanced servers, e.g. Cisco ISE (there are other vendors too), to tell the switch to perform the authorisation of the switch port ...

  11. PDF Understanding and Configuring 802.1X Port-Based Authentication

    Using 802.1X with VLAN Assignment You can use the VLAN assignment to limit network a ccess for certain users. With the VLAN assignment, 802.1X-authenticated ports are assigned to a VLAN based on the username of the client connected to that port. The RADIUS server database maintains the username-to-VLAN mappings. After successful

  12. PDF IEEE 802.1X VLAN Assignment

    IEEE 802.1X VLAN Assignment Author: Unknown Created Date: 20240711143157Z ...

  13. PDF IEEE 802.1X VLAN Assignment

    The IEEE 802.1X VLAN Assignment feature is automatically enabled when IEEE 802.1X authentication is configured for an access port, which allows the RADIUS server to send a VLAN assignment to the device port. This assignment configures the device port so that network access can be limited for certain users. Finding Feature Information, page 1.

  14. Configuration Guide on Dynamic VLAN with the VLAN Assignment function

    After configuration, run the RADIUS server to listen for access requests. Step 2. Create the RADIUS profile. Go to Authentication --- RADIUS Profile, create a new profile bound with the RADIUS server, and check "Enable VLAN Assignment for Wireless Network" to assign VLANs for wireless clients. Step 3.

  15. Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 ...

    Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user. The task to assign users to a specific VLAN is handled by a RADIUS authentication server, such as Cisco ISE. ... as defined in RFC2868 for use with IEEE 802.1X, the VLAN ID integer value is encoded as a ...