Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

How to integrate RADIUS and MAC Authentication with Cisco Meraki

Introduction

This guide demonstrates the authentication process of devices based on their respective physical MAC addresses using Media Access Control (MAC). Once the source MAC address is identified, the switch generates an access-request message, with the user/machine’s MAC address as the identity, and sends it to the RADIUS server. The RADIUS server performs MAC authentication after getting the access-request message.

The RADIUS authentication server determines whether to grant access to the user/device and specifies the level of access the client should receive. After making this decision, the RADIUS server transmits the access-accept, allowing the user/machine to access the network.

If you are interested in setting up EAP-TLS Authentication, you can find the relevant instructions and resources at the following link: How to Set Up EAP-TLS WPA2-Enterprise With Meraki

Create a MAC Authentication Identity Provider in SecureW2

Follow the below steps to create an Identity Provider in JoinNow Management Portal and configure it for MAC Authentication:

  1. Log in to JoinNow MultiOS Management Portal.
  2. Navigate to Identity Management > Identity Providers.
  3. Click Add Identity Provider.
  4. In the Name field, enter a name for your IdP.
  5. In the Description field, enter a suitable description for your IdP.
  6. From the Type drop-down list, select MAC Authentication.
  7. Click Save.
  8. The page refreshes and displays the Configuration and Groups tabs.
  9. Select the Groups tab.
  10. Click Add group.
  11. On the displayed pop-up window, in the Name field, enter a name for your group.
  12. In the Description field, enter a suitable description for your group.
  13. Click Save.
  14. Select the Configuration tab.
  15. Click Add Device.
  16. On the displayed pop-up window, in the MAC Address field, enter the MAC address of the device that you want to authenticate.
  17. From the Group Name drop-down list, select the group name you created earlier.
  18. In the Description field, enter a suitable description for your device.
  19. Click Save.
  20. To add the details of multiple devices at the same time (bulk upload), click Upload Device(s).
  21. On the Upload Device(s) pop-up window, from the Group Name drop-down list, select the group you created earlier.
  22. In the File field, click Choose file to select the .csv file containing the MAC address of the devices.


    NOTE: The MAC Address should be either in AA:BB:CC:DD:EE:FF or AA-BB-CC-DD-EE-FF format.
  23. Click Upload.
  24. Click Update.

Set up Role policy and Network policy

JoinNow Management Portal offers policy-based management to facilitate VLAN-based segmentation. The policies to be configured are:

  • Role Policy
  • Network Policy

Create a Role Policy

A Roles policy grants a user access to defined resources. To add a Role policy, perform the following steps:

  1. Log in to the JoinNow MultiOS Management Portal.
  2. Navigate to Policy Management > Roles Policies.
  3. Click Add Role.
  4. In the Name field, enter a name for your role policy.
  5. In the Display Description field, enter a suitable description for your role policy.
  6. Click Save.
  7. The page refreshes and the Conditions tab is displayed.
  8. Select the Conditions tab.
  9. In the Conditions section, from the Identity Provider drop-down list, select the IdP you created with the MAC Authentication type.
  10. In the Attribute/Groups section, in the Attribute field, retain ANY.
  11. In the Groups field, select the group you created earlier (see the Create a MAC Authentication Identity Provider in SecureW2 section).
  12. Click Update.

Create a Network Policy

The purpose of a network policy is to specify how Cloud RADIUS will authorize access to a particular user role. To create and configure the Network policy, perform the following steps:

  1. Navigate to Policy Management > Network Policies.
  2. Click Add Network Policy.
  3. In the Name field, enter a name for your network policy.
  4. In the Display Description field, enter a suitable description for your network policy.
  5. Click Save.
  6. The page refreshes and displays the Conditions and Settings tabs.
  7. Select the Conditions tab.
  8. In the Conditions section, select Match All or Match Any based on your requirement to set authentication criteria. In the case explained here, we are selecting Match All.
  9. Click Add rule.
  10. Expand Identity and select the Role option.
  11. Click Save.
  12. The Role option appears under the Conditions tab.
  13. From the Role Equals drop-down list, select the role policy you created earlier (see the Create a Role Policy section).
  14. Select the Settings tab.
  15. Click Add Attribute.
  16. From the Dictionary drop-down list, select an option: Radius:IETF or Custom.
  17. From the Attribute drop-down list, select Filter-Id.

    NOTE: Filter-Id is created on your access point to form a VLAN range.
  18. In the Value field, enter the VLAN filter-ID you wish to connect to.
  19. Click Save.

Configure CISCO Meraki for VLAN

This section describes the steps to create a VLAN in CISCO Meraki and configure Meraki with SecureW2.

Configure the RADIUS server with CISCO Meraki

  1. Log in to the JoinNow Management Portal.
  2. Navigate to RADIUS > RADIUS Configuration.
  3. Copy the Primary IP address on your console.

Configure MAC-based RADIUS Authentication in Meraki

Follow the below steps to set-up MAC based Authentication using Meraki:

  1. Log in to the CISCO Meraki Portal.
  2. Navigate to Wireless > Access Control.
  3. Under Access control, from the SSID drop-down list, select your SSID.
  4. Under Network access, for Association requirements, select MAC-based access control (no encryption).
  5. Under Splash page, select None (direct access).
  6. In the RADIUS servers section, click Add a server.
  7. From the JoinNow MultiOS Management Portal (navigate to RADIUS > RADIUS Configuration), copy the values from Host IP, Port, and Secret and paste them in the Host, Port, and Secret fields in the Meraki.
  8. From the VLAN tagging drop-down list, select Use VLAN tagging.
  9. In the VLAN ID section, add your VLAN ID with AP tags.
  10. Scroll down to the bottom of the page and click Save Changes.