ExtremeWireless (Identifi)

Expand all | Collapse all

One SSID, One VLan, One IP Pool, Restrict Access by Role

  • 1.  One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 01:23
    We have a requirement here.
    Situation as below.

    One SSID, One Vlan, One IP Pool.
    Differentiate by Roles such as Role A can access between Role A, internet and internal.
    Role B can only access to Internet and between Role B, means no internal.

    Is there a way to do this?

    Thanks.


  • 2.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 01:33
    Hmm. Is there a reason you have to have one vlan and ip pool? If you were able to break from that you could use NPS like this. https://community.extremenetworks.com/extreme/topics/one-ssid-redirect-to-two-different-vlans Outside of that... I'd say you'd have to implement 802.1x and maybe use NAP. https://technet.microsoft.com/en-us/network/bb545879.aspx Anything more specific let me know. Good luck!!


  • 3.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 01:33
    It's a coworking place and management wants it to be clean and easy.
    Therefore, they wish to have only one ssid and single ip pool.
    Wanted to do it using Extreme solutions like IdentiFI, NAC, Purview


  • 4.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 01:33
    Understandable, although it'd be an easier solution to manage without this. NAC is a solution. Well, IAC anyway. http://learn.extremenetworks.com/rs/641-VMV-602/images/Identity-and-Access-Control-DS.pdf This should be what you're looking for.


  • 5.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 01:33
    Sorry of misunderstood, so NAC is called IAC now.
    How do I use this to achieve the objective.


  • 6.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 03:51
    The Keyword to this is "OnePolicy" . Based on the role the Client get's his own policy and can access exactly the targets you want. The only things you need are a wireless controller, several APs and a radius server. When you use Extreme Control (formerly NetSight and NAC), you can do this very easily.

    /André


  • 7.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 03:51
    Is there any configuration example I could study on?
    Helps me to understand faster as I haven't configured any policy yet.

    Also, it could configured in OneView Policy sector right?


  • 8.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 03:57
    Hello, Jaden!

    I think simples way is to use authenticate roles based on MAC addresses of clients.
    Like Role A - accept all for MAC addresses A, B, C.
    Role B - (for example) deny dns, deny Internet gateway for MAC addresses D, E, F.

    Thank you!


  • 9.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 03:57
    It's impossible to authenticate with MAC addresses as there will be Role B,C,D and so on.
    Tenant may come and go, this will be bulky of work.


  • 10.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 03:57
    So, in this case you have to use RADIUS/TACACS+, NAC and so on.
    (to have some condition on which map some role)

    Thank you!


  • 11.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 04:26
    It is easy to accomplish that with EXtreme Control solution = NAC. In the management you will define criteria like MAC address or Username or hostname and based on that you assign the right profile. In the profile you define ACLs what such device/user can do... Single SSID design is good. Good luck.


  • 12.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 04:26
    Any documentation can I refer to?
    I would like to use with the Radius server too.


  • 13.  RE: One SSID, One VLan, One IP Pool, Restrict Access by Role

    Posted 05-06-2016 04:26
    If you have Radius-LDAP you can define de field Filter-ID attribute at the radius response, and create a rol with the same name at the Role tab.
    In the VirtualNetwork tab you configure the default role, but if the radius response can find a role with the same name that the Filter-ID attribute then role asigned change.
    I am not sure at all, but you can create a testing wlan