One SSID, One VLan, One IP Pool, Restrict Access by Role

  • 0
  • 2
  • Question
  • Updated 2 years ago
  • Answered
We have a requirement here.
Situation as below.

One SSID, One Vlan, One IP Pool.
Differentiate by Roles such as Role A can access between Role A, internet and internal.
Role B can only access to Internet and between Role B, means no internal.

Is there a way to do this?

Thanks.
Photo of jaden

jaden

  • 130 Points 100 badge 2x thumb

Posted 2 years ago

  • 0
  • 2
Photo of Christopher Davis

Christopher Davis

  • 366 Points 250 badge 2x thumb
Hmm. Is there a reason you have to have one vlan and ip pool?

If you were able to break from that you could use NPS like this.
https://community.extremenetworks.com...

Outside of that... I'd say you'd have to implement 802.1x and maybe use NAP.

https://technet.microsoft.com/en-us/n...

Anything more specific let me know. Good luck!!
Photo of jaden

jaden

  • 130 Points 100 badge 2x thumb
It's a coworking place and management wants it to be clean and easy.
Therefore, they wish to have only one ssid and single ip pool.
Wanted to do it using Extreme solutions like IdentiFI, NAC, Purview
Photo of Christopher Davis

Christopher Davis

  • 366 Points 250 badge 2x thumb
Understandable, although it'd be an easier solution to manage without this.

NAC is a solution. Well, IAC anyway.

http://learn.extremenetworks.com/rs/6...

This should be what you're looking for.
Photo of jaden

jaden

  • 130 Points 100 badge 2x thumb
Sorry of misunderstood, so NAC is called IAC now.
How do I use this to achieve the objective.
(Edited)
Photo of André Herkenrath

André Herkenrath, Employee

  • 1,962 Points 1k badge 2x thumb
The Keyword to this is "OnePolicy" . Based on the role the Client get's his own policy and can access exactly the targets you want. The only things you need are a wireless controller, several APs and a radius server. When you use Extreme Control (formerly NetSight and NAC), you can do this very easily.

/André
Photo of jaden

jaden

  • 130 Points 100 badge 2x thumb
Is there any configuration example I could study on?
Helps me to understand faster as I haven't configured any policy yet.

Also, it could configured in OneView Policy sector right?
Photo of Alexandr P

Alexandr P, Embassador

  • 12,192 Points 10k badge 2x thumb
Hello, Jaden!

I think simples way is to use authenticate roles based on MAC addresses of clients.
Like Role A - accept all for MAC addresses A, B, C.
Role B - (for example) deny dns, deny Internet gateway for MAC addresses D, E, F.

Thank you!
Photo of jaden

jaden

  • 130 Points 100 badge 2x thumb
It's impossible to authenticate with MAC addresses as there will be Role B,C,D and so on.
Tenant may come and go, this will be bulky of work.
Photo of Alexandr P

Alexandr P, Embassador

  • 12,192 Points 10k badge 2x thumb
So, in this case you have to use RADIUS/TACACS+, NAC and so on.
(to have some condition on which map some role)

Thank you!
Photo of Pala, Zdenek

Pala, Zdenek, Employee

  • 9,100 Points 5k badge 2x thumb
It is easy to accomplish that with EXtreme Control solution = NAC. In the management you will define criteria like MAC address or Username or hostname and based on that you assign the right profile. In the profile you define ACLs what such device/user can do...

Single SSID design is good.

Good luck.
Photo of jaden

jaden

  • 130 Points 100 badge 2x thumb
Any documentation can I refer to?
I would like to use with the Radius server too.
Photo of FES

FES

  • 1,360 Points 1k badge 2x thumb
If you have Radius-LDAP you can define de field Filter-ID attribute at the radius response, and create a rol with the same name at the Role tab.
In the VirtualNetwork tab you configure the default role, but if the radius response can find a role with the same name that the Filter-ID attribute then role asigned change.
I am not sure at all, but you can create a testing wlan