11-03-2021 11:02 PM
11-04-2021 09:37 AM
Hey Luis,
There are probably 5 different ways to do this using various combinations of netLogin, Policy, and RADIUS.
Using just that VSA, your switch is authing the AP and applying VLANs, but is also probably trying to authenticate the Wifi Clients themselves which may be why they cannot get DHCP.
A key thing to consider for authenticating APs and Wireless clients: Who, if anyone, is authenticating the wireless clients, the AP itself or the switch where the AP is connected? Do you actually need to authenticate the AP or can you get away with a static configuration on the AP port? Do you actually need to authenticate the WiFi Clients or are you OK with just basic SSID security?
Assuming that you do want to authenticate the AP itself to apply VLANs AND let all client traffic through, the easiest method to explain is using policy and RADIUS Filter-Ids.
Example with an AP on port 1:
1) Enable/configure netLogin, Policy, and RADIUS in EXOS
#Note, you do not need any VLANs on a port to begin with to authenticate a device and apply VLANs via RADIUS
#
# Module aaa configuration.
#
#Use VR-Mgmt if using the OOB mgmt port to get to RADIUS
configure radius 1 server <RADIUS IP> client-ip <Switch IP> vr VR-Default
configure radius 1 shared-secret <RADIUS Secret>
enable radius netlogin
#
# Module policy configuration.
#
#Setup a policy profile for the AP
#PVID-Status Enable PVID 4095 -> All traffic is permitted unless blocked via a policy rule (not shown)
#Untagged-VLAN -> Assign untagged VLAN to port
#Egress-VLANs -> Apply tagged VLANs to port, comma separated, no spaces
#Auth-override enable -> The APs authentication session is applied to all MACs (wifi-clients) learned on this port; Otherwise, you attempt to authenticate all wifi clients as well.
configure policy profile 1 name "AP" pvid-status "enable" pvid 4095 untagged-vlans <Untagged VLAN> egress-vlans <Tagged VLANs> auth-override enable
enable policy
#
# Module netLogin configuration.
#
#Not sure if that AP can authenticate via dot1x, you can auth via either dot1x or MAC.
enable netlogin mac dot1x
enable netlogin ports <AP Port> mac dot1x
configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48
2) Setup RADIUS to return the Filter-ID Generic RAIDUS attribute that is the policy profile name
#FreeRADIUS User File Example for MAC Authentication:
<AP MAC> Cleartext-Password := "<AP MAC>"
Filter-Id = "AP"
3) When the AP sends it's first frame, the switch will try to authenticate with RADIUS. RADIUS should return the Filter-Id of "AP" at which point that policy profile should be applied to the AP per 'show netlogin session'. VLANs will get added as configured. With auth-override, the APs authentication session is applied to all learned MACs (Wifi Clients) on that port and the switch does not attempt to authenticate them individually.
Hopefully that helps!