How to dynamically assign a user to a VLAN depending on the AP location?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-05-2017 06:25 AM
Hi all,
my goal is to use same SSID and (dynamically) assign users to a VLAN depending on location.
I am looking into "Replace BSSID with Zone name" in RADIUS TLVs (RADIUS Access Request Message Options) but had no success making it work. I can see the proper "Called Station Identifier: Location x" in NPS Event Viewer though. Now I need to find a way to assign a proper VLAN to it at the AP ...
I followed procedure on https://extremeportal.force.com/ExtrArticleDetail?an=000082506 but am missing something here ...
Setup: B@AP topology, EAP-TLS, NPS, NAC (RADIUS Proxy mode)
Thanks!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-05-2017 12:44 PM
found a working solution w/ EAC!
Client EWC/B@AP EAC (Radius Proxy) NPS (EAP-TLS)
Here's my community contribution (based on Volker Kull's advice):
@EWC
- VNS > Global > Authentication > RFC 3580 (ACCESS-ACCEPT) Options: "Both RADIUS Filter-ID and Tunnel-Private-Group-ID attributes" VNS > WLAN Service > Auth & Acct > RADIUS TLVs > Zone Support >
RADIUS Request Called Station ID Options > Replace BSSID with Zone name AP > Edit selected AP > AP Properies > Zone:
Access Control >
- Group Editor > Location Group:
+ Add New Group (for each location):
+ Switches: "List"
+
+ Interface: "Wireless"
+ AP ID:
Access Control Profiles > Policy Mappings >
+ Add New:
+ Map to Location: Select Location
+ Policy Role: "Enterprise Access"
+ VLAN [id] Name: Add New: +
+ VLAN Egress: "Tagged"
Access Control Profile
+ Add New (for each location)
+ Accept Policy: Select Policy Mapping (step #2)
+ Replace RADIUS Attributes with Accept Policy
Access Control Configurations > Default
+ Add New Rule (for each location)
+ Authentication Rule: 802.1X (EAP-TLS)
+ Location Group: Select Location (step #1)
+ Profile: Select Access Control Profiles (step #2)
Enforce
- Roles/Services > Enterprise Access > Mappings
+ Add (Type: RFC3580) VLAN: for each location
Save Domain Enforce Domain (Ignore Errors)
Client is authenticated against NPS.
Policy (Role/VLAN mapping) is applied directly from EAC.
Role Enterprise Access is used as an example
Cheers!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-05-2017 11:39 AM
https://community.extremenetworks.com/extreme/topics/how-to-configure-windows-2012-nps-for-radius-au...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-05-2017 06:56 AM
you need :
- location groups with APs
- a rule on EWC for every VLAN you use (matching the rule you get from NAC via RADIUS !) with the configured VLAN topoogy
- a NAC aaa rule for every location using this EWC rules. Radius request will overwrite the default rule on EWC
- on EWC (Global/Authentication/RFC3580): choose: "Both RADIUS Filter-ID and Tunnel-Private-Group-ID attributes"
- VLANs tagged on AP wired port
try WLAN config without TLS and NPS ! Use NAC user store to prevent issues from NPS.
br
Volker
