08-23-2019 04:05 AM
aaa-policy Testcorp_local_radius
authentication server 1 onboard controller
aaa-policy CaptivePortal
authentication server 1 onboard self
wlan Testcorp
description Testcorp
ssid Testcorp
vlan 201
bridging-mode local
encryption-type ccmp
authentication-type eap
no answer-broadcast-probes
use wlan-qos-policy Testcorp
use aaa-policy Testcorp_local_radius
wlan Guest
ssid Guest-Wifi
vlan 200
bridging-mode local
encryption-type none
authentication-type none
no answer-broadcast-probes
no client-client-communication
use wlan-qos-policy Guest
use captive-portal Guest
captive-portal-enforcement
use ip-access-list out BROADCAST-MULTICAST-CONTROL
use mac-access-list out PERMIT-ARP-AND-IPv4
radius-group Testcorp-Users
policy vlan 201
policy ssid Testcorp
radius-group Guest
guest
policy vlan 200
policy ssid Guest-Wifi
radius-user-pool-policy Testcorp-User-Pool
user john-test password 0 testpassword group Testcorp-Users
radius-user-pool-policy Guest
$GUEST_USERS
radius-server-policy RADIUS-Policy
use radius-user-pool-policy Guest
use radius-user-pool-policy Testcorp-User-Pool
authentication data-source ldap ssid Wifi01 precedence 1
authentication data-source ldap ssid Wifi02 precedence 2
authentication data-source local ssid Guest-Wifi precedence 3
authentication data-source local ssid Testcorp precedence 4
authentication data-source ldap fallback
authentication eap-auth-type peap-mschapv2
ldap-server primary host $IP port 389 login $LDAP_PARAMETERS net-timeout 3
ldap-agent primary domain-name $DOMAIN domain-admin-user $DOMAIN_USER domain-admin-password 0 $PASSWORD
use radius-group GROUP1
use radius-group GROUP2
Solved! Go to Solution.
08-28-2019 03:22 PM
08-27-2019 03:50 PM
08-27-2019 03:36 PM
crypto key import rsa RSA-KEYPAIR-NAME IMPORT-FROM-URL background|passphrase KEYPASSPHRASE
background on DEVICE-NAME
08-26-2019 01:18 PM
aaa-policy Testcorp_local_radius
authentication server 1 onboard self
08-24-2019 10:16 PM
profile anyap Corpsite-any-internal
no mint mlcp vlan
no mint mlcp ipv6
no autoinstall configuration
no autoinstall firmware
use radius-server-policy RADIUS-Policy
crypto ikev1 policy ikev1-default
isakmp-proposal default encryption aes-256 group 2 hash sha
crypto ikev2 policy ikev2-default
isakmp-proposal default encryption aes-256 group 2 hash sha
crypto ipsec transform-set default esp-aes-256 esp-sha-hmac
crypto ikev1 remote-vpn
crypto ikev2 remote-vpn
crypto auto-ipsec-secure
crypto load-management
crypto remote-vpn-client
interface radio1
wlan Wifi01 bss 1 primary
wlan Wifi02 bss 2 primary
wlan Guest bss 3 primary
wlan Employee bss 4 primary
wlan Testcorp bss 5 primary
interface radio2
wlan Wifi01 bss 1 primary
wlan Wifi02 bss 2 primary
wlan Mitarbeiter bss 3 primary
wlan Employee bss 4 primary
wlan Testcorp bss 5 primary
interface radio3
interface bluetooth1
shutdown
mode bt-sensor
interface up1
interface ge1
switchport mode trunk
switchport trunk allowed vlan 200-204
switchport trunk native vlan 100
interface ge2
interface fe1
interface fe2
interface fe3
interface fe4
interface vlan100
ip address dhcp
ip dhcp client request options all
interface vlan200
ip address dhcp
interface wwan1
interface pppoe1
use firewall-policy default
use captive-portal server Guest
configuration-persistence
service pm sys-restart
router ospf
adoption-mode controller
08-23-2019 01:39 PM