
Open Network Policy Server and right-click on RADIUS Clients > New, to configure Friendly name, IP address, and Shared secret.Ĭonfigure Connection Request Policies(CRP)

The following steps are applicable for switches supported on compound authentication.

The purpose of this configuration guide demonstrates every step to configure Dynamic VLAN Assignment on both switch and RADIUS Server. It mitigates considerable actions/jobs for network administrator. Conversely, administrator only needs to set switch port as trunk and fixed port and a few policies on RADIUS server for Dynamic VLAN Assignment. Administrators therefore create VLANs and configure the corresponding VLAN number to each switch port with access mode. In most networks, administrators may have to restrict devices on a variety of networking devices for security purposes.Ī common way to achieve this kind of network restriction is via static VLAN assignments. If you want to achieve RBAC with RADIUS-based VLANs, remember to tick the "Allow RADIUS Override" box in basic part of WLAN configuration in GUI (or see CLI example below).Dynamic VLAN Assignment separates and isolates devices into different network segments based on the device or user authorization and their characteristics. So if you configure AAA Policy on your WiNG controller (and it can specify whether the controller or AP acts as a RADIUS Client - with FreeRADIUS and NPS it is rather easy as you can specify entire subnet for authenticators in one line, so if it is needed there's no problem to have APs acting as NASes).Īuthentication handling has nothing to do with WLAN bridging mode (local/tunnel) as it comes before any traffic being allowed. Regarding wireless, please also consider increasing minimum basic rate to get rid of 11b support if possible, this will reduce the impact of beacons from too many SSIDs: Īlso remember to use WPA2 CCMP, as weaker options do not work with 11n and 11ac rates - but with WPA2-ENT I believe you'll definitely have it in place.

On Freeradius you have to configure RFC3580-related attributes for relevant resources, have a look here:
