<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication Method in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481648#M295315</link>
    <description>&lt;P&gt;Can we take a step back - what are you trying to achieve?&lt;/P&gt;&lt;P&gt;The end result (from above) is that both corporate and personal devices will have access to the same network.&lt;/P&gt;&lt;P&gt;What do you gain by making people enter two passwords from a personal device?&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2025 18:55:00 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2025-02-23T18:55:00Z</dc:date>
    <item>
      <title>Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481645#M295312</link>
      <description>&lt;P&gt;Hi all &lt;BR /&gt;I'm new to cisco Meraki and I'm using MR55 device &lt;BR /&gt;The thing is I have my network called Corporate and I want my staff to use the network normally with their laptop,&lt;BR /&gt;but if they managed to know the password and try to use it with their phone, I want them to authenticate in a splash page for example with different password. &lt;BR /&gt;&lt;BR /&gt;Can someone guide me on this &lt;/P&gt;&lt;P&gt;Thanks  &lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 15:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481645#M295312</guid>
      <dc:creator>Ahmed900</dc:creator>
      <dc:date>2025-02-22T15:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481646#M295313</link>
      <description>&lt;P&gt;I assume you won't achive this reliably with the build in tools.&lt;/P&gt;&lt;P&gt;One option worth a test is to have two group policies in the WLAN, one default without splash page and one with a splash page. The later gets assigned based on the end device:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KarstenI_0-1740241915098.jpeg" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.jpeg"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/276110iD3C9084580DB6A5B/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.jpeg" alt="image.jpeg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;For the "&lt;SPAN&gt;if they managed to know the password&lt;/SPAN&gt;":&lt;/P&gt;&lt;P&gt;Normally the users can always find out the passphrase. This is only forbidden when the WLAN profile is pushed with an MDM like Meraki Systems Manager.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 16:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481646#M295313</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-02-22T16:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481647#M295314</link>
      <description>&lt;P&gt;Something tells me here no matter which way they authenticate they’re going to end up on your corporate network.&lt;/P&gt;&lt;P&gt;How is your internal network segmented?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 21:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481647#M295314</guid>
      <dc:creator>MerakiGnome</dc:creator>
      <dc:date>2025-02-22T21:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481648#M295315</link>
      <description>&lt;P&gt;Can we take a step back - what are you trying to achieve?&lt;/P&gt;&lt;P&gt;The end result (from above) is that both corporate and personal devices will have access to the same network.&lt;/P&gt;&lt;P&gt;What do you gain by making people enter two passwords from a personal device?&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 18:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481648#M295315</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2025-02-23T18:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481649#M295316</link>
      <description>&lt;P&gt;Hi &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/121148"&gt;@Ahmed900&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;I agree with &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/340"&gt;@Philip D'Ath&lt;/A&gt;, at first its important to understand what you're trying to achieve.&lt;/P&gt;&lt;P&gt;With this said, I think you can use the setup with PSK and Sign-on splash page, and in the dashboard settings you can put the laptops into a white list manually, and in this case these clients won't need to go through splash authentication. And if users try to enter connect to the SSID from their phone knowing the PSK, they will be met with the splash page. This method, however, don't prevent them from connecting if they know the password for the splash page. Something similar is outlined in &lt;A href="https://documentation.meraki.com/MR/MR_Splash_Page/Using_a_Sign-on_Splash_Page_to_Restrict_Wireless_Access_by_MAC_address" target="_self" rel="nofollow noopener noreferrer"&gt;this KB&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;I believe the best way to go here if you want to restrict access from phones would be some sort of MAC address-based, or cert-based authentication.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 11:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481649#M295316</guid>
      <dc:creator>sinelnyyk1</dc:creator>
      <dc:date>2025-02-24T11:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481650#M295317</link>
      <description>&lt;P&gt;You would probably be better using 802.1x and applying group policies to the different device types i.e. BYOD and company owned. &lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 19:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481650#M295317</guid>
      <dc:creator>BlakeRichardson</dc:creator>
      <dc:date>2025-02-24T19:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481651#M295318</link>
      <description>&lt;P&gt;Hi &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/340"&gt;@Philip D'Ath&lt;/A&gt; &lt;BR /&gt;What I'm trying to achieve is for the network to be accessible for laptops only,&lt;/P&gt;&lt;P&gt;my point is when a user connects via Organization Laptops it should connect normally,&lt;BR /&gt;but if he trying to connect with his phone, it should not connect that's why I'm searching for other solution to forbid Connecting with phone in the splash page configuration &lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 11:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481651#M295318</guid>
      <dc:creator>Ahmed900</dc:creator>
      <dc:date>2025-02-25T11:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481652#M295319</link>
      <description>&lt;P&gt;Then the solution is 802.1X with EAP-TLS as already mentioned. Every company device is enrolled with a certificate that is not exportable on the end device and only these devices are allowed to authenticate. Or, all other devices that don't authenticate through a certificate get the "only-Internet" VLAN assigned.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 11:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481652#M295319</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-02-25T11:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481653#M295320</link>
      <description>&lt;P&gt;Hi &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/105916"&gt;@sinelnyyk1&lt;/A&gt; &lt;BR /&gt;both solutions sound good for me I will read more about it &lt;BR /&gt;&lt;BR /&gt;Thanks &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 11:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481653#M295320</guid>
      <dc:creator>Ahmed900</dc:creator>
      <dc:date>2025-02-25T11:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Method</title>
      <link>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481654#M295321</link>
      <description>&lt;P&gt;I second this.  Configure something like Microsoft Certificate Server (part of Windows Server) and a group policy to deploy a certificate to every AD member, and then use that for authentication.&lt;/P&gt;&lt;P&gt;Once you have the certificate deployment done, here is a walk through for the NPS configuration required.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Creating_a_Policy_in_NPS_to_support_EAP-TLS_authentication" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Creating_a_Policy_in_NPS_to_support_EAP-TLS_authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Except skip the entire first section on "Connection Request Policies.".  This section does absolutely nothing.  Whoever wrote that didn't know what connection request policies do.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 22:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/authentication-method/m-p/5481654#M295321</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2025-02-25T22:25:02Z</dc:date>
    </item>
  </channel>
</rss>

