<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius Authentication via Access Points in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524771#M309554</link>
    <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;Is there a good reason why you are using RADIUS proxy ? &lt;/P&gt;&lt;P&gt;Wouldn't it be easier to use your own RADIUS servers without a proxy ?&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2024 14:29:50 GMT</pubDate>
    <dc:creator>Raphael_L</dc:creator>
    <dc:date>2024-08-21T14:29:50Z</dc:date>
    <item>
      <title>Radius Authentication via Access Points</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524770#M309553</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a "special" setup for one of our sites which have its clients (PCs) connecting through the wifi using radius authentication.&lt;/P&gt;&lt;P&gt;The radius server is physically located at the same site with the clients that try to authenticate. &lt;/P&gt;&lt;P&gt;The traffic flow for all auth requests goes like: &lt;BR /&gt;&lt;BR /&gt; Client (PC) -&amp;gt; AP -&amp;gt; MX -&amp;gt; WWW -&amp;gt; Meraki Cloud&lt;/P&gt;&lt;P&gt;                    -&amp;gt; Meraki Cloud-&amp;gt; MX -&amp;gt; Radius server&lt;/P&gt;&lt;P&gt;We are concerned about security as some of the packets (UDP 1812) might be intercepted somewhere in between the Meraki Cloud to MX and EAP packets are not encrypted. &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I would like to know:&lt;BR /&gt;&lt;BR /&gt;1. The radius packets sent to Meraki Cloud and back to MX are encrypted? &lt;BR /&gt;    It makes sense that all the traffic that is being sent between MX &amp;lt;&amp;gt; Meraki Cloud is encapsulated and encrypted &lt;BR /&gt;    But I don't know for sure and maybe as these are UDP1812 they are excluded from being included in the encapsulation?&lt;BR /&gt;   My question is - is this setup secure or not? &lt;BR /&gt;&lt;BR /&gt;2. Is it possible not to send the packets from APs -&amp;gt; Meraki Cloud just for them to reach back to the inside LAN where the Radius server is? &lt;BR /&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MF-1-Radius-Auth.png" style="width: 200px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/274224i33310D38B32646CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/RADIUS_Proxy_for_WPA2-Enterprise_SSIDs#:~:text=Using%20the%20Meraki%20RADIUS%20proxy%20feature,client%20on%20the%20RADIUS%20server%20instead.&amp;amp;text=Using%20the%20Meraki%20RADIUS,the%20RADIUS%20server%20instead.&amp;amp;text=Meraki%20RADIUS%20proxy%20feature,client%20on%20the%20RADIUS" target="_blank" rel="nofollow noopener noreferrer"&gt;RADIUS Proxy for WPA2-Enterprise SSIDs - Cisco Meraki Documentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 14:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524770#M309553</guid>
      <dc:creator>Captain2</dc:creator>
      <dc:date>2024-08-21T14:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via Access Points</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524771#M309554</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;Is there a good reason why you are using RADIUS proxy ? &lt;/P&gt;&lt;P&gt;Wouldn't it be easier to use your own RADIUS servers without a proxy ?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 14:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524771#M309554</guid>
      <dc:creator>Raphael_L</dc:creator>
      <dc:date>2024-08-21T14:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via Access Points</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524772#M309555</link>
      <description>&lt;P&gt;As &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/13291"&gt;@Raphletourn&lt;/A&gt; says. The typical use-case for the RADIUS-Proxy is if you have branches that don't have IP connectivity to a central RADIUS server.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 14:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524772#M309555</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2024-08-21T14:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via Access Points</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524773#M309556</link>
      <description>&lt;P&gt;Hi RaphaeIL,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your quick response!&lt;/P&gt;&lt;P&gt;We actually do have the Radius servers on the same premise as the clients are.&lt;BR /&gt;When we tried at the beginning to forward all traffic from the access points directly to the radius servers on premise it didn't work. I figured out that as the access points are "reporting" everything to the Meraki Cloud it has to flow through the Meraki Cloud, and then from there back to the site (and it worked fine so far). &lt;BR /&gt;&lt;BR /&gt;Apparently, it can be done without Meraki Cloud as a proxy, and now I'd like to understand how to actually have ut corrected. &lt;BR /&gt;&lt;BR /&gt;If I change the radius servers ip addresses to point to the servers private ip addresses, then the traffic will never need to traverse through WAN to reach over back again to the local network.&lt;/P&gt;&lt;P&gt;But then how does the access points will be able to reach the radius servers lan?&lt;BR /&gt;Both the radius servers and the APs are on different management networks.&lt;BR /&gt;&lt;BR /&gt;For instance, let's say that&lt;/P&gt;&lt;P&gt; the access points are on network 192.168.128.0/24 - VLAN X.&lt;/P&gt;&lt;P&gt; and the radius servers are on network 10.1.1.0/24 - VLAN Y.&lt;/P&gt;&lt;P&gt; both of the vlans are defined on the MX addressing and vlans and have gateways. &lt;BR /&gt;&lt;BR /&gt;Adding routing rules / group policies to allow intervlan routing? Where? How?&lt;/P&gt;&lt;P&gt;Nowadays &lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captain_1-1724254212107.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/274228i7353582DBBA2833C/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Private IPs in inside lan&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captain_0-1724254086660.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/274229iA4D9D270114F4FB7/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 15:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524773#M309556</guid>
      <dc:creator>Captain2</dc:creator>
      <dc:date>2024-08-21T15:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication via Access Points</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524774#M309557</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;But then how does the access points will be able to reach the radius servers lan?&lt;BR /&gt;Both the radius servers and the APs are on different management networks.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;For instance, let's say that&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; the access points are on network 192.168.128.0/24 - VLAN X.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; and the radius servers are on network 10.1.1.0/24 - VLAN Y.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; both of the vlans are defined on the MX addressing and vlans and have gateways. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Yes the AP and the RADIUS server(s) need to have IP reachability. &lt;/P&gt;&lt;P&gt;Is the routing done by a MX / MS or something else ? if so you have to make sure that inter-vlan routing is enabled and that UDP 1812-1813 is allowed between these vlans/endpoints.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 18:58:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-via-access-points/m-p/5524774#M309557</guid>
      <dc:creator>Raphael_L</dc:creator>
      <dc:date>2024-08-21T18:58:49Z</dc:date>
    </item>
  </channel>
</rss>

