11-02-2023 08:03 AM
Hi ,
This is an open discussion about the new EA Feature : Org-level RADIUS Server
So here is my initial feedback 🙂
PS : Love the idea and the feature but still dislike the way to inform of bugs / feedback. The "give feedback button" is not event present on that page , and unsure if someone is really looking at that anyway.
Cheers !
11-02-2023 08:32 AM
Open question : If you change one or all RADIUS server IPs , should we expect a Org-Wide re-auth on all ports configured with an access policy ?
Eg : I'm migrating my RADIUS from 10.1.1.1 to 10.2.2.2. I do the change Org-Wide. What is the expected behavior ?
My initial thoughts : Nothing happens until there's a re-auth or new auth on the ports using that access policy. Am I right ?
11-02-2023 09:05 AM
Only for Switches??? Ok ... This is a feature I have hoped for since day 1. But wireless would be more important. For your question, I would expect the existing sessions to stay active until reauth or a button "reauth now" is pressed (either on the dashboard or on the RADIUS server).
11-02-2023 09:12 AM
Yes I hope this get ported to MR !
The only reason I'm asking is because editing ports/access policy on MX forces a re-auth of all ports. I was worried a bit about that part but it seems that you are right. I have to do more testing
Edit : And MS too ? https://documentation.meraki.com/MS/Access_Control/MS_Switch_Access_Policies_(802.1X)
As of MS 9.16, changes to an existing access policy will cause a port-bounce on all ports configured for that policy.
11-02-2023 11:18 AM
> If you change one or all RADIUS server IPs
Does it result in a re-auth if you change the RADIUS server IP address at the current network level?
11-02-2023 11:23 AM
Per documentation .. yes
https://documentation.meraki.com/MS/Access_Control/MS_Switch_Access_Policies_(802.1X)
As of MS 9.16, changes to an existing access policy will cause a port-bounce on all ports configured for that policy.
But I have to try it first. That message seems really old. 9.16 , I don't even remember the bugs from that version haha !
11-07-2023 05:30 AM
Update from my case : Hi Raphael. The behavior in question is no longer present.
So changing the Radius settings Org-wide ( or network-wide ) shouldn't bounce the configured ports.
11-02-2023 09:22 AM
MR will come later
11-03-2023 03:47 PM
+1 for MR please 🙂
06-19-2025 06:09 AM
Any update on when?
02-12-2024 10:53 AM
Is it possible to reference these global RADIUS servers when creating an access policy via API? I'm not seeing a way to use the createNetworkSwitchAccessPolicy operation to link to these global servers.
02-12-2024 10:57 AM
I'm afraid it is not possible at the moment.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide