cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
286
Views
1
Helpful
3
Replies

BYOD with Random Mac drop connection

MikeMoss
Level 1
Level 1

**Please point me in the right direction if there is a better place to post this**

  • ISE 3.2
  • WLC 9800
  • Mobile/cell phones using Random Mac Addresses

We have a single SSID in use for any non-corporate devices. This includes Guests/Visitors and Employees BYOD (cell phones).

1) The Visitors connect to the SSID and are redirectred to the Captive Portal. They sign in using sponsored credentials that we provide them for the day. ...These users have zero issues, everything works as expected.

...

2) Our Employees connect to the same SSID/Portal and sign in using their Active Directory domain credentials. They can sign in and authenticate without issue, then can surf the web, listen to music...whatever. No problem here.

The problem comes down to our employees that connect when their devices have Random Mac Address enabled. They can connect just as i stated #2 above. But after 5-10 minutes they are forcibly disconnected and re-directed (again) to the Captive Portal.

 

I can not narrow down the issue. Why would they keep dropping connection? Repeatedly. Also whats even more confusing is im SURE a good portion of visitors have Random Mac enabled as well, yet they are just fine.

So what would be cause only our Emplyoees (with Random Mac Address) to constantly get de-authenticated over and over?

(Will upload some screenshots momentarily)

 

TY!

 

 

 

 

 

 

3 Replies 3

Arne Bier
VIP
VIP

Hi @MikeMoss 

A few observations.  I used to think that allowing employees to log into the company guest Wi-Fi was a clever/neat idea, until someone pointed out to me that this is a serious security risk, since you're allowing a user to type in their company username and password into an untrusted device. By untrusted, I mean that the personal device could potentially contain malware that harvests your employee's credentials.  In security, we always think of the worst case and chances are it may never happen - but I would take this seriously and not accept company credentials on personal devices.

Secondly, MAC addresses on wireless devices are already a pain to deal with (local/random MAC addresses) - it's going to get worse. Apple just announced on their WDC that iOS 18 will have rotating MAC addresses - this means the MAC address will change even after you have associated to the WLAN. Makes guest portals and AuthZ policies using MAC addresses a complete nonsense.

We have to get away from using MAC addresses for any kind of authentication. The industry seems to favour privacy over convenience.

The forcible reconnection is due to their devices roaming (whether intentionally by moving around, or because of the wireless network conditions changing to cause a device to select another AP). When this happens, the WLC/AP kills the existing session and requests a new MAB from the RADIUS server. In the case of ISE, if you are using the "Guest_Flow" Authorization, then this means that the guest has a new session (because the previous one is now dead, due to RADIUS Accounting Stop) and then the portal must appear.

if you want the "Remember Me" feature, then you should be putting employees into an ISE Endpoint Group after they have authenticated on the portal, and use that as an AuthZ Rule, instead of the "Guest_Flow" condition. - then, they will never see the portal again, until their MAC address is purged from that Endpoint Group. 

But, in the case of iOS devices, once they get iOS 18.x and later, this will break everything - and users will be finding themselves in the portal constantly. And ISE will be filled with MAC addresses that you will have to purge.

Random/Rotating MAC addresses are a nice feature for the consumer to protect their privacy - but an absolute PITA in the corporate environment.  Perhaps we should stop using portals (YAY!) and move to WPA3 with OWE instead.

JPavonM
VIP
VIP

To add more into that feature from Apple for iOS 18 and Sequoia, and due to the lack of information about it, this is likely to impact the quality of experience of users, as the MAC rotation could make the device to abruptly disconnect from the wireless network to restart a new full authentication, which may introduce drops in real-time communications. 

If the feature will be enabled by default or not like the private MAC is something unknown, and we would need to check with the RADIUS vendors about a potential license over-consumption under this situation, when devices are not expiring the previous sessions if they don't send a disassociation/deauthentication packet before rotating the MAC.

There are some options as workaround for this new paradigm:

  1. Use a dual-SSID solution with an Open/OWE (or WPA2/3 Personal) one only for registering via a Sponsor Portal, and then use credentials with email and a random password generated by the portal to connect to a second SSID: this solution allows some control over the connection and it avoids providing a Free Internet access to all, but this is too much complicated for a Guests and they will end up complaining. This solution is compliant with the current Privacy Regulations in many countries like GDPR and CCPA.
  2. Move to Open/OWE: OWE is not widely adopted by the majority of the devices, and you will lose all control about the devices using it, and that may impact the performance of the solution if many devices make use of the FREE Internet access. This solution is not completely compliant with the Privacy Regulations. (URL redirection can be provided for T&Cs, but the rest of options are not available)
  3. Move to WPA2/3 personal with a rotating PSK (presented as a plain test or QR code at the venues): This solution limits the number of connection as it does not provide FREE Internet access, and the PSK can be rotated periodically. Again, this solution is not completely compliant with the Privacy Regulations. (URL redirection can be provided for T&Cs, but the rest of options are not available)

Arne Bier
VIP
VIP

@JPavonM - nice summary of options.  One other thing I would add for guest access is Open Roaming, which in theory sounds like the ultimate user experience for a visiting user (e.g. conference) - I had this experience at Cisco Live and it was great. However it seems that setting this up has quite some cost involved for the venue organiser - I looked at this as an option for my customers and was confused about how it worked and the costs involved.  I wish there was a way that we could implement Open Roaming without the massive cost.

Eduroam is a great example of something that also just works and to my knowledge, doesn't require a subscription fee to keep running - IIRC it relies on partnerships and federations with other RADIUS servers. But the users must of course be known and onboarded somehow. 

Many years ago I was involved in Service Provider EAP-SIM/EAP-AKA to allow mobile subscribers to transparently access the wifi hotspots of their service provider - users didn't even know it was there and the "Wi-Fi just worked" - that's the dream.  But boy oh boy, the effort and infrastructure to make that happen was quite massive.