09-06-2018 03:45 AM
We have a main 'WIRELESS' policy with various Authorization policies in place for several of our wireless networks etc.
At the moment I am playing around with certificate authentication etc and have set up a TEST SSID, but need to fiddle around with the Authentication Policy a little which I obviously don't want to do in the production 'WIRELESS' policy as it may affect the other networks.
Therefore I set up 'WIRELESS_TEST' as a policy as you can see which is initially pretty much a copy and paste of the live policy, but only containing the TEST SSID under Authorization policies.
The trouble is, I cannot then connect to the TEST SSID if I try as the 'WIRELESS' policy has a 'DenyAccess' set up as the Default Authorization policy rule (if a client doesn't match any of the other rules I assume)
What is the best way to resolve this? Do I need to move my 'WIRELESS_TEST' above 'WIRELESS' and set 'PermitAcess' as the Default Authorization policy rule in 'WIRELESS_TEST'?
Many thanks :)
Solved! Go to Solution.
09-06-2018 04:31 AM
I am a big believer in discreet policy sets that match each use case. Ideally, you don't want to have one policy set for all your wireless SSIDs. You should have a policy set for each SSID. This makes the rule set easier to look at and minimized the risk of mistakenly allowing someone on the network that shouldn't get on. The WLCs send the SSID name at the end of the RADIUS Called Station ID attribute. You can use that as the admission criteria.
In your case, if you just want to do this for the test SSID, move your policy above the production one and change the admission criteria to "RADIUS Called Station ID ends with TEST-SSID" or whatever your SSID name is. Remove the device type conditions.
09-06-2018 07:07 AM
Thanks, to make things more simple I added a new Authentication Policy in the existing 'WIRELESS' policy that only hits under the conditions suggested (RADIUS Called Station ID Contains = TESTSSID), I can see a limited number of hits going through to that Authentication Policy so seems to be working and it has resolved my issues with properly authenticating via certificates (Default policy not set up to scan enough fields in the certificate to authenticate device/user)
At the moment we just moved everything over from ACS so will probably start to split things up etc. later on,
09-06-2018 04:31 AM
I am a big believer in discreet policy sets that match each use case. Ideally, you don't want to have one policy set for all your wireless SSIDs. You should have a policy set for each SSID. This makes the rule set easier to look at and minimized the risk of mistakenly allowing someone on the network that shouldn't get on. The WLCs send the SSID name at the end of the RADIUS Called Station ID attribute. You can use that as the admission criteria.
In your case, if you just want to do this for the test SSID, move your policy above the production one and change the admission criteria to "RADIUS Called Station ID ends with TEST-SSID" or whatever your SSID name is. Remove the device type conditions.
09-06-2018 05:00 AM - edited 09-06-2018 05:00 AM
Create a new test wireless policy set, and configure a condition to match the WLAN ID.
Cisco_WLC and Airespace:Airespace-Wlan-Id EQUALS 2
09-06-2018 05:02 AM
09-06-2018 05:08 AM
Hmm, interesting point. When would the WLAN ID change? Do you mean in the case of two WLANs using the same SSID w/different security policies?
09-06-2018 05:11 AM
09-06-2018 05:12 AM
Or if you want to get even simpler, use the condition called "Normalised Radius·SSID" instead of Called-Station-ID (even though technically, under the covers that's what it is) - the Normalised Radius·SSID just makes it a bit clearer to understand.
I would always use the CONTAINS operator because you should not care exactly how the NAD has populated the Called-Station-ID
e.g.
Normalised Radius·SSID CONTAINS Corp
09-06-2018 05:16 AM
09-06-2018 07:07 AM
Thanks, to make things more simple I added a new Authentication Policy in the existing 'WIRELESS' policy that only hits under the conditions suggested (RADIUS Called Station ID Contains = TESTSSID), I can see a limited number of hits going through to that Authentication Policy so seems to be working and it has resolved my issues with properly authenticating via certificates (Default policy not set up to scan enough fields in the certificate to authenticate device/user)
At the moment we just moved everything over from ACS so will probably start to split things up etc. later on,
05-14-2023 08:28 AM
Few years ago while moving from MS NPS Wireless radius authentication, I was face on a dilemma, we had three 5508 WLC and same SSID was configured with different WLAN ID on each of them, fortunately finding the solution you are mentioning was my "Eureka time", I mean using the RADIUS Called Station ID and the actual SSID name.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide