01-17-2025 05:22 AM
Hello everyone,
I have the requirement that a customer wants to define fixed IPs for users, as these IPs are to be used in the firewall. Identity based networking on IP basis. For SSL VPN access, these IPs are read from Active Directory attributes of the users. Here is the setup Fortinet --> Radius to ISE --> AD Auth with Framed IP return --> Framed IP from ISE to Fortinet via Access Accept --> SSLVPN Adapter gets the IP assigned.
My question now is, is this also possible for “normal” network adapters in the WLAN and wired area. Can I also give the network cards IP information via AD attributes and the Access Accept? As in the SSLVPN area? Is that possible?
The current DHCP server for the WLAN area runs on the IOS XE WLC. It also works perfectly. I have looked into the DHCP proxy function. I haven't really got to grips with it yet. Do I have to use this proxy function? Or am I on the wrong track?
I would be grateful for any input.
Best regards, Alex...
01-17-2025 05:56 AM
Hello @advuni-af1
Yes, it's possible to assign fixed IP addresses to users in wired and wireless environments based on Active Directory attributes, similar to how it is done for SSL VPN access.
This could be achieved using the Framed-IP-Address attribute in the RADIUS Access-Accept message. When users authenticate via 802.1X, the RADIUS server (ISE in your setup) can retrieve the IP address from an AD attribute (e.g., msRADIUSFramedIPAddress) and include it in the Access-Accept response. The access device, such as a switch or WLC, can then enforce this IP assignment.
However, unlike SSL VPNs where the IP address is directly assigned to the VPN adapter, wired and wireless networks rely on DHCP for IP address allocation. To ensure the correct IP is assigned, there must be coordination between the access device, the RADIUS server, and the DHCP server. In your setup, since the DHCP server for WLAN runs on the IOS XE WLC, enabling the DHCP Proxy feature can facilitate this coordination. The DHCP Proxy function allows the WLC to relay DHCP requests to a central DHCP server while ensuring that the RADIUS-assigned Framed-IP-Address is honored.
Other way, you could use static DHCP reservatios on the DHCP server based on MAC addresses to assign fixed IPs to devices. While this method does not require RADIUS, it diverges from an identity-based networking model and lacks the flexibility of assigning IPs dynamically based on user identity. Configuring static IPs directly on client devices is another option but is not scalable or practical for large deployments....
01-20-2025 01:59 AM
01-17-2025 06:39 AM - edited 01-17-2025 09:03 AM
01-17-2025 06:45 AM
I dont think so'
Ssl vpn need user to have IP public IP or private IP to connect to VPN GW'
Then AD will provide additional IP (private) for RA VPN.
Here ssl vpn need to connect to ssid get IP then authc to vpn GW and get new IP'
New IP is encapsulate inside first IP it get from wlc dhcp.
MHM
01-20-2025 06:45 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide