12-20-2024 11:09 AM
Hello everyone. I want to place a wireless user in one VLAN or another, depending on the type of authentication, EAP-TLS or PEAP. How do I do this in the wireless part of the network?
Solved! Go to Solution.
12-20-2024 11:27 AM
On the WLC the only configurarion required is "AAA overide" on the WLAN. And create the appropriate vlans. All the rest is Radius job.
12-20-2024 01:14 PM - edited 12-20-2024 01:21 PM
The WLC needs to know which vlan it will put the client.
This procedure explains how to configure VLANs on the Catalyst 9800 WLC. As explained earlier in this document, the VLAN ID specified under the Tunnel-Private-Group ID attribute of the RADIUS server must also exist in the WLC.
In the example, the user smith-102 is specified with the Tunnel-Private-Group ID of 102 (VLAN =102)
on the RADIUS server."
12-20-2024 01:17 PM - edited 12-20-2024 01:23 PM
Then add two policy set one for eap-tls and other for peap.
In these policy set use allow protocol to set eap-tls or peap.
In authc and authz condition use match eap-tls or peap.
In authz use authz policy accept set attribute vlan value.
this example below how you can use PEAP as condition in authc and authz
https://sendthepayload.com/configuring-an-802-1x-wired-policy-using-peap-mschapv2-wo-mar/
MHM
12-20-2024 11:27 AM
On the WLC the only configurarion required is "AAA overide" on the WLAN. And create the appropriate vlans. All the rest is Radius job.
12-20-2024 01:04 PM
Thank you Flavio!
But what interface or group of interfaces should I assign to this WLAN?
And why should we assign a specific VLAN?
12-20-2024 01:14 PM - edited 12-20-2024 01:21 PM
The WLC needs to know which vlan it will put the client.
This procedure explains how to configure VLANs on the Catalyst 9800 WLC. As explained earlier in this document, the VLAN ID specified under the Tunnel-Private-Group ID attribute of the RADIUS server must also exist in the WLC.
In the example, the user smith-102 is specified with the Tunnel-Private-Group ID of 102 (VLAN =102)
on the RADIUS server."
12-20-2024 11:51 AM
You use ISE?
MHM
12-20-2024 01:05 PM
Yes, we do.
12-20-2024 01:17 PM - edited 12-20-2024 01:23 PM
Then add two policy set one for eap-tls and other for peap.
In these policy set use allow protocol to set eap-tls or peap.
In authc and authz condition use match eap-tls or peap.
In authz use authz policy accept set attribute vlan value.
this example below how you can use PEAP as condition in authc and authz
https://sendthepayload.com/configuring-an-802-1x-wired-policy-using-peap-mschapv2-wo-mar/
MHM
12-21-2024 08:01 AM
Colleagues, you were right. I've created profiles, policies, and etc. Assigned an interface group to the test WLAN. Everything works! It distributes clients to the required VLANs depending on EAP-TLS or PEAP. I like it!
12-21-2024 08:06 AM
Did you match condition as I suggest?
MHM
12-21-2024 08:20 AM
On the test laptop, I found that it had fallen off the Active Directory domain and cannot pass machine authentication. But if I disable the machine's domain membership in the Authorization Policy, then this problematic laptop successfully connects to the network. I thought that EAP-TLS requires checking the machine first, then the user, and there is no way to change this protocol behavior.
12-23-2024 02:56 AM
EAP-TLS authenticates whatever you setup oin the wireless profile.
For Windows, by default, it is machine authentication only, but if you change it to User OR Machine it will do Machine cert first on the login screen, and then it will re-authenitcate using the User cert after successful log in.
12-21-2024 08:20 AM
Yes, exactly.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide