11-20-2019 05:32 AM
Greetings.
I see that Meraki MR access points now support iPSK. I also saw a configuration example posted using FreeRADIUS and Cisco ISE but I was wondering if there was anything available for configuring iPSK with Microsoft NPS posted anywhere.
Any information would be greatly appreciated.
Thanks in advance.
Joe
04-09-2020 12:12 PM
Upon re-reading all the documentation, I've changed my mind. I think it may be possible to re-configure NPS to make this work, but this is not a normal workflow you would use NPS for.
The first thing I don't like is you have to create a user in AD where the username and password are the MAC address of the device.
Unless you go to a lot of trouble, this means someone could just log into an AD attached machine using those same details, and access anything that "Domain Users" or "Authenticated users" has access to.
You have no way to change the password or lock the person out or any way to remove them from those two built-in groups.
This just sounds dangerous to me.
04-09-2020 12:14 PM
ps. The solution may be to stop NPS sending some of the other attributes, and getting it to just send the Tunnel-Password attribute.
05-26-2020 02:00 AM
In beta version 27.1 you have the feature IPSK without radius. Very interesting. But I don't like the limit of 50 unique psk's per ssid.
05-26-2020 04:39 AM
05-26-2020 04:42 AM
Indeed look very promising. But I hope they well increase the number of allowed unique psk's. To give an example: Mist can do 5000 and Cisco Meraki 50. But it is a nice start!
05-28-2020 01:19 AM
Hi & Thanks for the information.
09-20-2020 04:27 PM
I have the same fears but then I came upon this
it might be weird for system admins to have accounts trhat cannot do login but it seems the way to go.
Am I correct?
Axl
10-21-2020 03:01 AM
Hi,
I got it working with a Cisco WLC (8.5) and NPS on Server 2012. The WLC part is pretty straight forward (PSK Based SSID with MAC filtering and AAA server configured). I know this is a Meraki forum but want to share the part of the NPS config. It might give others some leads:
NPS / Windows:
PSK configured on the WLC is 'Waarisdesleutel' just like the RADIUS attribute.
Caveats:
Password Policy is configured at the domain level so changing it will affect the whole domain. If you want to use NPS for this setup, install an sperate DC server with an seperate domain. Install NPS on this server and use this one for IOT-authentication.
If you want to use only one front end RADIUS server you can use this server. For normal 802.1X users you can add a policy which proxies the requests to the internal NPS server.
Seperating the IOT-users from your normal domain solves another problem and that is access to other Windows resources.
Edit : it seems in Authentication methods you need to select PAP only. My client was suddenly offline and fiddling with PAP and the "Allow clients to connect without selecting...." option got it back online. Going to keep an eye on this.
10-23-2020 12:35 AM
The story continues:
Have tested it with a MR33 and it fails to work with Microsoft NPS. I've also tried FreeRadius and that works. During the tests I made come captures:
This is FreeRadius capture (the only interesting part is the Access-Accept reply from the RADIUS server):
This is the NPS reply:
Assuming Meraki ignores the other attributes, one thing is different in the Tunnel-Password attribute; NPS is not adding a Tag field in the reply. From the RFC
Tag
The Tag field is one octet in length and is intended to provide a
means of grouping attributes in the same packet which refer to the
same tunnel. Valid values for this field are 0x01 through 0x1F,
inclusive. If the value of the Tag field is greater than 0x00 and
less than or equal to 0x1F, it SHOULD be interpreted as indicating
which tunnel (of several alternatives) this attribute pertains;
otherwise, the Tag field SHOULD be ignored.Don't know if this is the case but this might be the reason it is not working.
10-28-2020 07:02 AM
Try pfSense with the FreeRADIUS module. It provides a nice web interface to manage mac/psk entries, plus you get the power of shell to script bulk enrollment.
06-15-2023 01:57 PM
I know this is an old thread, but since so many have asked and with a recent development on this front, it is pertinent to share that IPSK with NPS is now supported on MR 30.1 and higher firmware when using both the RADIUS standard AVP Tunnel-Password AND Cisco AVPs "psk" and "psk-mode=ascii". Please see the updated documentation here: https://documentation.meraki.com/MR/Encryption_and_Authentication/IPSK_with_RADIUS_Authentication#Microsoft_NPS_Configuration
Cheers,
Geoff
06-22-2023 11:19 AM
Can confirm I got this to work on NPS now, hopefully it won't be too long before a firmware version over 30.1 is Stable
06-18-2023 11:34 PM
+1 I would love to see those integrations, or for the beginning Radius using Cloud Identity Providers (AzureAd, Gsuite, Okta etc.)
12-17-2023 05:39 PM
I just ran across this update. Has anyone got this working with a per device MAC authentication and VLAN assignment, like the Freeradius setup?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide