cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
489
Views
2
Helpful
6
Replies

MAC auth with WPA for specific SSIDs

3dmaxer
Level 1
Level 1

I have two SSIDs AP1 and AP2 both of which leverage MAC authentication device list defined under AAA Advanced, Device Authentication.  I have defined the Attribute List Name and WLAN profiles specific to each MAC in an attempt to limit the SSID that the device can connect to.

One SSID (AP1) gets the user further authenticated using Windows NPS, while the other (AP2) relies on a static password using WPA all within the Cisco EWC.

My issue is that I want to prevent someone that is already defined in the MAC list and knows the static password from jumping onto AP2.  What am I missing with the configuration that is not stopping this from occurring?

6 Replies 6

What wlc you have? 

I'm using C9115 APs and running them using the Embedded Wireless Controller implementation version 17.9.4.

marce1000
VIP
VIP

 

 - Jumping or roaming can never be prevented , you can only have WLANs with SSID's each having there (own) authentication schemes (if needed)  , 

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Haydn Andrews
VIP Alumni
VIP Alumni

You could look at iPSK and have the AAA server auth policy have the SSID in it.

That way you could say if connecting to SSID AP1 and part of endpoint group containing device MAC then return PSK, if not then return access deny.
Same for the other SSID

*****Help out other by using the rating system and marking answered questions as "Answered"*****
*** Please rate helpful posts ***

Hi Haydn,

I was hoping I could have the Cisco Wireless Controller check the MAC to the SSID against something like the Attribute List Name and stop people at that point before they get an IP assigned.

Do you know if I can define the devices MAC address as a user and for the password use some static password instead of having to use the MAC for password?

JPavonM
VIP
VIP

Yes you can define an allowlist for MAC Auth on the PSK SSID to prevent non-legitimate devices from connecting to it, but this could be spoofed for an user with access to free tools and hacking forums if they want to.

Using iPSK on the SSID would be the best way, but using MS NPS is hard to do as the part with MAC Auth relies on user accouint created on the DC. (https://community.meraki.com/t5/Wireless-LAN/iPSK-Configuration-with-Microsoft-NPS/m-p/100983/highlight/true#M14935)

Review Cisco Networking for a $25 gift card