cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
794
Views
10
Helpful
5
Replies

One SSID with multiple VLANS

gcook0001
Level 1
Level 1

I am trying to setup a single SSID with multiple VLANS but I can't seem to be able to get it to work. I have no issue with a single SSID with a single vlan.

I am running 5 AP2802I access points with one running Mobility Express. Everything is on the latest software version. 8.10.151.0

I am using Server 2019 NPS for authentication

Profile Name: test

SSID: test

Admin State: enabled

Radius Compatibility: Cisco ACS

Security Type: WPA2Enterprise

Ahuthentication Server: External Radius

Client IP Management: Network

Native VLAN ID: 300

Use VLAN Tagging: No  (I have also used yes here)

DHCP Scope: None

VLAN ID: 290

 VLAN Name: manag    VLAN ID: 300

VLAN Name: Guest      VLAN ID: 307

VLAN Name: Corp       VLAN ID: 290

VLAN Name: IT            VLAN ID: 291

Allow AAA Override: no (I have also tried enabling this)

 

Switch - CS3850

template WIRELESS-ACCESS-POINTS
switchport trunk native vlan 300
switchport trunk allowed vlan 290,291,300,307
switchport mode trunk
!

Inter g1/0/1

source template WIRELESS-ACCESS-POINTS

interface Vlan290

ip address 172.50.50.1 255.255.255.0

interface Vlan291
ip address 172.10.10.10 255.255.255.224
ip helper-address 172.50.50.19
ip helper-address 172.50.50.20

NPS Server

Tunnel-Medium-Type: 802

Tunnel-Private-Group-ID: 291

Tunnel-Type: Virtual LANs (VLAN)

 

I know the authentication is working as I can connect and it is using the correct Network Policy. The issue is that it always defaults to vlan 290 unless I specifically enter 291 as the vlan for the WLAN. I am not sure what I am doing wrong or missing. The goal is to have one SSID with 8 VLANs, one for each department.

 

5 Replies 5

You have to enable "AAA override" and then write a policy on NPS to return the correct VLAN depending on the group of users.

HTH
Rasika
*** Pls rate all useful responses ***

I have AAA override enabled. I also have the settings mentioned above on the NPS server.

NPS Server

Tunnel-Medium-Type: 802

Tunnel-Private-Group-ID: 291

Tunnel-Type: Virtual LANs (VLAN)

 

The settings are made in the NPS Network Policy that I am using for testing. When I check the logs I do see that I am using the correct policy. Also, I am using computer certificates for authentication if that makes a difference. 

Rich R
VIP
VIP

Exactly as @Rasika Nayanajith - you need a method for assigning a user to a VLAN and that is done via radiusAAA override.
Also note that current latest is in fact 8.10.171.0 which is what TAC recommends as per
https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/200046-tac-recommended-aireos.html#anc12

 

gcook0001
Level 1
Level 1

Does anyone have a solution for this? I have gone over and over the how-tos on this and nothing works.

Rich R
VIP
VIP

It definitely works so
1. Debug to understand why yours isn't working.  Try https://cway.cisco.com/wireless-debug-analyzer/

2. Make whatever changes are required to resolve the issues you find in the debug.

Your radius packets might be missing something else causing the WLC to ignore them.  They require certain essential fields to uniquely identify the client. 

Check your WLC config with https://cway.cisco.com/wireless-config-analyzer/

Review Cisco Networking for a $25 gift card