cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1275
Views
2
Helpful
7
Replies

Rede Guest para visitantes e funcionários

mcgonzaga
Level 1
Level 1

Hoje eu tenho um SSID GUEST, que utiliza um captive portal, e fica como autenticação aberta, Para aumentar a segurança, nos foi solicitado que seja habilitado WPA2+WPA3 para essa rede.
Gostaria de saber se é possível realizar a configuração do SSID GUEST com WPA2+WPA3 sem o uso de senha PSK e continuar direcionando os usuários para o portal cativo, para a autenticação, que hoje é feita no ISE. sabem dizer se é possível, sem prejudicar a dinâmica da rede?

1 Accepted Solution

Accepted Solutions

mcgonzaga
Level 1
Level 1

Agradeço o apoio de todos.

View solution in original post

7 Replies 7

JPavonM
VIP
VIP

Wireless security at L2 (WPA3 Transition mode) is different from authentication at other layers, in this case, Captive Portal. So yes, you can use a SSID with WPA3 Transition mode (recommended to enable Transition Disable) with a PSK and SAE both active, and then redirect all traffic to the Captive Portal as usual.

 

Rich R
VIP
VIP

If you use WPA2 then the connection has to be encrypted using pre-shared key (PSK) or 802.1x so in that case the answer is NO.

WPA3 introduced support for OWE but that is only supported with WPA3 - it's not part of WPA2:
https://www.cisco.com/c/en/us/products/collateral/wireless/catalyst-9100ax-access-points/wpa3-dep-guide-og.html#OWE
What model of WLC are you using, what model(s) of AP are you using and what version of software are you using?
All of those are relevant to what you will be able configure.

mcgonzaga
Level 1
Level 1

So in this case do I need to leave a PSK password configured anyway?
If it has to stay in this format, the guest network loses momentum for visitors, who now only register and gain access valid for 24 hours.
With a PSK password, will it be necessary to provide this password to visitors so that they can register correctly?

> So in this case do I need to leave a PSK password configured anyway?
Not unless you WANT to have to share a PSK with your visitors.  That defeats the purpose of guest WiFi but is not unheard of!  We have customers that ask for that so that they have extra control over who accesses their guest network.

> With a PSK password, will it be necessary to provide this password to visitors so that they can register correctly?
Yes

Who did this request come from?
These sort of requests often come from security teams who have hired a pen-tester or security auditor who comes in and runs an automated scanner which spits out a whole lot of "best practice recommendations" which includes "All SSIDs should be encrypted with WPA2/WPA3" which would be appropriate for a corporate network but is completely inappropriate for a hotspot/guest network.  Unfortunately the person doing the report is too stupid to understand what it means or they don't even read it themselves - they just paste the output from the scanner into their report and submit it - job done.
It requires an intelligent human being to read and assess the report and reply saying "this is absolute rubbish and completely inappropriate for a guest network which is open by design".  Guest users have a responsibility to encrypt all their traffic themselves (VPN, https, DNS over HTTPS etc).

Now WPA3 makes it possible to derive some security with OWE encryption but it's not the same as PSK or 802.1x but there are strong dependencies on your hardware and software and the clients.  Even if your hardware and software supports it, many clients will not support it.

This answer was one of the best answers I've seen right now, it would be funny if not tragic hahaha, but it's a shame that I can't answer that way in the future.
Today we use Cisco Catalyst 9800-CL Wireless Controller in the version
17.6.4, with Access Point C9120AXI-Z and C9115AXI-Z.

In this part we have already tried to explain that enabling WPA2 with a PSK password would remove all the dynamics and purpose of the Guest network. But they raised the tone so that there is another level of security before the captive portal. My question is, is there any other type of security that can be implemented that does not ruin the dynamics of a Guest network?

In that case your only options are WPA3 with OWE or WPA2/WPA3 with PSK <smile>
When users complain ask them to contact the person who insisted on this <smile>

mcgonzaga
Level 1
Level 1

Agradeço o apoio de todos.

Review Cisco Networking for a $25 gift card