{"id":4958,"date":"2021-01-13T17:46:44","date_gmt":"2021-01-13T16:46:44","guid":{"rendered":"https:\/\/cyber-fi.net\/?p=4958"},"modified":"2024-09-15T09:08:38","modified_gmt":"2024-09-15T07:08:38","slug":"meraki-wlan-mac-based-access-control-with-psk","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2021\/01\/13\/meraki-wlan-mac-based-access-control-with-psk\/","title":{"rendered":"Meraki WLAN MAC-based access control with PSK"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">The Problem: <\/h3>\n\n\n\n<p>When looking at the configuration of a Meraki SSID (this is software version 27.5.1), there is no obvious way to configure MAC-based access-control and PSK simultaneously as it is possible with the traditional Cisco WLAN:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"423\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.14.05@2x-1024x423.jpg\" alt=\"\" class=\"wp-image-4959\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.14.05@2x-1024x423.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.14.05@2x-300x124.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.14.05@2x-768x318.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.14.05@2x-1536x635.jpg 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.14.05@2x.jpg 2012w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We can configure either PSK <strong>or<\/strong> MAC-based access control, but the later without encryption.<\/p>\n\n\n\n<p>Why do we need both? One reason is to control Guest-access with the Cisco ISE and there we need a RADIUS-Request from the NAD to start the Guest-Workflow. At the same time we want to protect the SSID, that not every one in range can connect to this Guest-SSID.<\/p>\n\n\n\n<p>The solution to this &#8220;problem&#8221; is to combine two Meraki features which result in the desired functionality.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Meraki SSID-config: <\/h3>\n\n\n\n<p>Instead of using the option &#8220;MAC-based access control (no encryption)&#8221; we choose the option &#8220;Identity PSK with RADIUS&#8221;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"85\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.26.49@2x-1024x85.jpg\" alt=\"\" class=\"wp-image-4960\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.26.49@2x-1024x85.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.26.49@2x-300x25.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.26.49@2x-768x64.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.26.49@2x.jpg 1464w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>With this feature we assign a PSK to the session that is not configured on the Meraki-side, the PSK gets &#8220;pushed&#8221; from the RADIUS-server. The Guest-session is then controlled with the Meraki Splash-page, same as we would do it without a PSK;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.55.59@2x-1024x389.jpg\" alt=\"\" class=\"wp-image-4967\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.55.59@2x-1024x389.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.55.59@2x-300x114.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.55.59@2x-768x292.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.55.59@2x-1536x583.jpg 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.55.59@2x.jpg 1838w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The ISE is running on 10.255.192.141:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"478\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.57.53@2x-1024x478.jpg\" alt=\"\" class=\"wp-image-4968\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.57.53@2x-1024x478.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.57.53@2x-300x140.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.57.53@2x-768x359.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.57.53@2x-1536x717.jpg 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.57.53@2x.jpg 1718w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>On the Meraki-APs we need the &#8220;Walled Garden&#8221; feature instead of using Redirect-ACLs like on traditional Cisco APs:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"238\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.58.45@2x.jpg\" alt=\"\" class=\"wp-image-4969\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.58.45@2x.jpg 966w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.58.45@2x-300x74.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.58.45@2x-768x189.jpg 768w\" sizes=\"auto, (max-width: 966px) 100vw, 966px\" \/><\/figure>\n\n\n\n<p>To combine these two features, we just need to make sure that we always return the same PSK for the same session.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The ISE-Config: <\/h3>\n\n\n\n<p>Here I show the policy for the &#8220;hotspot&#8221;-Guest workflow. The other workflows could also be used in a similar way.  I assume that the reader knows the Guest-Workflow (which is for example learned in the Cisco SISE-training) . <\/p>\n\n\n\n<p>We need two Authorization rules, one for the unknown guest that starts the workflow and one for the enrolled guest that gets access to the internet.<\/p>\n\n\n\n<p>This is the last authorization rule in my MAB-policy set (yes, not a perfect name, I&#8217;ll change that later \ud83d\ude09 ):<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"102\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.34.42@2x-1024x102.jpg\" alt=\"\" class=\"wp-image-4961\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.34.42@2x-1024x102.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.34.42@2x-300x30.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.34.42@2x-768x76.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.34.42@2x-1536x153.jpg 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.34.42@2x.jpg 1692w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>When no other rule matches for an unknown MAC, the Authorization profile &#8220;WLAN-Hotspot&#8221; is returned to the Meraki AP. I match on Wireless MAB and the SSID name. These are the attributes in that profile:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"135\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.37.40@2x-1024x135.jpg\" alt=\"\" class=\"wp-image-4962\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.37.40@2x-1024x135.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.37.40@2x-300x40.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.37.40@2x-768x101.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.37.40@2x-1536x203.jpg 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.37.40@2x.jpg 1832w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The important attribute ist RADIUS:Tunnel-Password, which implements the &#8220;iPSK with RADIUS&#8221; feature. The redirect-ACL is not needed and the Meraki-documentation uses the keyword &#8220;NULL&#8221;. I use the same Authorization Profile also for my traditional Cisco WLAN and that is the reason an ACL is configured.<\/p>\n\n\n\n<p>With this config, the Guest can associate to the WLAN with the PSK &#8220;MySuperSecurePSK&#8221; and is redirected to the ISE-Portal to start the Guest-Flow. After completing the guest-flow the next authorization-rule is selected:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"167\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.45.36@2x-1024x167.jpg\" alt=\"\" class=\"wp-image-4963\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.45.36@2x-1024x167.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.45.36@2x-300x49.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.45.36@2x-768x125.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.45.36@2x-1536x251.jpg 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.45.36@2x.jpg 1740w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This example is from a LAB-environment, I use the same authorization for both the Hotspot- and Registered-Guest workflows. These are the RADIUS-attributes that I return:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"163\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.50.43@2x-1024x163.jpg\" alt=\"\" class=\"wp-image-4965\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.50.43@2x-1024x163.jpg 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.50.43@2x-300x48.jpg 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.50.43@2x-768x122.jpg 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.50.43@2x-1536x244.jpg 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2021\/01\/CleanShot-2021-01-13-at-16.50.43@2x.jpg 1812w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In this Authorization-Profile the redirect-URL is removed, but most important, the same Tunnel-Password as before is returned. If we skip the Tunnel-Password in the final authorization, the endpoint directly loses the connection. The other parameters are again not relevant, but we can assign a VLAN and\/or a Meraki Group-Policy for which I use the &#8220;Filter-ID&#8221;.<\/p>\n\n\n\n<p>Any drawbacks? Well, just remember that you have to modify at least two authorization profiles when you do your regular PSK-change.<\/p>\n\n\n\n<p>Have fun in combining your Cisco ISE with your Meraki APs!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Problem: When looking at the configuration of a Meraki SSID (this is software version 27.5.1), there is no obvious way to configure MAC-based access-control and PSK simultaneously as it is possible with the traditional Cisco WLAN: We can configure either PSK or MAC-based access control, but the later without encryption. Why do we need <\/p>\n<div class=\"read-more-text\"><a href=\"https:\/\/cyber-fi.net\/index.php\/2021\/01\/13\/meraki-wlan-mac-based-access-control-with-psk\/\" class=\"read-more\">continue reading<\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[705,717,685],"tags":[137,696,690],"class_list":["post-4958","post","type-post","status-publish","format-standard","hentry","category-meraki","category-wireless","category-cisco-wireless","tag-cisco","tag-ise","tag-meraki"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/4958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=4958"}],"version-history":[{"count":12,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/4958\/revisions"}],"predecessor-version":[{"id":4981,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/4958\/revisions\/4981"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=4958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=4958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=4958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}