Hi.
It looks like you don't have set the AP names on the controller so you get the default name.
You can use CLI command to set AP name and AP location on the WLC.
ap name XXXXXXX location "XXXXXXXXXX XXXXXXXXXXX"
I have very limited knowledge on Cisco WLC. You can check/try setting AP and location on the AP and see, what you will get in IETF parameters.
When you determine the correct parameter, then you can use it to dynamically set vlan like in the following example. In this example, I use AP-Name as the name of the vlan. You can put vlan number to the location parameter in
ap name xx location xx command and use it to assign the correct vlan by number.
Enforcement profile example

The result in my example is

This is just a demonstration how you can use values gathered from different sources to dynamically create appropriate enforcement profiles. It require some discipline eg. you need to maintain correct information for all APs for this to work reliably.
Best, Gorazd
------------------------------
Gorazd Kikelj
------------------------------
Original Message:
Sent: Sep 20, 2022 05:08 AM
From: BERNHARD HUSTOMO
Subject: Feature Request: SEPARATE 'Use Cached Roles and Posture Attributes From Previous Sessions'
My "Connection:AP-Name" has the AP MAC address as its value, and "RADIUS:IETF:Called-Station-Id" is basically the same as RADIUS:IETF:NAS-Identifier in which I got the AP-Name & Policy Tag appended there already. I don't know how to populate the called-station-id in 9800 WLC Cisco controller with SSID&&AP-Group, last time in 5500 series I could do that.
Example of my attributes' values:
- Radius:IETF:Called-Station-Id f0-1d-11-22-33-44:<SSID-Name>
- Radius:IETF:NAS-Identifier ushospwl:<CustName>-L01-AP11:<CustName>_POLICY_TAG_<TagName>
- Connection:AP-Name f01d11223344
I tried adding an added attribute under Network >> Devices, but it does not help as I can only add the attribute at the WLC device itself, not the AP.
Original Message:
Sent: Sep 16, 2022 02:27 AM
From: Gorazd Kikelj
Subject: Feature Request: SEPARATE 'Use Cached Roles and Posture Attributes From Previous Sessions'
In RADIUS request you'll find attributes like Aruba:Aruba-Location-Id and IETF_Called-Station-Id where the name of the AP is provided. The same info you can get from Connection:AP-Name.
If you have some unified way to include location info in the AP name, you can use this data to find out the micro location of the client.
You do not need to define APs in Device database.
Best, Gorazd
------------------------------
Gorazd Kikelj
Original Message:
Sent: Sep 15, 2022 11:16 AM
From: Gorazd Kikelj
Subject: Feature Request: SEPARATE 'Use Cached Roles and Posture Attributes From Previous Sessions'
Did you try to assign attribute to APs in Clearpass? If you assign for example attribute Location=L1 to endpoint database records of APs in one floor, you could use it in role mapping/enforcement to assign correct vlan.
Best, Gorazd
------------------------------
Gorazd Kikelj
Original Message:
Sent: Sep 14, 2022 12:43 PM
From: BERNHARD HUSTOMO
Subject: Feature Request: SEPARATE 'Use Cached Roles and Posture Attributes From Previous Sessions'
My network team said it is because , one vlan can only have limited number of hosts , and we cannot predict where the endpoint will be roaming , and according to the design, this one vlan cannot be configured everywhere.
Personally, I also find that design has weaknesses, but either way this ability to choose use cached Roles or Posture should be there.
Original Message:
Sent: Sep 13, 2022 11:18 AM
From: Unknown User
Subject: Feature Request: SEPARATE 'Use Cached Roles and Posture Attributes From Previous Sessions'
Why have multiple policy tags for this at all on the 9800? Why should the client be forced to a "hard" layer3 roam just because they moved floors? Why not use the same VLAN?
Original Message:
Sent: Sep 13, 2022 07:20 AM
From: BERNHARD HUSTOMO
Subject: Feature Request: SEPARATE 'Use Cached Roles and Posture Attributes From Previous Sessions'
Hi All,
I got a use-case, where a device roams from one floor to another, within same SSID, but different so-called Policy Tag in Cisco 9800 WLC. Different floor different policy tag.
This Policy Tag appends at RADIUS:NAS-Identifier and I put a Role Mapping rule like below:
- If policy tag = L1 -> assign WLAN VLAN L1 clearpass role
- If policy tag = L2 -> assign WLAN VLAN L2 clearpass role
Role mapping evaluation algorithm is the evaluate-all.
I ask my network team, for some reason they cannot name L1 and L2 with same vlan name with different vlan id at their backend.
So the issue with this, is when a user connects to L1, and then moving to L2 within 5 minutes policy cache result, this endpoint will have both L1 and L2 clearpass roles at the same time , whereby at the enforcement policy, first-applicable rule is applied: L2 rule is below L1, and this 'use cached Roles and Posture attributes from previous session' is checked, because I have posture attribute that needs to take into account as well.
If I change the role mapping evaluation algorithm to first-applicable, it is still possible for the user to hold two clearpass roles at the same time in this scenario.
So, at the end, could I request please, to have multiple options to tick the 'use cached Roles' separately from the 'use cached Posture' ?
Definitely in this case I do not want to tick the 'use cached Roles' because if ticked, it will make the same enforcement mistakes. At the same time Posture cache is a must so if you separate it, I will tick the Posture ONLY.
PS: actually we can create multiple Service with multiple policy tag as the service rule, but imagine we have so many floors with the SSID broadcasted everywhere... it will be so many Service lines seen at the Services page, and the enforcement policy should become a lot as well.