Wireless Access

last person joined: 21 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

MAC authentication

This thread has been viewed 28 times
  • 1.  MAC authentication

    Posted Sep 30, 2016 04:21 AM
    I'm looking to block everyone connecting to a WiFi, unless they provide me with their MAC address before hand so I can add it to the allowed list and allow them to connect.

    i don't want the wrong people accessing my network through overhearing the password.

    Is this possible through an Aruba controller on the GUI where I can just add new MAC addresses when I need to.

    Many thanks


  • 2.  RE: MAC authentication



  • 3.  RE: MAC authentication

    Posted Sep 30, 2016 04:40 AM
    I have read up on this and tried following the guide. However, users with the password but having not handing over their Mac addresses are still able to connect, so I'm stumped.


  • 4.  RE: MAC authentication

    EMPLOYEE
    Posted Sep 30, 2016 04:44 AM
    What role are they in after they connect?


  • 5.  RE: MAC authentication

    Posted Sep 30, 2016 06:00 AM
    So I've created a MAC address authentication profile.
    Then went onto the internal DB and added the MACs I had.
    Then is it just go to AAA profiles, and select your chosen under the network profile>MAC authentication?


  • 6.  RE: MAC authentication

    EMPLOYEE
    Posted Sep 30, 2016 07:39 AM

    You need a mac authentication profile attached to the AAA profile that corresponds to your SSID.  You can find out what AAA profile to edit by typing "show user-table verbose" and seeing what is under the "profile" column.

    You put mac addresses in the local user database.  The format of the macs you put in the local user database need to match the format in the mac authentication profile (lower, upper, delimeter, etc).  If users attach to the PSK SSID, they will get the default 802.1x role in the AAA profile.  If they also pass mac authentication, they will get the mac authentication default role (an elevated role). EDIT:  Not Correct If you instead want it so that they just simply cannot attach if they do not pass mac authentication, make sure in the AAA profile, l2 fail through is not enabled.

     



  • 7.  RE: MAC authentication

    Posted Oct 01, 2016 02:04 AM
    Update on this.

    I have managed to set the Mac auth table. I'm using both the GUI and CLI, on the CLI when I type #show user-table verbose
    It shows my iPhone connected with the MAC I entered and has me down as a guest role.
    I also connected my laptop to the wifi-but never entered the MAC address into the table, and the laptop Is able to connect fine, this is without me entering the MAC address onto the allowed list.
    Any ideas guys as to why it's not blocking those whose addresses I haven't entered?


  • 8.  RE: MAC authentication

    Posted Oct 01, 2016 02:12 AM
    The laptop was connected under role "login"


  • 9.  RE: MAC authentication

    EMPLOYEE
    Posted Oct 01, 2016 06:15 AM

    Using PSK, you cannot completely block users from being on the network on mac authentication failure.  You CAN send them to a captive portal page, upon failure however:

     

    In the AAA profile, make sure that the initial role is "logon".  This is the role a user gets if they have not passed mac authentication.  In the AAA profile, also configure the default mac authentication role, which is what a user gets if they pass authentication.

     

    This is how it should work:

     

    If a user associates and their mac address is not in the database, they should stay in the "logon" role, which typically produces a captive portal when they attempt to browse.  If the user associates and their mac address IS in the database, they will get the mac authentication default role in the AAA profile and they will be able to do whatever that allows.

     

    Only 802.1x authentication allows you to completely block users if they do not successfully mac authenticate.  Using PSK, you can only force them to be in a role with less IP privileges.



  • 10.  RE: MAC authentication

    Posted Oct 04, 2016 04:40 AM
    Thank you for your response, it is much appreciated.

    We are not using PSK, I think we are on 801.1x is this possible with these parameters then?


  • 11.  RE: MAC authentication

    EMPLOYEE
    Posted Oct 04, 2016 07:19 AM

    If you uncheck L2 failthrough in the AAA profile the user will not be able to connect if the user fails mac authentication.