0% found this document useful (0 votes)
85 views10 pages

Mac Authentication Bypass

The document discusses configuring MAC authentication bypass (MAB) on wireless networks. MAB allows clients to authenticate based on their MAC address alone by sending client MAC addresses to a RADIUS server. The document provides guidelines for MAB configuration and describes how to configure MAB for local or external authentication using the GUI or CLI of a wireless controller. It also discusses configuring MAC filtering policies and WLAN security settings to use MAB.

Uploaded by

Pagalka Bacha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views10 pages

Mac Authentication Bypass

The document discusses configuring MAC authentication bypass (MAB) on wireless networks. MAB allows clients to authenticate based on their MAC address alone by sending client MAC addresses to a RADIUS server. The document provides guidelines for MAB configuration and describes how to configure MAB for local or external authentication using the GUI or CLI of a wireless controller. It also discusses configuring MAC filtering policies and WLAN security settings to use MAB.

Uploaded by

Pagalka Bacha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

MAC Authentication Bypass

• MAC Authentication Bypass, on page 1


• Configuring 802.11 Security for WLAN (GUI), on page 3
• Configuring 802.11 Security for WLAN (CLI), on page 4
• Configuring AAA for External Authentication, on page 4
• Configuring AAA for Local Authentication (GUI), on page 6
• Configuring AAA for Local Authentication (CLI), on page 6
• Configuring MAB for Local Authentication, on page 7
• Configuring MAB for External Authentication (GUI), on page 8
• Configuring MAB for External Authentication (CLI), on page 8

MAC Authentication Bypass


You can configure the embedded wireless controller to authorize clients based on the client MAC address by
using the MAC authentication bypass (MAB) feature.
When MAB is enabled, the embedded wireless controller uses the MAC address as the client identity. The
authentication server has a database of client MAC addresses that are allowed network access. After detecting
a client, the embedded wireless controller waits for a packet from the client. The embedded wireless controller
sends the authentication server a RADIUS-access/request frame with a username and password based on the
MAC address. If authorization succeeds, the embedded wireless controller grants the client access to the
network. If authorization fails, the embedded wireless controller assigns the port to the guest WLAN, if one
is configured.
Clients that were authorized with MAC authentication bypass can be re-authenticated. The re-authentication
process is the same as that for clients that were authenticated. During re-authentication, the port remains in
the previously assigned WLAN. If re-authentication is successful, the embedded wireless controller keeps the
port in the same WLAN. If re-authentication fails, the embedded wireless controller assigns the port to the
guest WLAN, if one is configured.

MAB Configuration Guidelines


• MAB configuration guidelines are the same as the 802.1x authentication guidelines.
• When MAB is disabled from a port after the port has been authorized with its MAC address, the port
state is not affected.

MAC Authentication Bypass


1
MAC Authentication Bypass
MAB Configuration Guidelines

• If the port is in the unauthorized state and the client MAC address is not in the authentication-server
database, the port remains in the unauthorized state. However, if the client MAC address is added to the
database, the switch can use MAC authentication bypass to re-authorize the port.
• If the port is in the authorized state, the port remains in this state until re-authorization occurs.
• You can configure a timeout period for hosts that are connected by MAB but are inactive. The valid
range is from 1 to 65535, in seconds.

Note If wlan-profile-name is configured for a user, guest user authentication is allowed only from that WLAN.
If wlan-profile-name is not configured for a user, guest user authentication is allowed on any WLAN.

If you want the client to connect to SSID1, but not to SSID2 using mac-filtering, ensure that you configure
aaa-override in the policy profile.
In the following example, when a client with MAC address 1122.3344.0001 tries to connect to a WLAN, the
request is sent to the local RADIUS server, which checks the presence of the client MAC address in its attribute
list (FILTER_1 and FILTER_2). If the client MAC address is listed in an attribute list (FILTER_1), the client
is allowed to join the WLAN (WLAN_1) that is returned as ssid attribute from the RADIUS server. The client
is rejected, if the client MAC address is not listed in the attribute list.
Local RADIUS Server Configuration
!Configures an attribute list as FILTER_2
aaa attribute list FILTER_2
!Defines an attribute type that is to be added to an attribute list.
attribute type ssid "WLAN_2"

!Username with the MAC address is added to the filter


username 1122.3344.0002 mac aaa attribute list FILTER_2

!
aaa attribute list FILTER_1
attribute type ssid "WLAN_1"
username 1122.3344.0001 mac aaa attribute list FILTER_1

Controller Configuration
! Sets authorization to the local radius server
aaa authorization network MLIST_MACFILTER local

!A WLAN with the SSID WLAN_2 is created and MAC filtering is set along with security
parameters.
wlan WLAN_2 2 WLAN_2
mac-filtering MLIST_MACFILTER
no security wpa
no security wpa wpa2 ciphers

!WLAN with the SSID WLAN_1 is created and MAC filtering is set along with security parameters.
wlan WLAN_1 1 WLAN_1
mac-filtering MLIST_MACFILTER
no security wpa
no security wpa wpa2 ciphers aes
no security wpa akm dot1x
security web-auth
security web-auth authentication-list WEBAUTH

! Policy profile to be associated with the above WLANs

MAC Authentication Bypass


2
MAC Authentication Bypass
Configuring 802.11 Security for WLAN (GUI)

wireless profile policy MAC_FILTER_POLICY


aaa-override
vlan 504
no shutdown

Configuring 802.11 Security for WLAN (GUI)


Procedure

Step 1 Choose Configuration > Tags & Profiles > WLANs.


Step 2 Click Add to create WLANs.
The Add WLAN page is displayed.

Step 3 In the Security tab, you can configure the following:


• Layer2
• Layer3
• AAA

Step 4 In the Layer2 tab, you can configure the following:


a) Choose the Layer2 Security Mode from the following options:
• None—No Layer 2 security.
• WPA + WPA2—Wi-Fi Protected Access.
• Static WEP—Static WEP encryption parameters.

b) Enable MAC Filtering if required. MAC Filtering is also known as MAC Authentication Bypass (MAB).
c) In the Protected Management Frame section, choose the PMF as Disabled, Optional, or Required. By
default, the PMF is disabled.
d) In the WPA Parameters section, choose the following options, if required:
• WPA Policy
• WPA2 Policy
• WPA2 Encryption

e) Choose an option for Auth Key Mgmt.


f) Choose the appropriate status for Fast Transition between APs.
g) Check the Over the DS check box to enable Fast Transition over a distributed system.
h) Enter the Reassociation Timeout value, in seconds. This is the time after which a fast transition
reassociation times out.
i) Click Save & Apply to Device.
Step 5 In the Layer3 tab, you can configure the following:
a) Check the Web Policy check box to use the web policy.
b) Choose the required Webauth Parameter Map value from the drop-down list.

MAC Authentication Bypass


3
MAC Authentication Bypass
Configuring 802.11 Security for WLAN (CLI)

c) Choose the required Authentication List value from the drop down list.
d) In the Show Advanced Settings section, check the On Mac Filter Failure check box.
e) Enable the Conditional Web Redirect and Splash Web Redirect.
f) Choose the appropriate IPv4 and IPv6 ACLs from the drop-down lists.
g) Click Save & Apply to Device.
Step 6 In the AAA tab, you can configure the following:
a) Choose an authentication list from the drop-down.
b) Check the Local EAP Authentication check box to enable local EAP authentication on the WLAN. Also,
choose the required EAP Profile Name from the drop-down list.
c) Click Save & Apply to Device.

Configuring 802.11 Security for WLAN (CLI)


Follow the procedure below to configure 802.11 security for WLAN:

Procedure

Command or Action Purpose


Step 1 wlan profile-name wlan-id ssid Configures the WLAN profile.
Example:
Device(config)# wlan ha-wlan-dot1x-test
3 ha-wlan-dot1x-test

Step 2 security dot1x authentication-list Enables security authentication list for dot1x
auth-list-name security.
Example:
Device(config-wlan)# security dot1x
authentication-list default

Step 3 no shutdown Enables the WLAN.


Example:
Device(config-wlan)# no shutdown

Configuring AAA for External Authentication


Follow the procedure given below to configure AAA for external authentication.

Procedure

Command or Action Purpose


Step 1 radius server server-name Sets the radius server.
Example:

MAC Authentication Bypass


4
MAC Authentication Bypass
Configuring AAA for External Authentication

Command or Action Purpose


Device(config)# radius server ISE

Step 2 address {ipv4 | ipv6}radius-server-ip-address Specifies the radius server address.


auth-port auth-port-no acct-port acct-port-no
Example:
Device(config-radius-server)# address
ipv4 9.2.58.90 auth-port 1812 acct-port
1813

Step 3 key key Sets the per-server encryption key.


Example:
Device(config-radius-server)# key any123

Step 4 exit Returns to the configuration mode.


Example:
Device(config-locsvr-da-radius)# exit

Step 5 aaa local authentication default Selects the default local authentication and
authorization default authorization.
Example:
Device(config)# aaa local authentication
default authorization default

Step 6 aaa new-model Creates a AAA authentication model. Enable


new access control commands and functions.
Example:
Device(config)# aaa new-model

Step 7 aaa session-id common Creates common session ID.


Example:
Device(config)# aaa session-id common

Step 8 aaa authentication dot1x default group Configures authentication for the default dot1x
radius method.
Example: .
Device(config)# aaa authentication dot1x
default group radius

Step 9 aaa authorization network default group Configures authorization for network services.
radius
Example:
Device(config)# aaa authorization
network default group radius

Step 10 dot1x system-auth-control Enables SysAuthControl.


Example:
Device(config)# dot1x
system-auth-control

MAC Authentication Bypass


5
MAC Authentication Bypass
Configuring AAA for Local Authentication (GUI)

Configuring AAA for Local Authentication (GUI)


Procedure

Step 1 Choose Configuration > Tags & Profiles > WLANs.


Step 2 On the Wireless Networks page, click Add.
Step 3 In the Add WLAN window that is displayed, select Security > AAA .
Step 4 Select a value from the Authentication List drop-down.
Step 5 Check the Local EAP Authentication check box to enable local EAP authentication on the WLAN.
Step 6 Select a value from the EAP Profile Name drop-down.
Step 7 Click Save & Apply to Device.

Configuring AAA for Local Authentication (CLI)


Follow the procedure given below to configure AAA for local authentication.

Procedure

Command or Action Purpose


Step 1 aaa authentication dot1x default local Configures to use the default local RADIUS
server.
Example:
Device(config)# aaa authentication dot1x
default local

Step 2 aaa authorization network default local Configures authorization for network services.
Example:
Device(config)# aaa authorization network
default local

Step 3 aaa authorization credential-download Configures default database to download


default local credentials from local server.
Example:
Device(config)# aaa authorization
credential-download default local

Step 4 username mac-address mac For MAC filtering using username, use the
username abcdabcdabcd mac command.
Example:
Device(config)# username abcdabcdabcd
mac

Step 5 aaa local authentication default authorization Configures the local authentication method list.
default

MAC Authentication Bypass


6
MAC Authentication Bypass
Configuring MAB for Local Authentication

Command or Action Purpose


Example:
Device(config)# aaa local authentication
default authorization default

Step 6 aaa new-model Creates a AAA authentication model. Enable


new access control commands and functions.
Example:
Device(config)# aaa new-model

Step 7 aaa session-id common Creates common session ID.


Example:
Device(config)# aaa session-id common

Configuring MAB for Local Authentication


Follow the procedure given below to configure MAB for local authentication.

Before you begin


Configure AAA local authentication.
Configure the username for WLAN configuration (local authentication) using username mac-address mac
command.

Note The mac-address must be in the following format: abcdabcdabcd

Procedure

Command or Action Purpose


Step 1 wlan profile-name wlan-id Specifies the WLAN name and ID.
Example:
wlan CR1_SSID_mab-local-default 1
CR1_SSID_mab-local-default

Step 2 mac-filtering default Sets MAC filtering support for the WLAN.
Example:
Device(config-wlan)# mac-filtering
default

Step 3 no security wpa Disables WPA secuirty.


Example:
Device(config-wlan)# no security wpa

MAC Authentication Bypass


7
MAC Authentication Bypass
Configuring MAB for External Authentication (GUI)

Command or Action Purpose


Step 4 no security wpa akm dot1x Disables security AKM for dot1x.
Example:
Device(config-wlan)# no security wpa akm
dot1x

Step 5 no security wpa wpa2 Disables WPA2 security.


Example:
Device(config-wlan)# no security wpa wpa2

Step 6 no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES.
Example:
Device(config-wlan)# no security wpa wpa2
ciphers aes

Step 7 no shutdown Enables the WLAN.


Example:
Device(config-wlan)# no shutdown

Configuring MAB for External Authentication (GUI)


Before you begin
Configure AAA external authentication.

Procedure

Step 1 Choose Configuration > Wireless > WLANs.


Step 2 On the Wireless Networks page, click the name of the WLAN.
Step 3 In the Edit WLAN window, click the Security tab.
Step 4 In the Layer2 tab, check the MAC Filtering check box to enable the feature.
Step 5 With MAC Filtering enabled, choose the Authorization List from the drop-down list.
Step 6 Save the configuration.

Configuring MAB for External Authentication (CLI)


Follow the procedure given below to configure MAB for external authentication.

Before you begin


Configure AAA external authentication.

MAC Authentication Bypass


8
MAC Authentication Bypass
Configuring MAB for External Authentication (CLI)

Procedure

Command or Action Purpose


Step 1 wlan wlan-name wlan-id ssid-name Specifies the WLAN name and ID.
Example:
wlan CR1_SSID_mab-ext-radius 3
CR1_SSID_mab-ext-radius

Step 2 mac-filtering list-name Sets the MAC filtering parameters. Here,


ewlc-radius is an example for the list-name
Example:
Device(config-wlan)# mac-filtering
ewlc-radius

Step 3 no security wpa Disables WPA secuirty.


Example:
Device(config-wlan)# no security wpa

Step 4 no security wpa akm dot1x Disables security AKM for dot1x.
Example:
Device(config-wlan)# no security wpa akm
dot1x

Step 5 no security wpa wpa2 Disables WPA2 security.


Example:
Device(config-wlan)# no security wpa wpa2

Step 6 mab request format attribute {1 groupsize Optional. Configures the delimiter while using
size separator separator [lowercase | MAC filtering in a WLAN.
uppercase] | 2 {0 | 7 | LINE} LINE password
Here,
| 32 vlan access-vlan}
1- Specifies the username format used for MAB
Example:
requests.
Device(config)# mab request format
attribute 1 groupsize 4 separator groupsize size- Specifies the number of hex
digits per group. The valid values range from
1 to 12.
separator separator- Specifies how to separate
groups. The separators are comma, semicolon,
and full stop.
lowercase- Specifies the username in lowercase
format.
uppercase- Specifies the username in uppercase
format.
2- Specifies the global password used for all
the MAB requests.
0- Specifies the unencrypted password.

MAC Authentication Bypass


9
MAC Authentication Bypass
Configuring MAB for External Authentication (CLI)

Command or Action Purpose


7- Specifies the hidden password.
LINE- Specifies the encrypted or unencrypted
password.
password- LINE password.
32- Specifies the NAS-Identifier attribute.
vlan- Specifies a VLAN.
access-vlan- Specifies the configured access
VLAN.

Step 7 no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES.
Example:
Device(config-wlan)# no security wpa wpa2
ciphers aes

Step 8 no shutdown Enables the WLAN.


Example:
Device(config-wlan)# no shutdown

MAC Authentication Bypass


10

You might also like