User Guide: Vista Manager AWC Plug-in version 3.13.1

MAC Access Control



MAC Access Control is a mechanism to authenticate a wireless client by its MAC address when the client wants to associate to an AP.
There are two methods for MAC Access Control to check the validity of clients' MAC addresses. One is using RADIUS servers, and the other is using MAC Address Lists configured with the AWC Plug-in.
When you use the AWC Plug-in's MAC Address List, you can assign a single MAC Address List to each AP Profile. If an AP Profile has more than one VAP configured, you can choose whether to use the single MAC Address List on all VAPs, or to use the MAC Address List on some VAPs and use separate RADIUS servers on other VAPs.
Note
MAC Access Control is not supported in combination with Dynamic VLAN.
Note
MAC Access Control is not supported in combination with Area Authentication.
Note
While MAC Access Control checks the validity of a client, it does not improve the security level of the wireless communication itself. It is recommended that WPA Personal or WPA Enterprise is used for authentication and encryption in addition to the client validation by MAC Address Authentication.
If you use WPA Enterprise along with MAC Access Control, RADIUS attributes used for determining client VLANs should be configured as the ones for WPA Enterprise, not for MAC Address Authentication.
To use MAC Access Control, enable "MAC Access Control" on a VAP. Please refer to Configure AP Profiles for more details.

Use MAC Address List on AWC Plug-in

  1. First, you have to create a MAC Address List. Refer to Configure MAC Address Lists for more details.
    You have to choose an action, either "Allow" or "Deny" for a new MAC Address List to create.
    • "Allow" creates a whitelist, which only permits traffic from the MAC addresses in the list and blocks all other traffic.
    • "Deny" creates a blacklist, which only blocks traffic from the MAC addresses in the list and permits all other traffic.
  2. Next you have to create an AP Profile. Refer to Configure AP Profiles for details.
    The following two items are related to MAC Access Control:
    • Specify a MAC Address List to use in the "System" section's "MAC Address List".
      Clicking the "MAC Address List" drop-down list shows the "Select MAC Address List" dialog box. Click a MAC Address List for use with VAPs defined in the AP Profile and click "Select".

    • In the "VAP (Multiple SSID) Configuration" section, select "MAC Address List" for each VAP on which you want to use MAC Access Control.
      When you select "MAC Address List", the MAC Address List selected in the "Basic Configuration" section will be shown in the "Selected List" field.

      Note
      You cannot use separate MAC Address Lists for VAPs configured on a single AP Profile. If you want to use a different set of MAC Addresses for each VAP, you have to use external RADIUS servers.

Use External RADIUS Server

Next you have to create an AP Profile. Refer to Configure AP Profiles for details.
In the "VAP (Multiple SSID) Configuration" section, select "External RADIUS" for each VAP on which you want to use MAC Access Control via RADIUS servers.

When performing MAC Address Authentication, the AWC Plug-in sends a client's MAC address to the RADIUS server as a username. Therefore, you have to use the same MAC address format on both the AWC Plug-in and the RADIUS server.
Note
Refer to the RADIUS server's documentation for detailed instructions of how to configure the server.
Table 1: Configuration for MAC Address Format in RADIUS attributes
Item Name Description
User-Name Format Separator Specify an octet delimiter to use in a User-Name attribute from "Hyphen", "Colon" and "None". The default is "Hyphen".
User-Name Format Letter Case Specify which case to use in a User-Name attribute from "Upper" and "Lower". The default is "Lower".
User-Password Format Specify what is used for a User-Password attribute when a client MAC address is sent to the RADIUS server for authentication. The default is "User Name".
If you select "Fixed Password", a string specified in "User-Password Format Password" is always used as the value of the User-Password attribute.
If you select "User Name", the same string as the User-Name attribute (MAC Address) is sent to the RADIUS server as the value of the User-Password attribute.
User-Password Format Password Specify a fixed password string which is used when "User-Password Format Type" is set to "Fixed Password".
By default (where "User-Name Format Delimiter" is "Hyphen", "User-Name Format Case" is "Lower" and "User-Password Format Type" is "User Name"), authentication credentials (User-Name and User-Password attributes) of a client will be sent to the RADIUS server as follows:
Table 2: MAC Address Format with the Default Configuration.
Attribute Name Attribute Value Comment
User-Name Full Name MAC Address. Lower Case, Delimited by hyphen (eg. ab-cd-ef-12-34-56)
User-Password Password Same as the User-Name. (eg. ab-cd-ef-12-34-56)

Configure RADIUS Server

To use Dynamic VLAN, you have to add the APs to the RADIUS server's database as RADIUS clients.
Table 3: RADIUS Client Information to configured on the RADIUS Servers.
Item Name Description
RADIUS Client's IP Address Wireless AP's IP Address
(Example) 192.168.1.230
Secret Wireless AP's Password
(Example) "MyPassword"
Note
Because client users are authenticated by APs, you have to add all APs to the RADIUS client database.

Use both MAC Address List and External RADIUS server

TQ1402, TQm1402, TQ5403, TQ5403e, TQm5403, TQ6403 GEN2, TQm6403 GEN2, TQ6602, TQ6602 GEN2, TQm6602 GEN2, TQ6702 GEN2, TQm6702 GEN2, and TQ7403 can use both the AP's own MAC Address List and MAC Access Control via an External RADIUS server.
In the VAP (Multiple SSID) Settings of the AP Profile, set MAC Access Control to "MAC Address List + External RADIUS" and configure the MAC Address List and RADIUS server settings in the same way as when configuring each individually.
When using both the MAC Address List and an External RADIUS Server, the MAC address of the wireless client is queried in the order of MAC Address List and External RADIUS Server, and the wireless client is allowed to communicate if it is allowed to connect by either methods. This means that if the connection is refused by both, the client will not be able to communicate.

Combination of MAC Access Control and Captive Portal

In the VAP (Multiple SSID) Configuration of AP Profile, if any authentication method other than "None" is specified for both Captive Portal and MAC Access Control, these can be used together. In this case, the authentication process will be performed in the order of MAC Access Control, and then Captive Portal, and only the clients which have been successfully verified by both methods will be able to commuicate via the relevant VAP.

Also, when you are using TQ5403/5403e with firmware version 6.0.3-0.1 or later, you can choose to grant clients 2-step authentication with either or both MAC Access Control or Captive Portal.
If any authentication method other than "None" is specified for both Captive Portal and MAC Access Control, then the "Two-step auth with Captive Portal" option is displayed below the MAC Access Control options.
Table 4: Additional options for MAC Access Control in AP Profile VAP (multiple SSID) Configuration
Item Name Description
Two-step auth with Captive Portal When any authentication method except "None" is selected for Captive Portal, the authentication will be performed in two steps: Captive Portal and MAC Access Control.
  • When you select "Enable", only the wireless clients which have been successful with both Captive Portal and MAC Access Control authentication will be able to communicate via the relevant VAP.
  • When you select "Disable", the wireless clients which have been successful through either MAC Access Control or Captive Portal will be able to communicate via the relevant VAP.
When AMF Application Proxy is selected, only "Enable" is displayed for the option of Two-step auth with Captive Portal.
Note
This item is displayed if you select "Dual[11ax] GEN2", "Tri[11ac Wave2]", or "Tri[11ac Wave2] with External Antenna" for the Profile Type.
TQ5403/5403e, and TQm5403 models with firmware older than above will operate as "Enabled" regardless of the above setting. In other words, to communicate through the VAP in question, the wireless client must successfully authenticate with both Mac Access Control and Captive Portal.

29 Apr 2025 11:26