User Guide: Vista Manager AWC Plug-in version 3.8.0

MAC Access Control



MAC Access Control is a mechanism to authenticate a wireless client by its MAC address when the client wants to associate to an AP.

There are two methods for MAC Access Control to check the validity of clients' MAC addresses. One is using RADIUS servers, and the other is using MAC Address Lists configured with the AWC Plug-in.
When you use the AWC Plug-in's MAC Address List, you can assign a single MAC Address List to each AP Profile. If an AP Profile has more than one VAP configured, you can choose whether to use the single MAC Address List on all VAPs, or to use the MAC Address List on some VAPs and use separate RADIUS servers on other VAPs.

Note
MAC Access Control is not supported in combination with Area Authentication.
Note
MAC Address Authentication is valid for TQ1402, TQm1402, TQ2450, TQ3200, TQ3400, TQ3600, TQ4400, TQ4600, TQ4400e, TQ5403, TQ5403e, TQm5403, and TQ6602 running normal firmware. TQ4400, TQ4600, TQ5403, and TQ5403e running SDN/OpenFlow-capable firmware are not supported.
Note
While MAC Access Control checks the validity of a client, it does not improve the security level of the wireless communication itself. It is recommended that WPA Personal or WPA Enterprise is used for authentication and encryption in addition to the client validation by MAC Address Authentication.
If you use WPA Enterprise along with MAC Access Control, RADIUS attributes used for determining client VLANs should be configured as the ones for WPA Enterprise, not for MAC Address Authentication.

To use MAC Access Control, enable "MAC Access Control" on a VAP. Please refer to Configure AP Profiles for more details.

Use MAC Address List on AWC Plug-in

  1. First, you have to create a MAC Address List. Refer to Configure MAC Address Lists for more details.
    You have to choose an action, either "Allow" or "Deny" for a new MAC Address List to create.

    • "Allow" creates a whitelist, which only permits traffic from the MAC addresses in the list and blocks all other traffic.

    • "Deny" creates a blacklist, which only blocks traffic from the MAC addresses in the list and permits all other traffic.

  2. To use an external RADIUS server for MAC Address Authentication, you have to create an AP Profile. Refer to Configure AP Profiles for details.
    The following two items are related to MAC Access Control:

    • Specify a MAC Address List to use in the "System" section's "MAC Address List".
      Clicking the "MAC Address List" drop-down list shows the "Select MAC Address List" dialog box. Click a MAC Address List for use with VAPs defined in the AP Profile and click "Select".


    • In the "VAP (Multiple SSID) Configuration" section, select "MAC Address List" for each VAP on which you want to use MAC Access Control using the list.
      When you select "MAC Address List", the MAC Address List selected in the "Basic Configuration" section will be shown in the "Selected List" field.

      Note
      You cannot use separate MAC Address Lists for VAPs configured on a single AP Profile. If you want to use a different set of MAC Addresses for each VAP, you have to use external RADIUS servers.

Use External RADIUS Server

To use an external RADIUS server for MAC Address Authentication, you have to create an AP Profile. Refer to Configure AP Profiles for details.
In the "VAP (Multiple SSID) Configuration" section, select "External RADIUS" for each VAP on which you want to use MAC Access Control via RADIUS servers.


When performing MAC Address Authentication, the AWC Plug-in sends a client's MAC address to the RADIUS server as a username. Therefore, you have to use the same MAC address format on both the AWC Plug-in and the RADIUS server.
Note
Refer to the RADIUS server's documentation for detailed instructions of how to configure the server.

Table 1: Configuration for MAC Address Format in RADIUS attributes
Item Name Description
User-Name Format Separator Specify an octet delimiter to use in a User-Name attribute from "Hyphen", "Colon" and "None". The default is "Hyphen".
User-Name Format Letter Case Specify which case to use in a User-Name attribute from "Upper" and "Lower". The default is "Lower".
User-Password Format Specify what is used for a User-Password attribute when a client MAC address is sent to the RADIUS server for authentication. The default is "User Name".
If you select "Fixed Password", a string specified in "User-Password Format Password" is always used as the value of the User-Password attribute.
If you select "User Name", the same string as the User-Name attribute (MAC Address) is sent to the RADIUS server as the value of the User-Password attribute.
User-Password Format Password Specify a fixed password string which is used when "User-Password Format Type" is set to "Fixed Password".

By default (where "User-Name Format Delimiter" is "Hyphen", "User-Name Format Case" is "Lower" and "User-Password Format Type" is "User Name"), authentication credentials (User-Name and User-Password attributes) of a client will be sent to the RADIUS server as follows:

Table 2: MAC Address Format with the Default Configuration.
Attribute Name Attribute Value Comment
User-Name Full Name MAC Address. Lower Case, Delimited by hyphen (eg. ab-cd-ef-12-34-56)
User-Password Password Same as the User-Name. (eg. ab-cd-ef-12-34-56)

Configure RADIUS Server

To use Dynamic VLAN, you have to add the APs to the RADIUS server's database as RADIUS clients.

Table 3: RADIUS Client Information to configured on the RADIUS Servers.
Item Name Description
RADIUS Client's IP Address Wireless AP's IP Address
(Example) 192.168.1.230
Secret Wireless AP's Password
(Example) "MyPassword"
Note
Because client users are authenticated by APs, you have to add all APs to the RADIUS client database.

Use both MAC Address List and External RADIUS server

TQ1402, TQm1402, TQ5403, TQ5403e can use both the AP's own MAC Address List and MAC Access Control via an External RADIUS server.
In the VAP (Multiple SSID) Settings of the AP Profile, set MAC Access Control to "MAC Address List + External RADIUS" and configure the MAC Address List and RADIUS server settings in the same way as when configuring each individually.
When using both the MAC Address List and an External RADIUS Server, the MAC address of the wireless client is queried in the order of MAC Address List and External RADIUS Server, and the wireless client is allowed to communicate if it is allowed to connect by either methods. This means that if the connection is refused by both, the client will not be able to communicate.

Dynamic VLAN

With TQ4600, MAC Access Control supports Dynamic VLAN directly, and can assign each client (user) to a particular VLAN that is specified as RADIUS attributes during MAC Address Authentication.
Note
For wireless APs other than the TQ4600, the combination of MAC Access Control and Dynamic VLAN is not supported.

Use with WPA Enterprise

When you use WPA Enterprise together with MAC Access Control, a wireless client is assigned to the VLAN that was determined during the WPA Enterprise authentication.
This means that if the user's VLAN is set in the authentication information of the RADIUS server referenced by the WPA Enterprise, that VLAN will be applied.
If the AP doesn't receive any VLAN information during WPA Enterprise authentication, the client's traffic will be handled on a VLAN that is configured for the VAP.

As a result, VLAN attributes received during MAC Access Control will be discarded.
Note
When Captive Portal, MAC Access Control, and WPA Enterprise are used together, they are processed in the order of "MAC Access Control" -> "WPA Enterprise" -> "Captive Portal".



28 Mar 2022 10:47