Authentication Flow via AMF Security mini
Authentication for AMF Application Proxy in AW+
This section explains the authentication flow of devices in the AMF application proxy configuration of AW+.There are two components in the AMF application proxy of AW+, but since device authentication is handled by the whitelist feature, this section explains the AMF application proxy whitelist feature.
- AMF Application Proxy Whitelist
- AMF Application Proxy Blacklist
NoteThe basic flow leading up to an AMF member (edge node) sending a request to AMF Security mini is as follows.Displays the date and time when AMF Security mini and AMF Member last communicated.
- An AMF member (edge node) receives a packet from a device.
- The AMF member (edge node) checks whether authentication has been performed for the source MAC Address of the packet from the device. If the device has been successfully authenticated, the AMF Member (edge node) forwards the packet according to the corresponding VLAN.
- If the device has not been authenticated, the AMF Member (edge node) sends a request packet to the AMF Master (proxy node).
- The AMF Master (proxy node) forwards the request packet received from the AMF Member (edge node) to AMF Security mini.
The authentication process of AMF Security mini is broadly categorized into four types: Device Authentication Data, Tag Authentication Data, UnAuth Group, and action. However, the action-based authentication process is not used in authentication via the AMF application proxy.
- Device Authentication Data
The network (VLAN) to connect to is determined based on the security policy (Policy) of the Device ID (Device) associated with the MAC Address.
Note
The OpenFlow switch, switch port, and the “Indefinite expiration date” option configured in each policy are not supported.
- Authentication using Tag
The VLAN to connect to is determined based on the policy set on the tag, not the policy of the device with which the MAC Address is associated.
- UnAuth Group
For MAC Addresses that are not registered in Device Authentication Data, the connection destination VLAN is determined based on the policy set for the UnAuth Group.

As an example, the following describes the behavior when both Device Authentication Data and an UnAuth Group are registered.
| Device ID: Device_A | |
| MAC Address | 00:00:00:00:00:01 |
| Policies | VLAN100 |
| Group ID: Unregistered | |
| Policies | VLAN200 |

- Since the MAC Address “00:00:00:00:00:01” matches the Device Authentication Data for “Device ID: Device_A,” it is connected to VLAN100.
- Since the MAC Address “00:00:00:00:00:02” is not registered with AMF Security mini and does not match any registered Device Authentication Data, it is connected to VLAN200 as part of the UnAuth Group. Since the policy for the UnAuth Group does not specify a location or schedule, all devices (MAC Addresses) that are not registered with AMF Security mini are connected to VLAN200.
Authentication for AMF Application Proxy in TQ
This section explains the authentication flow for wireless devices in the AMF application proxy configuration of TQ.AMF Security mini performs authentication in response to requests from managed TQ devices. However, for a wireless device to be able to communicate, both the authentication by the AMF application proxy (AMF Security mini) and the authentication configured in the VAP (multi-SSID) security settings must succeed.
NoteThe basic authentication flow for wireless devices is as follows.If a wireless device succeeds in authentication by AMF Security mini but fails in the authentication configured in the VAP security settings, the device will be displayed as “Authorized” on the Device > Connected Device List page of AMF Security mini. Therefore, the actual status of the wireless device does not match its display in AMF Security mini.
- A wireless device connects to the wireless network of TQ.
- TQ checks the authentication status of the source MAC Address of the wireless device. If a wireless device is successfully authenticated by both AMF Security mini and the VAP security settings, TQ forwards the packet according to the VLAN assigned to the device.
- If a wireless device is not authenticated, TQ sends a request packet to AMF Security mini.
- Once authentication by AMF Security mini succeeds, authentication configured in the VAP security settings is performed.
Note
When WPA Enterprise is used in the VAP security settings of TQ, the VLAN assigned to a wireless device varies depending on whether dynamic VLAN is disabled or enabled. For details, refer to Quick Tour About AMF Security mini > AMF Application Proxy Function of TQ and TQR / Behavior when using TQ dynamic VLAN.
AMF Security mini has four major authentication processes: Device Authentication Data, Authentication using Tag, UnAuth Group and Action.
- Device Authentication Data
The network (VLAN) to connect to is determined based on the security policy (Policy) of the Device ID (Device) associated with the MAC Address.
- Authentication using Tag
The VLAN to connect to is determined based on the policy set on the tag, not the policy of the device with which the MAC Address is associated.
- UnAuth Group
For MAC Addresses that are not registered in Device Authentication Data, the connection destination VLAN is determined based on the policy set for the UnAuth Group.
Note
The following items configured in each policy are not supported: location, schedule, OpenFlow switch, switch port, and the “Set flow expiration to unlimited” option.
- Action
Specify individual actions—discard, quarantine, or assign a destination VLAN—for wireless terminals that match the conditions of MAC Address, IPv4 Address, device, device tag, and connected network. It is possible to manually create actions similar to the ones provided by interacting applications.

As an example, the behavior in the case where Action, Device Authentication Data, and UnAuth Group are registered is shown.
| Action ID: Drop | |
| Condition | MAC Address 00:00:00:00:00:01 |
| OpenFlow/TQ Action | Drop(Block) |
| Device ID: Device_A | |
| MAC Address | 00:00:00:00:00:01 |
| Policies | VLAN100 |
| Device ID: Device_B | |
| MAC Address | 00:00:00:00:00:02 |
| Policies | VLAN101 |
| Group ID: Unregistered | |
| Policies | VLAN200 |

- The MAC Address "00:00:00:00:00:01" is registered in both "Action ID: Drop" and Device Authentication Data of "Device ID: Device_A". If the device authentication processing meets the conditions of the action that is performed first and Drop(Block) is applied, subsequent authentication processing of Device Authentication Data is not performed.
- The MAC Address "00:00:00:00:00:02" matches Device Authentication Data of "Device ID: Device_B", so it is connected to VLAN101.
- Since the MAC Address “00:00:00:00:00:02” is not registered with AMF Security mini and does not match any registered Device Authentication Data, it is connected to VLAN200 as part of the UnAuth Group.
07 Oct 2025 12:05