MAC Authentication Bypass (MAB) and iPSK for IOT Endpoints
In this section, we will learn how to configure MAC Authentication Bypass (MAB) for endpoints that do not support 802.1X to apply an identity based dynamic authorization to the endpoints connecting to your network.
Endpoints and Groups
| 1. Navigate to Access Manager > Configure > Clients | |
| 2. Select Client Groups tab at the top. | |
|
3. Select Add Groups and enter
|
![]() |
| 4. Optionally add clients to this group by selecting Add Clients and choose: - Add existing clients - Add a client |
![]() |
| 5. Enter the client details like Description, MAC address and Client Groups to be associated with and select Save. | ![]() |
| 6. Repeat this process for as many groups as you need.
If you have many groups or some with many endpoints, you may want to consider creating your groups and their member endpoints via CSV import or APIs.
|
MAC Authentication Bypass (MAB)
Firstly, let’s try to understand the authentication flow for this specific use case. As shown in the diagram below, our goal is to enable endpoints connected to the network (SSID or a switch port) using the MAC Authentication Bypass (MAB).
_for_IOT.png?revision=1)
The following is the sequence of steps in the authentication flow:
- The endpoint initiates the connection with the SSID or switch port.
- The network device will request the identity of the endpoint.
- The endpoint will not respond with the identity information as it does not have 802.1X configured on it.
- The 802.1X process will timeout.
- The endpoint will send a packet which will contain its MAC address in the source MAC address field.
- The network device will forward the identity information (MAC address in this case) to Cisco Meraki Cloud over a Cisco proprietary AES-256-bit encrypted tunnel.
- Access Manager evaluates the session against the configured rules – a rule is matched if all the defined conditions (like endpoint group that has this MAC address added as condition) are matched and the corresponding configured authorization will be applied as a result.
- The resulting authorization (SGT, VLAN and so forth) will be sent back to the network device for enforcement.
- The endpoint will be connected successfully.
Configure Wireless SSID Security Settings for Access Manager
|
1. Assuming, you already have an MR added to your dashboard and licensed appropriately, navigate to Wireless > Configure > Access control. 2. Choose the SSID you want to use for this use case and rename it if you need. |
![]() |
|
3. Navigate to Security section and choose MAC-based access control (no encryption) with Access Manager as shown below: |
![]() |
|
4. Feel free to change any other SSID settings like Client IP, VLAN assignment and others as needed and click save at the bottom. |
Configure Wired Access Policies and Switch Ports
For Wired connections, you will need to configure an Access Policy that uses Access Manager as the authentication method and attach that Access Policy to the switch port where the endpoint/s will be connecting to.
The following are the steps at a high level to configure access policy and switch ports to use Access Manager as the authentication server:
|
Assuming that you have an MS already added to your dashboard and licensed appropriately, navigate to Switching > Configure > Access Policies.
|
![]() |
|
5. Navigate to Switching > Monitor > Switches and select the switch you would like to attach the configured access policy.
Optionally, you can update multiple ports at a time by navigating to Switching > Monitor > Switch Ports and selecting multiple ports.
|
![]() |
Configure Access Manager MAB Rules
Now that we have everything in place, it is time to configure the Access Manager rules which will determine what authorization (SGTs, VLANs, Group Policies) will be applied to the endpoints when they authenticate.
The rule framework is very straightforward – define the matching criteria and define the corresponding authorization result to be assigned. The following are the steps needed for this configuration:
|
This is an example rule that we will use to illustrate how to configure rules: |
![]() |
| Navigate to Access Manager > Policies > Access Rules | |
|
Select Add a rule
|
![]() |
|
Under Authorization section, click on the Access permission dropdown to choose an option:
Refer to our Adaptive Policy documentation on how to implement zero-trust micro-segmentation policies through Adaptive Policy.
Refer to our Group policy documentation on how define and apply a list of rules, restrictions, and other settings to the endpoints that are connecting to your network.
|
![]() |
| Select Save after the selections. |
Now, any endpoint matching the criteria defined in the rule (endpoint group) will be matched with the rule and corresponding authorization (VLAN = 200 and Adaptive Policy = Smart thermostats) will be applied.
iPSK (Identity Pre-Shared Key)
Wireless I/OT endpoints often do not have sophisticated interfaces enterprise authentication with 802.1X or certificate management. Many do support basic wireless pre-shared keys (PSKs) but it is not a good security practice to use the same PSK for all endpoints in your network in case it is leaked. It is much better to use a unique, identity pre-shared key (iPSK) tied to an endpoint (client) group or even endpoint MAC address.
__for_Wireless_IOT.png?revision=2)
In the example above:
- The handheld scanner attempts to associate to the wireless access point (AP) with it's configured pre-shared key (PSK)
- The AP performs a new RADIUS MAB request to Cisco Access Manager
- Access Manager verifies the MAC belongs to the Client Group named Scanners
- Access Manager checks the Access Rules and matches the Scanners rule for all members of the Scanners client group
- Access Manager returns an authorization to the AP with a security group tag (SGT) and the iPSK assigned for the Scanners client group
- The AP compares the scanner's iPSK with the assigned PSK from Access Manager and since they match, it is authorized
- The scanner gets a DHCP IP address and all it's traffic is tagged with a Scanner SGT
Configure Identity PSK with RADIUS for Wireless Access Control Security
Configure Identity PSK with RADIUS as the wireless SSID authentication method with Access Manager in the Cisco Meraki Dashboard.
| In the Cisco Meraki Dashboard, navigate to Wireless > Configure > Access Control | |
| Choose the SSID you want to authenticate using iPSK from the dropdown | |
| Give it a Name and Enable it if you haven't already | ![]() |
| Under Security, choose Identity PSK with RADIUS and select Access Manager from the dropdown | ![]() |
| For the Splash page options, choose None if this SSID will be used for IOT devices since they cannot perform any of the other Splash interactions | |
| Save your changes |
Configure Access Manager iPSK Rules















