Skip to main content
Cisco Meraki Documentation

Adaptive Policy MS Configuration Guide


This document explains the configuration options for assigning Adaptive Policy (SGT) groups to client devices.

For details on how to configure Adaptive Policy in your Dashboard Organization, refer to the Adaptive Policy Configuration Guide. To understand how Adaptive Policy works in a Meraki Dashboard Organization, refer to the Adaptive Policy Overview document.

Use the following process to configure LACP/Aggregates with Adaptive Policy:

  • Configure each interface as desired
  • Select and aggregate the interfaces with matching configurations

If the interfaces are already aggregated prior to adaptive policy configurations, there is a possibility that the configuration deployment may fail and cause an outage if the aggregate is the uplink for the switch. 

Adaptive Policy SGT Propagation Configuration

Adaptive policy relies on SGTs being transmitted between network devices that support inline SGT. To configure SGT propagation from switch to supported switch and switch to supported APs, navigate to Switching > Monitor > Switch Ports  configure the port as the following:


Adaptive Policy configuration on switchport


Without this configured on Peer to Peer links, the SGT value will not be propagated on packets. This configuration is ONLY for inline SGT capable devices and will not work with MS switches previous to the MS390/Catalyst or MR Access Points running firmware below MR 27.X. If configured for unsupported devices the device behind the switch port will be unable to communicate until the port is set back to Peer SGT capable - disabled. 

Static Assignment of Adaptive Policy Group by Switch Port

An Adaptive Policy Group can be configured on a switch-port to have it statically associated to the client directly connected on that port. To configure an Adaptive Policy Group on a switch-port,

  1. Navigate to Switching > Monitor > Switch Ports.
  2. Select the port(s) you would like to apply the access policy to and press the Edit button.
  3. From the Adaptive policy group drop-down box, select the group to be assigned to the switch-port press the Update button.


Applying Adaptive policy group to switch port

VLAN-Based SGT Assignment

The VLAN to SGT feature allows users to configure an SGT value for an entire VLAN. Example: VLAN HR is mapped to SGT 20, therefore all endpoints on the VLAN HR will be assigned the SGT 20. 

This feature could be used in a few different scenarios:

  • As a fallback SGT - In this scenario if the users do not get assigned an SGT via RADIUS, or the RADIUS servers are down this VLAN can be used as a fallback mechanism to assign a fallback SGT to all users.

  • Users have a very good definition of their VLANs and want to assign SGTs via VLAN instead of Radius. (Example: HR->SGT20, Finance->SGT30, PCI->SGT40)

RADIUS assigned SGT via AV-Pair, as well as IP to SGT maps will take precedence over VLAN to SGT assignment

The order of operation for classification is from highest to lowest priority:

  1. Port to SGT
  2. RADIUS session SGT assignment
  3. IP / Subnet to SGT Map
  4. VLAN to SGT Map

This means that if you have a client that matches an IP to SGT map, it will NOT be classified based on a VLAN to SGT map.

To configure:

  1. Navigate to Network-wide->VLAN profiles

  2. Select VLAN Profiles Tab, Click the …  and select Edit

From the VLAN profile list click the tree dots on the right and select Edit

  • Select the VLAN you'd like to add/edit an SGT for from the drop down box, then click save profile changes

From the VLAN list add or edit the Adaptive Policy (SGT)

To verify successful configuration:

In the dashboard, navigate to Switching, select your switch and the configured port.

You will see the IP and MAC as well as the SGT of the client which should Match what you set in the VLAN profile.

Switchport Adaptive Policy assignment verification

RADIUS-Based Assignment of an Adaptive Policy Group

Adaptive Policy Groups or SGTs can also be associated with client devices dynamically, using the cisco-av-pair:cts:security-group-tag during the RADIUS authentication process. Enabling your devices for SGT assignments via RADIUS requires the RADIUS server send the above AV-pair on every successful authentication. The interface must NOT have a static SGT mapped to it or the 802.1X policy will not be deployed. The formatting for the attribute requires converting the decimal value to hex and including a revision version as a dash after (the revision version does not matter and is fine to send back -00. For example this is a tag of 4000:

RADIUS-based assignment of an Adaptive Policy Group

Configure Access Policy on Switch Ports

  1. On the Dashboard navigate to Switching > Configure > Access Policies.
  2. Select the access policy you want to modify or, to add a new policy, click on the link Add an access policy in the main window, then select my RADIUS server from the drop-down menu for Authentication method.
    Access Policy on switchports using RADIUS
  3. Select the other options, as required. For details on configuring other options of the access policy refer to Creating an Access Policy on Dashboard
  4. Click Save Changes.
  5. Navigate to Switching > Monitor > Switch Ports.
  6. Select the port(s) you would like to apply the access policy to and press the Edit button.
  7. Convert the port type from trunk to access.  Note: you can only apply an Access Policy to an access port.
  8. From the Access Policy drop-down box, select the Access Policy you created and press the Update button.

For more details on client authentication on MS switches, refer to MS Switch Access Policies.

You cannot have static group assignment and an 802.1x access policy configured on a switch port. If 802.1x is used on the interface, the interface group tag will be grayed out (Configured with default “Unspecified” value). In this case all Access-Accept messages for clients will require an SGT using the below av-pair.

Configure RADIUS Server for SGT Assignment

To assign an SGT value to a client, the RADIUS server would have to include the cts:security-group-tag attribute value pair in the RADIUS Access-Accept message. The syntax for this attribute is as follows.

cisco-av-pair:cts:security-group-tag={SGT value in HEX}-{revision number}​

For example, the following statement would send back an SGT value of 4000 (0x0fa0 in hexadecimal).

  • Was this article helpful?