Skip to main content
Cisco Meraki Documentation

RADIUS Authentication and Accounting with a Sign-On Splash Page

Introduction

This document focuses on how the Splash Page using RADIUS authentication behaves and in particular how it is affected by using RADIUS accounting.

Overview

An SSID is configured to use Splash Page with RADIUS Authentication. After a client connects to the SSID, their first HTTP GET request is intercepted by the AP and the client is redirected to the configured splash page. The client enters their credentials and that information is sent to the RADIUS server by the Meraki Cloud Controller. If RADIUS grants access, that information is sent back to the Cloud Controller and the client can proceed. 

If RADIUS accounting is enabled on top of this, it creates accounting start and stop messages (client authentication and deauthentication) and provides additional client session information. RADIUS accounting also introduces additional deauthentication behavior that is important to be aware of.

Additional details on the splash page flow and troubleshooting for various splash page options that the dashboard has to offer can be referenced in our Splash Page Traffic Flow and Troubleshooting article. This article will focus on Sign-on with splash page configuration on dashboard.

Connecting to SSID with RADIUS Splash and Authentication Process

When a client connects to the SSID, it will be able to associate to the AP (assigned an IP and will be listed as a client on Dashboard) but it will be unable to access network resources (assuming Walled Garden is set to “block all traffic until sign-on is complete”) until after they have authenticated through the splash page. The following steps occur once the client associates to the access point.

The client is redirected to the splash page on their first HTTP GET request. If you are looking at a packet capture from the client you will see a “Temporary Redirect” HTTP packet after the GET:

clipboard_e4978a4fba03c673f9c518ff7fd6877d2.png

Within that packet you should see the Splash Page redirect URL:

clipboard_e896a3c4d606eeaa3db99af4496744c8d.png

When the client enters their credentials on the Splash Page, those credentials are sent to the Meraki Cloud Controller. The Cloud Controller then sends a RADIUS Access-Request to the RADIUS server.

Looking at a packet capture from the client, you will see the client establish a TLS session with the Cloud Controller.

clipboard_e05e363284da3cfebbec427ae38ea0215.png
In a capture from the RADIUS server you can see the contents of the Access-Request (use filter “radius”). In this case 46.165.249.3 is the Cloud Controller and 10.0.10.31 is the private IP of the RADIUS server.
clipboard_e9386524ff4de3948c3309be5ae486e57.png

After the RADIUS server receives the request it will respond to the Cloud Controller with an Access-Accept (or Reject if credentials don’t match user on RADIUS).

RADIUS Access-Accept message:
clipboard_e29500c17a940ac50f3107ef8ea6c8eb2.png
clipboard_eaf7216a7f8ad175392e464f0a72a8d42.png

Once the RADIUS Access-Accept message is received by the Cloud Controller, the client will be permitted to proceed. They will be redirected either to the URL they were trying to fetch originally or a different URL as specified in Configure > Splash Page on Dashboard.

On Dashboard you can see the status of a client’s authorization (navigate to Network-wide > Monitor > Clients and select the client) and how long until they will be deauthenticated due to Session Timeout or Splash Frequency settings:
clipboard_ed9f0aae01c2cbb1bffeb040baadf1cc1.png

Splash RADIUS Standard Deauthentication Methods

There are four ways to deauthenticate RADIUS users who authenticate using splash page sign-on.

  1. Revoke access from the clients page in the Dashboard
    clipboard_ec600d3c9c9d0616b3201244e2d5248da.png
  2. Use Splash Frequency Settings
    clipboard_ea7168a422505cc7ea8fcd1a6d141e5f4.png
  3. Configure Session Timeout on the RADIUS server. This will override the Splash Frequency settings.
    clipboard_eb4e5e8e070b5e52e94fd3dd5c8347478.png
  4. Change-of-Authorization (CoA) Disconnect

RADIUS Accounting

RADIUS Accounting (defined in RFC2866) is used to track additional information on a user’s session but it is important to note that it introduces additional deauthentication methods. Below will discuss how Meraki handles RADIUS Accounting.

When a client connects to a Splash Page SSID with RADIUS Auth and with Accounting enabled, the authorization process is the same, except there will be two additional RADIUS packets which will be the Accounting-Request and the Accounting-Response:
clipboard_e558f8ea1e1833c47dc74ab165a9014ff.png

The request will be the accounting start message:
clipboard_eae37666519bf87b3aa38b7de8391bbf8.png

With RADIUS Accounting enabled, clients will be deauthenticated under these additional criteria regardless of Splash Page frequency settings or RADIUS session timeout settings:

  • Disconnect from SSID for > 1 min
    • This parameter can be disabled on Dashboard by disabling “Data-carrier detect” which is an option under accounting

clipboard_e227b101d4196222f4920ca4f7081ab4f.png

  • The client transmits fewer than 1 KB per minute for at least 3 minutes
    • This parameter will be disabled if an idle-timeout is not set on the customer’s RADIUS server

With RADIUS Accounting disabled, the only deauthentications (as listed above) are caused by either the Splash Page frequency, RADIUS session timeout, or a manual revoke on the Dashboard.

RADIUS session timeout settings will always override Dashboard Splash Page frequency settings.

  1. The system will regard a login session as stopped if one of the following 5 events occurs:

    • User-Request: The user calls the logout http endpoint on splash (manual logout)

    • Session-Timeout: The login session expires (session timeout)

    • Lost-Carrier: The client disconnects from the network for more than 1 minute (lost carrier)

    • Idle-Timeout: The client transmits fewer than 1 KB per minute for at least 3 minutes (idle timeout)

    • Admin-Reset: An administrator revokes the login session via Dashboard (admin reset)

  2. If the login session is not stopped, the client may continue to use the network, and no RADIUS stop accounting message is sent to the RADIUS server.

  3. Within 60 seconds of a login session stopping, the client may no longer use the network, and should instead see splash.

  4. After at least 120 seconds, but within no more than 180 seconds, of a login session stopping, a RADIUS stop accounting message should be sent to the RADIUS server, with the total number of bytes and packets transmitted by the client.

 To see the accounting messages, run a packet capture from the RADIUS server and filter by “radius” in the capture.

The stop messages will be in the Accounting-Request packets
clipboard_ea90062abbef6430f5fd616f08f00d22c.png
Further down you will see the specific message
clipboard_e7be6e73b64dfd3a87fadd3b457054dc1.png
It is recommended to add the Acct-Terminate-Cause as a column so it is easy to see (right click on the “Acct-Terminate-Cause” field as highlighted above and select “Apply as Column”)
clipboard_e285ce959ffcf8ec55a4d65878bf73978.png