Skip to main content
Cisco Meraki Documentation

MR Meraki RADIUS 2.0

RADIUS Configuration

On the Access Control page, make sure "View new version" has been selected in the upper right corner. Once this has been done, click on the RADIUS option to show configuration options for RADIUS authentication and accounting servers.

Screenshot of the Wireless -> Access Control page for an SSID with RADIUS Authentication enabled, showing the available RADIUS Servers and Accounting options. Screenshot shows one RADIUS server and one Accounting server configured as an example configuration.

You can add up to 3 servers for authentication and 3 for accounting. It is required to have an IP Address for the server, the port to be used, and the secret phrase to be configured on each one.

Note: RADIUS accounting is only available by default with 802.1X authentication. To enable RADIUS accounting for splash pages as well, please contact Cisco Meraki support

Accounting interim interval: If an accounting server is added and saved, the option Accounting interim interval will be available to control how often accounting messages are sent to the server.

For the use of Accounting interim interval, all APs must support firmware MR28 and be updated, this means all access points must be WiFi 5 Wave 2 or higher. 

RADIUS testing: If enabled, Meraki devices will periodically send Access-Request messages to these RADIUS servers using identity 'meraki_8021x_test' to ensure that the RADIUS servers are reachable.

RADIUS CoA support: If enabled, Meraki devices will act as a RADIUS Dynamic Authorization Server and will respond to RADIUS Change-of-Authorization and Disconnect messages sent by the RADIUS servers.

RADIUS proxy: Meraki devices can send RADIUS Access-Request and Accounting messages via a Meraki proxy, which will forward these messages to the specified RADIUS servers.

RADIUS attribute specifying group policy name: Specify the RADIUS attribute used to look up group policies.  Access points must receive this attribute in the RADIUS Access-Accept message.  The value of the attribute must match the group policy name configured on this page. Four different attributes can be used to achieve this:

  • Filter-ID
  • Reply-Message
  • Airespace-ACL-Name
  • Aruba-User-Role

Advanced Settings

For the use of the new features, all APs must support firmware MR28 + (WiFi 5 Wave 2 or higher) and be updated. 

Called Station ID

The ability to configure the called-station-ID attribute that it is sent from the Access Point to the RADIUS server provides flexibility to network administrators when creating rules.

Once upgraded to firmware MR28, all Access points will automatically update the default setting for both Called-Station-Id and NAS-ID as "AP MAC address:SSID Name" and  "AP MAC address:SSID Number" respectively. 

Screenshot of the Called Station options on the Access Control page that are available once RADIUS is enabled. Image shows two options, 'AP MAC Address' and 'Custom'.

A maximum of 4 attributes can be configured including a custom phrase that can be set in the dashboard. Each setting will be appended with ":" as a separator in the called-station-ID attribute. The attributes that can be configured are:

  • AP MAC address
  • SSID name
  • SSID number
  • AP name
  • RF profile
  • AP VLAN ID
  • AP tags
  • AP LAN IP
  • AP Public IP
  • Custom (input by the administrator)

For example, in the following packet capture, it was selected:

Screenshot of Called station ID options showing three categories, including 'AP MAC Address', 'SSID Name' and 'Custom' option that is set to 'THISISATEST'

And the result in the packet capture is:

Screenshot of an Attribute Value Pair option from a RADIUS frame's payload in a packet capture, showing the result of the configuration from the previous image.

Called-station-id will be set to MAC:SSID_NAME automatically if using radius proxy feature, and the customization will not take place.

NAS ID

Similar to called-station-ID, Meraki offers a variety of attributes that can be configured when using the NAS-ID option, including: 

  • AP MAC address
  • SSID name
  • SSID number
  • AP name
  • RF profile
  • AP VLAN ID
  • AP tags
  • AP LAN IP
  • AP Public IP
  • Custom (input by the administrator)

A maximum of 4 attributes can be configured and there will be a ":" between each attribute.

Note: When 802.11r is enabled, the available NAS-ID options will be limited to specific attributes to ensure the network remains stable.

On a packet capture it will show as the following:

Screenshot of an Attribute Value Pair option from a RADIUS frame's payload in a packet capture, showing the NAS Identifier with 802.11r enabled. In this screenshot only the AP MAC and the radio ID are shown to be sent, separated by a ':'.

Device IP set as NAS-ID

The NAS-ID value can be set as the AP’s Public or LAN IPv4 address. 

Configuration

Dropdown menu for NAS ID Category #2 with "AP LAN IP' and 'AP Public IP' options highlighted

Please note that only IPv4 addresses are supported as part of this feature enhancement dashboard and API component.

Server Timeout and Retry Count

Two settings can be used to configure how long the Meraki dashboard should wait before it classifies a RADIUS server as inactive/unreachable:

  • Server timeout specifies how long to wait for a response from a RADIUS server in seconds (before being marked inactive/unreachable) from 1 to 10 secs.
  • Retry count specifies how many retries should be made before moving to the next server, from 1 to 5 retries.

Screenshot of server timeout and Retry count timers available on the Access Control page, with the default values configured, of one and three seconds respectively

RADIUS Fallback

Screenshot of RADIUS fallback feature turned 'Off'.

The fallback behavior depends on the order the servers are listed on the dashboard will dictate the priority of each one, For example:

  • Server 1 = priority 1
  • Server 2 = priority 2
  • Server 3 = priority 3

Where the available server with higher priority will be used (priority 1 is the highest). If Server 1 were to become unreachable, Server 2 would become active, and so on.

If the fallback option is enabled, once the server with higher priority recovers, the AP will switch back to using that preferred (higher priority) server.

EAP Timers

The Meraki dashboard provides the ability to customize the EAP timers for communication over wireless between the access point and the client.

It is not recommended to change these values without oversight from an expert technician.

Screenshot of EAP timers available on the Access Control page, with default values set. Image shows the default values of five seconds for the settings, EAP  timeout, max retries, identity timeout and identity retries, along with 500 milliseconds for EAPOL key timeout and 4 seconds for EAPOL key retries.

RADIUS VLAN Override

RADIUS VLAN Override offers the option to override the VLAN with the attributes coming from a RADIUS server with the option "RADIUS override." It is disabled by default.

Screenshot of the RADIUS Override feature available on the Access Control page, with the 'Ignore_VLAN_Attribute' option selected, with Override VLAN tag being the other, unselected option.

For a VLAN override to be successful, the RADIUS server must send:

  • IETF 64 (Tunnel Type) — Set this to VLAN.

  • IETF 65 (Tunnel Medium Type) — Set this to 802

  • IETF 81 (Tunnel Private Group ID) — Set this to VLAN ID.

Behavior as of R31.1

RADSec Keep Alives

Image of the logical representation of an AP forming a TLS tunnel with the radius server for purposes of authentication. The AP and the server are connected via a dotted green link whereas the tunnel is represented with a larger horizontal cylindrical link.

In order to not have to reestablish a TLS tunnel between the MR and RADIUS sever APs can be configured to send "keep-alive" messages to RADSec servers. This feature helps to maintain the TLS connection, preventing devices like load balancers or the RADIUS server from closing the connection in case authentications or accounting updates aren't sent. 

 

Configuration:

  1. Within the Radius server settings, specify the TLS idle timeout.

Screenshot of the RADSec TLS Idle timeout value on the Wireless -> Access Control Page on Dashboard, with a fifteen minute default timer option.

Note: The idle timeout can be set to 1- 32767 minutes.

API Configuration

PUT /networks/{networkId}/wireless/ssids/{number}

- Optional property radiusRadsecTlsIdleTimeout Added

{

   "radiusRadsecTlsIdleTimeout": 900

}

RADSec with Tunneled SSIDs

With R31, all RADSec traffic to and from the AP is securely encrypted as it passes through the IPSec tunnel that terminates at the MX security appliance located back in the physical premises.

Screenshot of pings with responses run from an MX that APs create a tunnel with, to the IP 10.0.87.50 from three different interfaces on the MX. The three interfaces presented in the image are 'Internet IP', 'VLAN 10 IP' and 'Default IP'.

Screenshot of two clients and the network-level information pertaining to the two, including IP address, VLAN, MAC address, Usage, Associated for, SSID, Channel, Current Channel Width, Signal Strength and Tools,  connected to the MX


 

Accounting

  • Test to ensure a TLS connection can be made to any RADSec server configured in the SSID access control.
  • Check accounting packets are sent as regular to the SSID tunnel to the MX
  • Take a pcap and verify the packets are sent frequently using the same socket(4) Found Auth-Type = Accept

Change of Authorization with RADSec

Configuration:

Screenshot of the RADIUS testing and RADIUS CoA options on the Wireless -> Access Control page of the Dashboard, with the RADIUS CoA option checked using the checkbox on the left-hand side of the option.

Navigate to the RADIUS server settings and select the check box to enable RADIUS CoA support.


When enabled, MR APs will act as a RADIUS Dynamic Authorization Server and will respond to RADIUS Change-of-Authorization and disconnect messages sent by the RADIUS servers.

  • Was this article helpful?