Search…
Dynamic VLANs with RADIUS
OpenWiFi 2.0
In many deployment scenarios, user authentication is centralized with RADIUS systems. In addition, users may have association to their own networks or private networks. A common approach for this is to dynamically assign VLANs to Wi-Fi subscribers as they join the OpenWiFi network.
To configure Dynamic VLANs with RADIUS, associate an SSID with RADIUS authentication, and associate the interface to "upstream" role as dynamic VLANs are most likely to be applicable across the service provider, venue, enterprise network.
1
"interfaces": [
2
{
3
"name": "WAN",
4
"role": "upstream",
5
"ethernet": [
6
{
7
"select-ports": [
8
"WAN*"
9
]
10
}
11
],
12
"ipv4": {
13
"addressing": "dynamic"
14
},
15
"ssids": [
16
{
17
"name": "OpenWifi",
18
"wifi-bands": [
19
"5G", "2G"
20
],
21
"bss-mode": "ap",
22
"encryption": {
23
"proto": "wpa2",
24
"ieee80211w": "optional"
25
},
26
"radius": {
27
"authentication": {
28
"host": "192.168.178.192",
29
"port": 1812,
30
"secret": "secret"
31
},
32
"accounting": {
33
"host": "192.168.178.192",
34
"port": 1813,
35
"secret": "secret"
36
}
37
}
38
}
39
]
40
},
Copied!

RADIUS Access-Accept

OpenWiFi devices will determine a VLAN is associated to the authentication of a subscriber when the access-accept message returns the following attribute value pairs:
    Tunnel-Type = 13
    Tunnel-Medium-Type = 6
    Tunnel-Private-Group-Id = VLAN Id Number
Upon return of an access-accept from RADIUS, based on any method chosen for security, OpenWiFi will dynamically create a VLAN Id as described in Tunnel-Private-Group-Id, associated to the interface role, in this example upstream.
Last modified 2mo ago
Export as PDF
Copy link