404 Not found

integrating IT

ISE Dynamic VLAN assignment

Dynamic VLAN assignment by a RADIUS server (e.g. Cisco ISE) can be useful when you want to assign a specific VLAN to a user or group of users. In order to achieve this the VLANS configured on the switches must be configured with a name, this name must be consistent across multiple switches. However the VLAN number does not necessarily need to be the same across the switches.The scenario in this blog post will simply define 2 VLANS (ADMIN and USERS), members of the AD group Domain Admins will be assigned to a VLAN called ADMIN and members of the AD group Domain Users will be assigned to a VLAN called USERS.

The configuration of ISE in this post only describes the steps in order to configure Dynamic VLAN assignment. Refer to this previous post on how to configure Cisco ISE for 802.1x authentication.

Switch Configuration

Configure the name on the VLANS. These names must match the name specified in the Authorisation Profile on ISE.

ISE Configuration

Authorisation profiles.

  • Navigate to Policy > Policy Elements > Results > Authorisation > Authorisation Profiles
  • Create a new Authorisation Profile and name appropriately e.g VLAN_ADMIN
  • Under the Common Tasks section, tick VLAN
  • Enter the ID/Name of the Admin VLAN as ADMIN

dynamic vlan assignment with wlc based on ise

  • Repeat the task and create another Authorisation Profile for the Standard Users e.g VLAN_USERS
  • Enter the correct ID/Name as USERS

dynamic vlan assignment with wlc based on ise

Authorisation Policy

  • Navigate to Policy > Policy Set
  • Modify an existing Policy Set used for 802.1x
  • Ensure there are different Authorization Policy rules, for Admin Users and another for Standard Users
  • Assign the VLAN_ADMIN Authorisation Profile to the Admin rule Profiles
  • Assign the VLAN_USERS Authorisation Profile to the Standard Users rule Profiles
  • Save the policy

dynamic vlan assignment with wlc based on ise

Verification

Before logging in as a user, confirm the configuration of the interface the test computer is plugged into. Notice the VLAN is set to VLAN 10.

dynamic vlan assignment with wlc based on ise

  • Running the command show authentication sessions interface fastethernet 0/3 confirm the computer has a valid IP address in VLAN 10. Notice under Vlan Policy N/A, this means this interface was not dynamically assigned a VLAN.    

dynamic vlan assignment with wlc based on ise

Login as a user that is a member of the AD group Domain Users.

  • Run the command show authentication sessions interface fastethernet 0/3
  • Compare the output this time with above. Notice the computer now has an IP address from the VLAN 11 DHCP Pool and Vlan Policy = 11, this confirms the computer has dynamically been assigned to VLAN 11.

dynamic vlan assignment with wlc based on ise

  • Run the command debug radius whilst the users is logging on
  • You can confirm the VLAN name being returned by successful authorisation by the RADIUS server by the presence of Tunnel-Private-Group .

dynamic vlan assignment with wlc based on ise

Logoff and log back in as a user in the Domain Admins AD group.

  • Compare the output this time with above. Notice the computer now has an IP address from the VLAN 12 DHCP Pool and Vlan Policy = 12

dynamic vlan assignment with wlc based on ise

  • Running the command debug radius confirms the correct VLAN name ADMIN was sent by the RADIUS server.

dynamic vlan assignment with wlc based on ise

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

' src=

Published by integratingit

View all posts by integratingit

3 thoughts on “ ISE Dynamic VLAN assignment ”

  • Pingback: Initial Cisco ISE Configuration – integrating IT

Hi it is cool . What happend if some device has IP fix

If the device has a static IP address and is moved to a different VLAN, the user will not be able to communicate. It will only work if using DHCP.

Leave a comment Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed .

' src=

  • Already have a WordPress.com account? Log in now.
  • Subscribe Subscribed
  • Copy shortlink
  • Report this content
  • View post in Reader
  • Manage subscriptions
  • Collapse this bar

IP With Ease

Dynamic VLAN Assignment: Wireless

dynamic vlan assignment with wlc based on ise

Dynamic VLAN Assignment

Objective: To dynamically Assign Wireless User to VLAN based on user credentials. This type of setup is called “Dynamic VLAN Assignment”

Description:  Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user. This task of assigning users to a specific VLAN is handled by a RADIUS authentication server, such as Cisco Secure ACS. This can be used, for example, to allow the wireless host to remain on the same VLAN as it moves within a campus network.

Related- Cisco ACS vs ISE Comparison

Therefore, when a client attempts to associate to a LAP registered with a controller, the LAP passes the credentials of the user to the RADIUS server for validation. Once the authentication is successful, the RADIUS server passes certain Internet Engineering Task Force (IETF) attributes to the user. These RADIUS attributes decide the VLAN ID that should be assigned to the wireless client. The SSID ( WLAN , in terms of WLC) of the client does not matter because the user is always assigned to this predetermined VLAN ID.

WLC Configuration

This configuration requires these steps:

Configure the WLC with the Details of the Authentication Server

  • Configure the Dynamic Interfaces (VLANs)
  • Configure the WLANs ( SSID )

It is necessary to configure the WLC so it can communicate with the RADIUS server to authenticate the clients, and also for any other transactions.

Complete these steps:

  • From the controller GUI, click  Security .
  • Enter the IP address of the RADIUS server and the Shared Secret key used between the RADIUS server and the WLC.

This Shared Secret key should be the same as the one configured in the RADIUS server under Network Configuration > AAA Clients > Add Entry. Here is an example window from the WLC:

Configure the Dynamic VLAN (Interfaces)

This procedure explains how to configure dynamic interfaces on the WLC. As explained earlier in this document, the VLAN ID specified under the Tunnel-Private-Group ID attribute of the RADIUS server must also exist in the WLC.

In the example, the user1 is specified with the  Tunnel-Private-Group ID of 10 (VLAN =10)  on the RADIUS server.

You can see the same dynamic interface (VLAN=10) configured in the WLC in this example. From the controller GUI, under the Controller > Interfaces window, the dynamic interface is configured.

  • Click  Apply  on this window.

This takes you to the Edit window of this dynamic interface (VLAN 10 here).

Enter the IP Address and default Gateway of this dynamic interface

Note:  Because this document uses an internal DHCP server on the controller, the primary DHCP server field of this window points to the Management Interface of the WLC itself. You can also use an external DHCP server, a router, or the RADIUS server itself as a DHCP server to the wireless clients. In such cases, the primary DHCP server field points to the IP address of that device used as the DHCP server. Refer to your DHCP server documentation for more information.

  • Click  Apply .

Now you are configured with a dynamic interface in your WLC. Similarly, you can configure several dynamic interfaces in your WLC. However, remember that the same VLAN ID must also exist in the RADIUS server for that particular VLAN to be assigned to the client.

Configure the WLANs (SSID)

This procedure explains how to configure the WLANs in the WLC.

  • From the controller GUI, choose  WLANs > New  in order to create a new WLAN.

The New WLANs window is displayed.

  • Enter the WLAN ID and WLAN SSID information.

You can enter any name to be the WLAN SSID. This example uses VLAN10 as the WLAN SSID.

  • Click  Apply  in order to go to the Edit window of the WLAN SSID10.

Normally, in a wireless LAN controller, each WLAN is mapped to a specific VLAN (SSID) so that a particular user that belongs to that WLAN is put into the specific VLAN mapped. This mapping is normally done under the Interface Name field of the WLAN SSID window.

In the example provided, it is the job of the RADIUS server to assign a wireless client to a specific VLAN upon successful authentication. The WLANs need not be mapped to a specific dynamic interface on the WLC. Or, even though the WLAN to dynamic interface mapping is done on the WLC, the RADIUS server overrides this mapping and assigns the user that comes through that WLAN to the VLAN specified under the user  Tunnel-Group-Private-ID  field in the RADIUS server.

  • Check the  Allow AAA Override  check box in order to override the WLC configurations by the RADIUS server.
  • Enable the Allow AAA Override in the controller for each WLAN (SSID) configured.

When AAA Override is enabled, and a client has AAA and controller WLAN authentication parameters that conflict, client authentication is performed by the AAA (RADIUS) server. As part of this authentication, the operating system moves clients to a VLAN returned by the AAA server. This is predefined in the controller interface configuration.

For instance, if the corporate WLAN primarily uses a Management Interface assigned to VLAN 2, and if the AAA Override returns a redirect to VLAN 100, the operating system redirects all client transmissions to VLAN 100 even if the physical port to which VLAN 100 is assigned. When AAA Override is disabled, all client authentication defaults to the controller authentication parameter settings, and authentication is only performed by the AAA server if the controller WLAN does not contain any client-specific authentication parameters.

Continue Reading:

CONFIGURE INTERFACES ON WIRELESS CONTROLLER 5508

Wireless Interview Questions

ABOUT THE AUTHOR

dynamic vlan assignment with wlc based on ise

I am here to share my knowledge and experience in the field of networking with the goal being – “The more you share, the more you learn.”

I am a biotechnologist by qualification and a Network Enthusiast by interest. I developed interest in networking being in the company of a passionate Network Professional, my husband.

I am a strong believer of the fact that “learning is a constant process of discovering yourself.” – Rashmi Bhardwaj (Author/Editor)

Related Posts

Server Operating System

What is a Server Operating System (Server OS)?

vSAN Operations Guide: Managing Fault Domains

vSAN Operations Guide: Managing Fault Domains

multiple files download in chrome

Multiple File Downloads in Chrome – Disable them

Leave a comment cancel reply.

Your email address will not be published. Required fields are marked *

Technology and life with Eyvonne Sharp

Configuring Cisco FlexConnect AP to Support Dynamic VLAN Assignment with ISE

August 17, 2013 By Eyvonne 4 Comments

I am in the middle of an ISE proof of concept and have been running the product through its paces. Since nearly all of my access points are in FlexConnect mode (formerly known as H-REAP), they require additional configuration to allow dynamic VLAN assignment with ISE. FlexConnect supports local switching which allows you to map a local VLAN ID from the AP’s switch to an SSID instead of tunneling all traffic back to the Wireless LAN Controller to be switched centrally.

In order to dynamically assign a VLAN ID with an ISE authorization profile, the VLAN must exist on the access point. FlexConnect Groups accomplish this task.

From the Wireless menu, select FlexConnect Groups and click the New button. Once you create the group, click the group name to open the edit menu (seen below). On the General tab, add the access points to the FlexConnect group. To add the VLAN ID, select the ACL Mapping tab and then the “AAA VLAN-ACL mapping” tab. Enter the VLAN ID and select the ingress and egress ACLs. In my case, I selected “none”. Click Add and then Apply.

Your VLAN ID’s have been added to your access point and can be assigned with an ISE authorization policy.

For more information see Cisco documentation

ise_wireless_flexconnect_vlan

Share this:

' src=

February 10, 2014 at 9:41 am

Just what I was looking for! Thanks!

' src=

November 12, 2014 at 11:07 am

Man, I was looking for this and had problems achieving it, thank you so much. Now I have clients in the correct Vlans

' src=

November 1, 2018 at 11:36 am

Thanks a lot for sharing this information.

' src=

March 6, 2023 at 6:47 am

It works for me for WLC 5520 v8.5.135.0 but it is not working on 8.10.130.0

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Notify me of follow-up comments by email.

Notify me of new posts by email.

Dynamic VLAN assignment

Larger WLAN infrastructures often require individual WLAN clients to be assigned to certain networks. Assuming that the WLAN clients are always within range of the same APs, then assignment can be realized via the SSID in connection with a particular IP network. If on the other hand the WLAN clients frequently change their position and logon to different APs then, depending on the configuration, they may find themselves in a different IP network.

For WLAN clients to remain within a certain network independent of their current WLAN network, dynamically assigned VLANs can be used. Unlike the situation where VLAN IDs are statically configured for a certain SSID, in this case a RADIUS server directly assigns the VLAN ID to the WLAN client.

  • The WLAN clients of two employees log into an AP in the WPA2-secured network with the SSID 'INTERNAL'. During registration, the RADIUS requests from the WLAN clients are directed to the AP. If the corresponding WLAN interface is in the operating mode 'managed' the RADIUS requests are automatically forwarded to the WLC. This forwards the request in turn to the defined RADIUS server. The RADIUS server can check the access rights of the WLAN clients. It can also use the MAC address to assign a certain VLAN ID, for example for a certain department. The WLAN client in Marketing, for example, receives the VLAN ID '10' and WLAN client from Research & Development receives '20'. If no VLAN ID is specified for the user, the SSID's primary VLAN ID is used.
  • The WLAN clients of the guests log into the same AP in the unsecured network with the SSID 'PUBLIC'. This SSID is statically bound to the VLAN ID '99' and leads the guests into a certain network. Static and dynamic VLAN assignment can be elegantly operated in parallel.
  • Activate VLAN tagging for the WLC. This is done in the physical parameters of the profile by entering a value greater than '0' for the management VLAN ID.
  • For authentication via 802.1x, go to the encryption settings for the profile's logical WLAN network and choose a setting that triggers an authentication request.
  • To check the MAC addresses, activate the MAC check for the profile's logical WLAN network. Note: For the management of WLAN modules with a WLC, a RADIUS server is required to operate authentication via 802.1x and MAC-address checks. The WLC automatically defines itself as the RADIUS server in the APs that it is managing—all RADIUS requests sent to the AP are then directly forwarded to the WLC, which can either process the requests itself or forward them to an external RADIUS server.
  • To forward RADIUS requests to another RADIUS server, use LANconfig to enter its address into the list of forwarding servers in the configuration section 'RADIUS servers' on the Forwarding tab. Alternatively, external RADIUS servers can be entered in WEBconfig under Menu tree > LCOS Setup > RADIUS > Server > Forward servers . Also, set the standard realm and the empty realm to be able to react to different types of user information (with an unknown realm, or even without a realm).
  • Configure the entries in the RADIUS server so that WLAN clients placing requests will be assigned the appropriate VLAN IDs as based on the identification of certain characteristics.

www.lancom-systems.com

LANCOM Systems GmbH | A Rohde & Schwarz Company | Adenauerstr. 20/B2 | 52146 Wuerselen | Germany | E‑Mail  [email protected]

LANCOM Logo

IMAGES

  1. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    dynamic vlan assignment with wlc based on ise

  2. Dynamic VLAN Assignment: Wireless

    dynamic vlan assignment with wlc based on ise

  3. IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius

    dynamic vlan assignment with wlc based on ise

  4. Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 Wireless

    dynamic vlan assignment with wlc based on ise

  5. Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 Wireless

    dynamic vlan assignment with wlc based on ise

  6. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    dynamic vlan assignment with wlc based on ise

VIDEO

  1. Connecting with the Community 2024: Mind the gap

  2. CCNA (Cisco IOS)

  3. AIOU Code 417 Solved Assignment No.1 Spring 2023

  4. Home Theater Geeks 343: HPA Tech Retreat 2017

  5. What's in my Kit Bag : Stay Focused with Doug McKinlay

  6. Travel Healthcare Is Unpredictable: Plans For Our Next Travel Assignment Away From Home

COMMENTS

  1. Configure Dynamic VLAN Assignment with WLCs Based on ISE to ...

    In order to accomplish dynamic VLAN assignment with WLCs based on ISE to AD group mapping, these steps must be performed: ISE to AD integration and configuration of authentication and authorization policies for users on ISE. WLC configuration in order to support dot1x authentication and AAA override for SSID 'office_hq'.

  2. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    This documents defined the thought of dynamic VLAN mission. Prerequisites The document describing how to configure the wireless LAN controller (WLC) and Identity Services Engine (ISE) web in order to assigning without LOCAL (WLAN) clients into a customized VLAN dynamically.

  3. ISE Dynamic VLAN assignment

    ISE Dynamic VLAN assignment. Dynamic VLAN assignment by a RADIUS server (e.g. Cisco ISE) can be useful when you want to assign a specific VLAN to a user or group of users. In order to achieve this the VLANS configured on the switches must be configured with a name, this name must be consistent across multiple switches.

  4. Integration with Cisco ISE: Wireless 802.1X and MBA Use Cases

    The steps to configure a policy set with the appropriate authentication and authorization rules are as follows: Go to Work Center > Network Access > Policy Set. Click the (+) sign to add a policy set. Name the policy set (for example, "Wireless_802.1X_Posture) and select "Wireless_802.1X" as the condition.

  5. Dynamic VLAN Assignment: Wireless

    Dynamic VLAN Assignment. Objective: To dynamically Assign Wireless User to VLAN based on user credentials. This type of setup is called "Dynamic VLAN Assignment" Description: Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user.This task of assigning users to a specific VLAN is handled by a RADIUS ...

  6. RADIUS VLAN Assignment with Cisco ISE

    4. I am trying to install Cisco ISE 2.1 to be used as a RADIUS server with 802.1x on my switches. I want to dynamically assign a VLAN based to a user who connects on the switch port. The problem is that, although my end client is authenticated and authorized by ISE, the VLAN id never gets received on the switch from ISE.

  7. Configuring Cisco FlexConnect AP to Support Dynamic VLAN Assignment

    On the General tab, add the access points to the FlexConnect group. To add the VLAN ID, select the ACL Mapping tab and then the "AAA VLAN-ACL mapping" tab. Enter the VLAN ID and select the ingress and egress ACLs. In my case, I selected "none". Click Add and then Apply. Your VLAN ID's have been added to your access point and can be ...

  8. Dynamic VLAN Assignment with ISE : r/networking

    The technologies you're looking for are MAB lists (for ISE to store a list of the approved MAC address) and VLAN groups (for the switches to associate a ISE group name to a VLAN tag number) ISE is a difficult piece of software to work with, you can expect to do a lot of reading and you will probably need to create a test ISE server to test changes on so you don't break the production system.

  9. PDF Configure Dynamic VLAN Assignment with WLCs Based on ISE to ...

    In order to accomplish dynamic VLAN assignment with WLCs based on€ISE to AD group mapping, these steps must be performed: 1. ISE to AD integration and configuration of authentication and authorization policies for users on ISE. 2. WLC configuration in order to support€dot1x authentication and AAA override for SSID 'office_hq'. 3.

  10. Dynamic VLAN assignment

    Dynamic VLAN assignment. Larger WLAN infrastructures often require individual WLAN clients to be assigned to certain networks. Assuming that the WLAN clients are always within range of the same APs, then assignment can be realized via the SSID in connection with a particular IP network. If on the other hand the WLAN clients frequently change ...