Presentation 3107 1461137144
Presentation 3107 1461137144
Presentation 3107 1461137144
2
Special Thanks
3
802 1X
802.1X
• 802.1X is NOT an encryption type. It is basically just a
per‐user (e.g. username and password)
authentication mechanism.
• WPA2 is a security scheme that specifies two main
aspects of your wireless security:
– Authentication:
u e ca o Your ou cchoice
o ce o
of PSK
S ("Personal")
( e so a ) o or
EAP ("Enterprise").
– Encryption: Always AES‐CCMP.
AES‐CCMP
4
Dynamic VLAN assignment
• VLANs are used to assign wireless users to different
networks without requiring the use of multiple SSIDs.
• Each user’s VLAN assignment is stored in the user
database of the RADIUS server that authenticates the
users.
5
Network Diagram
CAPsMAN
CAP
6
Security Cfg.
Cfg
7
Add a RADIUS Server for wireless
service
8
To create a RADIUS client
9
Create Self Signed Server Certificate
10
Import newly created certificate to
RADIUS
11
VLAN Interfaces
12
Datapath
Enables and specifies type of VLAN tag to be assigned to interface (causes all received data
to get tagged with VLAN tag and allows interface to only send out data tagged with given tag).
13
RADIUS attributes
• The RADIUS attributes used for the VLAN ID
g
assignment are:
14
Specifies the VLAN ID
• For each user, add RADIUS attributes which specify
the VLAN information to be sent to the CAPsMAN.
In this example
example, user1 is assigned VLAN 21 and user2
is assigned VLAN 22.
15
MAC address binding
16
Bind multiple MAC addresses to one
user
17
Bind multiple MAC addresses to one
user
‐ Phone
‐ Tablet
‐ Laptop
18
Registration Table
• Description of an entry. Comment is taken from
RADIUS attributes if specified.
19
Mikrotik Wireless Comment
Mikrotik‐Wireless‐Comment
20
EAP TLS
EAP‐TLS
• For RouterOS client, EAP‐TLS is possible only.
• For RouterOS AP ‐ to clients any EAP method is
possible.
21
More information at:
http://mum.mikrotik.com/2016/CN/agenda