Wired access – Cisco Meraki

In this topic, you will learn how to configure Cisco Meraki switch ports to work together with Portnox™ Cloud and 802.1X RADIUS authentication for Ethernet connections.

Warning: We tested this configuration on a Meraki MS220-8P switch in our Meraki lab, but we cannot guarantee that it will cover every Meraki product and version. Also, the configuration is generic and may not fit every single environment. Therefore, to get the most accurate and current configuration guidance on 802.1X configuration, we strongly recommend that you refer to the documentation provided by Meraki on these topics for your particular device models.

Create an access policy

In this section, you will create an access policy for Portnox Cloud RADIUS servers that you will later apply to specific switch ports.

  1. In the Meraki web interface, select your network, and then click on the Switching > Access policies menu option.

  2. In the Access policies pane, click on the Add an access policy link.

  3. In the Name field, enter a name for this access policy, and in the Authentication method field, select the my RADIUS server option.

    In this example, we used the name Portnox Cloud, but you can use any name you like.

  4. In the RADIUS servers field, click on the Add a server link to add the Portnox Cloud RADIUS server.

  5. In the Host field, enter the IP address of the Portnox Cloud RADIUS server that you created earlier, in the Port field, enter the authentication port for this RADIUS server, and in the Secret field, enter the shared secret for this server.

    1. Optional: Click on the Test button to open a pop-up and test the connectivity to the server. Enter the credentials of an account that is registered in your Cloud in the Username and Password fields, and then click on the Begin test button.

  6. If you use two Cloud RADIUS servers in both regions, repeat the above steps for the second radius server.
  7. Optional: If you want to use RADIUS Change of Authorization (CoA) functionality, add your AD Broker installation IP address as the last RADIUS server and set the RADIUS CoA support field to RADIUS CoA enabled under the list of RADIUS servers.
  8. Set the RADIUS accounting field to RADIUS accounting enabled.

  9. Repeat the above steps in the RADIUS accounting servers section, entering the same IP address and shared secret, and the accounting Port number from your Cloud RADIUS server configuration (for one or two servers, depending on your configuration).

    The above screenshot shows an example configuration for two Cloud RADIUS region servers. Adjust the IP addresses and port numbers to your tenant configuration.

  10. Optional: In the Critical Auth VLAN section, in the Data and Voice fields, enter the VLAN numbers that the device (data or voice) will be assigned to if the RADIUS servers are not reachable at the moment.

    Note: If, for any reason, your NAS device is temporarily unable to connect to Portnox Cloud RADIUS servers, the client device attempting 802.1X authentication is assigned to this VLAN. This lets your network administrators maintain client connectivity to certain resources without compromising security in circumstances such as an Internet connection failure.
    Warning: As of February 2024, the Meraki critical auth VLAN functionality is a beta feature and we do not recommend using it on production systems. We have found the feature to have serious bugs, such as the inability to switch back to the expected VLAN once the RADIUS server is back online.
  11. Configure other parameters according to the requirements of your environment.

    For information on other parameters, see the Cisco Meraki documentation.

  12. Click on the Save Changes button to save your configuration.

Assign the access policy to switch ports

In this section, you will assign the access policy that you just created to specific switch ports on your Meraki switches.

  1. In the Meraki web interface, select your network, and then click on the Switching > Switch ports menu option.

  2. In the Switch Ports pane, find the port that you want to assign the policy to and click on its name.

    In the case of large number of switches/ports, you can use the search functionality to find the correct switch/port.

  3. In the Update port pop-up, in the Type field, select the Access option, in the Access policy field, select the access policy that you just created, and then click on the Update button in the bottom-right corner of the pop-up.

  4. Repeat the above steps for any other ports, as needed.
    Note: You can create many access policies and assign them to different ports, as needed. For example, you can create a different access policy for ports used by IoT devices via MAC authentication bypass (MAB), and a different access policy for ports used by laptop docking stations with 802.1X authentication.