MAC authentication

This help contains the following topics:

Introduction

MAC authentication controls network access by authenticating source MAC addresses on a port. The feature does not require client software, and users do not have to enter a username and password for network access. The device initiates a MAC authentication process when it detects an unknown source MAC address on a MAC authentication-enabled port. If the MAC address passes authentication, the user can access authorized network resources. If the authentication fails, the device marks the MAC address as a silent MAC address, drops the packet, and starts a quiet timer. The device drops all subsequent packets from the MAC address within the quiet time. The quiet mechanism avoids repeated authentication during a short time.

MAC authentication user account format

MAC authentication supports the following user account formats:

MAC authentication methods

The access device uses Password Authentication Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP) to perform MAC authentication with the authentication server.

MAC authentication features

Offline detection interval

If the device receives no traffic from a user within the specified offline detection interval, it logs off that user and requests the accounting server to stop accounting for the user.

Quiet interval

If the authentication for a user fails, the device marks the MAC address of the user as a silent MAC address and starts a quiet timer. The device drops all subsequent packets from the MAC address within the quiet time. The quiet mechanism avoids repeated authentication during a short time. Packets from the user will be processed when the quiet timer expires.

Configuration guide

Analysis

Configure MAC authentication as shown in the following figure:

Figure-1 MAC authentication configuration procedure

Basic configuration

Configure MAC authentication

  1. From the left navigation pane, select Configure > Authentication > Authentication Global Settings > MAC Authentication.

  2. In the Basic Configuration area, configure the MAC authentication method, ISP domain, user account format, and MAC address format.

  3. Click Submit.

Advanced configuration

Configure advanced MAC authentication parameters

  1. From the left navigation pane, select Configure > Authentication > Authentication Global Settings > MAC Authentication.

  2. In the Advanced Configuration area, configure the following parameters as needed:

    Table-1 Parameters for configuring MAC authentication

    Parameter

    Description

    Offline Detection Interval

    Sets the user idle timeout timer. If the device has not received traffic from a user before the timer expires, the device logs off that user and requests the accounting server to stop accounting for the user.

    Quiet Interval

    Sets the interval that the device must wait before the device can perform MAC authentication for a user that has failed MAC authentication. All packets from the MAC address are dropped during the quiet time. Packets from the user will be processed when the quiet timer expires.

    Server Timeout Interval

    Sets the interval that the device must wait for a response from a RADIUS server before it determines that the RADIUS server is unavailable. If the timer expires during MAC authentication, the user cannot access the network.

  3. Click Submit.

Example: Configure RADIUS-based MAC authentication

Network configuration

Configure the AC to perform MAC authentication on wireless users for Internet access control. This example uses the following settings:

Figure-2 Network diagram

Procedure

Configure a RADIUS scheme

  1. From the left navigation pane, select Configure > Authentication > AAA Settings > RADIUS Settings. The RADIUS Schemes page is displayed.

  2. Click Add. On the page that opens, add a RADIUS scheme:

    • Configure the RADIUS scheme name as maca.

    • Configure the primary authentication server. Set its IP address to 10.1.1.1, port number to 1812, and shared key to name.

    • Configure the primary accounting server. Set its IP address to 10.1.1.1, port number to 1813, and shared key to name.

  3. Click Submit.

    Figure-3 RADIUS scheme basic configuration

  4. In RADIUS scheme named maca, configure the AC to exclude domain names in usernames sent to the RADIUS server.

  5. Click Submit.

    Figure-4 RADIUS scheme advanced configuration

Configure an ISP domain:

  1. From the left navigation pane, select Configure > Authentication > AAA Settings > ISP Domains. The ISP Domain Settings page is displayed.

  2. Click Add. On the page that opens, add an ISP domain:

    • Configure the ISP domain name as maca.

    • Select RADIUS Scheme for authentication, authorization, and accounting and select maca as the scheme for each of them.

  3. Click Submit.

Figure-5 Configuring an ISP domain

Configure MAC authentication

  1. From the left navigation pane, select Configure > Authentication > Authentication Global Settings > MAC Authentication.

  2. In the Basic Configuration area, configure the MAC authentication method as PAP and ISP domain as maca., set the user account format to User MAC as Username and Password, and then select the default MAC address format.

  3. Click Submit.

Figure-6 Configure MAC authentication

Configure the RADIUS server

Add user accounts on the RADIUS server and make sure it can provide authentication, authorization, and accounting services. (Details not shown.)

Verify the configuration

After the traffic from a MAC authentication user triggers an authentication, the user can pass the authentication and comes online.