Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    FreeRadius 3: Fall-through vlan assignment.

    Scheduled Pinned Locked Moved pfSense Packages
    4 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      OldManNiko
      last edited by

      I am a new user to PFSense, and have been kicking the tires quite a bit, including giving dynamic VLAN assignments by MAC. I have this working, but I cannot find a configuration item that would allow me to authenticate the MAC and give a VLAN assignment back, else return a different VLAN for those clients which did not authenticate successfully with a MAC to the radius server.

      I don't want to pursue this further if it's folly, but I think I am on the right track. Is there a way to produce a fall-through vlan assignment?

      1 Reply Last reply Reply Quote 0
      • NogBadTheBadN
        NogBadTheBad
        last edited by NogBadTheBad

        Isn't it a function of the switch rather than FreeRadius, I don't use FreeRadius MAC auth myself but looking on one of my switches:-

        Screenshot 2019-09-05 at 11.58.36.png

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        awebsterA 1 Reply Last reply Reply Quote 0
        • awebsterA
          awebster @NogBadTheBad
          last edited by

          @NogBadTheBad
          You're correct, it is a function of the switch, or wireless AP.
          These devices typically have a facility to allow MAC authentication using a RADIUS authentication provider, in which case a RADIUS based authentication handshake takes place but instead of a username/password being exchanged the MAC address is passed as the username AND password. Hint: This will be a PAP type authentication.
          The format of the MAC address is important, the switch or AP and the RADIUS server have to agree on how to process it, is it aa:bb:cc:dd:ee:ff, or aa-bb-cc-dd-ee-ff, or AA-BB-CC-DD-EE-FF, etc.
          When the RADIUS server grants access, it returns an attribute value (could need to be custom depending on the equipment vendor) containing the desired VLAN number.
          If the RADIUS server does not grant access, the equipment (switch or AP) will assign a default vlan to the connection.
          The net result is if RADIUS MAC passes you get assigned the desired VLAN, and if it fails you end up on the Guest VLAN which terminates in a Captive Portal or some such alternate authentication mechanism.

          –A.

          O 1 Reply Last reply Reply Quote 0
          • O
            OldManNiko @awebster
            last edited by

            @awebster Thank you guys so much for your help. I have the mac address authentication working, I think I missed the native-vlan option on the client device. Thanks for pointing me in the right direction.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.