Arista / WatchGuard
CONFIGURATION GUIDE
The purpose of the following manual is to describe the configuration required on Arista Networks or WatchGuard equipment for integration with Octopus Platform.
Â
1- Pre-requisites
If there is a firewall in the network that might block the traffic, you will need to allow access to some domains to enable user's authentication:
Radius Servers:
Primary:Â <IP_Radius_1>Â 1812 and 1813 UDP ports
Secondary:Â <IP_Radius_2>Â 1812 and 1813 UDP ports
Splash Portal server:Â
Domain <captive_portal_domain>Â 80 and 443 TCP ports
For the operation of the Guest and Enterprise modules configuration, it will be necessary to previously contract the Octopus platform licenses with the respective modules.
2- Guest module configuration
2.1 Radius Server
The first step is to add all the configuration of the Radius servers. To do this go to Configuration > RADIUS Profiles > Add RADIUS Profile and create one with the following parameters:
Profile Name: RADIUS1
IP Address: <IP_Radius_1>
Authentication Port: 1812
Accounting Port: 1813
Shared secret: <Secret>
After clicking OK, configure the parameters of the second Radius server with the following data:
Profile Name: RADIUS2
IP Address: <IP_Radius_2>
Authentication Port: 1812
Accounting Port: 1813
Shared secret: <Secret>
Click on Save to save the changes
2.2 WLAN Settings
The first step is to create a new WLAN network. To do this go to the Configuration > Device Configuration > SSID Profiles tab, to add a new WLAN click on Add New WiFi Profile.
Add a name for the new profile as well as the SSID to be radiated by the APs.
In the Security tab select Open as the authentication method for the newly created WLAN.
2.3 Captive Portal
The configuration required to enable an external captive portal must be done within Captive Portal on the configuration page of the created SSID. First, check the Enable Captive Portal option and select from the possible options that appear External Splash Pag with RADIUS Authenticaction and fill in the fields with the following information:
Splash Page URL:Â https://<captive_portal_domain>/login/hotspot/mojo
Shared Secret: xieylpgxoypwzqtb
In the next step we will select the Radius server for the SSID, click on Radius Settings on the configuration page. Within the dropdown that appears fill in all the fields with the following parameters and select the Authentication and Accounting Radius created previously:
Authentication
Called Station ID: %m:%s
NAS ID: %m:%s
Primary Authentication Server:
RADIUS1
Secondary Authentication Server:
RADIUS2
Accounting (this option must be enabled to perform session control)
Interval: 10 mins
Primary Accounting Server:
RADIUS1
Secondary Accounting Server:
RADIUS2
Â
Once all the parameters have been filled in, click on the Save button to save the changes made.
The next step is to enter the parameters that the AP will send in the HTTP redirect. To do this, access the Advanced Parameters option and fill in all the fields with the following configuration:
Request Attributes:
Request Type: res
Challenge: challenge
Client MAC Address: client_mac
AP MAC Address: ap_id
AP IP Address: uamip
AP Port Number: uamport
Failure Count: failure_count
Requested URL: userurl
Login URL: login_url
Logoff URL: logoff_url
Remaining Blackout Time: blackout_time
Service Identifier: service_id
On the other hand, within the same drop-down list it is also necessary to fill in the fields that the AP will accept as an answer, Within these fields are included the username and password and the url to which the user will be redirected after validation. The parameters to be included are detailed below:
Request Attributes:
Challenge: challenge
Response Type: res
Challenge Response: digest
Redirect URL: redirect
Login Timeout: session_timeout
Username: username
Password: password
Once the fields have been filled in, click on Save to save the changes made.
2.4 Walled Garden
Finally, within the WLAN configuration it is necessary to include the domains to which free access should be allowed within the walled garden. To do this, click on Captive Portal and then Add on Walled Garden Sites and add all the necessary domains within the drop-down menu that appears.
If you wish to add extra domains (Social Networks, Paypal, etc...) they can be consulted from the following link.
Once all the changes have been made in both Security and Captive Portal, the configuration must be saved by clicking on Save.
2.5 Device Templates
Once the external captive portal has been configured, the WLAN created within a template must be associated. To do this go to Configuration > Device Configuration > Device Template and click on Add Device Template to create a new one or modify an existing one. In the configuration options set the following parameters.
Template Name: Template Name
Next, you need to add the WLAN created earlier. To do this, go to Radio Settings and click on Universal Configuration, select Add SSID Profile from the drop-down menu and select the SSID profile that contains the captive portal:
Once you have added the SSID Profile in both the 2.4GHz and 5GHz bands, click Save to save all changes.
When saving the changes, if no password has been configured for access to the APs within the Template, an error will appear. Therefore, it will be necessary to add a password to save the changes made. To do this go to Device Settings > Device Password and add the password for access to the APs.
2.5 Managed devices
To finish the configuration of the APs of the installation it is necessary to associate the Device Template created previously to the APs in which you want the SSID created to be radiated. To do this, go to Monitoring > Managed Devices and once inside select all the APs of the installation that should radiate the SSID created previously and click on the button at the bottom of the page to change the Template associated to the APs.
After clicking on this button, select the Template created in the drop-down menu and confirm that you want to make these changes.
Â
Finally, check that once these changes have been made, the template has been associated with the APs.
2.6Â Authorized MAC Addresses
For user validation to work properly, it is necessary to identify the NAS that will be able to make authentication requests to the Radius Server. The MAC address of all APs must be added.
These MAC addresses are easily accessible within Monitoring > Managed Devices:
For information on how to add the MAC address of each AP as an authorized NAS on the platform, please refer to the following link Locations
3- Enterprise module configuration
In order to integrate the configurations of this module with the platform, it is necessary to contract the Octopus Wifi Enterprise Module.
3.1 Â Captive portal + MAC Authentication configuration
To enable MAC authentication it is necessary to edit the WLAN in use.
To do so, go to Configuration > Device Configuration > SSID Proflies and select the SSID profile created earlier to edit its configuration and once inside the SSID Profile, go to the Security section and check the Secondary Authentication option.
Next, check the RADIUS MAC Authentication option and click RADIUS Settings to configure the following parameters:
Associate the radius servers created in point 2.3 (Radius section) of this guide.
Authentication
Called Station ID: %m:%s
NAS ID: %m:%s
Username and Password:
Username: MAC Address with Colon
Password: MAC Address with Colon
Primary Authentication Server: RADIUS1
Secondary Authentication Server: RADIUS2
Accounting (this option must be enabled in order to control the sessions)
Interval: 10 mins
Primary Accounting Server: RADIUS1
Secondary Accounting Server: RADIUS2
Once all the changes have been made within the SSID Profile edition, click on Save to save the new configuration.
3.2 MAC Authentication configuration
To create an SSID dedicated only to MAC Authentication go to Configuration > Device Configuration and click on Role Profiles and once inside click on Add Role Profile to create a new role and configure the following parameters:
Profile Name: MAC AUTH USER
Role: MAC AUTH USER
Inherit from SSID: disable.
VLAN: enable this option and configure:
VLAN ID: indicate the vlan configured on the network
Once you have done this, you have to create the SSID, to do this go to Configuration > Device Configuration > SSID Profiles, to add a new WLAN click on Add New WiFi Profile
Add a name for the new profile as well as the SSID to be radiated by the APs, e.g. Mac_Auth_Guest
In the Security tab, select Open as the authentication method for the newly created WLAN.
Next, enable MAC Authentication within the SSID Profle and assign the above role to users who validate themselves by their MAC address.
To do this go to Configuration > Device Configuration > SSID Proflies and select the SSID profile created earlier to be able to edit its configuration and once inside the SSID Profile, drop down the Security section and check the Secondary Authentication option.
Next, check the RADIUS MAC Authentication option and click RADIUS Settings to configure the following parameters:
Associate the radius servers created in point 2.3 (Radius section) of this guide.
After clicking on Save enable the Assign SSID Profile option and select the role created earlier under Select Role for Sucessful Clients.
In this way, if the MAC authentication is correct, the user will have free access without the need to validate through the captive portal.
Once all the changes have been made within the SSID Profile edition, click on Save to save the new configuration.
Â