Sections:
Resources:
Overview:
Lab Topology
(ACL) Access Control Lists
Overview:
ACL Menu
ACL Menu Overview
ACL Configuration
Overview:
ACL Verification
Corporate VLAN
IP Verification in Corporate Network Range
SSH Putty Client
Successful SSH - Matches Rule 4: Allow 'Any Any'
RDP Client
Successful RDP - Matches Rule 4: Allow 'Any Any'
TFTP Client
Unsuccessful TFTP - Matches Rule 3: Deny TFTP Access
Guest VLAN
IP Verification of Guest Network Range
Unsuccessful SSH - Matches Rule 1: Deny SSH Access
Unsuccessful RDP - Matches Rule 2: Deny RDP Access
Successful TFTP - Matches Rule 4: Allow 'Any Any'
Port Schedules
Overview:
Port Schedules Menu
Port Schedule Menu Overview
Configuration
Applying Port Schedules
Overview:
Port Schedule Verification
Overview:
Access Policies
Overview:
Access Policies Menu
Access Policies Menu Overview
Access Policy Setting Parameters
Authentication Methods
Organization-Wide RADIUS Servers
Access Policy Types
Host Modes
802.1X Control Direction (Wake-on-LAN)
Re-authentication Interval
Concurrent Authentication (Hybrid Policy)
Suspend Port Bounce
Critical Auth VLAN
Guest VLAN
Failed Auth VLAN
Radius Caching & Caching Timeout
Other RADIUS Features
Meraki Authentication Access Policy Configuration
Overview
Overview of Defined Policy
Configuring Meraki Auth User
Configuring Meraki Auth User for the Access Policy Zone
Configuring Meraki Auth User
Verification of Defined Meraki Auth User
Associating Policy to LAN Port
Overview of Configured Policy
IP Verification of Corporate Client on Network
Verification of Successful 802.1X Login
Verification of Successful 802.1X Login via Event Log
Windows 802.1X Supplicant Configuration
Overview
Accessing Windows Services
Locating 'Wired AutoConfig' Service
Changing Startup Type to 'Automatic'
Start 'Wired AutoConfig' Service
Accessing Network Adapter Settings
Accessing Properties of Ethernet Adapter
'Authentication' Parameters for 802.1X
'Authentication' Parameters for 802.1X
'Authentication' Parameters for 802.1X
'Authentication' Parameters for 802.1X
Accessing Meraki Authentication Credentials
Saving Meraki Authentication Credentials
RADIUS Authentication Configuration
Overview
Creating a New RADIUS Client
Configuring Meraki Switch RADIUS Client with Shared Secret
Configuring 802.1X Policy for Wired or Wireless Connections
Configuring 802.1X Policy - Defining Ethernet 802.1X Connection Type
Configuring 802.1X Policy - Verifying Switch RADIUS Client
Configuring 802.1X Policy - Setting EAP Authentication Method for Policy
Configuring 802.1X Policy - Adding an AD User Group for 802.1X Authentication
Configuring 802.1X Policy - Specifying AD User Group for 802.1X Authentication
Configuring 802.1X Policy - Verify AD Group is Specified
Configuring 802.1X Policy - Leave Default Traffic Controls
Configuring 802.1X Policy - Finish Policy
Verification of Completed 802.1X Policy
Overview of Configured RADIUS Access Policy
Overview of Configured RADIUS Access Policy
Overview of Configured RADIUS Access Policy
IP Verification of Corporate Client on Network
Corporate Client Successful 802.1X using Saved AD Credentials
Verification of Successful 802.1X Login via Meraki Event Log
MAB Authentication Configuration
Overview
Phillips Hue IoT Device
Acquiring the MAC Address of the IoT Device using an IP Scanner
Defining a New AD Group for MAB Devices
Specifying New Group Name & Scope/Type
Verifying Defined New Group
Using PowerShell to Define a Custom Fine Grained Password Policy for the Meraki MAB AD Group to Allow MAC Addresses to be used as Passwords of MAB Device Clients
Adding an AD Group (Meraki MAB) to the Defined Custom Password Policy
Defining MAB Client (Phillips Hue Device) by Setting the Username as the MAC Address
Will Need to Add User to the Meraki MAB Group Before Specifying MAC Address as the Password
Add MAB Client to the Meraki MAB Group so that it inherits the Custom Password Policy
Adding MAB Client to the Meraki MAB Group
Reset Password of MAB Client & Specify the MAC Address as the Password
MAB Client MAC Address as the Password
Last Step is to Enable Account of MAB Client
Verification of Defined MAB Client
Verification Check of MAB Client Inheriting the Custom Password Policy Defined In Previous Steps Using PowerShell
Defining Meraki Switch as a RADIUS Client via Network Policy Server
Defining New Connection Request Policy
Naming Connection Request Policy
Adding Condition for Connection Request Policy
Adding 'NAS Port Type Ethernet' as the Condition for the Connection Request Policy
Verifying Condition for Connection Request Policy
Leave 'Connection Request Forwarding' at Defaults
Leave 'Authentication Methods' at Defaults
Leave 'Configure Settings' at Defaults
Finish Connection Request Policy
Define a New Network Policy
Name Network Policy
Define Conditions for Network Policy
Add 'NAS Port Type Ethernet' & 'Meraki MAB' Windows Group as Conditions for Network Policy
Leave 'Specific Access Permission' at Default
Enable 'Unencrypted Authentication (PAP, SPAP) as Authentication Methods for Network Policy
Leave 'Configure Constraints' at Default
Leave 'Configure Settings' at Default
Finish the Network Policy
Overview of the Defined Meraki Access Policy
Overview of the Defined Meraki Access Policy
Associating the Meraki Access Policy to the Switchport with the Connected MAB Client
Associating the Meraki Access Policy to the Switchport with the Connected MAB Client
Verification of Successful MAB Authentication via Meraki Event Log
Verification of Successful MAB Authentication
Verification of Successful MAB Authentication
Port Profiles
Overview:
Port Profiles Menu
Port Profiles Menu Overview
Configuration
Applying Port Profiles