Configuring Access Guardian Access Guardian Overview
OmniSwitch AOS Release 8 Network Configuration Guide December 2017 page 28-14
For non-supplicant authentication, the client MAC address is sent as the username and password. The
administrator can configure the password and username on the authentication server as the MAC
address of the client. The calling-station-ID, accounting-session-ID are also sent for authentication. All
of these IDs can be in uppercase or lowercase.
• Internal Captive Portal authentication.
Internal Captive Portal authentication is a configurable option for a UNP profile that is applied after a
user is initially assigned to that profile (after the initial 802.1X or MAC authentication or classification
process). Captive Portal provides a secondary level of authentication that is used to apply a new role
(QoS policy list) to the user. This type of authentication may change the profile assignment for the user
device.
When a user is classified into a profile that has the Captive Portal option enabled, a Web page is
presented to the user device to prompt the user to enter login credentials. The credentials are then
authenticated through a RADIUS server. If the authentication process results in a new policy list or
new profile, that policy list or profile is applied to the user device. If a policy list or profile is not
assigned or authentication fails, the policy list associated with the initial profile is used to define the
network access role for the user.
• External Captive Portal authentication.
External Captive Portal authentication is provided through the OmniSwitch Bring Your Own Device
(BYOD) solution. Access Guardian, through the UNP port and profile framework, redirects user device
traffic to the Unified Policy Access Manager (UPAM) server or the ClearPass Policy Manager (CPPM)
server for Guest Access using the UPAM or CPPM Guest module.
802.1X and MAC authentication are Layer 2 mechanisms that are configured and invoked at the port
level. A UNP port is enabled with either 802.1X, MAC, or both types of authentication. Devices
connected to UNP ports undergo the type of authentication configured on the port.
Internal and external Captive Portal authentication are Layer 3 mechanisms that are invoked through the
UNP profile configuration. Devices connected to UNP ports initially undergo Layer 2 authentication and/
or classification at the port level to determine an initial UNP profile assignment. Then, based on the
profile settings, the user may be redirected for Layer 3 authentication.
The authentication functionality provided allows the administrator to assign the appropriate method of
authentication. Multiple authentication methods for multiple users (many users or different types of users,
such as IP phones) are supported on the same port.
Device Classification
Successful device authentication can result in a UNP profile assignment for the user device. However, if
authentication is not available or does not return a profile name for whatever reason, the following
additional UNP device classification methods are available to determine the profile assignment for the
user device:
• UNP classification rules. Switch-wide classification rules to classify users based on port and device
attributes (for example, source MAC, domain ID, IP address). Classification rules are associated with
profiles and are applied to traffic received on UNP-enabled ports. When any of the traffic matches one
of the classification rules, the user device is dynamically assigned to the matching profile.
• Alternate pass UNP. A UNP associated with a UNP port to which traffic is assigned when successful
802.1X or MAC authentication does not return a UNP name.