B-03 | Guest Wireless with AGNI¶
Overview¶
AGNI Login¶
If you're not already logged into AGNI, navigate to the Arista Launchpad for your lab.
AGNI Guest Captive Portal¶
Let's configure a Guest Captive Portal using AGNI for wireless clients. To configure the guest portal, you must configure both AGNI and CV-CUE.
🔥 CRITICAL PREREQUISITE 🔥
📖 Follow the steps here - This step cannot be skipped!
RadSec | Installing the AP Certificate¶
What is RadSec?¶
RadSec is a protocol that supports RADIUS over TCP and TLS. For mutual authentication it is required to install a client certificate with corresponding private key as well as your AGNI CA certificate.
With the proliferation of IoT devices, mobile users, and remote access, networks have become more complex and diverse, making traditional RADIUS susceptible to eavesdropping and man-in-the-middle attacks. RadSec's integration of secure Transport Layer Security (TLS) encryption addresses these vulnerabilities, providing a robust defense against unauthorized access, data interception, and tampering.
Arista Switches can form a RadSec tunnel using SSL encryption with AGNI:
- AGNI integrates with network infrastructure devices (wired switches and wireless access points) through a RadSec tunnel over
Port 2083 - The highly secure and encrypted tunnel offers complete protection to the communications that happen in a distributed network environment. This mechanism offers much greater security to AAA workflows when compared with traditional unencrypted RADIUS workflows.
More information on RadSec
Open AGNI and CV-CUE
When applying the Certificate to the AP it is recommended to have both the CV-CUE and AGNI windows opened side by side. - Login to CV-CUE - Login to AGNI
Configure RadSec¶
It's important to identify if the wired or wireless device you are configuring is manufactured with a Trusted Platform Module (TPM) chip. This chip contains the required certificate used for RadSec. However, if the TPM chip does not exist, CV-CUE supports Custom Certificate Management for Access Points.
More information on TPM
Summary¶
- Launchpad Add AP and assign the Service
- CV-CUE Create a Folder and move the AP
- CV-CUE Generate CSR TAG and then Download CSR
.zip. - AGNI Add the device as a new AP under Access Devices
- AGNI Click on your AP and then select Get Client Certificate
- AGNI Upload the CSR and Generate Certificate
- CV-CUE Click on your AP and Upload Device Certificate and select TAG and
AP.pemfile - AGNI Under Administration click on RadSec settings and download Cert and copy hostname
- CV-CUE In your Folder, Create a RADIUS RadSec server and apply the RadSec Cert from AGNI and Select your CSR TAG -> FQDN:
radsec.beta.agni.arista.io - CV-CUE Create an SSID and point to the RADIUS client you created using WPA2 802.1X RadSec.
- AGNI Create a User Account
- AGNI Add Client
- AGNI Under Networks, recommend starting with just a MAC auth example to make sure everything is running like you expected and point it to your SSID
Detailed Steps¶
-
CV-CUE- First we Generate a CSR. Click on
Monitor > WiFi Access Points - On right hand side on top and click on
Certificate Actions - Next, right click on the AP and select
Generate CSRand select yourAdd New Certificate Tag. Type in a name for your Certificate Tag. Click onGenerate. - Next, right click on the AP and select
Download CSRand select yourCertificate Tag.
- First we Generate a CSR. Click on
-
AGNI-
Click on Access Devices and click on
+ Add or Import. Specify the following in the table below. Click onAdd Devicewhen done.Field Value Notes Choose Action Add DeviceSelect radio button Name Your AP NameEnter descriptive name for the AP MAC Address xx:xx:xx:xx:xx:xxOptional - Enter AP MAC address Vendor Arista WiFiSelect from dropdown Serial Number Your AP SerialRequired for RadSec - Enter AP serial number IP Address Your AP IPOptional - Enter AP IP address Access Device Group Select GroupOptional - Choose appropriate group Location Your LocationOptional - Example: Global/America/California/Site-1 -
Access Devices → Devices → Select AP → Get Client Certificate
- Next, select
Generate Certificate: Use CSR (Single Device), and selectAction: Upload CSR File, and browse to and select the CSR zip file. - Select
Generate Certificateand the AP Client Certificate will be created and downloaded to your device. - Under
System -> RadSec Settingscopy theRadsec Server HostnameandDownload Certificateat the bottom.
-
🚨 CRITICAL STEP - DO NOT SKIP!
📥 Download Certificate - This certificate is required for the RadSec tunnel to work properly.
🔗 Copy Hostname - The RadSec Server Hostname is needed for CV-CUE RADIUS server configuration.
-
- Upload the Device Certificate
- Go to
Monitor → WiFi → Access Points → Select AP → Certificate → Upload Device Certificate, and upload the Client/Device Certificate that was downloaded to your device. Use the same Certificate Tag as when you Downloaded the CSR above. - Configuring AGNI RadSec Server.
- Go to
Configure → Network Profiles → RADIUSand create a new RADIUS Server. -
Select
Add RADIUS Server. Specify the following in the table below.Field Value Server Name AGNI-01Server Address radsec.beta.agni.arista.ioRadsec ONRadsec Port 2083Add CA Certificate Downloaded from AGNICertificate Tag Select your tag created in Step 1
CV-CUE- Select
Saveto commit the changes.
-
AGNI- Click on Access Devices and then Devices look at the RadSec Status.
- 🟢 Green dot means connected and an active SSID is using AGNI.
-
Navigate to
Guest > Portalsunder the sectionIdentity. -
Click
+ Add Guest Portaland configure the followingNetwork Settings
Field Student 1 Student 2 Portal Name ATD-##-GUESTATD-##-GUESTAuthentication Types Clickthrough Clickthrough Re-Authuthenticate Guest Always Always CAPTCHA Disabled Disabled -
Click the Customization tab to customize the portal settings, and notice the elements. When done, click
Add Guest Portal. The portal gets listed in the portal listing.- Page
- Login Toggle
- Terms of Use and Privacy Policy
- Logo
- Guest Login Submit Button
- Etc
-
Click
Back -
Navigate to the
Networksunder the sectionAccess Control. Click on+ Add Network -
Add a new network with following settings
Network Settings
Field Student 1 Student 2 Name ATD-##-GUESTATD-##-GUESTConnection Type Wireless Wireless SSID ATD-##-GUESTATD-##-GUESTAuthentication Type Captive Portal Captive Portal Captive Portal Type Internal Internal Select Internal Portal ATD-##-GUESTATD-##-GUESTInternal Role for Portal Authentication Portal ## RolePortal ## Role -
Click
Add Network. -
Copy the portal URL at the bottom of the page.
AGNI URL
Make sure to copy the AGNI Guest Portal URL, we are going to use this in CV-CUE for Guest Portal Redirection.
CV-CUE Login¶
If you're not already logged into CV-CUE, navigate to the Arista Launchpad for your lab.
Role Profile (CV-CUE)¶
Let's configure two role profiles and the SSID settings. This will ensure our guest SSID we will create is enabled with redirection to AGNI captive portal. These roles are
- Portal (A/B) Role: This role will be assigned initially to ensure captive portal redirection
- Guest (A/B) Role: This role will be assigned by AGNI to drop our client into a "Guest Role" where we can further define policy
Portal Role Profile¶
-
Log in to CV-CUE and navigate to
Configure > Network Profiles > Role Profile. -
Add a
Role Profileusing the setting belowNetwork Settings
Field Student 1 Student 2 Role Name Portal ## RolePortal ## RoleProfile Name Portal ## RolePortal ## RoleRedirection Enabled Enabled Redirection Type Static Redirection Static Redirection Redirect URL <Copied from AGNI><Copied from AGNI>HTTPS Redirection Enabled Enabled Common Name www.arista.com www.arista.com Organization Arista Networks Arista Networks Organization Unit Arista Networks Arista Networks -
Click
Saveat the bottom of the page.
Guest Role Profile¶
Next, we’ll configure a Guest Role in CV-CUE to assign to Guest Users post authentication.
-
In CV-CUE, navigate back to
Configure > Network Profiles > Role Profile. -
Click
Add Role Profile. -
Add the
Role Nameas follows, this role is simple, but see the additional information below to explore some of the options you have with roles.Network Profiles
Field Student 1 Student 2 Role Name Guest ## RoleGuest ## Role -
Click
Saveat the bottom of the page -
You should now have two roles, we will refer back to these roles in both the AGNI and CUE SSID configuration.
Additional Information¶
-
VLAN
In this lab the VLAN is set to 0. In production networks you would define the Guest VLAN ID or Name that you want to assign to the Guest Users.
-
Firewall
Layer 3-4 and Application Firewall Rules can be assigned to the Guest User Role.
-
User Bandwidth Control
Upload and Download Bandwidth Limits can be assigned to the Guest User Role.
Portal Segment (AGNI)¶
Next, we’ll configure a Segment in AGNI to assign the Guest Role Profile post authentication.
- Go back to AGNI and navigate to the Access Control > Segments.
-
Add a new Segment by clicking on
+ Add SegmentConditions for segments must MATCH ALL conditions line by line.
Network Settings
Field Student 1 Student 2 Name ATD-##-GUESTATD-##-GUESTCondition Network:Name is ATD-##-GUESTNetwork:Name is ATD-##-GUESTAction Arista-WiFi:Assign Role ProfileArista-WiFi:Assign Role ProfileAction Role Profile Guest ## RoleGuest ## Role -
Click
Add Segmentat the bottom of the page. - Let's now add the Guest SSID
Guest Portal SSID (CV-CUE)¶
Lastly, we’ll configure and enable the Guest Captive Portal SSID and assign the pre and post authentication roles.
- Let's navigate back to CV-CUE
-
Select Correct location
ACorpCV-CUE Locations
Reminder, make sure you have selected your appropriate corporation before creating the SSID!
-
Navigate to
Configure > WiFiand click onAdd SSID -
Configure the SSID
Basicsettings using the settings belowSSID Basic Settings
Setting Student 1 Student 2 SSID Name ATD-##-GUESTATD-##-GUESTSSID Type Private Private -
Click the 3 dots and select
Access Controltab and configure using the settings belowSSID Access Control Settings
Setting Value Notes Client Authentication Authentication Type Radius MAC Authentication RadSec Authentication Server AGNI-01AGNI Radsec Server was configured already Accounting Server AGNI-01Role Based Control Rule Type 802.1X Default VSA Operand Match Assign Role Select All Created in previous section Send DHCP Options and HTTP User Agent -
Once all settings have been set, Click the
Save & Turn SSID Onbutton at the bottom of the page. -
You will be prompted to customize before enabling, select the
5 GHzoption on the next screen (un-check the2.4 GHzbox if it’s checked), then clickTurn SSID On. -
Join the new WiFi and verify connectivity in CUE and AGNI
Join the guest WiFi!
Give it a moment for the new SSID to come up, but once it's up try and join the WiFi! You should be prompted with a captive portal, click on the a
Tunneling Guest Traffic¶
To highlight Arista's Controller-less Architecture we will use the labs spine MLAG switches to terminate the AP tunnel with VXLAN configured and tunnel guest traffic.
Create Tunnel Profile (CV-CUE)¶
- Under the
Configuresection, click onNetwork Profiles > Tunnels - Select the correct location in your hierarchy
-
Select
Add Tunnel InterfaceNetwork Profiles
Setting Value Tunnel Interface Name tunnel-## Tunnel Type VXLANRemote Endpoint 1.1.1.1 Local Endpoint VLAN 0 VXLAN VNI Offset 10200 -
Click
Save
Assign SSID to Tunnel Profile¶
- Under the
Configuresection, click onWiFi - Select the correct location in your hierarchy
- Select the pencil to edit Guest SSID
- Select
Network - Change
Network ModetoL2 Tunnel - Select the tunnel-##
-
Click Save
Monitor Tunnels¶
- Under the
Monitorsection, click onWiFi - Verify your location in the hierarchy
-
Click on
Tunnelsor the tunnel icon on the top row -
Verify if the Tunnels are green
Review VXLAN on spine1 or spine2 in CVaas¶
Screenshot shows VLAN200 mapped to VNI10200 and VXLAN clients with VLAN200 IPs
🎉 CONGRATS! You have completed this lab! 🎉
























