{"id":24789,"date":"2018-12-07T15:00:28","date_gmt":"2018-12-07T22:00:28","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=24789"},"modified":"2022-11-18T15:49:58","modified_gmt":"2022-11-18T20:49:58","slug":"vlan-tagging-meraki","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/vlan-tagging-meraki","title":{"rendered":"Per-User VLAN Tagging with Meraki and JumpCloud"},"content":{"rendered":"\n

Cisco Meraki wireless access points (WAPs) are some of the most popular in the industry. Resulting from the overall shift from wired to WiFi networks, Meraki is often a IT admin\u2019s first choice when it comes to WAPs. However, solutions from Aruba and Ruckus get a fair amount of consideration as well. As an important aspect of managing and securing WiFi environments, many IT admins are leveraging VLAN tagging with Meraki equipment. <\/span><\/p>\n\n\n\n

Physical VLAN Networking<\/span><\/h2>\n\n\n\n

IT networks have historically been connected via wires and switches\/routers. Part of the security model with wired networks was greater physical control. IT admins could manage Virtual Local Area Network (VLAN) access by assigning designated ports on a switch to a specific group of users. Accounting would get assigned to a grouping of ports while Marketing was on another. This helped to segment traffic and increase security. The security of the network these physical devices emit has been radically improved with software. But, with organizations <\/span>shifting to WiFi<\/span><\/a>, the security model must also adjust as well. <\/span><\/p>\n\n\n\n

Security Improvements via RADIUS<\/span><\/h2>\n\n\n\n

One way that IT admins have begun to step up the security posture on their WiFi networks is through RADIUS authentication. <\/span>RADIUS<\/span><\/a> offers an excellent increase in security for WiFi networks because it enables users of a given network to log in with their own unique set of credentials. For example, think about a large college campus where students each access the network using a university-assigned username (often a student number) and a password created by the student. By eliminating the shared SSID and passphrase commonly used for WiFi access, network security is increased because only those registered with the university can access the student network. It\u2019s the same scenario for instructors. Yet, some IT admins are seeking to increase their network even further, and VLAN tagging \u2013 or network segmentation \u2013 \u00a0is often considered. <\/span><\/p>\n\n\n\n

VLAN Tagging, Groups, and Additional Equipment<\/span><\/h2>\n\n\n\n

As stated above, the idea is to create separate VLANs for different <\/span>groups of users<\/span><\/a> on the network so that they can only communicate and access the resources that have been explicitly granted to them. These VLANs are tagged with unique identifiers which are subsequently used to place the user and device on the appropriate VLAN or network segment. While that all sounds pretty complex, VLAN tagging<\/a> with Meraki isn\u2019t all that difficult. But, it does require a number of additional components beyond the Meraki WAPs. <\/span><\/p>\n\n\n\n

In order to properly implement dynamic, per user VLAN assignment, IT admins need to connect the WAPs with a RADIUS server which is backended with an <\/span>identity provider (IdP)<\/span><\/a>. When a user is authenticated all the way through to the identity provider (often a Microsoft<\/span>\u00ae<\/sup><\/span> Active Directory<\/span>\u00ae<\/sup><\/span> or OpenLDAP\u2122  implementation) the RADIUS server attaches what are called RADIUS reply attributes which are used to specify which VLAN a given user belongs to. The WAP then takes that information and places the user and device on the proper VLAN.  <\/span><\/p>\n\n\n\n

VLAN Tagging with Meraki from the Cloud<\/span><\/h2>\n\n\n\n

The process of implementing VLAN tagging can be significant if the IT organization needs to build, configure, and maintain each component described above. While that may seem like a massive undertaking, the good news is that there is a <\/span>cloud identity management platform<\/span><\/a> that does the bulk of the heavy lifting for you around implementing VLAN tagging, a RADIUS server, and of course, the identity provider. All you need to do is point your WAPs to the cloud RADIUS endpoint and decide which users and groups are on which VLAN.<\/span><\/p>\n\n\n\n

Aside from those networking security measures, this cloud identity management platform can connect you to a wide array of additional IT resources including systems (Windows<\/span>\u00ae<\/sup><\/span>, Mac<\/span>\u00ae<\/sup><\/span>, Linux<\/span>\u00ae<\/sup><\/span>), web apps (Slack, GitHub\u2122, Salesforce<\/span>\u00ae<\/sup><\/span>), cloud infrastructure (AWS<\/span>\u00ae<\/sup><\/span>, GCE, Azure<\/span>\u00ae<\/sup><\/span>), file servers on-prem and in the cloud (NAS\/Samba devices, Box\u2122, DropBox\u2122), and much more all with a single set of credentials by utilizing <\/span>True Single Sign-On\u2122<\/span><\/a>. It\u2019s called JumpCloud<\/span>\u00ae<\/sup><\/span> Directory-as-a-Service<\/span>\u00ae<\/sup><\/span><\/a>, and it\u2019s a modern reimagination of Active Directory and LDAP for the modern world. <\/span><\/p>\n\n\n\n

Learn More About JumpCloud<\/span><\/h2>\n\n\n\n

Ready to embrace per-user VLAN tagging with Meraki and JumpCloud<\/a>? <\/span>Sign up today<\/span><\/a> for a free JumpCloud Directory-as-a-Service account. As a free account holder you can manage up to 10 users for free, forever. No credit card required. If you need to manage more than 10 users, visit our <\/span>pricing page<\/span><\/a>. Once you\u2019ve signed up for free account or otherwise, check out our <\/span>Knowledge Base<\/span><\/a> and <\/span>YouTube channel<\/span><\/a> for more helpful information to help you get the most of Directory-as-a-Service.<\/span><\/p>\n\n\n\n

\n