How to configure MAC-Based Authentication on Omada Controller
EAP610GP-Desktop , EAP683 UR , EAP225-Wall , EAP225-Outdoor , EAP245 , EAP783 , EAP265 HD , EAP230-Wall , EAP115-Bridge KIT , EAP620 HD , EAP215-Bridge KIT , EAP613 , EAP610 , EAP653 , EAP650-Outdoor , EAP211-Bridge KIT , EAP655-Wall , EAP615-Wall , EAP653 UR , EAP660 HD , EAP773 , EAP625-Outdoor HD , EAP673 , EAP772 , EAP650 , EAP670 , EAP235-Wall , EAP690E HD , EAP615GP-Wall , EAP723 , EAP225 , EAP623-Outdoor HD , EAP650-Wall , EAP610-Outdoor , EAP650-Desktop
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device and check either the Datasheet or the firmware section for the latest improvements added to your product.
Contents
Configuration with External Radius Server
Configuration with Built-in RADIUS of Omada Controller
Objective
This article introduces how to configure MAC-Based Authentication for wireless clients using an external radius server or the Built-in RADIUS of the Omada Controller, ensuring that only clients with authorized MAC addresses are granted network access.
Requirements
- Omada AP
- Omada Controller (Software Controller / Hardware Controller / Could-based Controller)
- External Radius Server
Introduction
MAC-Based Authentication is designed to control network access based on a device’s port and MAC address. To pass this authentication, a client’s MAC address should be registered on the Radius Server beforehand, with no additional client-side software required. The authentication process is seamless for users, since they do not need to manually enter the username and password, which greatly improves the wireless network access experience. With this function, you can control which clients can access the wireless network, reducing the risk of network intrusion and data theft.
In the Omada Controller, the feature is only applicable to wireless clients, so it can be regarded as Wireless MAC-Based Authentication. When a client tries to connect to an SSID configured with MAC-Based Authentication, the access point (AP), as a RADIUS client, converts the client's MAC address into a specified format and then sends it as the username and password to the RADIUS server. If the server recognizes the MAC address as authorized, it will inform the AP and the client will be given access to network resources.
You can use either the Built-in RADIUS server of the Omada Controller, or an external RADIUS server according to your needs. This guide will use EAP660 HD v1 and Omada Software Controller v5.14.30.7 to demonstrate how to configure MAC-Based Authentication using both methods. For the configuration through the external RADIUS server, FreeRADIUS installed on the CentOS system will be used as an example.
- CentOS version: centos-release-7-5.1804.el7.centos.×86_64
- FreeRADIUS version: FreeRADIUS Version 3.0.13
Note:
- When configuring MAC-Based Authentication with External Radius Server selected on Omada Software Controller v5.14 and above, you can add up to 4 RADIUS servers to increase fault tolerance. When one server becomes unavailable, the system can automatically switch to another server to complete the authentication. Make sure that this function is supported on the AP you are using. To verify this, refer to the Release Note on the device’s firmware update on TP-Link’s official website.
- The Omada Cloud-Based Controller (CBC) does not support the built-in RADIUS server. The built-in RADIUS will be removed from OC200 v5.15 model, but will continue to be available on the Omada Software Controller and other hardware controllers.
- Because the MAC addresses of authorized clients must be registered in the RADIUS server, MAC-Based Authentication is a bit complex to manage. When the administrator wants to add/replace/remove a client, the authentication list must be updated, which reduces network flexibility. Thus, you can combine MAC-Based Authentication with other methods, such as WPA/WPA2/WPA3 and portal authentication for all-round network security.
Configuration with External Radius Server
Step 1. Add multiple authorized clients in FreeRADIUS.
Open the CentOS system with FreeRADIUS installed and go to the Command Line Interface (CLI), edit and save the users file to add the MAC addresses of the authorized clients as shown in the following figure. You can add clients with two methods, via the Cleartext-Password attribute and the Auth-Type attribute. However, do not mix the two configurations.
- Via the Cleartext-Password attribute: The format is MAC address Cleartext-Password := “MAC address”
- Via the Auth-Type attribute: The format is MAC address Auth-Type := Accept
Note: When adding clients via the Cleartext-Password attribute, do not enable Empty Password in Step 7. If you do so, clients will not pass the authentication.
Step 2. Restart FreeRADIUS
After editing and saving the user file, run the following two commands on the CLI to restart FreeRADIUS and ensure that the configuration takes effect:
service radiusd stop
radius –X
Note: The specific CLI commands you need to enter in this step vary based on your Linux system. The preceding two commands apply only to the environment in this article.
Step 3. Log in to the Controller, go to Settings > Wireless Network > WLAN, and click Create New Wireless Network.
Step 4. Set parameters or options such as Network Name (SSID) / Band / Security. You may click on Advanced Settings to adjust more advanced configuration items according to your needs, and then click on Apply button.
Step 5. Go to Settings > Profiles > RADIUS Profile to click Create New RADIUS Profile.
Step 6. Enter Name, Authentication Server IP/URL, Authentication Port and Authentication Password. Meanwhile, if your AP supports multiple Radius Servers, you can click Add New Authentication Server to complete the settings of the several other Radius Servers, then click Save. The relevant parameters are described as follows:
- Authentication Server IP/URL: The IP address or the URL of your Radius Server for authentication.
- Authentication Port: The UDP destination port on the Radius Server for authentication requests.
- Authentication Password: The password configured in clients.conf file of FreeRADIUS that will be used to validate the communication between Omada APs and the Radius Server.
Step 7. Go to Settings > Authentication > MAC-Based Authentication to tick MAC-Based Authentication and select the target SSID and the RADIUS Profile created in the above steps. Set the other configurations (NAS ID / MAC-Based Authentication Fallback / Empty Password) and choose the MAC Address Format based on your needs, but it must be consistent with the MAC address format that you entered in the Radius Server.
Note:
- NAS ID: Configure a Network Access Server Identifier (NAS ID) for authentication. Authentication request packets from the AP to the RADIUS server carry the NAS ID. The Radius server can classify users into different groups based on the NAS ID. Then choose different policies for different groups. When it’s empty, NAS ID is TP-Link_AP’s Model_AP’s MAC_NAS by default, such as TP-Link_EAP660 HD_xx-xx-xx-xx-xx-xx_NAS.
- MAC-Based Authentication Fallback: For wireless networks configured with both MAC-Based Authentication and Portal, if you enable this feature, a wireless client needs to pass only one authentication. The client tries MAC-Based Authentication first, and is allowed to try Portal authentication if it failed the MAC-Based Authentication. If you disable this feature as default, a wireless client needs to pass both the MAC-Based Authentication and portal authentication for internet access, and will be denied if it fails either of the authentications.
- Empty Password: With this option enabled, the password used for authentication will be blank. Otherwise, the password will be the same as the username which is the client’s MAC address.
Configuration with Built-in RADIUS of Omada Controller
Step 1. Go to Global View’s Settings > Sever Settings to enable Built-in RADIUS and set the Server Address Type, Secret and Authentication Port properly according to your own needs. Then you will see that Status changes from Disabled to Running.
- Server Address Type: When the Controller is on a computer with multiple network adapters, and the type is configured as Auto, the server address will be sent to the device according to the ports connected to the device; when the type is configured as Manually, the user needs to manually configure the server's IP address, which should be the address the device can communicate with.
- Secret: RADIUS server key.
- Authentication Port: RADIUS server authentication port.
Step 2. Log in Controller, go to Settings > Wireless Network > WLAN to click Create New Wireless Network.
Step 3. Set parameters or options such as Network Name (SSID) / Band / Security. You may click on Advanced Settings to adjust more advanced configuration items according to your needs. Then click Apply.
Step 4. Go to Settings > Profiles > RADIUS Profile to edit Built-in Radius Profile.
Step 5. Click Add New RADIUS User, select Authentication Type as MAC Authentication, enter the client’s MAC address in a proper format, and then click Apply.
Step 6. Go to site’s Settings > Authentication > MAC-Based Authentication to tick MAC-Based Authentication and select the target SSID. Choose Built-in RADIUS Profile as the RADIUS Profile. Set the other configurations (NAS ID / MAC-Based Authentication Fallback / Empty Password) and choose the MAC Address Format based on your needs, but note that it must be consistent with the MAC address format that you entered in the Built-in RADIUS Profile.
Note:
- NAS ID: Configure a Network Access Server Identifier (NAS ID) for authentication. Authentication request packets from the AP to the RADIUS server carry the NAS ID. The Radius server can classify users into different groups based on the NAS ID, and then choose different policies for different groups. When it’s empty, NAS ID is TP-Link_AP’s Model_AP’s MAC_NAS by default, such as TP-Link_EAP660 HD_xx-xx-xx-xx-xx-xx_NAS.
- MAC-Based Authentication Fallback: For the wireless network configured with both MAC-Based Authentication and Portal, if you enable this feature, a wireless client needs to pass only one authentication. The client tries MAC-Based Authentication first, and is allowed to try Portal authentication if it failed the MAC-Based Authentication. If you disable this feature as default, a wireless client needs to pass both the MAC-Based Authentication and portal authentication for internet access, and will be denied if it fails either of the authentications.
- Empty Password: With this option enabled, the password used for authentication will be blank. Otherwise, the password will be the same as the username which is the client’s MAC address.
Verification
To verify the configuration, connect the two clients whose MAC addresses were registered in the RADIUS server to the corresponding SSID. If the two clients can connect to the SSID and access the internet, while others cannot, this indicates a successful configuration.
Conclusion
Now you have learned how to configure and verify MAC-Based Authentication. Please select an appropriate RADIUS server according to your actual situation. You can use other authentication methods such as WPA/WPA2/WPA3 and portal authentication for comprehensive network security.
Get to know more details of each function and configuration please go to Download Center to download the manual of your product.
1. What is the authentication priority when WPA, MAC-Based Authentication, and Portal Authentication are all enabled?
Re. MAC Authentication > WPA Authentication > Portal Authentication.
2. What is the authentication priority between MAC-Based Authentication and MAC Filter?
Re. MAC Filter has a higher priority than MAC-Based Authentication. That is, if a client's MAC address is in the Deny List of MAC Filter, it will be unable to connect to the SSID even if it is registered for MAC-Based Authentication.
Is this faq useful?
Your feedback helps improve this site.
What’s your concern with this article?
- Dissatisfied with product
- Too Complicated
- Confusing Title
- Does not apply to me
- Too Vague
- Other
We'd love to get your feedback, please let us know how we can improve this content.
Thank you
We appreciate your feedback.
Click here to contact TP-Link technical support.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.
We have updated our Policies. Read Privacy Policy and Terms of Use here.
This website uses cookies to improve website navigation, analyze online activities and have the best possible user experience on our website. You can object to the use of cookies at any time. You can find more information in our privacy policy .
We have updated our Policies. Read Privacy Policy and Terms of Use here.
This website uses cookies to improve website navigation, analyze online activities and have the best possible user experience on our website. You can object to the use of cookies at any time. You can find more information in our privacy policy .
Basic Cookies
These cookies are necessary for the website to function and cannot be deactivated in your systems.
TP-Link
accepted_local_switcher, tp_privacy_base, tp_privacy_marketing, tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple, tp_top-banner, tp_popup-bottom, tp_popup-center, tp_popup-right-middle, tp_popup-right-bottom, tp_productCategoryType
Livechat
__livechat, __lc2_cid, __lc2_cst, __lc_cid, __lc_cst, CASID
Youtube
id, VISITOR_INFO1_LIVE, LOGIN_INFO, SIDCC, SAPISID, APISID, SSID, SID, YSC, __Secure-1PSID, __Secure-1PAPISID, __Secure-1PSIDCC, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC, 1P_JAR, AEC, NID, OTZ
Analysis and Marketing Cookies
Analysis cookies enable us to analyze your activities on our website in order to improve and adapt the functionality of our website.
The marketing cookies can be set through our website by our advertising partners in order to create a profile of your interests and to show you relevant advertisements on other websites.
Google Analytics & Google Tag Manager
_gid, _ga_<container-id>, _ga, _gat_gtag_<container-id>
Google Ads & DoubleClick
test_cookie, _gcl_au
Meta Pixel
_fbp
Crazy Egg
cebsp_, _ce.s, _ce.clock_data, _ce.clock_event, cebs
Hotjar
OptanonConsent, _sctr, _cs_s, _hjFirstSeen, _hjAbsoluteSessionInProgress, _hjSessionUser_14, _fbp, ajs_anonymous_id, _hjSessionUser_<hotjar-id>, _uetsid, _schn, _uetvid, NEXT_LOCALE, _hjSession_14, _hjid, _cs_c, _scid, _hjAbsoluteSessionInProgress, _cs_id, _gcl_au, _ga, _gid, _hjIncludedInPageviewSample, _hjSession_<hotjar-id>, _hjIncludedInSessionSample_<hotjar-id>
lidc, AnalyticsSyncHistory, UserMatchHistory, bcookie, li_sugr, ln_or