Dynamic VLAN Authorization Guide
– Multi-element Authentication Mechanism Integrating MAC / Portal / RADIUS
- 1 Introduction
- 2 Technical Background and Pain Points
- 3 Basic Principles of Dynamic VLAN Authorization
- 4 Asterfusion OpenWiFi Dynamic VLAN Authorization Solution
- 4.1 STA Initial Access
- 4.2 STA Reconnection After Disconnection
- 4.3 STA Roaming
- 5 Asterfusion OpenWiFi AP Dynamic VLAN Configuration
- 6 Appendix
1 Introduction
2 Technical Background and Pain Points
3 Basic Principles of Dynamic VLAN Authorization
-
After the terminal connects to wireless, it initiates PSK authentication (see diagram)
-
AP redirects the client to Portal for identity authentication.
-
Portal forwards the authentication request to the RADIUS server, RADIUS returns dynamic VLAN allocation information.
-
Portal forwards VLAN information to AP, AP binds the terminal to the corresponding VLAN, allowing access.
-
When authentication fails, Portal displays failure prompt, denying access.

4 Asterfusion OpenWiFi Dynamic VLAN Authorization Solution
4.1 STA Initial Access
Scenario Description
-
AP local authentication method is WPA2
-
Default VLAN 401, IP address segment 192.168.17.xx
-
Authorized VLAN 403, IP address segment 192.168.18.xx
-
STA initially connects to AP, enters username and password on the pop-up portal page
-
Obtains the IP address corresponding to VLAN 403
Process Description
STA Re-obtains IP
Process Flow Chart

4.2 STA Reconnection After Disconnection
Scenario Description
- DHCP Release time is 30 minutes, RADIUS MAC aging time is 30 minutes
- AP local authentication method is WPA2
- Default VLAN 401, IP address segment 192.168.17.xx
- Authorized VLAN 403, IP address segment 192.168.18.xx
- STA disconnects from AP and reconnects after 15 minutes, no portal page popup
- Obtains IP address corresponding to VLAN 403
Process Description
Process Flow Chart

4.3 STA Roaming
Scenario Description
-
DHCP Release time is 30 minutes, RADIUS MAC aging time is 30 minutes
-
AP local authentication method is WPA2
-
Default VLAN 401, IP address segment 192.168.17.xx
-
Authorized VLAN 403, IP address segment 192.168.18.xx
-
After STA roams from AP1 to AP2, no portal page popup
-
After roaming to AP2, still has VLAN 403 address, client unaware
Process Description
Direct PSK+MAC Authentication
① STA goes offline from AP1, roams to AP2
② Initiates PSK authentication to AP2, establishes encrypted channel
③ AP2 initiates authentication to RADIUS using STA2’s MAC as username and password
④ RADIUS server has corresponding table for this terminal’s MAC, returns VLAN, PSK authentication ends
⑤ AP2 locally updates MAC VLAN table
⑥ STA will not send DHCP discover request, maintains original VLAN 403 network segment address
Note: If STA supports 802.11R, it will save the 4-way handshake time during PSK authentication, accelerating the roaming process
Process Flow Chart

5 Asterfusion OpenWiFi AP Dynamic VLAN Configuration
– Navigate to Organization -> Venue -> Configuration -> Wireless Configuration Template -> Add Wireless Configuration

-
Configure template name, corresponding AP model, configuration tags, system time zone and LED

-
Switch to Service Activation, configure SSID, WiFi band, VLAN ID, local authentication method and password, enable Force Portal Authentication (Portal)

-
Switch to Security and Services, configure Force Portal Authentication method as External-UAM

-
Under External UAM, configure domain whitelist (Portal server domain name or IP), External-UAM server, External-UAM key, External UAM-Port, Probe Port, NAS ID

-
Continue under External UAM to configure authentication server, authentication key, authentication port. If audit requirements exist, corresponding fields can also be configured. Other fields without * can be configured as needed.

-
After configuration is complete, click the save button in the upper right corner to complete wireless configuration template saving

-
Deploy configuration to AP, click the push button in the upper right corner of the wireless configuration template, select the MAC address of the AP to deploy, click push configuration

6 Appendix
6.1 RADIUS Authentication Packet

6.2 RADIUS Response Packet

Filter-Id := “vlan:403”, # Used to specify VLAN ID, format used here is vlan:<VLAN_ID>
Tunnel-Type := 13, # Specifies tunnel type, VLAN corresponding type is 13
Tunnel-Medium-Type := 6, # Specifies tunnel medium type, usually uses 6
Tunnel-Private-Group-Id := “403” # Here specifies VLAN ID
6.3 RADIUS Disconnect Packet

Code: Disconnect-ACK (41)
6.4 DHCP Request, Reply Packet

Client MAC address: MAC address of client requesting IP allocation Your (client) IP address: IP address allocated to client

Your (client) IP address: The IP address assigned to the client.
6.5 Portal Authentication, Authentication Success, Authentication Failure Pages
(portal UI can be configured as needed)


