MAC Authentication
The Nile Access Service is built on the principles of a "Zero Trust Campus," ensuring that no user or device is implicitly trusted. As part of this security model, the Nile Access Service supports MAC Authas an authentication method for devices that cannot accommodate the 802.1X standard. When a device connects to a Nile Switch, its MAC address is learned and sent to the Nile Cloud or External RADIUS server for authentication. If the device is successfully authenticated a Segment name is returned to the NSB. The device is then assigned the segment and traffic is allowed.
By default when a device connects to the Nile Switch it will show up in the Nile Portal as "Waiting for approval". This device can then be manually approved or denied. If approved a segment will be assigned to it. Approving or denying each individual device can be cumbersome. So Nile provides the ability for an admin to create pre-define rules. The following are the rules that can be created:
- Exact Match Address - The admin can create an entry with an MAC address
- Fingerprint Rule - Nile has an exhaustive list of fingerprints in its database. So a rule based on fingerprint can be created e.g. Devices matching "HP Printer" should be assigned the printer segment
- OUI - Create a rule based on the first 3 octets of a MAC address
- Catch All rule - If none of the rules are not matched a device can be mapped to a segment using this rule
All these rules are optional but its recommended to create rules
Nile provides flexible options for configuring MAC Auth within the Nile Access Service:
Uploading a MAC Address List: You can upload a list of MAC addresses for wired MAC authentication by navigating to the Nile Portal (Settings > Access Management > Wired) and providing the following information:
- OUI/MAC/Name (mandatory) - Either enter a MAC address or OUI or a Fingerprint value
- Description (optional) - An admin can provide a description for this device
- Segment: The network segment to which the device should be assigned (required for "Allow" status, optional for "Deny")
- Geoscope (optional) Site, Building, Floor: Restrict the device to a specific geographical location. The default is ALL geoscopes which means a device can be plugged into any switch at any site assuming "Lock to port" is not set.
- Status (mandatory): Specify whether to allow or deny access for the device
- Lock to Port (optional): The "Lock to Port" feature automatically locks the device to the switch port where it first achieved successful authentication. For example; when a VOIP phone is connected to the network, the admin may choose to lock it to a port to ensure its location is not changed. If this phone is moved to a different port on the same switch or different switch, it will be denied access
- Allow ALL MACs (optional) - Catch all rule for devices that dont match and criterias.
- Wired SSO (optional) - If a device falls in the ALL category, enable SSO and move the device to an employee segment
MAC athentication is a mandatory for all devices that dont support 802.1X. But admins have the choice to use MAC auth with their own RADIUS server as opposed to Nile Cloud.
When a RADIUS server is created and the "Wired Auth" checkbox is checked; Nile will do a MAC Auth with the external radius server.
Note: External RADIUS Servers must be configured to return a segment name with authentication to ensure the device is placed in the correct segment. Refer to the expandable header below for details.
By understanding the role of MAC Auth within the Nile Access Service and the available configuration options, you can ensure that non-802.1X capable devices are granted secure network access while maintaining the principles of the Zero Trust Campus.
In summary, the Nile Access Service's implementation of MAC Auth is a vital component of our comprehensive authentication framework. Nile's flexible MAC Auth configuration options, including MAC address lists, auto-MAC Authfor specific device types, and advanced security controls like port locking and geographical restrictions, empower organizations to extend secure network access to a wide range of devices, including those that cannot support 802.1X.
Furthermore, Nile's innovative approach to network segmentation, which transcends traditional VLAN-based models, enhances the benefits of MAC Auth The Nile Access Service's Layer 3 segmentation, driven by user identity, device attributes, and application requirements, enables granular access controls and micro-segmentation. This powerful combination of MAC Auth and Nile's advanced segmentation strategy helps enterprises maintain a robust security posture while accommodating diverse connectivity needs, in alignment with Zero Trust principles.
By leveraging the flexibility and security of MAC Auth within Nile's innovative network architecture, organizations can confidently provide secure access to a wide range of devices, minimizing the attack surface and reducing the risk of lateral movement. As a key part of the Nile Access Service's authentication framework, MAC Auth contributes to the overall effectiveness of this cloud-native network solution in helping enterprises build resilient, agile, and highly secure network environments.
Read Next; Wired Access FAQ