VLAN Steering over captive portal login

What is VLAN steering?

Dynamic VLAN assignment (VLAN steering) is a core technique used by many Network Access Control (NAC) implementations, to quarantine untrusted connection, until the user is authenticated and device passes posture assessment checks. When a new device first connects (either wireless or wired), it's allocated into a quarantine network/VLAN, then after successful authentication (additionally maybe some sort of posture assessments via integration with other 3rd-party solutions), it's authorized and re-assigned to a trusted network/VLAN. 

Dynamic VLAN assignment is also used to build a Personal Area Network (PAN) to group devices with the same access rights to their dedicated private VLAN/network. Particularly in an open Wi-Fi network, connections can be easily sniffed and hijacked. Most enterprise wireless AP supports "client isolation" feature to prevent associated clients from connecting to each other, but it also blocks some intended accesses. For example, in a hotel room, a guest may have multiple devices that need to connect to each other. So building a PAN network helps to achieve both objectives - if you login with the same user account, all devices can belong to the same dedicated private VLAN (therefore accessible to each other) while being isolated from the rest of other devices in the same open Wi-Fi network.

RansNet HotSpot Gateway (HSG) comes with built-in standard RADIUS server that works with 3rd-party wireless AP or switches to provide dynamic VLAN assignment (VLAN steering). Together with our winning captive portal features, customers can benefit the best of both worlds:

How does it work?

VLAN steering is commonly used in conjunction with RADIUS and 802.1x authentication, and it requires compatible WPA supplicant which is not always available on all devices. And the user on-boarding process can be a challenge too. For example, if it's visitor/guest who doesn't have any account yet, how can they login to dot1x? Now with RansNet proprietary technology to correlate user account and device MAC address, we can do this in a open Wi-Fi network (unlike typical 802.1x authentication that requires users to enter credentials during Wi-Fi association), so that you can prompt user login (or self-register) with a captive portal to enjoy all our Wi-Fi monetization features, and steer authenticated users to their respective VLANs according to defined profiles.

This is how the user flow works (using an on-premise design example):

NOTE: the authorized VLAN doesn't even have to pass through HSG physically. For example, if you have upstream UTM firewalls, the firewall could patch directly to the authorized VLAN and all authorized user traffic will pass directly across the firewall.

Why do we need VLAN steering?

There are several use scenarios for this VLAN steering feature:

Watch live demo on youtube