VT Open WiFi
The VT Open WiFi
SSID is an open network with no captive portal.
This network should be used by devices that cannot or should not use eduroam. The main reasons for this are:
- The device cannot do 802.1X authentication (game consoles, Chromecasts, etc).
- The device belongs to a group (e.g., department) rather than an individual, and thus does not have eduroam credentials.
- The user is a guest (and has no eduroam IdP)
Authentication
Users can connect and use the network with or without authentication. Only MAC auth is used, so no matter what, the client sees the network as an open unauthenticated network. Currently, auth is handled by ClearPass, but will soon be an instance of FreeRADIUS.
Devices can be registered in the NIS Portal. Devices can be registered as a personal device or an organizational device. Any registered device is put in the Authenticated network; all other devices are in the unauthenticated network.
Quarantine
This is not yet implemented, and is subject to change. Currently, if we need to prevent a device from connecting, it is blocked by MAC address on the controller.
The database backing the FreeRADIUS authentication will include a list of banned MAC addresses. Any device connecting with a banned MAC is placed in the unauthenticated network, irrespective of registration, and is put behind a captive portal.
This captive portal will be a static page without a network login. Instead, it will display a message saying the device has been blocked and that the user should contact 4Help.
Networks
Authenticated
Authenticated devices land in the same network as eduroam users and have no restrictions. Some service owners restrict access to on campus networks, such as this one.
Devices get an RFC 1918 IPv4 address and a globally routed IPv6 address.
Unauthenticated
Unauthenticated devices land in the guest VRF.
Devices get a CG-NAT (100.64.0.0/10
) IPv4 address and a globally routed IPv6
address.
This traffic is hair-pinned at the border and is effectively treated as Internet
traffic.
There are no network ACLs artificially limiting access. However, there are services that require being connected to an "on campus" network to use them, which the unauthenticated network is not. Some services that do not work from the unauthenticated network include:
- Zoom rooms
- Digital key access for physical doors