Personal WiFi Docs
  • Getting Started
  • WiFi Integration
    • Summary of supported WiFi vendors
      • Cisco Meraki
        • Meraki oAuth integration
      • Cisco Catalyst WLC (IOS-XE)
      • Cisco Meraki Easy PSK
      • Aruba - Unbound MPSK
      • Fortinet (FortiGate Secure Wireless Controller)
      • Extreme Networks
      • Ruckus SmartZone
      • Cambium cnMaestro
      • Juniper (Mist)
      • TP-Link Omada
      • Huawei - iMaster NCE-Campus
  • Service management
    • Dashboard
    • Managing Accounts
    • Groups
    • Managing Networks
      • Network Managers
    • Units
    • General options
      • Personal Area Networks (PAN)
      • Service Options
      • Organization details
    • Network Policies
    • WiFi Portal & Onboarding
      • Access Control options
      • WiFi Portal options
      • IoT Devices Authentication
      • WiFi Portal distribution
    • Visitors (beta)
    • Admins
      • Multi Organizations
    • Account settings
    • My Profile
    • Support platforms integrations
    • Service Monitoring and Assurance
      • Anomalies
      • Activity Logs
      • Network Health
  • Cloud Identity Platforms integrations
    • Coworking management platforms
      • Optix
      • Office RnD
      • Nexudus
      • Andcards
    • Property Management Systems
      • Oracle Opera Cloud
      • Mews
      • Cloudbeds
      • Apaleo
      • StarRez
    • Enterprise cloud IdPs
      • Microsoft Entra ID (SAML)
      • Microsoft Entra ID (oAuth)
      • Google Workspace (oAuth)
      • Shibboleth
      • Group mapping
    • Passwordless SSO
      • Custom HTTP Request
  • MSP Operations
    • MSP Dashboard
    • MSP Account settings
  • Add-ons
    • Billing
    • White label
    • Passpoint
    • SMS Services - via Twilio
  • APIs
    • Getting Started
    • Account management
  • PRODUCT
    • Coming soon...
      • Engenius Cloud
      • Zyxel Nebula (Pro)
    • Changelog
    • Datasheet
  • Solution guides
    • Student living
      • Sample FAQ: WiFi for the Resident Hall
    • BYOD
Powered by GitBook
On this page
  • Meraki Setup
  • Cusna setup
  • Scenarios: multi-network deployments
  • Wired Devices Onboarding

Was this helpful?

  1. WiFi Integration
  2. Summary of supported WiFi vendors

Cisco Meraki Easy PSK

PreviousCisco Catalyst WLC (IOS-XE)NextAruba - Unbound MPSK

Last updated 3 months ago

Was this helpful?

This is a Beta feature only for partners and customer with access to the Beta Program

Traditional RADIUS-based iPSK relies on MAC authentication, requiring each device to be pre-onboarded individually to collect its MAC address. While onboarding through a captive portal can simplify the process for non-headless devices, it still requires manually collecting and adding the MAC addresses of headless devices (such as smart TVs, printers, smartwatches, etc.), which can be challenging. Additionally, the MAC addresses of many personal devices may change over time due to the aggressive MAC randomization and rotation policies in modern operating systems.

Cisco Meraki Easy PSK is a new solution that leverages RADIUS authentication while overcoming the limitations of traditional MAC-based authentication. The RADIUS platform performs a user lookup by analyzing the EAPOL parameters included in the RADIUS request to identify potential user matches.

Key Advantages of This Approach:

  • Scalability: Supports deployments larger than 5,000 users, overcoming the limit of Meraki iPSK without RADIUS, which supports up to 5,000 iPSKs per network.

  • Seamless Roaming: Enables users to roam across any network deployed within the project without reauthentication issues.

  • Selective PAN Enforcement: In multi-network deployments, Cusna can enforce Personal Area Network (PAN) segmentation on specific networks, such as a user’s home network. For example, in a large campus with multiple networks, a user can connect with their iPSK anywhere, but PAN enforcement applies only when connected to their dormitory network.

  • Advanced Connection Logs and Reports: Provides detailed RADIUS authentication and accounting logs for improved visibility and auditing.

  • Wired Device Support: Allows devices connected via switch ports to be authorized using MAC authentication. Since PAN cannot be implemented via WPN (which is incompatible with switches), Cusna can be configured to use VLANs for PAN deployment.

  • Granular Network Policies: Enforces advanced policies through RADIUS AAA, beyond dynamic group policies. This includes the ability to limit the maximum number of devices per user and restrict the number of concurrent device per user.

Meraki Setup

Each Location in Cusna is associated to a Network in the Meraki dashboard.

  1. Create a Network in Meraki as described in the official .

  2. Next, you need to create an SSID configured to support Easy PSK. Navigate to Wireless > Configure > SSIDs, enable an SSID from the list and rename it with your desired network name, e.g. "Residents WiFi". Click Save Changes at the bottom of the page.

  3. On the desired SSID, click "edit settings" link to navigate to the Access Control page for this SSID.

  4. On the Access control Page, Select Identity PSK with RADIUS under Security and in the dropdown select Easy PSK

  5. Set Wi-Fi Personal Network (WPN) to Enabled

  6. Click Save changes on the bottom of the page.

IoT SSID - optional
  1. Navigate to Wireless > Configure > SSIDs, enable an SSID from the list and rename it with your desired network name, e.g. "IoT Devices". Click Save Changes at the bottom of the page.

  2. On the above SSID, click "edit settings" link to navigate to the Access Control page for this SSID.

  3. Finally, expand the RADIUS section and add Primary and Secondary RADIUS data for both the RADIUS servers and RADIUS Accounting servers sections. The RADIUS data (IP addresses, Ports and Secrets are delivered as part of your onboarding email).

Cusna setup

To connect Cusna to your Meraki account, you need to generate an API Key in your Meraki account:

  1. Navigate to Organizations > Settings.

  2. Ensure the option Enable access to the Cisco Meraki Dashboard API is enabled.

  3. Navigate to your profile by clicking your account email address in the upper-right > My profile to generate the API key.

  4. Save this key in a secure location as it represents your admin credentials.

Once the key is generated from the Cisco Meraki dashboard:

  • Log in to your Cusna account and click Setting.

  • Expand the WiFi setup card, select Meraki

  • Enable the toggle Easy PSK via RADIUS

  • Enter your API Key.

  • The Organization menu will load the list of Meraki Organizations enabled on your API Kay; select the Organization that you want to link to your Cusna account.

  • Click Save.

Next, you need to setup at least one Network Policy. Once you have set up the Meraki integration, the Network Policy section appears.

Scenarios: multi-network deployments

Imagine a large campus divided into multiple Meraki Networks for easier management, with separate networks for areas such as dormitories, public spaces, parks, and faculty buildings.

In the dormitories, each room has its own access point (AP) along with Ethernet outlets connected to floor-level switches. In this scenario, the best technology for managing Personal Area Networks (PANs) is VLANs, since switches do not support WPN.

  • Wireless Devices: Students connect their wireless devices using PPSK (Easy PSK), allowing seamless connectivity across all campus networks.

  • Wired Devices: Devices connected via the Ethernet outlet in a student’s room are authenticated using MAC authentication, and require an onboarding process.

When a student connects devices (wired or wireless) from the dorm network, the RADIUS server assigns a unique VLAN to ensure all of that student’s devices are on the same network, creating an isolated PAN.

However, when the student connects their wireless devices to other networks on campus (outside the dorms), the devices are still authorized but without any specific VLAN enforcement. Instead, they inherit the VLAN defined by their Group Policy or the default VLAN assigned to the SSID.

Wired Devices Onboarding

Wired devices can be onboarded in two different ways.

Non-headless devices, once connected to the ETH port, can be blocked and prompted to a captive portal to enroll the device.

  1. The user enters his email address

  2. Form another device, open the email and click the link

  3. Give a name to the device and approve it.

  4. Disconnect and reconnect the cable device to the ETH port

If you need to support via MAC authentication, you need to add an additional dedicated SSID in each of the Networks configured for the service.

On the Access Control page, select Identity PSK without RADIUS under Security

Select "None (direct Access)" in the Splash Page section

Headless devices must be manually provisioned by the user on their , adding their MAC address and reference friendly name.

IoT Devices Authentication
Network Policies
WiFi portal
Meraki documentation