How-To: Control RADIUS Policies and Behavior for BYOD/Personal Devices

Learn how to implement a RADIUS architecture that separates BYOD devices into separate RADIUS policies. Explore deployment scenarios, best practices, and design considerations for this approach.

Overview - How to Control RADIUS Policies and Behavior for BYOD/Personal Devices

In this pattern, you can have separate RADIUS policies for BYOD and corporate-owned devices. This approach allows you to segment your network and VLANs based on device ownership, enhancing security and ensuring that corporate-owned devices have access to the resources they need while restricting personal BYOD devices.

How Are Devices Evaluated for Ownership?

There are a couple different ways to separate BYOD devices from corporate-owned devices in EZRADIUS, depending on how you want to evaluate device ownership:

  • Separate SSID for BYOD Devices: You can create a separate SSID, or network name, for your BYOD devices. That way, any device that connects to the BYOD SSID is automatically placed in the BYOD VLAN, while devices that connect to the corporate SSID are placed in the corporate VLAN.
  • Entra ID (EAP-TTLS) vs. Certificate-Based (EAP-TLS) Authentication: If you want to use Entra ID authentication for BYOD devices and certificate-based authentication for corporate-owned devices, you can create separate access policies in EZRADIUS that check the authentication method used. Devices that authenticate using Entra ID would be classified as BYOD and placed in the BYOD VLAN, while devices that authenticate using certificates would be classified as corporate-owned and placed in the corporate VLAN.

Let’s explore each of these approaches in more detail so you can determine which one is the best fit for your organization.

Methods for Evaluating Device Ownership

Using a separate SSID for BYOD devices is often the simplest way to separate BYOD devices from corporate-owned devices. By creating a dedicated SSID for BYOD devices (Contoso-Internet) and another SSID for corporate-owned devices (Contoso-Corp), you can easily apply different RADIUS policies and VLAN assignments based on the SSID that a device is connecting to. This method does not require any special configuration on the devices themselves, as the network infrastructure will handle the separation based on the SSID.

Refer to our Match on SSID Name reference architecture for detailed implementation steps for this approach.

View Reference Architecture for Separate SSIDs

Using different authentication methods for BYOD and corporate-owned devices is another effective way to separate device ownership. For example, you can require corporate-owned devices to use certificate-based authentication (EAP-TLS) while allowing BYOD devices to use Entra ID authentication (EAP-TTLS). By creating separate access policies in EZRADIUS that check the authentication method used, you can classify devices as BYOD or corporate-owned based on how they authenticate and apply different VLAN assignments accordingly.

To implement this approach, you can create two access policies in EZRADIUS:

  1. Corporate-Owned Devices Policy: This policy would require certificate-based authentication (EAP-TLS) and would be configured to place devices in the corporate VLAN. This policy could also validate the user/device against Entra ID or Intune for additional security checks if desired.

    Access Policy for Corporate-Owned Devices
  2. BYOD Devices Policy: This policy would allow Entra ID authentication (EAP-TTLS) and would be configured to place devices in the BYOD VLAN.

    Access Policy for BYOD Devices

The order of these access policies is not important as long as the conditions are set correctly, since one policy is looking for certificate-based authentication and the other is looking for Entra ID authentication. Devices that authenticate with a certificate will match the corporate-owned policy and be placed in the corporate VLAN, while devices that authenticate with Entra ID will match the BYOD policy and be placed in the BYOD VLAN.