This guide explains how to integrate Cloudi-Fi’s cloud RADIUS service with a Cisco Catalyst 9800 WLC to enable 802.1X authentication.
Prerequisites
Before starting, ensure the following:
A Cisco access point managed by a Cisco Catalyst 9800 WLC
Cloudi-Fi RADIUS IP addresses and shared secret
Administrator access to the Cisco WLC GUI
Knowledge of your internal IP addressing scheme
Firewall access to allow required ports
| Source | Destination | Port | Protocol | Action | Comment |
|---|---|---|---|---|---|
| 802.1X subnet | Cloudi-Fi IPs | 1815 | UDP | Allow | RADIUS traffic |
| 802.1X subnet | Any | 80 | TCP | Allow | HTTP traffic |
| 802.1X subnet | Any | 443 | TCP | Allow | HTTPS traffic |
| 802.1X subnet | Any | 53 | UDP/TCP | Allow | DNS resolution |
| * | * | * | * | Deny | Adjust as needed |
Get the Cloudi-Fi NAS-ID
You must create or use a Cloudi-Fi location and retrieve its NAS-ID (Hash key).
- Log in to the Cloudi-Fi admin console.
- Go to Location.
- Create a new location if needed and fill in:
- Location name
- Type (Redirect URL)
- Country
- Save.
- Click the location you created.
- Go to Network parameters and copy the Hash key — this will be used as the NAS-ID.
Configure a custom NAS-ID on the WLC
- Navigate to Configuration > Security > Wireless AAA policy.
- Edit an existing policy or create a new one.
- Under NAS-ID option 1, set the type to Custom string.
- Paste the Hash key obtained from Cloudi-Fi.
AAA configuration on Cisco 9800 WLC
Step 1. Declare the RADIUS server
Navigate to:
Configuration > Security > AAA > Servers / Groups > RADIUS > Servers > +Add
Enter:
Name:
802.1x_Cloudi-Fi_SrvsRADIUS IPs: see Radius Servers for 802.1X
Authentication port: 1815/UDP
Accounting port: 1813/UDP
Shared secret: Obtained via Cloudi-Fi chatbot or support
Server timeout: 20
Retry count: 20
Click Apply.
Step 2. Create a RADIUS server group
Navigate to:
Configuration > Security > AAA > Servers / Groups > RADIUS > Server Groups > +Add
Create a new group (for example
Cloudi-Fi_8021x_Group).Move your RADIUS server into Assigned Servers.
Step 3. Create an authentication method list
Navigate to:
Configuration > Security > AAA > AAA Method List > Authentication > +Add
Set:
Method list name:
802.1X_Cloudi-Fi_MethodType: dot1x
Group type: group
Add the RADIUS server group created above to Assigned Server Groups.
WLAN profile configuration
Step 1. Create the WLAN
Navigate to Configuration > Tags & Profiles > WLANs > +Add
Enter your SSID details.
Add the SSID name, profile name, and enable broadcast.
Step 2. Configure WLAN security
Navigate to the Security tab.
Select WPA2 + 802.1X
or if required:WPA2 + WPA3 mixed mode
Step 4. Apply the AAA method
Navigate to Security > AAA and assign the authentication method list created earlier (802.1X_Cloudi-Fi_Method).
Policy profile configuration
The policy profile controls VLAN assignment, ACLs, QoS, timers, and mobility behavior.
Go to Configuration > Tags & Profiles > Policy Profile
Step 1. Create or edit the profile
Edit default-policy-profile
orClick + Add to create a new policy profile
Step 2. Enable the policy profile
In the General tab:
Ensure Policy Profile State : Enabled
Step 3. Configure settings for local mode APs
If your APs operate in Local Mode, enable the following under the Advanced or General tabs (depending on WLC version):
Central Switching
Central Authentication
Central DHCP
Step 4. Assign the VLAN
Go to the Access Policies tab:
Set the VLAN used for authenticated 802.1X clients
Step 5. Enable AAA override
Enable this if Cloudi-Fi returns RADIUS attributes such as dynamically assigned VLANs.
Go to the Advanced tab.
Enable AAA Override.
In Policy Name, select the policy configured with the custom NAS-ID.
Policy tag configuration
The policy tag ties together the WLAN profile and the policy profile.
Go to Configuration > Tags & Profiles > Tags > Policy
Step 1. Create or use an existing policy tag
Select an existing tag
orClick + Add to create a new policy tag
Step 2. Associate profiles
Inside the policy tag:
Assign your WLAN Profile
Assign your Policy Profile
Click Apply.
Policy tag assignment
This step applies the policy tag to specific access points.
Go to Configuration > Wireless > Access Points
Step 1. Select the AP
Click the AP name you want to configure.
Step 2. Apply the policy tag
Under the General tab → Tags section:
Select the desired Policy Tag
Step 3. Save the configuration
Click Update & Apply to Device.
Step 4. Repeat or bulk assign
Repeat for each AP
orUse AP Join Profiles for group-level assignment
Your Cisco WLC 9800 is now configured to authenticate clients using Cloudi-Fi RADIUS via 802.1X.