Current network infrastructure is to be converted from Cisco to Sophos.
Current status (Cisco network infrastructure)
- Switch with port security via RADIUS MAB VLAN assignment active.
- WLAN access points in own VLAN 50, assigned via RADIUS server.
- WLAN networks are tunneled to Cisco WLC via access points so that ports with APs only allow VLAN 50.
Target status (conversion to Sophos firewall, switch and APs)
The new network structure is to be realized with Sophos components.
The test scenario currently uses:
- Sophos Firewall XGS 107
- Sophos Switch CS110-24FP
- Sophos AP6 420 access points
According to my understanding, I can only operate WPA2-Enterprise with WLAN tunneling on the "old" APX access points.
With the "new" AP6 series, in addition to the VLAN 50 of the access points, every VLAN of the respective WLAN networks must be available on the access point port.
Port security with RADIUS VLAN assignment for the access point ports would therefore not work, as otherwise all WLAN end devices would also have to be known in RADIUS.
Example WLAN networks:
SSID: Office (VLAN 100)
SSID: Guest access (VLAN 200)
VLANs required on access point port (50,100,200).
Physical attack thought experiment
Cisco state
A potential attacker could therefore gain access to the physical access point port with MAC spoofing, but would initially be encapsulated in VLAN 50.
Sophos state
A potential attacker could therefore gain access to the physical access point port with MAC spoofing and would then be able to access all VLANs (50, 100, 200).
Port security question
How can port security be guaranteed for this scenario with Sophos if WLAN networks such as the guest access, where the end devices are not known, are also to be broadcast?
Added TAGs
[edited by: Erick Jan at 11:11 PM (GMT -7) on 4 Aug 2025]