The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
CONNECT & ENGAGE is a customizable and location-aware guest captive service that enables you to create customized, intuitive on-boarding experiences for your visitors. It enables you to provide two types of on-boarding experiences for your visitors:
– Allows the administrator of a facility to enable the facility's Facebook page as a free Wi-Fi hotspot for visitors.
– Allows visitors to access free Wi-Fi after accessing the facility’s Facebook page.
– Provides insight into a facility's customer base through demographic reports.
– Enables the administrator of a facility to create and host a guest splash page with customized branding and advertisements.
– Provides social network authentication with Facebook, Instagram, and Foursquare using OAuth 2.0.
– Collects OAuth 2.0 user social information
You must have a Facebook account for a business page. For more information, see the “Creating a Facebook Page for Your Organization” section.
Step 1 Log in to Cisco Connected Mobile Experiences (Cisco CMX).
Step 4 In the Add New User dialog box, enter the first name, last name, username, and password of a user.
Step 5 From the Roles drop-down list, select Connect or ConnectExperience.
Note For information about access rights for the Cisco CMX services available to the Connect and ConnectExperience user roles, see Table 4-2.
Table 4-2 lists the user roles that have access to the Connect & Engage service.
|
|
|
||
---|---|---|---|---|
|
|
|
||
To view the Connect Settings page, log in to Cisco CMX as an admin user and choose CONNECT & ENGAGE > Settings.
Two data retention settings are available:
Connect & Engage prunes users based on the user retention period. This task is run once every day at 3 a.m. server time. If the maximum user capacity is exceeded, older users within the retention period are pruned to make room for new users. To avoid losing any user data, we recommend that you perform the following tasks:
– Periodically export data from Cisco CMX.
– Adjust the retention period based on projected days for full capacity, which is calculated based on usage patterns. The usage patterns are established after the system has been operational for a while.
For information about Connect & Engage APIs, see the “Getting APIs” section.
Using Connect Experiences, you can choose between two types of guest on-boarding experiences:
The Facebook Wi-Fi feature provides organizations with a simple and fast guest access solution. With Cisco CMX for Facebook Wi-Fi, organizations can:
Facebook Wi-Fi is based on WLAN web passthrough authentication on Cisco Wireless Controllers (Cisco WLCs). Cisco WLC intercepts HTTP traffic and redirects the client browser to Cisco CMX. Cisco CMX finds the client location and redirects the client browser location to the configured location-specific Facebook page. After a successful Facebook sign-in and check-in, Cisco CMX redirects the client browser to the specific Facebook page.
For information about setting up Facebook Wi-Fi, see the “Setting Up a Facebook Wi-Fi Portal” section.
Custom Portal enables you to perform the following tasks:
For information about setting up a custom portal, see the “Setting Up a Custom Portal” section.
Setting up a Facebook Wi-Fi portal involves the following tasks:
1. Configuring Access Control Lists on Cisco Wireless Controller
2. Configuring WLAN for Web Passthrough Authentication
3. Creating a Facebook Page for Your Organization
Step 1 Log in to the web UI of a Cisco Wireless Controller (Cisco WLC) that is associated with Cisco CMX.
Step 2 Choose SECURITY > Access Control Lists > Access Control Lists.
Step 3 On the Access Control Lists page, click New to add an access control list (ACL).
Step 4 On the Access Control Lists > Edit page, enter a name for the new ACL. You can enter up to 32 alphanumeric characters.
Step 5 Choose the ACL type as either IPv4 or IPv6.
Step 7 On the Access Control Lists page, click the name of the new ACL.
Step 8 On the Access Control Lists > Edit page, click Add New Rule.
The Access Control Lists > Rules > New page is displayed.
Step 9 Configure the following ACLs, as listed in Table 4-3 :
|
|
|
|
|
|
|
|
|
---|---|---|---|---|---|---|---|---|
To provide network access to users, you must configure a wireless LAN (WLAN) on the Cisco WLC, for which you must set up the web passthrough on Layer 3 security of WLAN for Connect & Engage.
Step 1 From the web UI of Cisco WLC, choose WLANs.
Step 2 On the WLANs page, click the corresponding WLAN ID.
Step 3 On the WLANs > Edit page, choose Security > Layer 2.
Step 4 From the Layer 2 Security drop-down list, choose None.
Step 6 Under the Layer 3 tab, from the Layer 3 Security drop-down list, choose Web Policy.
Step 7 For web passthrough, choose Passthrough.
Step 8 Choose the Preauthentication ACL defined using the procedure described in the “Configuring Access Control Lists on Cisco Wireless Controller” section.
Step 9 To override the global authentication configuration web authentication pages, check the Over-ride Global Config check box.
Step 10 To define the web authentication pages for wireless guest users, from the Web Auth Type drop-down list, choose External (Re-direct to external server).
This redirects clients to an external server for authentication.
Step 11 In the URL field, enter the Facebook Wi-Fi page URL. The external redirection URL should point to the corresponding portal on Cisco CMX for Facebook Wi-Fi, for example:
Step 12 Enable this Service Set Identifier (SSID).
Step 14 Click Save Configuration.
Note Connect & Engage redirection requires special configuration on Cisco WLC for Apple iOS devices. Perform this by entering the following command using the Cisco WLC CLI:
config network web-auth captive-bypass enable.
For more information, see: http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/command-reference/b_cr80/b_cr80_chapter_010.html#wp2423541535.
Follow the instructions provided in Facebook to create a Facebook page for your organization.
Step 1 Log in to Cisco Connected Mobile Experiences (Cisco CMX).
Step 2 Choose CONNECT & ENGAGE > Connect Experiences.
Step 3 In the Facebook Wi-Fi column, click Assign Default.
The Facebook Wi-Fi Configuration option opens in a new browser tab.
Step 4 Perform the following tasks:
d. Click the optional Terms of Service if additional Terms of Service are required.
After the system default page has been set, you can assign a location-specific Facebook page:
Step 1 Select a specific campus, building, floor, or zone and click or hover over the Gear icon.
You can create a custom portal page using the following four types of templates:
– Registration form to specify name and email address of the visitor
– Social login element that includes three options: Facebook, Instagram, and Foursquare.
The Social login element enables on-boarding of visitors using social OAuth 2.0.
To configure OAuth 2.0 for each social media platform, you must first register your application or client with Connect & Engage. Click the Link () icon to the right of the social media platform name to go to the associated developer website. Follow the instructions provided in the respective social media platform documentation to create your applications.
The template choice does not limit the type of elements you can add. For example, if a Social Login template is selected, you can always modify it to use the Registration Form elements instead.
The following options are available to design a custom portal:
Setting up a custom portal involves the following tasks:
1. Configuring Access Control Lists on Cisco Wireless Controller
2. Configuring WLAN for Web Passthrough Authentication
Step 1 Log in to the web UI of a Cisco Wireless Controller (Cisco WLC) that is associated with Cisco CMX.
Step 2 Choose SECURITY > Access Control Lists > Access Control Lists.
Step 3 On the Access Control Lists page, click New to add an access control list (ACL).
The Access Control Lists > New page is displayed.
Step 4 On the Access Control Lists > New page, enter a name for the new ACL. You can enter up to 32 alphanumeric characters.
Step 5 Choose the ACL type as either IPv4 or IPv6.
The Access Control Lists page is displayed.
Step 7 On the Access Control Lists page, click the name of the new ACL.
Step 8 On the Access Control Lists > Edit page, click Add New Rule.
The Access Control Lists > Rules > New page is displayed.
Step 9 Configure the ACLs, as listed in either Table 4-4 or Table 4-5 :
|
|
|
|
|
|
|
|
|
---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
---|---|---|---|---|---|---|---|---|
To provide network access to users, you must configure a wireless LAN (WLAN) on the Cisco WLC, for which you must set up web passthrough on Layer 3 security of WLAN for the Connect & Engage service.
Step 1 From the web UI of Cisco WLC, choose WLANs.
Step 2 On the WLANs page, click the corresponding WLAN ID.
Step 3 On the WLANs > Edit page, choose Security > Layer 2.
Step 4 From the Layer 2 Security drop-down list, choose None.
Step 6 Under the Layer 3 tab, from the Layer 3 Security drop-down list, choose Web Policy.
Step 7 For web passthrough, click the Passthrough radio button.
Step 8 Choose the Preauthentication ACL defined using the procedure described in the “Configuring Access Control Lists on Cisco Wireless Controller” section.
Step 9 To override the global authentication configuration web authentication pages, check the Over-ride Global Config check box.
Step 10 To define the web authentication pages for wireless guest users, from the Web Auth Type drop-down list, choose External (Re-direct to external server).
This redirects clients to an external server for authentication.
Step 11 In the URL field, enter the custom portal URL. The external redirection URL should point to the corresponding portal on Cisco CMX for custom portal, for example:
Step 12 Enable this Service Set Identifier (SSID).
Step 14 Click Save Configuration.
Note Connect & Engage redirection requires special configuration on Cisco WLC for Apple iOS devices. Perform this by entering the following command in the Cisco WLC CLI:
config network web-auth captive-bypass enable
For more information, see http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/command-reference/b_cr80/b_cr80_chapter_010.html#wp2423541535.
Step 1 Log in to Cisco CMX as an admin user.
Step 2 Choose CONNECT & ENGAGE > Connect Experiences.
Step 3 Under Custom Portals, click Create Default.
Step 4 In the Portal Title field, enter the name of your custom portal.
Step 5 Click the template that you want to use and click Next.
Step 6 Design the template according to your requirements.
After the system default portal has been set, you can assign a location-specific custom portal page.
Step 1 Select a specific campus, building, floor, or zone from the corresponding custom portal drop-down list.
Step 2 Click Create New to create a new portal and assign it to that location. Alternatively, assign an existing portal to that location.
To view the Connect & Engage Dashboard, log in to Cisco CMX and choose CONNECT & ENGAGE > Dashboard.
The Connect & Engage Dashboard page displays the summary report and two historical reports.
Use the navigation bar at the top of the page to set the location and interval of reports.
The location consists of the following levels:
From the Interval drop-down list in the Connect & Engage Dashboard page, you can select the time frame for generating historical reports:
The summary information presents users’ usage information for the present day. Note that the time used is server time, and not web browser time.
The Connect & Engage Dashboard displays historical information:
In historical reports, you can choose the type of chart you want to be displayed in the reports:
The Connect & Engage Dashboard provides a search option, where the following types of searches can be performed:
To search for a visitor, enter a search term, for example, name or email address, in the Visitor Search field.
Table 4-6 lists the tested devices and browsers for Connect & Engage in the context of custom portals.
|
|
|
|
---|---|---|---|
Table 4-7 lists the tested devices and browsers for Facebook Wi-Fi.
|
|
|
|
---|---|---|---|