- Auto Anchor SSID between Wireless LAN Controllers acting as MC
- Enabling Central Web Authentication on ISE
- Configuring Auto Anchor and Mobility Groups on Wireless Services
- Configuring Wireless Multicast on Wireless LAN Controllers
- Converged Access Consolidated Quick Reference Templates for Wireless LAN
- Converged Access Controller AP Join Issue Troubleshoot with Traces
- Converged Access Controllers MAC Address Entry for Network Mobility Service Protocol
- Configuration Example: Converged Access Management through Prime Infrastructure with SNMP v2 and v3
- Converged Access Path Maximum Transmission Unit Discovery
- Third-Party Certificate Installation on Converged Access Wireless LAN Controllers
- Configuration Example: Converged Access for WLC EAP-FAST with Internal RADIUS Server
- Converged Access and WLC Local EAP Authentication Configuration Example
- Configuration Example: Custom Web Authentication with Local Authentication
- Dynamic VLAN Assignment with Converged Access and ACS 5.2 Configuration Example
- Configuration Example: External RADIUS Server EAP Authentication
- External Web Authentication on Converged Access
- Installing Wireless Services
- Local Web Authentication with External RADIUS Authentication
- Local Web Authentication on Converged Access
- PEAP Authentication with Microsoft NPS Configuration
- QoS on Converged Access Controllers and Lightweight Access Points
- Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers
- Configuration Example: Unified Access WLC Guest Anchor with Converged Access
- VideoStream Troubleshooting
- Custom Web Authentication Locally Hosted on WLC or an External Server
- Wireless Converged Access Chromecast Configuration Example
- Web Passthrough Configuration Example
- Configuration Examples: WPA2-PSK and Open Authentication
External Web Authentication on Converged Access
The configuration procedure for the External Web Authentication on Converged Access is similar to the configuration procedure of Local Web Authentication with External RADIUS Authentication. However, to configure an External Web Authentication, in addition to configuring Local Web Authentication, you need to do the following:
![]() Note | For information on Local Web Authentication with External RADIUS Authentication, refer to Local Web Authentication with External RADIUS Authentication. |
The following example describes the parameter maps in global configuration mode:
parameter-map type webauth test_web
type webauth
redirect for-login https://192.168.154.119 : 8443 /guestportal/portals/external_webauth/portal.jsp -> ISE customguest portal
redirect portal ipv4 192.168.154.119 -> Redirect to ISE banner
![]() Note | You can specify the redirect pages for success and failure scenario using the following commands: |
![]() Note | Preauth_ise is an optional configuration for external web authentication.
|
ip access-lists extended preauth_ise
10 permit udp any eq bootps any -> allow DHCP
20 permit udp any any eq bootpc -> allow DHCP
30 permit udp any eq bootpc any -> allow DHCP
40 permit udp any any eq domain -> allow DNS
50 permit udp any eq domain any -> allow DNS
60 permit ip any host 192.0.2.1 -> allow access to ISE
70 permit ip host 192.0.2.1 any -> allow ISE to talk back
![]() Note | On Converged Access, the traffic for Web Authentication, Service Set Identifier (SSID), DHCP, and Domain Name System (DNS) is not allowed, by default. You need to enable DHCP, DNS, and access to the external server. |
- Example: Configuring WLAN Commands
- Configuring External Web Authentication with Custom Guest Portal page on ISE
- Example: External Web Authentication Page
- Example: Configuring External Web Authentication on Converged Access
Example: Configuring WLAN Commands
The following example describes how to configure WLAN commands:
wlan external_webauth 11 external_webauth client vlan 263 ip access-group web preauth_ise ----> applying preauth ACL no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list ext_ise security web-auth parameter-map test_web no shutdown
Configuring External Web Authentication with Custom Guest Portal page on ISE
Perform the following steps to configure the External Web Authentication with a custom guest portal page on Identity Services Engine (ISE):
![]() Note | In the figure, the custom default portal is 'external webauth'. |
Example: External Web Authentication Page
The following code describes an external web authentication page:
<HTML><HEAD><TITLE>Authentication Proxy Login Page</TITLE>
<script type="text/javascript">
var pxypromptwindow1;
var pxysubmitted = false;
function submitreload() {
if (pxysubmitted == false) {
pxypromptwindow1=window.open('', 'pxywindow1', 'resizable=no,width=350,height=350,scrollbars=yes');
pxysubmitted = true;
return true;
} else {
alert("This page can not be submitted twice.");
return false;
}
}
</script>
</HEAD>
<!--
// The form "action" url must be set to the webauth virtual-ip address
//
-->
<BODY>
<H1>Cisco Systems</H1><H2>Web Authentication</H2>
<FORM method=post action="http://1.1.1.1/" target="pxywindow1">
Username: <input type=text name=uname><BR><BR>
Password: <input type=password name=pwd><BR><BR>
<input type=submit name=ok value=OK onClick="return submitreload();">
</FORM><noscript>
<BR>
<UL>
<H2><FONT COLOR="red">Warning!</FONT></H2>
<p>JavaScript should be enabled in your Web browser
for secure authentication</p>
<LI>Follow the instructions of your Web browser to enable
JavaScript if you would like to have JavaScript enabled
for secure authentication</LI>
<BR>OR<BR><BR>
<LI> Follow these steps if you want to keep JavaScript
disabled or if your browser does not support JavaScript
<OL><BR>
<LI> Close this Web brower window</LI>
<LI> Click on Reload button of the original browser window</LI>
</OL></LI>
</UL>
</noscript></BODY></HTML>
Example: Configuring External Web Authentication on Converged Access
The following code describes the configuration of an external web authentication on converged access using show run command on Cisco Catalyst 3850 Series Switch:
Device# Device# show run
Building configuration...
Current configuration : 7946 bytes
!
! Last configuration change at 07:29:52 UTC Tue Apr 9 2013
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service compress-config
!
hostname Switch
!
boot-start-marker
boot system switch 1 flash:packages.conf
boot system switch 1 flash:cat3k_caa-universalk9.SSA.03.09.55.RDP.150-9.55.RDP.bin
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 4 EqmAkK0J3mSGO0ZICurjr4sQh0jNaaNBJAFiEDDLi1s
!
username admin privilege 15 password 0 ww-wireless
username 3850 password 0 3850
aaa new-model
!
!
aaa group server radius rad_ise
server name ise
!
aaa authentication login wcm_local local
aaa authentication login ext_ise group rad_ise
aaa authorization network default local
!
!
!
!
!
aaa session-id common
switch 1 provision ws-c3850-24p
access-session mac-move deny
!
ip device tracking
ip dhcp snooping
!
!
qos wireless-default-untrust
vtp mode transparent
!
crypto pki trustpoint TP-self-signed-0
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-0
revocation-check none
rsakeypair TP-self-signed-0
!
!
crypto pki certificate chain TP-self-signed-0
certificate self-signed 01
3082022C 30820195 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
28312630 24060355 0403131D 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 30301E17 0D313330 34303930 34343531 325A170D 32303031
30313030 30303030 5A302831 26302406 03550403 131D494F 532D5365 6C662D53
69676E65 642D4365 72746966 69636174 652D3030 819F300D 06092A86 4886F70D
01010105 0003818D 00308189 02818100 A80E6C19 126053DC AF217458 7A9F5E74
7E4FF6CB F0DA23BB 36603DC4 4418FA85 655F670C 38CDB836 497A3BCD 2ABF4A5C
15F46CAB C503BD09 61AC0D7F C2F25DC0 670E30AD 926368BF 24BD0834 87750901
5C2EA184 689700FE 10379C58 A9A778EA 88A05B32 AC2D7F6F BE90F6D1 C73625BA
35F89D4F 633AC666 92B88255 094BF927 02030100 01A36630 64300F06 03551D13
0101FF04 05300301 01FF3011 0603551D 11040A30 08820653 77697463 68301F06
03551D23 04183016 801438DB 46071ACE AA940D18 EB943367 D62E08D7 93E1301D
0603551D 0E041604 1438DB46 071ACEAA 940D18EB 943367D6 2E08D793 E1300D06
092A8648 86F70D01 01040500 03818100 6039B3A8 BD78C3D3 3631D01D 44EE79FC
5EE37CCD AC1244EF 97DC8B36 0D937D9F 6F965DCB 908ABBDC 8BBB7D10 3D7C1DE2
0EC93557 2C162A8D 1EFB319D EF0E944D CEF2CC8E 5741ACD5 7C7E0B75 34C51700
11ACDA36 A8968447 A86D6685 52277348 1EF6E60D BA7DD0B5 CB5A7264 B0CB7D1F
E1AB1040 D580C937 CD227437 8695049A
quit
dot1x system-auth-control
!
!
!
!
!
diagnostic bootup level minimal
service-template webauth-global-inactive
inactivity-timer 3600
spanning-tree mode pvst
spanning-tree extend system-id
!
redundancy
mode sso
!
!
parameter-map type webauth global
virtual-ip ipv4 1.1.1.1
parameter-map type webauth test_web
type webauth
redirect for-login https://192.0.2.1:8443/guestportal/portals/external_webauth/portal.jsp
redirect portal ipv4 192.0.2.1
banner
parameter-map type webauth webconsent
type webauth
banner
custom-page login device flash:custom_login.html
custom-page success device flash:custom_success.html
custom-page failure device flash:custom_fail.html
custom-page login expired device flash:custom_fail.html
parameter-map type webauth localweb
type webauth
banner text ^C test webauth ^C
!
!
vlan 254,263
!
!
class-map match-any non-client-nrt-class
match non-client-nrt
!
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
no ip route-cache
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 263
switchport mode access
!
interface GigabitEthernet1/0/2
!
interface GigabitEthernet1/0/3
switchport access vlan 263
switchport mode access
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
switchport mode trunk
ip dhcp snooping trust
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet1/0/24
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
interface Vlan263
ip dhcp relay information trusted
ip address 192.0.2.2 192.0.2.254
ip helper-address 192.0.2.25
no ip route-cache
!
ip default-gateway 192.0.2.1
ip http server
ip http authentication local
ip http secure-server
!
!
ip access-list extended ACL-REDIRECT
deny udp any eq bootps any
deny udp any any eq bootpc
deny udp any eq bootpc any
deny ip any host 192.0.2.5
deny ip any host 192.0.2.6
deny ip any host 192.0.2.6
permit tcp any any eq www
ip access-list extended ACL_Provisioning
permit udp any eq bootpc any eq bootps
permit udp any host 192.0.2.25 eq domain
permit udp any host 192.0.2.119 eq domain
permit ip any host 192.0.2.14
ip access-list extended ACL_Provisioning_Web
permit ip any host 192.0.2.250
permit udp any eq bootpc any eq bootps
permit udp any host 192.0.2.25 eq domain
permit tcp any host 192.0.2.119 eq 443
permit tcp any host 192.0.2.119 eq 8443
permit tcp any host 192.0.2.119 eq www
ip access-list extended ACL_Redirect
deny ip any 198.51.100.1 198.51.100.2
deny ip any 198.51.100.5 198.51.100.9
deny ip any 198.51.100.15 198.51.100.20
deny ip any 198.51.100.30 198.51.100.40
deny ip any 198.51.100.50 198.51.100.60
deny ip any 198.51.100.70 198.51.100.80
deny ip any 198.51.100.80 198.51.100.90
deny ip any host 198.51.100.95
permit tcp any any eq www
permit tcp any any eq 443
permit tcp any any eq 8443
ip access-list extended preauth_ise
permit udp any eq bootps any
permit udp any any eq bootpc
permit udp any eq bootpc any
permit ip any host 192.0.2.251
permit ip host 192.0.2.250 any
permit ip any host 192.0.2.249
permit ip host 192.0.2.245 any
!
ip radius source-interface Vlan263
!
!
!
radius server ise
address ipv4 192.0.2.240 auth-port 1812 acct-port 1813
key Cisco123
!
!
!
banner motd ^Citen login
^C
!
line con 0
login authentication console
stopbits 1
line aux 0
stopbits 1
line vty 5 15
!
wireless mobility controller
wireless management interface Vlan263
wireless security dot1x radius call-station-id ap-macaddress-ssid
wlan ua-web1 11 ua-web1
client vlan 263
ip access-group web preauth_ise
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
security web-auth
security web-auth authentication-list ext_ise
security web-auth parameter-map test_web
no shutdown
ap dot11 24ghz rrm channel dca 1
ap dot11 24ghz rrm channel dca 6
ap dot11 24ghz rrm channel dca 11
ap dot11 5ghz rrm channel dca 36
ap dot11 5ghz rrm channel dca 40
ap dot11 5ghz rrm channel dca 44
ap dot11 5ghz rrm channel dca 48
ap dot11 5ghz rrm channel dca 52
ap dot11 5ghz rrm channel dca 56
ap dot11 5ghz rrm channel dca 60
ap dot11 5ghz rrm channel dca 64
ap dot11 5ghz rrm channel dca 149
ap dot11 5ghz rrm channel dca 153
ap dot11 5ghz rrm channel dca 157
ap dot11 5ghz rrm channel dca 161
ap group default-group
end






Feedback