- Auto Anchor SSID between Wireless LAN Controllers acting as MC
- Enabling Central Web Authentication on ISE
- Configuring Auto Anchor and Mobility Groups on Wireless Services
- Configuring Wireless Multicast on Wireless LAN Controllers
- Converged Access Consolidated Quick Reference Templates for Wireless LAN
- Converged Access Controller AP Join Issue Troubleshoot with Traces
- Converged Access Controllers MAC Address Entry for Network Mobility Service Protocol
- Configuration Example: Converged Access Management through Prime Infrastructure with SNMP v2 and v3
- Converged Access Path Maximum Transmission Unit Discovery
- Third-Party Certificate Installation on Converged Access Wireless LAN Controllers
- Configuration Example: Converged Access for WLC EAP-FAST with Internal RADIUS Server
- Converged Access and WLC Local EAP Authentication Configuration Example
- Configuration Example: Custom Web Authentication with Local Authentication
- Dynamic VLAN Assignment with Converged Access and ACS 5.2 Configuration Example
- Configuration Example: External RADIUS Server EAP Authentication
- External Web Authentication on Converged Access
- Installing Wireless Services
- Local Web Authentication with External RADIUS Authentication
- Local Web Authentication on Converged Access
- PEAP Authentication with Microsoft NPS Configuration
- QoS on Converged Access Controllers and Lightweight Access Points
- Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers
- Configuration Example: Unified Access WLC Guest Anchor with Converged Access
- VideoStream Troubleshooting
- Custom Web Authentication Locally Hosted on WLC or an External Server
- Wireless Converged Access Chromecast Configuration Example
- Web Passthrough Configuration Example
- Configuration Examples: WPA2-PSK and Open Authentication
- Prerequisites
- Configuration Templates for Layer 2 Security
- Open WLAN No Security Template
- Static Wired Equivalent Privacy Template
- MAC Filter - Local Database Template
- MAC Filter - External RADIUS Template
- Wireless Protected Access 2 Pre-Shared Key Template
- 802.1x Local Extensible Authentication Protocol Authentication Template
- 802.1x on External RADIUS Template
- Configuration Templates for Layer 3 Security
Converged Access Consolidated Quick Reference Templates for Wireless LAN
This document describes the CLI configuration templates for basic and known Layer 2 and Layer 3 WLANs configurations. The configuration templates are used for the lab recreations and customer initial installations of Cisco Catalyst 3850 Series Switches.
- Prerequisites
- Configuration Templates for Layer 2 Security
- Configuration Templates for Layer 3 Security
Prerequisites
Supported Platforms and Releases
This document is not restricted to specific software and hardware versions.
![]() Note | The information in this document refers to devices in a specific lab environment. Descriptions of the devices is provided with default configuration values. If you are on a live network, you must understand the potential impact of all the commands. |
Configuration Templates for Layer 2 Security
Open WLAN No Security Template
The following is the template for Open WLAN No Security:
wlan 1 name testwlan ssid testwlan client vlan 20 no security wpa no shutdown
Static Wired Equivalent Privacy Template
The following is the template for Static Wired Equivalent Privacy (WEP):
wlan staticWEP 6 staticWEP client vlan 79 no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes security static-wep-key encryption 40 ascii 0 Cisco 1 session-timeout 1800 no shutdown
MAC Filter - Local Database Template
The following is the template for MAC Filter - Local Database:
username 24770319eB75 mac aaa new-model aaa authorization network test_mac local wlan macfiltering 6 macfiltering client vlan Vlan7 mac-filtering test_mac no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes no shutdown
MAC Filter - External RADIUS Template
The following is the template for MAC Filter - External RADIUS:
aaa new-model aaa group server radius wcm_rad server name RAD_EXT subscriber mac-filtering security-mode mac mac-delimiter colon radius server RAD_EXT address ipv4 x.x.x.x auth-port 1812 acct-port 1813 key cisco aaa authorization network wcm_macfilter group wcm_rad wlan macfiltering 1 macfiltering client vlan Vlan7 mac-filtering wcm_macfilter no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes no shutdown
Wireless Protected Access 2 Pre-Shared Key Template
The following is a template for Wireless Protected Access 2 (WPA2) Pre-Shared Key (PSK):
wlan wpa2psk 1 wpa2psk client vlan 20 no security wpa akm dot1x security wpa akm psk set-key ascii 0 Cisco123 no shutdown
802.1x Local Extensible Authentication Protocol Authentication Template
The following is the template for 802.1x Local Extensible Authentication Protocol (EAP):
user-name test privilege 15 password 0 cisco type network-user description pass=cisco aaa new-model aaa authentication dot1x default local aaa authorization credential-download author_list local aaa authentication dot1x authen_list local aaa local authentication authen_list authorization author_list dot1x system-auth-control eap profile PEAPProfile method ? fast EAP-FAST method allowed gtc EAP-GTC method allowed leap EAP-LEAP method allowed md5 EAP-MD5 method allowed mschapv2 EAP-MSCHAPV2 method allowed peap EAP-PEAP method allowed tls EAP-TLS method allowed method peap method mschapv2 wlan TestCONVERGEDACCESS 1 TestCONVERGEDACCESS client vlan VLAN0080 ip dhcp server 192.0.2.14 local-auth PEAPProfile
802.1x on External RADIUS Template
The following is the template for 802.1x on External RADIUS:
aaa new-model
!
!
aaa group server radius ACS
server name ACS
!
aaa authentication dot1x ACS group ACS
radius server ACS
address ipv4 203.0.113.50 auth-port 1645 acct-port 1646
key Cisco123
dot1x system-auth-control
wlan EAPFAST 4 EAPFAST
client vlan VLAN0020
security dot1x authentication-list ACS
session-timeout 1800
no shutdown
Configuration Templates for Layer 3 Security
Web Passthrough Template
The following is the template for Web Passthrough:
parameter-map type webauth global type consent virtual-ip ipv4 192.0.2.1 ! ! parameter-map type webauth web type consent wlan Webauth 9 Webauth client vlan VLAN0020 no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes security web-auth security web-auth parameter-map web session-timeout 1800
Local Authentication Template
The following is the template for Local Web Authentication:
aaa new-model
aaa authentication login wcm_local local
aaa authorization network default local
aaa authorization credential-download default local
username test password 0 test12345
parameter-map type webauth global
virtual-ip ipv4 1.1.1.1
parameter-map type webauth test_web
type webauth
banner c test webauth c
ip http server
ip http authentication local
ip http secure-server
wlan local_webauth 11 local_webauth
client vlan 263
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
security web-auth
security web-auth authentication-list wcm_local
security web-auth parameter-map test_web
Web Authentication with External RADIUS Authentication Template
The following is the template for Web Authentication and External RADIUS Authentication:
radius server ise
address ipv4 192.0.2.119 auth-port 1812 acct-port 1813
key Cisco123
aaa group server radius rad_ise
server name ise
aaa authentication login ext_ise group rad_ise
parameter-map type webauth global
virtual-ip ipv4 1.1.1.1
parameter-map type webauth test_web
type webauth
banner c test webauth c
wlan local_webauth 11 local_webauth
client vlan 263
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
security web-auth
security web-auth authentication-list ext_ise
security web-auth parameter-map test_web
no shutdown
External Web Authentication Template
The following is the template for External Web Authentication:
//Parameter Map //
parameter-map type webauth test_web
type webauth
redirect for-login https: //192.0.2.119:8443 /guestportal /portals/external_webauth/portal.jsp
redirect portal ipv4 192.0.2.119
redirect on-success <url> //Optional//
redirect on-failure <url> //Optional//
banner
//Pre auth ACL//
ip access-lists extended preauth_ise
10 permit udp any eq bootps any
20 permit udp any any eq bootpc
30 permit udp any eq bootpc any
40 permit udp any any eq domain
50 permit udp any eq domain any
60 permit ip any host 192.0.2.119
70 permit ip host 192.0.2.119 any
wlan external_webauth 11 external_webauth
client vlan 263
ip access-group web preauth_ise
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
security web-auth
security web-auth authentication-list ext_ise
security web-auth parameter-map test_web
no shutdown
Customized Local Web Authentication Template
The following is the template for Customized Web Authentication with Local Authentication:
ip http server ip device tracking aaa new-model aaa authentication login local_webauth local aaa authorization network default local aaa authorization credential-download default local username <username> password 0 <password> FTP Configuration for file transfer: ip ftp username <username> ip ftp password <password> Upload custom html files to flash: with command: Device# copy ftp: //x.x.x.x /webauth_login.html flash: Example of flash content: Device# dir flash: Directory of flash:/ 64649 -rw- 1164 Oct 7 2013 04:36:23 +00:00 webauth_failure.html 64654 -rw- 2047 Oct 7 2013 13:32:38 +00:00 webauth_login.html 64655 -rw- 1208 Oct 7 2013 04:34:12 +00:00 webauth_success.html 64656 -rw- 900 Oct 7 2013 04:35:00 +00:00 webauth_expired.html 64657 -rw- 96894 Oct 7 2013 05:05:09 +00:00 web_auth_logo.png 64658 -rw- 23037 Oct 7 2013 13:17:58 +00:00 web_auth_cisco.png 64660 -rw- 2586 Oct 7 2013 13:31:27 +00:00 web_auth_aup.html parameter-map type webauth global virtual-ip ipv4 1.1.1.1 parameter-map type webauth custom type webauth redirect on-success http://www.cisco.com banner text ^C CC global ip for redirect ^C custom-page login device flash:webauth_login.html custom-page success device flash:webauth_success.html custom-page failure device flash:webauth_failure.html custom-page login expired device flash:webauth_expired.html wlan cisco 1 cisco client vlan Vlanx no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list local_webauth security web-auth parameter-map custom session-timeout 1800 no shutdown
Auto Anchor Web Authentication Template
The following is the template for Auto Anchor Web Authentication:
//Verify//
show wireless mobility summary
<snip>
IP Public IP Group Name Multicast IP Link Status
-------------------------------------------------------------------------------
192.168.100.8 - CONVERGEDACCESS 0.0.0.0 UP : UP
192.168.100.15 192.168.100.15 5760 UP : UP
radius server ise
address ipv4 192.0.2.119 auth-port 1812 acct-port 1813
key Cisco123
aaa group server radius rad_ise
server name ise
aaa authentication login ext_ise group rad_ise
parameter-map webauth global
virtual-ip ipv4 1.1.1.1
parameter-map type webauth test_web
type webauth
banner
WLAN configs on the Foreign 5760
wlan convergedaccess_guest 3 convergedaccess_guest
client vlan 254
mobility anchor 192.0.2.8 //Anchor
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
security web-auth
security web-auth authentication-list wcm_local
security web-auth parameter-map test_web
no shutdown
WLAN configs on the Anchor 5760
wlan convergedaccess_guest 3 convergedaccess_guest
client vlan 254
mobility anchor 192.0.2.8 //Local
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
security web-auth
security web-auth authentication-list rad_ise
security web-auth parameter-map test_web
no shutdown

Feedback