Central web authentication
A central web authentication is a wireless security mechanism that
-
delegates the user login webpage and credential processing to a centralized authentication server such as Cisco Identity Services Engine (Cisco ISE)
-
initiates user redirection and authentication at Layer 2, often in combination with MAC filtering or 802.1X authentication, and
-
uses RADIUS server attributes to instruct network controllers to redirect web traffic to the authentication portal, streamlining access and reducing delays.
-
ISE (Identity Services Engine): Cisco’s centralized network access policy platform that delivers authentication, authorization, accounting, and guest access functionality.
-
ACL (Access control list): A set of rules used to control network traffic and enforce security policies, determining which clients can access which network resources.
-
Change of Authorization (CoA): A mechanism to reapply or update authorization parameters dynamically without requiring a new login.
Comparison with other authentication methods
Central web authentication (CWA) enables centralized management of web-based access for wireless clients by utilizing a dedicated authentication portal (typically ISE). The primary distinction from traditional (local) web authentication is that core security and redirection functions are performed at Layer 2 (data link), in conjunction with authentication mechanisms such as MAC filtering or dot1x. In CWA, the RADIUS server provides special attributes directing the controller to redirect web traffic appropriately, thereby triggering portal-based login. This process streamlines authentication, reduces delays, and enhances consistent policy enforcement.
There are multiple methods of web authentication used in wireless environments.
-
Local web authentication (LWA): Configured as Layer 3 security on the controller. The web authentication page and pre-authentication access control list (ACL) are locally configured on the controller. The controller intercepts HTTP(S) traffic from the client and redirects the client to an internal web page for authentication. Credentials are authenticated by the controller locally or through a RADIUS or LDAP server.
-
External web authentication (EWA): Also configured as Layer 3 security on the controller. The controller intercepts HTTP(S) traffic and redirects the client to a login page hosted on an external web server. Credentials are authenticated by the controller locally or through a RADIUS or LDAP server. The pre-authentication ACL is statically configured on the controller.
-
Central web authentication (CWA): Typically configured as Layer 2 security, with the redirection URL and pre-authentication ACL residing on ISE. During Layer 2 authentication, ISE pushes the redirection attributes to the controller. The controller redirects all web traffic from the client to the ISE login page. ISE then validates the credentials entered by the client through HTTPS and authenticates the user.
Method |
Layer |
Portal |
Credential processing |
Key attributes |
---|---|---|---|---|
Local Web Authentication |
Layer 3 |
Controller |
Locally or through RADIUS/LDAP |
Controller intercepts traffic |
External Web Authentication |
Layer 3 |
External Server |
Locally or through RADIUS/LDAP |
Static ACLs, external portal |
Central Web Authentication |
Layer 2 |
ISE |
Through ISE (HTTPS) |
ISE pushes ACL, redirection |
Analogy: concert tickets
Imagine a concert venue with several ways to check tickets and admit guests. You can have ticket booths at every entrance (local authentication), ticket checkers who send guests to a special desk outside (external authentication), or one main VIP booth at the heart of the venue that handles everyone’s tickets and access (central authentication). Let’s use this concert analogy to understand central web authentication and other methods.
At your concert venue, central web authentication (CWA) is what happens when, instead of letting every entrance or gate have their own ticket booth, you create one exclusive VIP booth—like Cisco’s ISE—that manages all ticketing for everyone. Instead of waiting until a guest actually tries to enter through a particular door (the way local booth might do), the venue’s security starts checking guests' tickets as soon as they enter the red carpet. The VIP booth can give the gatekeepers special instructions: “If you don’t recognize someone’s ticket, redirect them straight to me!” This means the main ticketing process is handled efficiently and quickly by one central authority.
Let’s look at all the ticketing strategies you could use at your concert:
Local Ticket Booth (Local Web Authentication, LWA): Every entrance has its own mini ticket booth and rules. Guards at the door check tickets and can ask guests for their info. Ticket validation is handled locally at each gate, sometimes via a backstage manager or external system.
External Ticket Desk (External Web Authentication, EWA): Instead of ticket checks at the gate, guests are sent to a desk outside the stadium. The desk is run by another company. The security at the entrance gates redirects guests and the validation can still interact with the backstage manager if needed. Rules for who gets through are set upfront.
VIP Central Ticket Booth (Central Web Authentication, CWA): The gates just check basic details (like guest’s wristband color), and anyone who isn’t recognized is sent straight to the main VIP booth (ISE) to have their ticket or credentials checked and get access granted for the whole event.
Prerequisites for Central Web Authentication
-
Cisco Identity Services Engine (ISE)