Local web authentication
Local web authentication is a network security mechanism that
-
authenticates users through a web browser login page
-
enables access control on host systems that do not run IEEE 802.1X supplicants, and
-
communicates with authentication, authorization, and accounting (AAA) servers to enforce security policies.
Feature history
|
Feature Name |
Release |
Description |
|---|---|---|
|
Built-in Captive Portal Improvement |
Cisco IOS XE 17.1.1 |
This release introduces support for special characters in the login portal banner title and banner text. The number of characters supported on the banner text has doubled to 400. The exec-character-bits command has been introduced. |
Presentation options for local web authentication web pages
Local web authentication intercepts HTTP sessions on Layer 2 interfaces, and in some cases, Layer 3 interfaces (with restrictions for some switch models). When users try to access the network, local web authentication displays a login page and verifies user credentials with AAA servers, granting or denying access accordingly.
Local web authentication is categorized by the location where its web pages are hosted.
-
Internal: Uses HTML pages (login, success, fail, and expire) stored on the embedded wireless controller .
-
Customized: Uses customized HTML pages (login, success, fail, and expire) downloaded onto the embedded wireless controller for a customized user experience.
-
External: Uses HTML pages hosted on an external web server.
<body onload="loadAction();">Web authentication modes
The types of web authentication differ according to the available web authentication pages.
-
Webauth—The embedded wireless controller displays a page with the user name and password. Users enter valid credentials to gain network access.
-
Consent or web-passthrough—The controller presents a policy page with the Accept and Deny buttons. Users simply click Accept to access the network – no credentials are required.
-
Webconsent—This mode combines the features of Webauth and Consent. The embedded wireless controller displays a policy page with Accept or Deny buttons along with user name or password. Users must enter the correct credentials and click Accept to access the network.
Additional reference information
-
You can view the webauth parameter-map information using the show running-config command.
-
If you see tracebacks during client authentication, performance and behavior are not affected. Tracebacks may occur if Flexible Forwarding Mode (FFM) replies to Endpoint Profiler Module (EPM) for ACL application after the session is dequeued, usually because a timer expired or the session became unauthorized.
-
You can configure web-based authentication on Layer 2 and layer 3 interfaces.
-
When a client reaches the maximum limit of 200 HTTP connections, the system resets TCP connections and excludes your client from the network.
How local web authentication works
Summary
authentication enables secure network access for clients by prompting users to authenticate through a web login page. The process coordinates actions between the user, authentication server, and the network switch. The key components are:
-
User: Initiates the HTTP session and enters authentication credentials.
-
Network switch: Intercepts traffic, presents login pages, applies policies, and communicates with the authentication server.
-
Authentication server: Verifies credentials and provides policy enforcement details.
Workflow
These are the stages of the process.
- Session initiation: The user starts an HTTP session by attempting to access the network.
- Traffic interception and login page presentation: The network switch intercepts the HTTP request and triggers the authorization process. It presents a login page for the user to enter their username and password.
- Credential submission and authentication: After the user submits credentials, the switch forwards them to the authentication server
-
Authentication outcome:
- If authentication succeeds, the switch downloads and activates the access policy assigned to the user from the server, then displays a login success page.
- If authentication fails, the switch displays a login failure page. After a maximum number of failures, the login expired window appears, and the host is put on a watch list. Once the timeout expires, the user may try again
- Server non-response handling: If the authentication server does not respond, and an AAA fail policy is in place, the switch applies the failure policy to the host and displays a login success page.
- Reauthentication triggers: The switch reauthenticates a client if the host does not respond to an ARP probe (Layer 2) or does not send traffic within an idle timeout (Layer 3) suppress-feature-id="uabu_2960l_sw".
- Session timeout enforcement: The switch applies either the session timeout configured locally or provided by the server. The default local web authentication session timeout on controller is 1800 seconds from Cisco IOS XE 16.1.1 and later. The default session timeout value was infinite seconds, prior to Cisco IOS XE Denali 16.1.1.
-
Session termination:
- If the terminate action is set to RADIUS, the switch sends a nonresponsive host request to the server; the server’s response dictates the next action.
- If the terminate action is set to default, the switch dismantles the session and removes the access policy.
Result
If authentication succeeds and the correct policies are applied, the user gains network access. If authentication fails, failure policies or timeout mechanisms may deny access.
Restrictions
-
You cannot configure bypass authentication with the wireless web authentication feature.
-
To update the redirect login URL, enable and then disable the WLAN. The redirect login URL specified in the web authentication parameter map changes when an AP rejoins.
-
If authentication fails, users receive a failure page and can try to log in again. If the number of allowed attempts is exceeded, users may be excluded and receive a specific reason for the exclusion.
-
Use the local web authentication feature to authenticate end users on host systems that do not run the IEEE 802.1x supplicant.
Roles of devices in local web authentication
In a local web authentication scenario, network devices assume specific roles to manage authentication and access to the LAN.
-
Client: A device, such as a workstation, that requests network access and responds to authentication requests from the switch. The client must have an HTML browser with JavaScript enabled.
-
Authentication server: A server that validates the identity of the client. The authentication server notifies the switch if the client is allowed or denied access to the LAN and related services.
-
Switch: A network device that manages physical access to the network based on the authentication status of the client. The switch relays identity information and authorization responses between the client and the authentication server.
These device roles work together to ensure secure access control through local web authentication processes.
Banner messages for local web authentication
Local web authentication banners provide visual feedback to users during authentication on switches. The banners can display default or customized messages. They may also include branding or additional information on the login and result screens.
Default banner messages
When web authentication is enabled, one of these default messages appears on both the login screen and the authentication result pop-up page:
-
Authentication Successful
-
Authentication Failed
-
Authentication Expired
Commands to configure local web authentication banner
You can configure the local web authentication banner using the .
Use the command in the global configuration mode:
Device(config)# parameter map type webauth global
Device(config-params-parameter-map)# banner ?
file <file-name>
text <Banner text>
title <Banner title>
You can add a custom message, such as a switch, router, or company name, to the banner using the command:
Device(config)# parameter map type webauth global
Device(config-params-parameter-map)# banner text <text>
You can add a logo or text file to the banner using the command:
Device(config)# parameter map type webauth global
Device(config-params-parameter-map)# banner text <filepath>
Banner examples
Banner usage and behavior
-
The default banners are Cisco Systems and Switch host-name Authentication. These banners appear on the login page. The Cisco Systems banner also appears on the authentication result pop-up page.
-
The default banners appear unless custom banners are configured.
-
If you do not enable a banner, only username and password dialog boxes appear on the web authentication login screen. You will not see a banner when you log into the switch.
Authentication states in customized local web authentication
During local web authentication, the switch’s internal HTTP server hosts four HTML pages that communicate authentication states to the client.
You can replace the default internal HTML pages or specify a URL that redirects users after authentication. This URL replaces the internal Success page.
The four authentication pages and states are:
-
Login: Credentials are requested from the client.
-
Success: The client has authenticated successfully.
-
Fail: Authentication attempt failed.
-
Expire: The session expires after excessive failures.
You must configure all four pages. You can specify text or add a logo to each of the four pages.
Banner examples
Best practices for customizing web authentication pages
-
Add appropriate text to the banner and login pages as needed.
-
Always include a valid HTML redirect command in the success page to redirect users to a specific URL after login
-
Ensure the URL string is well-formed (for example, "http://www.cisco.com") to avoid browser errors.
-
If you configure web pages for HTTP authentication, include the appropriate HTML commands. For example, HTML commands to set the page time out, to set a hidden password, or to confirm that the same page is not submitted twice.
-
You can copy the configured web pages to the switch boot flash or the flash.
-
The login page can reside on one flash device, while the success and failure pages can be stored on another flash device
-
You must configure all four pages.
-
All logo files—including image, flash, audio, video, and similar file types—stored in the system directory must use web_auth_<filename> as the file name. System directory examples are flash, disk0, or disk.
-
You can copy the configured web pages to the switch boot flash or the flash.
Restrictions for customizing web authentication pages
-
The banner page has no effect if it is configured together with a web authentication page.
-
When the configured login form is enabled, the CLI command for redirecting users to a specific URL is unavailable. Configure redirection in the web page.
-
If you enter the CLI command to redirect users to a specific URL after authentication and then configure web pages, the redirect command does not take effect.
-
The configured authentication proxy feature supports both HTTP and SSL.
Guidelines for configuring a redirection URL for Successful Login page
-
If you enable the custom authentication proxy web pages feature, you cannot use the redirection URL feature in the CLI. To redirect users after login, configure redirection in the custom login success page.
-
If you enable the redirection URL feature, the configured authorization proxy banner is not be used.
-
To remove the specification of a redirection URL, use the no form of the command.
-
If a redirection URL is required after successful authentication, it must begin with a valid protocol prefix (such as http://) followed by the URL. If http:// is omitted, the browser might show a page not found error or similar issue
How to configure local web authentication
Configure default local web authentication
|
Feature |
Default Setting |
|---|---|
|
AAA |
Disabled |
|
RADIUS server
|
|
|
Default value of inactivity timeout |
3600 seconds |
|
Inactivity timeout |
Enabled |
Configure AAA authentication (GUI)
Set up AAA authentication to control network access using the GUI.
Use this task to define and assign authentication methods and server groups for device access.
Before you begin
Confirm that server groups are configured if you plan to use them.
Procedure
|
Step 1 |
Choose . |
|
Step 2 |
In the Authentication section, click Add. |
|
Step 3 |
In the Quick Setup: AAA Authentication window that is displayed, enter a name for your method list. |
|
Step 4 |
Choose the type of authentication you want to perform before allowing access to the network, in the Type drop-down list. |
|
Step 5 |
In the Group Type drop-down list, select either a group of servers as your access server or a local server to authenticate access. |
|
Step 6 |
To configure a local server to act as a fallback method when servers in the group are unavailable, check the Fallback to local check box. |
|
Step 7 |
Choose the server groups you want to use to authenticate access to your network, from the Available Server Groups list and click > icon to move them to the Assigned Server Groups list. |
|
Step 8 |
Click Save & Apply to Device. |
The controller is now configured with AAA authentication, and users are authenticated using the chosen methods.
Configure AAA authentication (CLI)
Enable authentication, authorization, and accounting (AAA) on the device to manage login methods and network access.
AAA centralizes user authentication for device access and network services. Select a named method list or the default list, depending on your VTY line configuration.
If no method list is configured under VTY lines, add the default method list to the AAA configuration.”
line vty 0 4
authorization commands 15 abc
aaa authorization commands 15 abc group tacacs+
line vty 0 4
aaa authorization commands 15 default group tacacs+
![]() Note |
Use the default list for AAA authorization if you plan to use features such as dACL. |
Before you begin
Ensure that the TACACS+ server address and group name are available.
Procedure
|
Step 1 |
Enable AAA functionality. Example:
|
|
Step 2 |
Define the list of authentication methods at login using the aaa authentication login {default | named_authentication_list} group AAA_group_name command. Example:
named_authentication_list refers to any name that is not greater than 31 characters. AAA_group_name refers to the server group name. Define the server_name at the beginning of the configuration. |
|
Step 3 |
Create an authorization method list for web-based authorization using the aaa authorization network {default | named_authorization_list} group AAA_group_name command. Example:
|
|
Step 4 |
Specify a AAA server. Example:
|
Configure the HTTP or HTTPS server (GUI)
Set up HTTP and HTTPS access to enable secure web-based management of the device.
HTTP provides basic web access; HTTPS secures connections with SSL encryption. You can configure access ports, authentication, trust points, and session policies to meet your security requirements.
Before you begin
Confirm necessary certificates are available if using HTTPS trust points.
Procedure
|
Step 1 |
Choose . |
|
Step 2 |
In the HTTP/HTTPS Access Configuration section, enable HTTP Access and enter the port that will listen for HTTP requests. The default port is 80. Valid values are 80, and ports between 1025 and 65535. |
|
Step 3 |
Enable HTTPS Access on the device and enter the designated port to listen for HTTPS requests. The default port is 1025. Valid values are 443 and ports between 1025 and 65535. Data exchanged over a secure HTTP connection is encrypted before transmission across the Internet. SSL encryption over HTTP enables secure configuration of the switch through a web browser. |
|
Step 4 |
Choose the Personal Identity Verification as enabled or disabled. |
|
Step 5 |
In the HTTP Trust Point Configuration section, enable Enable Trust Point to use Certificate Authority servers as trustpoints. |
|
Step 6 |
From the Trust Points drop-down list, choose a trust point. |
|
Step 7 |
In the Timeout Policy Configuration section, enter the HTTP timeout policy in seconds. Enter a value between one to 600 seconds. |
|
Step 8 |
Enter the number of minutes of inactivity allowed before the session times out. Enter a value between 180 and 1200 seconds. |
|
Step 9 |
Enter the server life time in seconds. Enter a value between one and 86400 seconds. |
|
Step 10 |
Enter the maximum number of requests the device can accept. Valid values range from one and 86400 requests. |
|
Step 11 |
Save the configuration. |
The device is configured for HTTP or HTTPS access according to your specified settings.
Configure the HTTP server (CLI)
Enable HTTP or HTTPS server functionality on your device to support local web authentication.
Local web authentication requires the HTTP server to be enabled on the controller.
You can configure both HTTP and HTTPS servers to support device management and user authentication.
Both HTTP and HTTPS servers can be configured to support device management and user authentication.
Note that some browsers, such as the Apple psuedo-browser, do not open if you configure only the ip http secure-server command. You should also configure the ip http server command.
Procedure
|
Step 1 |
Enable the HTTP server. The local web authentication feature uses the HTTP server to communicate with the hosts for user authentication. Example:
|
||
|
Step 2 |
Enable HTTPS. Example:
You can configure custom authentication proxy web pages or specify a redirection URL for successful login.
|
||
|
Step 3 |
Return to privileged EXEC mode. Example:
|
The controller is now configured with the HTTP or HTTPS or both. This enables local web authentication and secure browser access for users.
Allow special characters for serial port
Configure the serial port to support special characters for advanced device communication.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure the primary terminal line number. Example:
|
|
Step 3 |
Configure the time to disconnect idle EXEC sessions using the exec-timeout mins sec command. Example:
|
|
Step 4 |
Configure login authentication checking using the login authentication word default command. Example:
|
|
Step 5 |
Configure the character widths of EXEC command characters using the exec-character-bit { 7 | 8} command. Example:
|
|
Step 6 |
Configure the stop bits for the console port using the stopbits { 1 | 1.5| 2} command. Example:
|
|
Step 7 |
Return to privileged EXEC mode. Example:
|
The serial port is now configured to support special characters according to your settings.
Allow special characters for VTY port
Enable the use of special (non-standard) characters in the banner text for Virtual Teletype (VTY) ports, which enhances customization options and supports global character sets.
You can allow special (non-standard) characters in the banner text for Virtual Teletype (VTY) ports. This lets you customize banners and support global character sets.
You may want to allow special characters in the banner displayed on the VTY port—for example, to include accented letters, non-English text, or symbols for branding or user communication.
Before you begin
Ensure you have determined the desired banner text and any required special characters.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Create a parameter map and enter parameter-map webauth configuration mode. Example:
|
|
Step 3 |
Create a custom banner using the banner text text command. Example:
You can create a custom banner (of up to 400 characters) by entering c <banner-text> c, where c is a delimiting character. If the banner text exceeds 400 characters (400 characters is about 250 words), you see an error message and the configuration is rejected. The parser limits each line to 254 characters (about 150 words), including CLI keywords. If you need more than 254 characters, split the banner text into multiple lines. The webauth login page displays only the default banner strings, if banner command is not configured. |
|
Step 4 |
Return to privileged EXEC mode. Example:
|
You can now use special characters in the VTY port banner. When users connect through VTY, they see your custom banner.
Create a parameter map (GUI)
Define criteria-based policies to control device and user access within the local policy framework.
Use this task to create a parameter map by specifying match criteria and associating service templates. This enables dynamic policy application based on device type, user role, and other attributes.
Before you begin
Ensure you have the required policy details and service templates ready.
Procedure
|
Step 1 |
Choose . |
|
Step 2 |
Click Add. |
|
Step 3 |
Click Policy Map. |
|
Step 4 |
Enter Policy Map Name. |
|
Step 5 |
In the Match Criteria List settings, click Add. |
|
Step 6 |
In the Add Match Criteria settings, choose the service template from the Service Template drop-down list. |
|
Step 7 |
Choose the filters from Device Type, User Role, User Name, OUI, and MAC Address drop-down lists. |
|
Step 8 |
Click Add Criteria. |
|
Step 9 |
Click Apply to Device. |
The parameter map is created and applied, enabling policy enforcement based on the selected criteria.
Configure the maximum web authentication request retries
Set the maximum number of web authentication request retries to define how many times the system attempts authentication before it stops.
Configure this setting to adjust the tolerance for failed web authentication attempts, which can improve network security and user experience.
Before you begin
Ensure you are in global configuration mode on your device.
Procedure
|
Step 1 |
Configure the maximum web authentication request retries. Example:
number is the maximum number of web authentication request retries. The valid range is 0-20. |
|
Step 2 |
Return to privileged EXEC mode. Example:
|
You have configured the specified maximum number of web authentication request retries.
Configure a local banner in web authentication page (GUI)
Present a custom banner to users on the web authentication page to meet organizational messaging or compliance requirements.
Use this task to configure a banner that will display on the login page for web authentication sessions.
Procedure
|
Step 1 |
Choose . |
|
Step 2 |
In the Webauth Parameter Map tab, click the parameter map name. The Edit WebAuth Parameter window is displayed. |
|
Step 3 |
In the General tab and choose the required Banner Type:
|
|
Step 4 |
Click Update & Apply. |
The specified banner displays on the web authentication page as configured.
Configure a local banner in web authentication page (CLI)
Present a custom banner to users on the Web Authentication page to meet organizational messaging or compliance requirements.
Use this task to configure a banner that displays on the login page for web authentication sessions.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure the web authentication parameters. Enters the parameter map configuration mode. Example:
|
|
Step 3 |
Enable the local banner using the banner [ file | banner-text | title] command. Example:
Create a custom banner by entering C banner-text C (where C is a delimiting character), or file that indicates a file (for example, a logo or text file) that appears in the banner, or title that indicates the title of the banner. |
|
Step 4 |
Return to privileged EXEC mode. Example:
|
The specified banner displays on the web authentication page as configured.
Configuration examples for local web authentication
Example: obtain a web authentication certificate
DeviceDevice# configure terminal
Device(config)# crypto pki import cert pkcs12 tftp://10.1.0.100/ldapserver-cert.p12 cisco
Device(config)# end
Device# show crypto pki trustpoints cert
Trustpoint cert:
Subject Name:
e=rkannajr@cisco.com
cn=sthaliya-lnx
ou=WNBU
o=Cisco
l=SanJose
st=California
c=US
Serial Number (hex): 00
Certificate configured.
Device# show crypto pki certificates cert
Certificate
Status: Available
Certificate Serial Number (hex): 04
Certificate Usage: General Purpose
Issuer:
e=rkannajr@cisco.com
cn=sthaliya-lnx
ou=WNBU
o=Cisco
l=SanJose
st=California
c=US
Subject:
Name: ldapserver
e=rkannajr@cisco.com
cn=ldapserver
ou=WNBU
o=Cisco
st=California
c=US
Validity Date:
start date: 07:35:23 UTC Jan 31 2012
end date: 07:35:23 UTC Jan 28 2022
Associated Trustpoints: cert ldap12
Storage: nvram:rkannajrcisc#4.cer
CA Certificate
Status: Available
Certificate Serial Number (hex): 00
Certificate Usage: General Purpose
Issuer:
e=rkannajr@cisco.com
cn=sthaliya-lnx
ou=WNBU
o=Cisco
l=SanJose
st=California
c=US
Subject:
e=rkannajr@cisco.com
cn=sthaliya-lnx
ou=WNBU
o=Cisco
l=SanJose
st=California
c=US
Validity Date:
start date: 07:27:56 UTC Jan 31 2012
end date: 07:27:56 UTC Jan 28 2022
Associated Trustpoints: cert ldap12 ldap
Storage: nvram:rkannajrcisc#0CA.cer
Example: display a web authentication certificate
Device# show crypto ca certificate verb
Certificate
Status: Available
Version: 3
Certificate Serial Number (hex): 2A9636AC00000000858B
Certificate Usage: General Purpose
Issuer:
cn=Cisco Manufacturing CA
o=Cisco Systems
Subject:
Name: WS-C3780-6DS-S-2037064C0E80
Serial Number: PID:WS-C3780-6DS-S SN:FOC1534X12Q
cn=WS-C3780-6DS-S-2037064C0E80
serialNumber=PID:WS-C3780-6DS-S SN:FOC1534X12Q
CRL Distribution Points:
http://www.cisco.com/security/pki/crl/cmca.crl
Validity Date:
start date: 15:43:22 UTC Aug 21 2011
end date: 15:53:22 UTC Aug 21 2021
Subject Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Signature Algorithm: SHA1 with RSA Encryption
Fingerprint MD5: A310B856 A41565F1 1D9410B5 7284CB21
Fingerprint SHA1: 04F180F6 CA1A67AF 9D7F561A 2BB397A1 0F5EB3C9
X509v3 extensions:
X509v3 Key Usage: F0000000
Digital Signature
Non Repudiation
Key Encipherment
Data Encipherment
X509v3 Subject Key ID: B9EEB123 5A3764B4 5E9C54A7 46E6EECA 02D283F7
X509v3 Authority Key ID: D0C52226 AB4F4660 ECAE0591 C7DC5AD1 B047F76C
Authority Info Access:
Associated Trustpoints: CISCO_IDEVID_SUDI
Key Label: CISCO_IDEVID_SUDI
Example: choose the default web authentication login page
Device# configure terminal
Device(config)# parameter-map type webauth test
This operation will permanently convert all relevant authentication commands to their CPL control-policy equivalents. As this conversion is irreversible and will
disable the conversion CLI 'authentication display [legacy|new-style]', you are strongly advised to back up your current configuration before proceeding.
Do you wish to continue? [yes]: yes
Device(config)# wlan wlan50
Device(config-wlan)# shutdown
Device(config-wlan)# security web-auth authentication-list test
Device(config-wlan)# security web-auth parameter-map test
Device(config-wlan)# no shutdown
Device(config-wlan)# end
Device# show running-config | section wlan50
wlan wlan50 50 wlan50
security wpa akm wpa2
security wpa wpa1
security wpa wpa1 ciphers aes
security wpa wpa1 ciphers tkip
security web-auth authentication-list test
security web-auth parameter-map test
session-timeout 1800
no shutdown
Device# show running-config | section parameter-map type webauth test
parameter-map type webauth test
type webauth
Example: choosing a CWA login page from an IPv4 external web server
Device# configure terminal
Device(config)# parameter-map type webauth global
Device(config-params-parameter-map)# virtual-ip ipv4 192.0.2.1.
Device(config-params-parameter-map)# parameter-map type webauth test
Device(config-params-parameter-map)# type webauth
Device(config-params-parameter-map)# redirect for-login http://9.1.0.100/login.html
Device(config-params-parameter-map)# redirect portal ipv4 9.1.0.100
Device(config-params-parameter-map)# end
Device# show running-config | section parameter-map
parameter-map type webauth global
virtual-ip ipv4 192.0.2.1.
parameter-map type webauth test
type webauth
redirect for-login http://10.1.0.100/login.html
redirect portal ipv4 10.1.0.100
security web-auth parameter-map rasagna-auth-map
security web-auth parameter-map test
Example: choose a customized web authentication login page from an IPv6 external web server
Device# configure terminal
Device(config)# parameter-map type webauth global
Device(config-params-parameter-map)# virtual-ip ipv6 2001:DB8::/48
Device(config-params-parameter-map)# parameter-map type webauth test
Device(config-params-parameter-map)# type webauth
Device(config-params-parameter-map)# redirect for-login http://9:1:1::100/login.html
Device(config-params-parameter-map)# redirect portal ipv6 9:1:1::100
Device(config-params-parameter-map)# end
Device# show running-config | section parameter-map
parameter-map type webauth global
virtual-ip ipv6 2001:DB8::/48
parameter-map type webauth test
type webauth
redirect for-login http://10:1:1::100/login.html
redirect portal ipv6 10:1:1::100
security web-auth parameter-map rasagna-auth-map
security web-auth parameter-map test
Example: assigning login, login failure, and logout pages per WLAN
Device# configure terminal
Device(config)# parameter-map type webauth test
Device(config-params-parameter-map)# custom-page login device flash:loginsantosh.html
Device(config-params-parameter-map)# custom-page login expired device flash:loginexpire.html
Device(config-params-parameter-map)# custom-page failure device flash:loginfail.html
Device(config-params-parameter-map)# custom-page success device flash:loginsucess.html
Device(config-params-parameter-map)# end
Device# show running-config | section parameter-map type webauth test
parameter-map type webauth test
type webauth
redirect for-login http://10.1.0.100/login.html
redirect portal ipv4 10.1.0.100
custom-page login device flash:loginsantosh.html
custom-page success device flash:loginsucess.html
custom-page failure device flash:loginfail.html
custom-page login expired device flash:loginexpire.html
Example: configure preauthentication ACL
Device# configure terminal
Device(config)# wlan fff
Device(config-wlan)# shutdown
Device(config-wlan)# ip access-group web preauthrule
Device(config-wlan)# no shutdown
Device(config-wlan)# end
Device# show wlan name fff
Example: configure webpassthrough
Device# configure terminal
Device(config)# parameter-map type webauth webparalocal
Device(config-params-parameter-map)# type consent
Device(config-params-parameter-map)# end
Device# show running-config | section parameter-map type webauth test
parameter-map type webauth test
type webauth
redirect for-login http://10.1.0.100/login.html
redirect portal ipv4 10.1.0.100
Verify web authentication type
To verify the web authentication type, run the command:
Device# show parameter-map type webauth all
Type Name
---------------------------------
Global global
Named webauth
Named ext
Named redirect
Named abc
Named glbal
Named ewa-2
Device# show parameter-map type webauth global
Parameter Map Name : global
Banner:
Text : CisCo
Type : webauth
Auth-proxy Init State time : 120 sec
Webauth max-http connection : 100
Webauth logout-window : Enabled
Webauth success-window : Enabled
Consent Email : Disabled
Sleeping-Client : Enabled
Sleeping-Client timeout : 60 min
Virtual-ipv4 : 10.0.2.1.
Virtual-ipv4 hostname :
Webauth intercept https : Disabled
Webauth Captive Bypass : Disabled
Webauth bypass intercept ACL :
Trustpoint name :
HTTP Port : 80
Watch-list:
Enabled : no
Webauth login-auth-bypass:
Device# show parameter-map type webauth name global
Parameter Map Name : global
Type : webauth
Auth-proxy Init State time : 120 sec
Webauth max-http connection : 100
Webauth logout-window : Enabled
Webauth success-window : Enabled
Consent Email : Disabled
Sleeping-Client : Disabled
Webauth login-auth-bypass:


Feedback