![]() |
|||||||||||||
Consent Feature for Cisco IOS Routers
![]() |
|||||||||||||
Contents
Consent Feature for Cisco IOS RoutersLast Updated: April 12, 2012
The Consent Feature for Cisco IOS Routers enables organizations to provide temporary Internet and corporate access to end users through their wired and wireless networks by presenting a consent webpage. This webpage lists the terms and conditions in which the organization is willing to grant requested access to an end user. Users can connect to the network only after they accept the terms of use on the consent webpage.
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Consent Feature for Cisco IOS RoutersTo enable a consent webpage, you must be running an Advanced Enterprise image. Information About Consent Feature for Cisco IOS RoutersAuthentication Proxy OverviewAuthentication proxy is an ingress authentication feature that grants access to an end user (out an interface) only if the user submits valid username and password credentials for an ingress traffic that is destined for HTTP, Telnet, or FTP protocols. After the submitted authentication credentials have been checked against the credentials that are configured on an Authentication, Authorization, Accounting (AAA) server, access is granted to the requester (source IP address). When an end user posts an HTTP(S), FTP, or Telnet request on a router's authentication-proxy-enabled ingress interface, the Network Authenticating Device (NAD) verifies whether or not the same host has already been authenticated. If a session is already present, the ingress request is not authenticated again, and it is subjected to the dynamic (Auth-Proxy) ACEs and the ingress interface ACEs. If an entry is not present, the authentication proxy responds to the ingress connection request by prompting the user for a valid username and password. When authenticated, the Network Access Profiles (NAPs) that are to be applied are either downloaded from the AAA server or taken from the locally configured profiles. An Integrated Consent-Authentication Proxy WebpageThe HTTP authentication proxy webpage has been extended to support radio buttons--"Accept" and "Don't Accept"--for the consent webpage feature. The consent webpage radio buttons are followed by the authentication proxy input fields for a username and a password. (See the figure below.) The following consent scenarios are possible:
How to Configure Authentication Proxy Consent
Configuring an IP Admission Rule for Authentication Proxy ConsentUse this task to define the IP admission rule for authentication proxy consent and to associate the rule with an interface. DETAILED STEPS Troubleshooting TipsTo display authentication proxy consent page information on the router, you can use the debug ip admission consent command. Router# debug ip admission consent errors IP Admission Consent Errors debugging is on Router# debug ip admission consent events IP Admission Consent Events debugging is on Router# debug ip admission consent messages IP Admission Consent Messages debugging is on Router# Router# show debugging IP Admission Consent: IP Admission Consent Errors debugging is on IP Admission Consent Events debugging is on IP Admission Consent Messages debugging is on Defining a Parameter Map for Authentication Proxy Consent
SUMMARY STEPS
DETAILED STEPS Configuration Examples for Authentication Proxy Consent
Ingress Interface ACL and Intercept ACL Configuration ExampleThe following example shows how to define the ingress interface ACL (via the ip access-list extended 102 command) to which the consent page policy ACEs will be dynamically appended. This example also shows how to define an intercept ACL (via the ip access-list extended 103 command) to intercept the ingress interesting traffic by the IP admission consent rule. ip access-list extended 102 permit ip any 192.168.100.0 0.0.0.255 permit ip any host 192.168.104.136 permit udp any any eq bootps permit udp any any eq domain permit tcp any any eq www permit tcp any any eq 443 permit udp any any eq 443 exit ! ip access-list extended 103 permit ip any host 192.168.104.136 permit udp any host 192.168.104.132 eq domain permit tcp any host 192.168.104.136 eq www permit udp any host 192.168.104.136 eq 443 permit tcp any host 192.168.104.136 eq 443 exit ! Consent Page Policy Configuration ExampleThe following example shows how to configure the consent page policy ACL and the consent page identity policy: ip access-list extended consent-pg-ip-acc-group permit ip any host 192.168.104.128 permit ip any host 192.168.104.136 exit ! identity policy consent_identity_policy description ### Consent Page Identity Policy ### access-group consent-pg-ip-acc-group exit Parameter Map Configuration ExampleThe following example shows how to define the consent-specific parameter map "consent_parameter_map" and a default consent parameter map: parameter-map type consent consent_parameter_map copy tftp://192.168.104.136/consent_page.html flash:consent_page.html authorize accept identity consent_identity_policy timeout file download 35791 file flash:consent_page.html logging enabled exit ! parameter-map type consent default copy tftp://192.168.104.136/consent_page.html flash:consent_page.html authorize accept identity test_identity_policy timeout file download 35791 file flash:consent_page.html logging enabled exit ! IP Admission Consent Rule Configuration ExampleThe following example shows how to configure an IP admission consent rule, which includes the consent page parameter map as defined the in the Parameter Map Configuration Example section: ip admission name consent-rule consent inactivity-time 204 absolute-timer 304 param-map consent_parameter_map list 103 ip admission consent-banner file flash:consent_page.html ip admission consent-banner text ^C Consen-Page-Banner-Text ^C ip admission max-login-attempts 5 ip admission init-state-timer 15 ip admission auth-proxy-audit ip admission inactivity-timer 205 ip admission absolute-timer 305 ip admission ratelimit 100 ip http server ip http secure-server ! interface FastEthernet 0/0 description ### CLIENT-N/W ### ip address 192.168.100.170 255.255.255.0 ip access-group 102 in ip admission consent-rule no shut exit ! interface FastEthernet 0/1 description ### AAA-DHCP-AUDIT-SERVER-N/W ### ip address 192.168.104.170 255.255.255.0 no shut exit ! line con 0 exec-timeout 0 0 login authentication noAAA exit ! line vty 0 15 exec-timeout 0 0 login authentication noAAA exit ! Additional ReferencesThe following sections provide references related to the Consent Feature for Cisco IOS Routers feature. MIBsTechnical Assistance
Feature Information for Consent Feature for Cisco IOS RoutersThe following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. © 2012 Cisco Systems, Inc. All rights reserved.
|
|||||||||||||
|
|