ToX1c1986 Mon, 11/28/2011 - 00:58
User Badges:

Thank you sooo much!

Could you explain me about Posture Compliance like this?

RRBLEEKER_2 Tue, 11/29/2011 - 09:44
User Badges:

I agree with ToX1c1986 - I could use more examples like this one. It explains the flow of events.

fabianbeck Wed, 03/14/2012 - 13:09
User Badges:

Where can I find the complete Switch configuration? I tried the commands above, but it doesnt redirect the traffic.

Nicolas Darchis Thu, 03/15/2012 - 00:21
User Badges:
  • Cisco Employee,

Hi Fabien,

please open a new discussion (i.e. post a question in the AAA forum) with your switch config and ISE screenshot. I'll be glad to check your setup and try to understand what is missing. This doc is meant to be basic config, so depending on the rest of your config, there might be a few traps.

Joshua Robertson Mon, 04/02/2012 - 14:04
User Badges:

Nicholas, you say that you attached the full switch config at the end of the document but I don't see it anywhere.  Is it available for download?  Thanks.

Nicolas Darchis Tue, 04/03/2012 - 00:28
User Badges:
  • Cisco Employee,

I forgot to attach it apparently :-) Thanks for the heads-up. I will redo the setup in my lab and will try to attach it in the coming days.

Nicolas Darchis Wed, 04/04/2012 - 03:00
User Badges:
  • Cisco Employee,

There you go. I also added a note saying that "ip http server" and "ip http secure-server" were necessary.

eng.malak Mon, 10/01/2012 - 06:44
User Badges:

i did the same configuration and everything is ok except that the guest web browser is not automatically redirected to the portal and when i manually copy the url from the switch port it works as expected , how can i force the guest browser to be redirected automatically ?

maxime.gerges Tue, 12/11/2012 - 14:03
User Badges:

Great article ! Very interresting.

I got 2 questions regarding this configuration :

  • Is it possible to return a dynamic VLAN (a restricted temporary VLAN) with the redirect address in the "mac not known" ?
  • With this method I am not able to distinguish between corporate user (AD auth) and Guest (internal). I might create a new authorization rule "is-a-CORPORATE" but in the 2nd AUTH (which define de VLAN) I can't make a difference between the 2. Any idea how to distinguish CORPORATE login from GUEST with CWA and apply a specific VLAN ?
Nicolas Darchis Tue, 12/11/2012 - 23:17
User Badges:
  • Cisco Employee,

Of course you can return a vlan with the mac-not-known. It should be a vlan with restricted access just for the guests logically.

You can, after the 3rd authorziation (the dynamic authorization, the CoA) return another vlan that will depend on the username typed in the guest portal. that's the magic of CWA.

Distinguishing between a corporate user and a guest ? Theoretically your switchport should be configured to do 802.1x first, which will give the employees the proper attributes. Then if the PC does not do dot1x of fail it, then you fallback to mab and this scenario.

If your employees are supposed to go through the guest portal as well to login, then it's on the 3rd authorization that you can return their attributes, because you learned their username

aijazbeigh Thu, 05/02/2013 - 11:22
User Badges:

Hi Nicholas,

Is it possible to change the redirect url. for example by default url is


where ip is replaced by PSN hostname and becomed

I want to change it to LB

Nicolas Darchis Thu, 05/02/2013 - 12:02
User Badges:
  • Cisco Employee,

It is automatic. ISE might display to you "ip:port" in the configuration GUI, but in reality what will be sent is the PSN hostname of the ISE node against which the client authenticated (this is mandatory, only PSN where auth occured can do webauth for the client).

Therfore load balancing is achieved only by load balancing radius authentication. Portal will automatically be balanced as well then.

aijazbeigh Thu, 05/02/2013 - 12:11
User Badges:

My challenge is that I cannot get public certificate for the domain.local as it is not a valid domain. And we do have but we do not have AD in Since I would need to join ISE to domain so it will not accept the certificate with anything apart from its actual fqdn.And customer has this requirement that his guests must not get certificate warning so using public cert is must. I cannot use AD for LDAP as it does not support the MSCHAPV2 in LDAP. so I would need to put PKI infra then only this setup will work it seems there seems no option but Local PKI and use LDAP and then I can have ISE in withoout integrating it with AD.

Nicolas Darchis Thu, 05/02/2013 - 12:28
User Badges:
  • Cisco Employee,

What is the problem with that ?

just configure ISE cli with "ip domain name". As long as it's a valid DNS domain it's fine. it doesn't require to be an AD domain, there's no link between the 2 at all

aijazbeigh Thu, 05/02/2013 - 12:39
User Badges:

Thats great the. Can you please confirm if my understanding is correct.

1. I will assign ISE name as psn01

2. Use Ip domain name

3. Join ISE to my AD domain which is

And I can use public certificate from verisign with fqdn and ISE will let me upload it.

Nicolas Darchis Thu, 05/02/2013 - 13:33
User Badges:
  • Cisco Employee,

your ISE still has a certificate issued to the old FQDN, this is why it's still returning the old name for CWA.

I suggest you open a discussion in the forum to discuss your issues rather than commenting on a document though.

Hi Nicolas,

thanks for this document, i have got my CWA working with user layer 3 vlan configured on the access switch but when i turn the layer 3 user vlan off  CWA doesnt work. would you please let me know if there is any particular setting i need to know.

i have also checked my firewall and all is allowed in firewall.




This Document

Related Content