This document now went live on cisco.com at the following URL:
Document ID: 113362
Thank you sooo much!
Could you explain me about Posture Compliance like this?
I agree with ToX1c1986 - I could use more examples like this one. It explains the flow of events.
Where can I find the complete Switch configuration? I tried the commands above, but it doesnt redirect the traffic.
please open a new discussion (i.e. post a question in the AAA forum) with your switch config and ISE screenshot. I'll be glad to check your setup and try to understand what is missing. This doc is meant to be basic config, so depending on the rest of your config, there might be a few traps.
Nicholas, you say that you attached the full switch config at the end of the document but I don't see it anywhere. Is it available for download? Thanks.
I forgot to attach it apparently :-) Thanks for the heads-up. I will redo the setup in my lab and will try to attach it in the coming days.
Thanks, I'd appreciate it.
There you go. I also added a note saying that "ip http server" and "ip http secure-server" were necessary.
i did the same configuration and everything is ok except that the guest web browser is not automatically redirected to the portal and when i manually copy the url from the switch port it works as expected , how can i force the guest browser to be redirected automatically ?
Great article ! Very interresting.
I got 2 questions regarding this configuration :
Of course you can return a vlan with the mac-not-known. It should be a vlan with restricted access just for the guests logically.
You can, after the 3rd authorziation (the dynamic authorization, the CoA) return another vlan that will depend on the username typed in the guest portal. that's the magic of CWA.
Distinguishing between a corporate user and a guest ? Theoretically your switchport should be configured to do 802.1x first, which will give the employees the proper attributes. Then if the PC does not do dot1x of fail it, then you fallback to mab and this scenario.
If your employees are supposed to go through the guest portal as well to login, then it's on the 3rd authorization that you can return their attributes, because you learned their username
Is it possible to change the redirect url. for example by default url is
where ip is replaced by PSN hostname and becomed
https://PSN.Domain.com:8443/guestportal/portals/PortalName/portal.jspI want to change it to LBhttps://lb-ise.domain.com:8443/guestportal/portals/PortalName/portal.jsp
It is automatic. ISE might display to you "ip:port" in the configuration GUI, but in reality what will be sent is the PSN hostname of the ISE node against which the client authenticated (this is mandatory, only PSN where auth occured can do webauth for the client).
Therfore load balancing is achieved only by load balancing radius authentication. Portal will automatically be balanced as well then.
My challenge is that I cannot get public certificate for the domain.local as it is not a valid domain. And we do have domain.com but we do not have AD in domain.com. Since I would need to join ISE to domain so it will not accept the certificate with anything apart from its actual fqdn.And customer has this requirement that his guests must not get certificate warning so using public cert is must. I cannot use AD for LDAP as it does not support the MSCHAPV2 in LDAP. so I would need to put PKI infra then only this setup will work it seems there seems no option but Local PKI and use LDAP and then I can have ISE in domian.com withoout integrating it with AD.
What is the problem with that ?
just configure ISE cli with "ip domain name domain.com". As long as it's a valid DNS domain it's fine. it doesn't require to be an AD domain, there's no link between the 2 at all
Thats great the. Can you please confirm if my understanding is correct.
1. I will assign ISE name as psn01
2. Use Ip domain name mydomain.com
3. Join ISE to my AD domain which is uk.group.local
And I can use public certificate from verisign with fqdn psn01.mydomain.com. and ISE will let me upload it.
I did the change but redirect url still shows with AD domain
I was it expecting to turn out to be like
After I chnaged ip domain name mycompany.com
your ISE still has a certificate issued to the old FQDN, this is why it's still returning the old name for CWA.
I suggest you open a discussion in the forum to discuss your issues rather than commenting on a document though.
Thank you. I have configured the central webauthentication sucessfully.
thanks for this document, i have got my CWA working with user layer 3 vlan configured on the access switch but when i turn the layer 3 user vlan off CWA doesnt work. would you please let me know if there is any particular setting i need to know.
i have also checked my firewall and all is allowed in firewall.