Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Configuration example : central web-authentication with a switch and Identity Service Engine

This document now went live on at the following URL:

Document ID: 113362

Version history
Revision #:
1 of 1
Last update:
‎09-05-2011 06:34 AM
Updated by:
Labels (1)
New Member

Thank you sooo much!

Could you explain me about Posture Compliance like this?

New Member

I agree with ToX1c1986 - I could use more examples like this one. It explains the flow of events.

New Member

Where can I find the complete Switch configuration? I tried the commands above, but it doesnt redirect the traffic.

Cisco Employee

Hi Fabien,

please open a new discussion (i.e. post a question in the AAA forum) with your switch config and ISE screenshot. I'll be glad to check your setup and try to understand what is missing. This doc is meant to be basic config, so depending on the rest of your config, there might be a few traps.

New Member

Nicholas, you say that you attached the full switch config at the end of the document but I don't see it anywhere.  Is it available for download?  Thanks.

Cisco Employee

I forgot to attach it apparently :-) Thanks for the heads-up. I will redo the setup in my lab and will try to attach it in the coming days.

New Member

Thanks, I'd appreciate it.

Cisco Employee

There you go. I also added a note saying that "ip http server" and "ip http secure-server" were necessary.

New Member

i did the same configuration and everything is ok except that the guest web browser is not automatically redirected to the portal and when i manually copy the url from the switch port it works as expected , how can i force the guest browser to be redirected automatically ?

New Member

Great article ! Very interresting.

I got 2 questions regarding this configuration :

  • Is it possible to return a dynamic VLAN (a restricted temporary VLAN) with the redirect address in the "mac not known" ?
  • With this method I am not able to distinguish between corporate user (AD auth) and Guest (internal). I might create a new authorization rule "is-a-CORPORATE" but in the 2nd AUTH (which define de VLAN) I can't make a difference between the 2. Any idea how to distinguish CORPORATE login from GUEST with CWA and apply a specific VLAN ?
Cisco Employee

Of course you can return a vlan with the mac-not-known. It should be a vlan with restricted access just for the guests logically.

You can, after the 3rd authorziation (the dynamic authorization, the CoA) return another vlan that will depend on the username typed in the guest portal. that's the magic of CWA.

Distinguishing between a corporate user and a guest ? Theoretically your switchport should be configured to do 802.1x first, which will give the employees the proper attributes. Then if the PC does not do dot1x of fail it, then you fallback to mab and this scenario.

If your employees are supposed to go through the guest portal as well to login, then it's on the 3rd authorization that you can return their attributes, because you learned their username

New Member

Hi Nicholas,

Is it possible to change the redirect url. for example by default url is


where ip is replaced by PSN hostname and becomed

I want to change it to LB

Cisco Employee

It is automatic. ISE might display to you "ip:port" in the configuration GUI, but in reality what will be sent is the PSN hostname of the ISE node against which the client authenticated (this is mandatory, only PSN where auth occured can do webauth for the client).

Therfore load balancing is achieved only by load balancing radius authentication. Portal will automatically be balanced as well then.

New Member

My challenge is that I cannot get public certificate for the domain.local as it is not a valid domain. And we do have but we do not have AD in Since I would need to join ISE to domain so it will not accept the certificate with anything apart from its actual fqdn.And customer has this requirement that his guests must not get certificate warning so using public cert is must. I cannot use AD for LDAP as it does not support the MSCHAPV2 in LDAP. so I would need to put PKI infra then only this setup will work it seems there seems no option but Local PKI and use LDAP and then I can have ISE in withoout integrating it with AD.

Cisco Employee

What is the problem with that ?

just configure ISE cli with "ip domain name". As long as it's a valid DNS domain it's fine. it doesn't require to be an AD domain, there's no link between the 2 at all

New Member

Thats great the. Can you please confirm if my understanding is correct.

1. I will assign ISE name as psn01

2. Use Ip domain name

3. Join ISE to my AD domain which is

And I can use public certificate from verisign with fqdn and ISE will let me upload it.

New Member


I did the change but redirect url still shows with AD domain


I was it expecting to turn out to be like

After I chnaged ip domain name

Any Clues.

Cisco Employee

your ISE still has a certificate issued to the old FQDN, this is why it's still returning the old name for CWA.

I suggest you open a discussion in the forum to discuss your issues rather than commenting on a document though.

New Member

Thank you. I have configured the central webauthentication sucessfully.



New Member

Hi Nicolas,

thanks for this document, i have got my CWA working with user layer 3 vlan configured on the access switch but when i turn the layer 3 user vlan off  CWA doesnt work. would you please let me know if there is any particular setting i need to know.

i have also checked my firewall and all is allowed in firewall.