ISE Version 1.3 Hotspot Configuration Example

Similar documents
ISE Version 1.3 Self Registered Guest Portal Configuration Example

Identity Services Engine Guest Portal Local Web Authentication Configuration Example

Central Web Authentication on the WLC and ISE Configuration Example

Verify Radius Server Connectivity with Test AAA Radius Command

Configure Easy Wireless Setup ISE 2.2

Configure Guest Flow with ISE 2.0 and Aruba WLC

P ART 3. Configuring the Infrastructure

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

ISE Express Installation Guide. Secure Access How -To Guides Series

Posture Services on the Cisco ISE Configuration Guide Contents

Cisco TrustSec How-To Guide: Central Web Authentication

ISE with Static Redirect for Isolated Guest Networks Configuration Example

Support Device Access

Integrating Meraki Networks with

What Is Wireless Setup

Converged Access Wireless Controller (5760/3850/3650) BYOD client Onboarding with FQDN ACLs

Configuring Client Profiling

Universal Wireless Controller Configuration for Cisco Identity Services Engine. Secure Access How-To Guide Series

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

Web Authentication Proxy Configuration Example

Configuring NAC Out-of-Band Integration

DumpsFree. DumpsFree provide high-quality Dumps VCE & dumps demo free download

Configure Maximum Concurrent User Sessions on ISE 2.2

Configure Flexconnect ACL's on WLC

Cisco S802dot1X - Introduction to 802.1X(R) Operations for Cisco Security Professionals.

CMX Connected Experiences- Social, SMS and Custom Portal Registration Configuration Example

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers

Guest Access User Interface Reference

Create Custom Guest Success Pages by Active Directory Group with Cisco Identity Services Engine 1.2

Deploying Cisco ISE for Guest Network Access

Manage Authorization Policies and Profiles

Configure to Secure a Flexconnect AP Switchport with Dot1x

ForeScout CounterACT. Configuration Guide. Version 4.3

Configure Client Posture Policies

Configuring Client Posture Policies

Configure Guest Access

Configure MAC authentication SSID on Cisco Catalyst 9800 Wireless Controllers

Network Deployments in Cisco ISE

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

Configure Guest Access

Forescout. Configuration Guide. Version 4.4

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

Network Deployments in Cisco ISE

IEEE 802.1X Open Authentication

Wireless BYOD with Identity Services Engine

Manage Authorization Policies and Profiles

Guest Management. Overview CHAPTER

Support Device Access

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

Troubleshooting Web Authentication on a Wireless LAN Controller (WLC)

Configuring MAC Authentication Bypass

Contents. Introduction. Prerequisites. Requirements. Components Used

IEEE 802.1X with ACL Assignments

RADIUS Change of Authorization

Network Admission Control Agentless Host Support

Securing Cisco Wireless Enterprise Networks ( )

CounterACT 802.1X Plugin

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Configure Client Posture Policies

Configure Guest Access

Configure Guest Access

Identity Based Network Access

RADIUS Change of Authorization Support

LAB: Configuring LEAP. Learning Objectives

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features

TrustSec Configuration Guides. TrustSec Capabilities on Wireless 8.4 Software-Defined Segmentation through SGACL Enforcement on Wireless Access Points

IEEE 802.1X Multiple Authentication

FortiNAC. HiPath. Enterasys. Siemens. Extreme. Wireless Integration. Version: 8.x. Date: 8/28/2018. Rev: B

MS Switch Access Policies (802.1X) Host Modes

Configuring Network Admission Control

Integration of FireSIGHT System with ISE for RADIUS User Authentication

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Wireless LAN Controller Web Authentication Configuration Example

Configuring RADIUS Clients

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

Monitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series

CMX Dashboard Visitor Connect

BYOD: Management and Control for the Use and Provisioning of Mobile Devices

2012 Cisco and/or its affiliates. All rights reserved. 1

Configuring Web-Based Authentication

ForeScout CounterACT. Configuration Guide. Version 1.8

Cisco WLC. (For Version ) CoA Setup Guide

ONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013

For Sales Kathy Hall

Understand and Troubleshoot Central Web- Authentication (CWA) in Guest Anchor Set- Up

Design Your Network. Design A New Network Infrastructure. Procedure

Securing Wireless LAN Controllers (WLCs)

Cisco TrustSec How-To Guide: Monitor Mode

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

CounterACT Wireless Plugin

Symbols. Numerics I N D E X

How to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00

Introducing Cisco Identity Services Engine for System Engineer Exam

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5

Configuring Network Admission Control

Configuring Web-Based Authentication

Policy User Interface Reference

Transcription:

ISE Version 1.3 Hotspot Configuration Example Document ID: 118741 Contributed by Michal Garcarz and Nicolas Darchis, Cisco TAC Engineers. Feb 11, 2015 Contents Introduction Prerequisites Requirements Components Used Topology and Flow Configure WLC ISE Verify Additional Posture Troubleshoot Related Information Introduction Cisco Identity Services Engine (ISE) Version 1.3 has a new type of Guest Portal called Hotspot. This type of portal allows you to provide guest access to the network and does not force the user to provide any credentials. This document describes how to configure and troubleshoot this functionality. Prerequisites Requirements Cisco recommends that you have experience with ISE configuration and basic knowledge of these topics: ISE deployments and Guest flows Configuration of Wireless LAN Controllers (WLCs) Components Used The information in this document is based on these software and hardware versions: Microsoft Windows 7 Cisco WLC Version 7.6 and Later ISE Software, Version 1.3 and Later Topology and Flow

This scenario is for guest users who accept the Acceptable Use Policy (AUP) and only then be given access to the Internet (or any other limited access). Step 1. Guest user associates to Service Set Identifier (SSID): Hotspot. This is an open network with MAC filtering with ISE for authentication. This authentication matches the second authorization rule on the ISE and the authorization profile redirects to Hotspot. ISE returns a RADIUS Access Accept with two cisco av pairs: url redirect acl (which traffic should be redirected, and the name of Access Control List (ACL) defined locally on the WLC) url redirect (where to redirect that traffic to ISE) Step 2. A guest user is redirected to the ISE, accepts the AUP, and optionally provides a secret access code. Step 3. ISE sends a RADIUS Change of Authorization (CoA) Admin Reset to the WLC. The WLC re authenticates the user when it sends the RADIUS Access Request. ISE responds with the Access Accept and Airespace ACL defined locally on the WLC, which provides access to the Internet only. Note: The CoA Admin Reset is specific for Hotspot functionality and described in Cisco bug ID CSCus46754. The behavior for ISE Version 1.2 with a guest portal was different; a CoA Re authenticate or Terminate was sent. Step 4. A guest user desires access to the network. The network administrator is certain that the user has accepted the AUP. The guest user can be redirected to the original URL, a statically configured URL, or a success page. All pages displayed by ISE can be customized. Integration with an optional posture check is presented in the last section. Configure WLC 1. Add the new RADIUS server for Authentication and Accounting. Navigate to Security > AAA > Radius > Authentication in order to enable RADIUS CoA (RFC 3576).

There is a similar configuration for Accounting. It is also advised to configure the WLC to send SSID in the Called Station ID attribute, which allows the ISE to configure flexible rules based on SSID: 2. Under the WLANs tab, create the Wireless LAN (WLAN) Hotspot and configure the Correct Interface. Set Layer2 security to None with MAC filtering. In Security/Authentication, Authorization, and Accounting (AAA) Servers, select the ISE IP address for both Authentication and Accounting (Accounting is optional). On the Advanced tab, enable AAA Override and set the Network Admission Control (NAC) State to RADIUS NAC (CoA support). 3. Navigate to Security > Access Control Lists > Access Control Lists and create two access lists: HotspotRedirect, which permits traffic that should not be redirected and redirects all other traffic Internet, which is denied for corporate networks and permitted for all others Here is an example of HotspotRedirect ACL (need to exclude traffic to/from ISE from redirection):

ISE 1. Navigate to Guest Access > Configure > Guest Portals, and create a new portal type, Hotspot Guest Portal: 2. Choose the portal name that will be referenced in the authorization profile. In order to customize the portal from Portal Behavior and Flow Settings, enable AUP, and a secret code (optional):

3. Several more options can be enabled under Portal Page Customization; all pages presented can be customized. Navigate to Policy > Results > Authorization > Authorization Profile in order to configure Authorization profiles. HotSpot (with redirection to Hotspot portal name and ACL HotspotRedirect): Internet (with Airespace ACL equals Internet): 4. In order to verify the authorization rules, navigate to Policy > Authorization. In ISE Version 1.3 by default for failed MAC Authentication Bypass (MAB) access (MAC address not found),

authentication is continued (not rejected). This is very useful for Guest Portals because there is no need to change anything in the default authentication rules. For the first MAB authentication, the second rule is matched (endpoint is not yet in any identity group). Then the user is redirected to a webportal (hotspot), accepts the AUP, and optionally types the correct secret access code. ISE sends a RADIUS CoA and the WLC performs re authentication. For the second authentication, the first rule is matched along with authorization profile PermitInternet and returns the ACL name that is applied on the WLC (this time, the endpoint is already in the GuestEndpoints group). By default, guests who accept the AUP are put into the GuestEndpoints identity group. The identity group that is assigned for those endpoints is configured under guest portal configuration, which can be different for every portal. 5. Add the WLC as a Network Access Device from Administration > Network Resources > Network Devices. Verify Use this section in order to confirm that your configuration works properly. 1. After guest users associate with the SSID Hotspot and type a URL, they are redirected to the AUP:

2. If the access code was configured under the guest portal, then it is required. If the user provides an incorrect code, an error displays: 3. Here is the screen that displays if the correct code is entered:

4. Once the correct code is entered, the WLC performs re authentication and presents Internet ACL attached to the session. Additional Posture If there is a need to provide access to guest users, but only when they satisfy a specific policy (Posture) such as fresh Anti Virus updates and Microsoft Windows updates, then it can be accomplished with these rules:

HotSpot rule will not provide access to the Internet, but instead performs redirection to a posture service. Then the Web Agent can be pushed to the station (Client Provisioning rules) and perform policy checks (Posture rules). Report compliance is sent by the Web Agent to ISE. After the station is compliant, ISE sends another CoA reauthenticate, which triggers an authorization update on the WLC. Then the HotSpot_Compliant rule is encountered and access to the Internet is provided. Posture configuration with NAC or Web Agent is very similar as in ISE Version 1.2 and is out of scope for this document (see the Related Information section for more information). Troubleshoot This section provides information you can use in order to troubleshoot your configuration. ISE should present: Here is the flow: Guest user encounters the second authorization rule and is redirected to Hotspot ("Authentication succeeded"). After user accepts the AUP, ISE sends the CoA Admin Reset, which is confirmed by the WLC ("Dynamic Authorization succeeded"). The WLC performs re authentication, and the ACL name is returned ("Authorize Only succeeded"). This can be also verified if you navigate to Operations > Reports > ISE Reports > Guest Access Reports > AUP Acceptance Status:

Related Information Posture services on Cisco ISE Configuration Guide Cisco ISE 1.3 Administrators Guide Central Web Authentication on the WLC and ISE Configuration Example Central Web Authentication with FlexConnect APs on a WLC with ISE Configuration Example Technical Support & Documentation Cisco Systems Updated: Feb 11, 2015 Document ID: 118741