Brkewn 2016 2
Brkewn 2016 2
Brkewn 2016 2
BRKEWN-2016
Housekeeping
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Agenda
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Guest Access Overview
Evolution to a Supplementary User Authentication
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Borderless Network Context
Remote
Site
Unknown or Guest
Si WAN
Employees
Wireless LAN
Several Access
Contractors Methods, Numerous
Profiles
Consultant Corporate LAN Si
Enterprise
Network
DMZ
Public
Internet
Business
Partners
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Guest Access Components
Employee
Employee
(bad credential)
802.1X
Guest
WiFi AP
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Wireless Guest Access Control
and Path Isolation
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Guest Access Control
Cisco WLAN Controller Deployments
WiSM WLAN Controller
LWAPP/CAPWAP tunnel is a Layer 2 tunnel
(encapsulates original Ethernet frame) Wireless
VLANs
Same LWAPP/CAPWAP tunnel used for
data traffic of different SSIDs
Control and data traffic tunneled
to the controller via CAPWAP:
data uses UDP 5247 Campus
control uses UDP 5246 LWAPP/CAPWAP
Core LWAPP/CAPWAP
Data traffic bridged by WLAN controller
on a unique VLAN corresponding to
each SSID
Traffic isolation provided by VLANs is
valid up to the switch where the controller
is connected
Guest Guest
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Guest Path Isolation
Firewall Ports and Protocols
Open ports in both directions for:
EoIP packets IP protocol 97 Must
Mobility UDP Port 16666 (non-secured) or 16667 (secured IPSec tunnel) be Open!
Inter-Controller CAPWAP (rel 5.0, 6.0, 7.0) Data/Control Traffic UDP 5247/5246
Do NOT
Inter-Controller LWAPP (before rel 5.0 ) Data/Control Traffic UDP 12222/12223 Open!
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Guest Path Isolation Using VRF
Campus Virtualization
Virtual Routing/Forwarding (VRF) is the L3
virtualization used in Enterprise Campus networks
Guest isolation is done by dedicated VRF instances
Guest VRF
Employee VRF
Global
Logical or Logical or
Physical Int Physical Int
(Layer 3) (Layer 3)
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Guest Path Isolation Using VRF
WLC and VRF Virtualization
Guest Provisioning
Internet
Cisco ASA
at access layer Corporate
Inside Firewall
Intranet
L2 path isolation
Guest DMZ
Guest VRF
between WLC and
default gateway Isolated L2 VLAN L3 Switches with VRF
Guest VRF
Employee VRF
Wireless Guest
Global
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Wired Guest Access Control
and Path Isolation
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Wired Guest Access
802.1x @
Guest VLAN Failover WLC Wired
Guest Access
Open (guest) VLAN
L2 Path Isolation
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Wired (Guest) Access Basic Operation
DHCP/DNS AAA Server
•Multiple Triggers Switch
•Single Port Config
•Mostly Flex-auth
•802.1X Timeout
1 •802.1X Failure
•MAB Failure
•Access VLAN only
Port Enabled, •Pre-Auth ACL must permit DHCP, DNS
2
Pre-Auth ACL Applied •ACL applies to port -> phones must use MDA
Corporate
Access Layer
Wired Guest
Guest VRF
Employee VRF
Global
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
WLC Wired Guest Access
Wired Guest Access by Wireless LAN Controllers
Internet
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
WLC Wired Guest Access
Deployment Requirements
Five guest LANs for wired guest access are supported
Admin can create wired guest VLANs on the WLC and
associate it with the guest LAN
Web-auth is the default security on a wired guest LAN, but
open and web pass-thru can also be used
No L2 security like 802.1x is supported
Multicast and broadcast traffic are dropped
on wired guest VLANs to reduce the load on the overall
network
Wired guest access is supported on a single guest WLC or on
a Anchor-Foreign Guest WLC scenario
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Architecture Summary
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Guest Services Portal
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Guest Authentication Portal
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Wireless Guest Authentication Portal
Internal Web Portal
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Wired Guest Authentication Portal
Catalyst Switches Internal Web Portal
Welcome Text
Fixed Text
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Wired Guest Authentication Portal
Catalyst Switches Customizable Web Portal
Completely Customizable
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Centralized Wireless
and Wired Guest Portal
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Wireless Guest
Centralized Login Page
1) Administrator Creates WLAN
Login Page on NGS
2) Wireless Guest Opens Web
browser
3) Web traffic is intercepted by
Wireless LAN Controller and
redirected to Guest Server.
4) Guest Server returns centralized
login page
(3) (1)
(2)
Redirect
AP
WLC (4) NGS
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Wired Guest
Looks Exactly the Same As Wireless
1) Administrator Creates Wired Login
Page on NGS
2) Wired guest opens Web browser
3) Web traffic is intercepted by switch
and redirected to Guest Server.
4) Guest Server returns centralized
login page
(3) (1)
(2)
Redirect
(4)
Switch
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Authentication and Authorization
Still Local
1) Administrator Creates Wired Login Page on NGS
2) Wired guest opens Web browser
3) Web traffic is intercepted by switch and redirected to Guest Server.
4) Guest Server returns centralized login page
5) Guest submits credentials to switch
6) Switch authenticates credentials & controls access
(1)
(2)
(3)
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Guest Services Provisioning
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Requirements for Guest Provisioning
Provisioning strategies :
Lobby ambassador
Employees
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Multiple Guest Provisioning Services
Advanced Provisioning
Cisco
Wireless LAN Control Customer
Development
Basic Provisioning
Additional Cisco
Product
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Guest Provisioning Service : WLC
Cisco Wireless LAN Controller
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Guest Provisioning Service : WCS
Cisco Wireless Control System
WCS offer specific Lobby Ambassador
access for Guest management only
Lobby Ambassador accounts can be created directly
on WCS, or be defined on external
RADIUS/TACACS+ servers
Lobby Ambassadors on WCS are able to create
guest accounts with advanced features like:
Start/end time and date, duration
Bulk provisioning
Set QoS Profiles
Set access based on WLC, Access Points, or location
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Guest Provisioning Service
Add a Guest User with WCS
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Guest Provisioning Service
Print/E-Mail Details of Guest User
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Guest Provisioning Service
Schedule a Guest User
Configure Controller Template > Schedule Guest User
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Guest Provisioning Service : NGS
Cisco NAC Guest Server
Dedicated external server
Complete provisioning, accounting, reporting,
and billing services
Advanced feature full sponsor and guest
user policies
Large guest account base using RADIUS
Easy integration with clean access and WLC
Email and SMS notifications
Sponsor authentication through local database,
LDAP or active directory
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Cisco NAC Guest Server
IT Admin
NGS Configuration Network/Solution Mgt
Lobby Ambassador
Employee Sponsor
Guest
Visitor, Contractor, Customer
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Cisco NAC Guest Server
Admin Interface
Admin portal is required to configure the device
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Cisco NAC Guest Server
Sponsor Authentication: Local Account/AD
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Cisco NAC Guest Server
Guest Policy: Username/Password Policy
Username Policy Password Policy
1. E-mail address 1. Alphabetic characters
2. First and last name 2. Numeric characters
3. Alphabetic, numeric 3. Special characters
and special characters
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Cisco NAC Guest Server
WLC Integration: Guest Server Configuration
Add the WLC that performs WebAuth as a RADIUS Client in the NGS
NGS uses standard RADIUS Attribute 27 (session-timeout)
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Cisco NAC Guest Server
Informing Guest
Sponsor will have three ways to inform guest
1. Printing the details
2. Sending the details via e-mail
3. Sending the details via SMS
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Cisco NAC Guest Server
Sponsor Portal: Create and Print Guest Access Credentials
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Cisco NAC Guest Server Lobby Ambassador
Guest User Creation Employee Sponsor
Guest
Visitor, Contractor, Customer
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Cisco NAC Guest Server
Lobby Ambassador—Guest Account Creation
Personal Settings
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Reporting and Monitoring
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Cisco NAC Guest Server
Sponsor Portal: Guest Reports and Logs
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Aggregation of Guest Informations
Intranet
Destination IP@/ports, policy-map global_policy
class inspection_default
inspect http
URL logging, … !
service-policy global_policy global
logging enable
logging timestamp
logging list WebLogging message 304001
logging trap WebLogging
Wireless Guest logging facility 21
logging host inside 192.168.215.16
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Guest Activity Reporting
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Summary
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
From Wireless Guest Access …
Sponsored
Guest
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
… to Unified Wired and Wireless
Guest Access …
Sponsored NGS
Guest Guest Server
Parity for
Guest
Wired / WLAN
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
… to Centralized Policy and Accounting
802.1X/MAB
Employee SSC Compatibility
Employee
Sponsored Centralized Policy
Guest Active Directory
& Accounting
Employee RADIUS
Proxy
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
What We Have Covered…
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Recommended Reading
BRKEWN-2016
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Complete Your Online
Session Evaluation
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Enter to Win a 12-Book Library
of Your Choice from Cisco Press
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Additional Slides
Evolution to a Supplementary User Authentication
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Challenge in Building an Access Policy
in a Borderless Network
Access Policy
Who is on my network? Can I allow guests How do I discover
Internet-only access? non-user devices?
Can I manage the risk
of using personal PCs? How do I manage Can I determine what
guest access? they are?
Common access rights
when on-prem, at Can this work in Can I control their
home, on the road? wireless and wired? access?
Endpoints are healthy? How do I monitor Are they being
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All guest activities?
rights reserved. Cisco Public spoofed? 65
Why Web Authentication for Guest?
User-based
Familiar
Ubiquitous
Clientless
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Additional Slides
LWAPP/CAPWAP Controller Configurations
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Guest Access Control
WLAN Controller Deployments
Cisco Catalyst Switch
Access Layer Switch (Connected to WLAN Controller)
vlan 3
vlan 2
name Employee_VLAN
name AP_Mgmt
!
!
vlan 4
interface FastEthernet0/1
name Guest_VLAN
description link to AP
!
switchport access vlan 2
interface Vlan3
switchport mode access
description Employee_VLAN
ip address 10.10.3.1 255.255.255.0
!
No Trunk Between AP and interface Vlan4
description Guest_VLAN
Access Layer Switch, Only ip address 10.10.4.1 255.255.255.0
AP Mgmt VLAN Defined !
interface GigabitEthernet1/0/1
description Trunk Port to Cisco WLC
switchport trunk encapsulation dot1q
switchport trunk native vlan 2
SVIs Corresponding to switchport trunk allowed vlan 2-4
Each SSID Are switchport mode trunk
Defined Here no shutdown
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Guest Access Control
WLAN Controller Deployments
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Guest Access Control
WLAN Controller Deployments
Map the employee/guest WLAN in the controller
to the respective employee/guest VLAN
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Additional Slides
Building the EoIP Tunnel
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Guest Path Isolation
Building the EoIP Tunnel
Specify a mobility group for each WLC
Open ports for:
Inter-Controller Tunneled Client Data
Inter-Controller Control Traffic
Configure the mobility groups and add the MAC-address
and IP address of the remote WLC
Create identical WLANs on the Remote and Anchor controllers
Create the Mobility Anchor for the Guest WLAN
Modify the timers in the WLCs
Check the status of the Mobility Anchors for the WLAN
Pros Cons
Simple configuration Support for wireless and wired (layer-
2 adjacent) guest clients only
Overlay solution: no need to
Limited to WLAN Controllers wireless
modify the network configuration deployments
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Remote Controller Configuration
Each WLC is part of a mobility group
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Anchor and Remote Controller Configuration
Configure the mobility groups and add the MAC-address
and IP address of the remote WLCs
Anchor
Remote
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Remote Controller Configuration
Create the mobility anchor for the guest WLAN on Remote WLCs
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Anchor Controller Configuration
Create the Mobility Anchor for the guest WLAN on Anchor WLC
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Anchor Controller
Modify the timers on the Anchor WLCs
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Guest Network Redundancy
A1 A2
Internet
Using EoIP Pings (data path) Management
10.10.75.2
Management
10.10.76.2
functionality Anchor WLC reachability
will be determined
Foreign WLC will send pings at
configurable intervals to see if Anchor
WLC is alive EtherIP EtherIP
“Guest “Guest
Once an Anchor WLC failure is Tunnel” Tunnel”
detected a DEAUTH is send to Campus
the client Core
Remote WLC will keep on monitoring
the Anchor WLC Secure Secure
Under normal conditions round-robin F1
fashion is used to balance clients
between Anchor WLCs
Guest VLAN 10.10.60.x/24
CAPWAP Management 10.10.80.3 CAPWAP
Wireless
VLANs
Primary Link
Redundant Link
Guest Secure Guest Secure
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Path Isolation
Sample Firewall Configuration
interface Ethernet0/1
nameif inside
security-level 100
interface Ethernet0/2
nameif dmz
security-level 50
access-list DMZ extended permit udp host 10.50.10.26 host 10.70.0.2 eq 16666
access-list DMZ extended permit udp host 10.50.10.26 host 10.70.0.2 eq 16667
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Show Commands
Show Mobility Summary
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Show Commands
Show Mobility Anchor
Show Mobility Statistics
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Show Commands—Remote and
Anchor WLC
Show client detail mac_address
Remote
(Cisco Controller) >show client detail 00:40:96:ad:0d:1b
Anchor
(Cisco Controller) >show client detail 00:40:96:ad:0d:1b
Client MAC Address............................... 00:40:96:ad:0d:1b
Client MAC Address............................... 00:40:96:ad:0d:1b
Client Username ................................. N/A
Client Username ................................. guest1
AP MAC Address................................... 00:14:1b:59:3f:10 AP MAC Address................................... 00:00:00:00:00:00
Client State..................................... Associated Client State..................................... Associated
Channel.......................................... N/A
Channel.......................................... 64
IP Address....................................... 10.50.10.128
IP Address....................................... Unknown
Association Id................................... 0
Association Id................................... 1
Interface........................................ guest
Policy Type...................................... N/A
VLAN............................................. 4
BRKEWN-2016_c1
Encryption Cipher................................ None © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Additional Slides
WLC Wired Guest Configuration
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
WLC Wired Guest Access
Deployment Steps
Create a dynamic interface as guest LAN
which will be the ingress interface
DHCP server information is not required
DHCP server information is required on the egress dynamic interface
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
WLC Wired Guest Access Configuration
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
WLC Wired Guest Access Configuration
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
WLC Wireless and Wired Guest
Configuration
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Additional Slides
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Wireless Guest Authentication Portal
Configuring Customized WebAuth with WCS
Internet
WCS
Guest
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Wireless Guest Authentication Portal
Design with Anchor WLC
Internet
WCS
Upload the customized web page to the Anchor WLC Guest
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Additional Slides
Configuring External Web Portal
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Wireless Guest Authentication Portal
External Web Server with WLC
Eternal Internet
Web Server WLC
Guest
Campus
Core
Emp Emp
CAWAP CAPWAP
Wireless
VLANs
Guest Emp Guest Emp
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Customized Wired Pages
Design Considerations: No Redirect CLI
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Customized Wired Pages
Switch Config
ip device tracking
ip admission name IP_ADMIN_RULE proxy http
ip admission proxy http login page file disk1:login.htm
Make sure to update the
ip admission proxy http success page file disk1:success.htm “Magic” Login Page with NGS
ip admission proxy http fail page file disk1:fail.htm IP address and hotspot name
ip admission proxy http login expired page file disk1:expired.htm
!
fallback profile WEB_AUTH_PROFILE
ip access-group PRE_WEBAUTH_POLICY in
ip admission IP_ADMIN_RULE
!
dot1x system-auth-control ip access-list extended PRE_WEBAUTH_POLICY
! permit udp any any eq bootps
interface Gigabit 1/0/5 permit udp any any eq domain
switchport mode access permit tcp any host 10.100.10.227 eq 8443
switchport access vlan 30
authentication port-control auto
authentication fallback WEB_AUTH_PROFILE Permit Traffic to NGS
authentication event fail action next-method
dot1x pae-authenticator
dot1x tx-period 5
!
ip http server
ip http secure-server
Everything else is standard Web-Auth
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Additional Slides
WCS Lobby Ambassador Configuration
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Guest Provisioning Service
Lobby Ambassador Feature in WCS
User created in WCS with Lobby Ambassador (LA) privilege
Lobby Ambassador user logs into
the WCS to create guest user accounts
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Guest Provisioning Service
Lobby Ambassador Feature in WCS
Associate the lobby admin with Profile and Location specific
information
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Guest Provisioning Service
Details About the Guest User(s)
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
WCS Provisioning Service Lobby Ambassador
Employee Sponsor
Using Internal DB and Reporting Capabilities
1
1. Lobby Ambassador create Guest WCS
Account with policies Lobby Ambassador Portal
Guest Account Database
2. Guest Account credentials Monitoring & reporting`
Guest
Visitor, Contractor, Customer
BRKEWN-2016_c1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 100