BRKEWN-2013 Deploying Wireless Guest Access
BRKEWN-2013 Deploying Wireless Guest Access
BRKEWN-2013 Deploying Wireless Guest Access
BRKEWN-2013
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Abstract
This session focuses on design requirements and deployment considerations for a
wireless guest access solution. It discusses the main components of an end-to-end
guest access solution including how to provide network access to visitors and route
guest traffic across the network that is safe and secure. Attendees will be introduced
to a detailed discussion on various guest access services directly on the wireless LAN
controllers (WLC), management of Guest services using Cisco Prime Infrastructure,
and integration with the Identity Services Engine (ISE) for various external web
authentication services such as sponsored and self-service options. We will also
discuss FlexConnect, Guest Anchor, and enhanced guest security with WLC and ISE.
This session is especially useful for those attendees responsible for the Design,
Deployment, Operations and Management of Enterprise Campus Wireless Networks.
It is assumed that those attending this session have a working knowledge of LAN
switching and routing, fundamentals in 802.1x and Network Admission Control.
Knowledge of 802.11 WLAN fundamentals and WLAN security is required.
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Session Objectives
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Guest Access Overview
...
Evolution of Network Access Access
Health Location Time Method
Age of the Borderless Network
Mobile Hotspot
Employee
Workers (Sales)
Personal VPN Managed Printer
Devices Desktop? (Payroll)
VPN
Internet Employee
(Finance)
VPN Managed
Security
Systems Desktop?
Employee
(Sales)
Managed Branch Campus
Desktop? Network Network
Internal
Printer Resources
(Sales)
Guest
Guest
Device
Usability
No laptop reconfiguration, no client software required
Plug & Play
Splash screens and web content can differ by location
Easy administration by non-IT staff
“Guest network” must be free or cost-effective and non-disruptive
Monitoring
Mandatory acceptance of disclaimer or Acceptable Use Policy (AUP)
before access is granted
Logging and Monitoring
Must not require guest desktop software or configuration
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Guest Access Components
Customisable
Centralised Web •Flexible Sponsored
Login Page
Page Management
•AccessGuest Credentials
Policies
•Centralised Accounting
802.1X/MAB
Compatibility
•Centralised Web Page
Flexible
Access Policies Management
Guest • Sponsored Guest
NAC Guest Server
Credentials
Identity Services Engine
Parity for ACS 5.1
Wired / Wireless Centralised Accounting
The fact
Traffic isolation achieved
via LWAPP/CAPWAP valid
from the AP to the WLAN
Controller
The challenge CAPWAP
CAPWAP AP
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Path Isolation
Why Do We Need It for Guest Access?
each SSID
Traffic isolation provided by VLANs is
valid up to the switch where the
controller is connected
Guests
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Guest Network Redundancy
A1 A2
Using EoIP Pings (data path) Internet Management Management
10.10.75.2 10.10.76.2
functionality Anchor WLC reachability
will be determined
Foreign WLC will send pings at
configurable intervals to see if Anchor EtherIP Si
EtherIP
WLC is alive “Guest “Guest
Tunnel” Campus Core Tunnel”
Once an Anchor WLC failure is
detected a DEAUTH is send to
the client Secure
Si Secure
Si
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Remote Controller Configuration
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Anchor and Remote Controller Configuration
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Anchor and Remote Controller Configuration
Configure the mobility groups and add the MAC-address and IP address of the remote
WLCs
Anchor
Remote
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Remote Controller Configuration
Create the mobility anchor for the guest WLAN on Remote WLCs
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Guest Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Anchor Controller Configuration
Create the Mobility Anchor for the guest WLAN on Anchor WLC
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Path Isolation
WLAN Controller Deployments with EoIP Tunnel
Anchor Controller
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Guest Path Isolation
Firewall Ports and Protocols
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Solution #2: Guest Path Isolation using VRF
Campus Virtualisation
Virtual Routing / Forwarding (VRF) or VRF- lite is the L3
virtualisation used in Enterprise Campus networks
Guest isolation is done by dedicated VRF instances
Guest VRF
Employee VRF
Global
Logical or Physical Int Logical or Physical Int
(Layer 3) (Layer 3)
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Guest Path Isolation using VRF
WLC and VRF Virtualisation
Guest Provisioning
Internet
LWAPP/CAPWAP Path
Isolation at Access Layer Outside
Cisco ASA
interface Corporate
Wireless LAN Access Layer
Controller
CAPWAP
Guest VRF
Employee VRF
Guests
Global
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Wireless Guest Access
Deployment Options Summary
Internet Internet Internet DMZ WLC
NCS NCS
EoIP
LAN LAN LAN
NCS
Branch
URL/ACL
Radius Auth
Webauth
VLAN Assignment
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Guest with FlexConnect
Identity Branch Office
Guests
Corporate
AP Internet
Branch VLAN
Corporate
Intranet
ASA Firewall
DMZ VLAN
Cisco 3750 Switch
Anchor Controller
EOIPTunnel
WLC - Virtual Controller (FlexConnect Mode)
Identity Services Engine
Active Directory Server
Certificate Authority Server
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
CWA on Wireless Controllers
Contractor Guest
Guest-SSID
MAB
Blocking non-HTTP/DHCP/DNS Traffic Access Point
Default Policy
WLC
Redirect ACL
&
URL Redirect
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Pre-Requisites
Foreign Controller – Step-by-Step
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Foreign Controller – Step-by-Step
1 Configure
Interfaces
Foreign WLC
10.1.100.61/ 00:50:56:B0:01:0E
2 Configure
Mobility Group Members
Anchor WLC
10.10.20.5/ D0:c2:82:dd:88:00
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Foreign Controller – Step-by-Step
1 Configure
Interfaces
2 Configure
Mobility Group Members
3 Configure WLAN
10.10.20.5/ D0:c2:82:dd:88:00
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public
Pre-Requisites
Anchor Controller Allow Access to ISE for
Step-by-Step CWA (URL-Redirect)
NOT Required
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Anchor Controller
Step-by-Step
Configure
1 Interfaces
Foreign WLC
10.1.100.61/ 00:50:56:B0:01:0E
2 Configure
Mobility Group Members Anchor WLC
10.10.20.5/ D0:c2:82:dd:88:00
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Anchor Controller - Step-by-Step
1 Configure
Interfaces
2 Configure
Mobility Group Members
10.10.20.5/ D0:c2:82:dd:88:00
Foreign WLC
4 Configure Mobility Anchors
10.1.100.61/ 00:50:56:B0:01:0E
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Review Wireless CWA Config
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
CWA – Session Flow ISE Server
Foreign WLC
Anchor WLC
EoIP Tunnel
10.1.100.61/ 00:50:56:B0:01:0E 10.10.20.5/ D0:c2:82:dd:88:00
Guest SSID
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
CWA – Session Flow ISE Server
Foreign WLC
Anchor WLC
EoIP Tunnel
10.1.100.61/ 00:50:56:B0:01:0E 10.10.20.5/ D0:c2:82:dd:88:00
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
CWA – Session Flow ISE Server
Foreign WLC
Anchor WLC
EoIP Tunnel
10.1.100.61/ 00:50:56:B0:01:0E 10.10.20.5/ D0:c2:82:dd:88:00
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Guest Services Portal
When to Use Web-Authentication ?
802.1X MAB Web Auth
Managed 802.1X-devices (mac-address bypass) Users without 802.1X devices
Known users Managed devices Users with Bad credentials
SSC SSC
Employee Employee
(bad credential)
Guest
802.1X
Web Auth is a supplementary authentication method
Most useful when users can’t perform or pass 802.1X
Primary Use Case: Guest Access
Secondary Use Case: Employee who fails 802.1X
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Guest Authentication Portal
Internal (Default Web Authentication Pages)
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Wireless Guest Authentication Portal
Internal Web Portal
Wireless guest user associates to
the guest SSID
Initiates a browser connection to
any website
Web login page will displayed
Login Credentials
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Wireless Guest Authentication Portal
Customisable Web Portal
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Wireless Guest Authentication Portal
External Web Portal
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Wireless Guest
Centralised Login Page
AP WLC (4)
ISE
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Guest Services Provisioning
Line Chart Example
6
Series 1
3 Series 2
Series 3
Series 4
2
0
Category 1 Category 2 Category 3 Category 4
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Guest Provisioning Service : WLC
Cisco Wireless LAN Controller
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Guest Provisioning Service
Create the Lobby Admin in WLC
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Local WLC Guest Management
Password is Created
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Guest Provisioning Service : NCS
Cisco Prime Network Control System
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Guest Provisioning Service
Add a Guest User with NCS
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Guest Provisioning Service
Print/E-Mail Details of Guest User
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Guest Provisioning Service
Schedule a Guest User
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Cisco Guest Services
Table Example
Header Header Header Header Header
Data 80 70 60 50
Data 20 20 20 20
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Web Auth and Guest Access
LWA vs CWA piggybacks on MAB authentication policy rule.
Configure:
If User Not Found = Continue (default Reject)
Redirect URL: For CWA, Client Provisioning, and Posture, URL value
returned as a Cisco AV-pair RADIUS attribute.
Ex: cisco:cisco-av-pair=url-redirect=
https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&action=cwa
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
ISE Sponsored Guests – Sponsor Portal
Customisable Web
Portal for Sponsors as
well
Authenticate Sponsors
with corporate
credentials
‒Local Database
‒Active Directory
‒LDAP
‒RADIUS
‒Kerberos
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Guest Portal Localisation
Several Languages are
Supported Natively in ISE 1.1
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
ISE Sponsored Guest
URL-REDIRECT
3. Account is verified
on ISE decision
point against the
Guest User Identity
2. Guest enters the credentials created Store
by the Sponsor GUEST
Identity Store
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
ISE Self-Registration
4. Guest is re-directed again to login again with auto generated username/ password.
6. Account is monitored
Internet via the timed profile
settings.
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Cisco ISE Guest Server
Sponsor Authentication: Local Account/AD
Password Policy
Localisation
Time Profiles
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Cisco ISE Guest Server
Sponsor Portal
https://<ise-server-ip>:8443/sponsorportal/
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Cisco ISE Guest Server
Sponsor – Guest Account Creation
Create/View/Modify
Guest Accounts
Personal Settings
Tools to Manage
Guest Accounts
Email / Print / SMS
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Guest Monitoring, Reporting and
Troubleshooting
Live Guest Verification - ISE
Monitor > Operations > Authentications window will show all
Authentications including Guests
Identity and Authorisation can be found for Guests
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Guest Monitoring - NCS
Monitor > Clients and Users window will show all Authentications
including Guests
Identity and Authorisation can be found for Guests
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Guest Activity Reporting - ISE
Guest Reports
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Guest Activity Reporting - NCS
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Q&A
Complete Your Online Session
Evaluation
Give us your feedback and receive
a Cisco Live 2013 Polo Shirt!
Complete your Overall Event Survey and 5
Session Evaluations.
Directly from your mobile device on the
Cisco Live Mobile App
By visiting the Cisco Live Mobile Site
www.ciscoliveaustralia.com/mobile
Visit any Cisco Live Internet Station located
Don’t forget to activate your
throughout the venue
Cisco Live 365 account for
Polo Shirts can be collected in the World of access to all session material,
Solutions on Friday 8 March 12:00pm-2:00pm communities, and on-demand and live activities throughout
the year. Log into your Cisco Live portal and click the
"Enter Cisco Live 365" button.
www.ciscoliveaustralia.com/portal/login.ww
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
BRKEWN-2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public