Wired Guest Access: Protect Your Network Against Threats
|
|
|
- Julianna Caldwell
- 9 years ago
- Views:
Transcription
1 White Paper Wired Guest Access: Protect Your Network Against Threats White Paper October SE Release
2 Contents What You Will Learn... 3 Introduction... 3 Deployment Scenario... 4 Deployment Modes... 5 Configuration Guide... 5 Open, Consent, and WebAuth Mode: Step-by-Step Configuration Guide... 5 Open Mode Configuration... 7 Consent Mode Configuration... 7 WebAuth Mode Configuration... 8 Troubleshooting... 8 Caveats... 9 Appendix Show Commands and Troubleshooting Commands to Check Summary and Details of Guest LAN Profiles Commands to Check Summary and Details About Access Session Profiles Open Mode Outputs Consent Mode Outputs Webauth Mode Outputs Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 32
3 What You Will Learn In enterprise networks, there is typically a need for providing network access to its guests on the campus. The guest access requirements include providing connectivity to the Internet or other selective enterprise resources to both wired and wireless guests in a consistent and manageable way. The same wireless LAN controller can be used to provide access to both types of guests on the campus. For security reasons, a large number of enterprise network administrators segregate guest access to a demilitarized zone (DMZ) controller using tunneling. The guest access solution is also used as a fallback method for guest clients that fail dot1x and MAB authentication methods. Today, solutions exist for providing guest access through wireless and wired networks on the Cisco AireOS Wireless LAN Controller (WLC). This document covers deployment of the wired guest access feature on Cisco Catalyst 3850 Series Switches. The Cisco 5760 Wireless LAN Controller is used as the guest anchor. Depending on the security requirements of the network, the network administrator can choose to implement the wired guest access feature in the following ways, which are described briefly later in this document: Open authentication mode Web consent mode Web authentication mode Introduction In modern networks, providing security to safeguard confidential information and assets has become a quintessential part of planning and implementation. The assets need to be secured against a variety of threats, including access to resources through wireless and wired networks. The wired guest access feature provides a high level of security by restricting access to only desired resources and the Internet. The guest user connects to the designated port for access and optionally might be made to go through web consent or web authentication modes, depending on the security requirements (details in later sections). After guest authentication succeeds, access is provided to the network resources, and the guest controller manages the client traffic. The foreign controller is the primary switch where the client connects for network access. It initiates tunnel requests. The guest anchor is the switch where the client actually gets anchored. Apart from the AireOSbased controllers, the Cisco IOS Software-based Cisco 5760 WLC can also be used as a guest anchor. Before the guest access feature can be deployed, a mobility tunnel must be established between the foreign controller and guest anchor switches. A typical setup for the guest access feature would be mobility agent -> mobility controller (foreign controller) - mobility controller (guest anchor). The foreign controller switch anchors guest traffic to the guest anchor controller (preferably in a DMZ), and multiple guest anchors can be configured for load balancing. Get more information about mobility controllers and mobility anchors: mobility_3se_5700_cg/b_mobility_32se_5700_cg_chapter_00.html Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 32
4 For the guest feature, the ports on the foreign controller switch need to be configured in the Layer 2 access mode. The VLAN used on the switchport, depending on implementation, can be a separate VLAN altogether. It is up to the network administrator to have either a data VLAN or some other VLAN specifically for guests. A data VLAN can be used when other authentication methods are configured on the switchport and the guest access feature is used as a fallback method (for example, when other methods such as dot1x and MAB fail). This allows corporate end devices to connect to the same port using dot1x or MAB methods. Noncorporate or guest devices would fail the first two methods and fall back to the guest access method for Internet access. A different use case for using guest VLAN is when the network admin has dedicated few ports for guest access, which in turn warrants the use of guest VLAN on the switchport. The guest VLAN can be made nonroutable so that no traffic flows from it to other VLANs on the corporate network. Deployment Scenario This document covers common use cases in which the wired clients connect to access switches for network access. The three modes of access are explained in different examples. In all of the methods, the wired guest access feature can act as a fallback method for authentication. This is typically a use case in which a guest user brings an end device that is unknown to the network. Because the end device is missing an endpoint supplicant, it will fail dot1x authentication. Similarly, MAB authentication would also fail, because the MAC address of the end device would be unknown to the authenticating server. It is worth noting that in such implementations, corporate end devices would successfully get access because they would have either a dot1x supplicant or their MAC addresses in the authenticating server for validation. This allows for flexibility in deployment, because the administrator does not need to restrict and tie up ports specifically for guest access. Figure 1 shows the topology used in the deployment scenario. Figure 1. Wired Guest Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 32
5 The topology shown in Figure 1 represents a Cisco Catalyst 3850 access switch that is acting as a mobility agent where guest users plug in directly on the access port. The corresponding mobility controller is the Cisco 5760 WLC, local to the site. The local Cisco 5760 WLC connects to another Cisco 5760 WLC at the central location that acts as the guest anchor. The guest tunnels terminate on the guest anchor. Deployment Modes Depending on security requirements of the enterprise network, the administrator has the option of providing wired guest access to the Internet using different modes. Among the three methods discussed in this document, one can be implemented. This document assumes the wireless network is in place and the Cisco Catalyst 3850 is already working in a converged access setup. The three modes include open access mode, consent mode, and web authentication mode. This section briefly describes each of those modes. It is worth noting that the guest LAN security configurations on both foreign controller and guest anchor must match for web consent and web authentication modes; otherwise the tunnel buildup process fails. The following access modes are available: Open mode: Open mode allows guest user access to the Internet without requiring any form of consent or authentication. Consent mode: In consent mode, on connecting, the user is presented with a page to agree/disagree to certain terms of usage. Web authentication mode: In web authentication access method, the user is presented with a page to enter credentials, which can be provided by the network administrator on a temporary basis. Configuration Guide The following sections describe the series of steps that are involved in configuring various access methods on the guest anchor and foreign controller switches for various access modes. Open, Consent, and WebAuth Mode: Step-by-Step Configuration Guide In open mode, a guest user connecting to the switchport is given access to guest resources without requiring any form of authentication or consent. As soon as the client MAC address is detected on the port, an access session is started, and a tunnel request is initiated from the foreign controller switch to the guest anchor. After the process is complete, the client is able to access the guest resources. It is typically used when the physical location of the Ethernet ports is in a trustworthy environment and, optionally, the area is secured by other means of physical security. Consent mode allows access to the network resources only on agreement of terms and conditions by the guest user, as set by the enterprise policy. The tunnel buildup process in consent mode is similar to open mode, but authorization for network access is only provided when the guest user acknowledges the policies of network usage. The user is presented with a splash page that lists the terms of use and might have optional fields for entering the guest address. Consent mode is usually used as an additional way of making sure that guest users comply with the enterprise network usage policies Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 32
6 In web authentication mode, a guest user coming on the network needing access to the Internet is required to provide login credentials for authorization. The lobby administrator can provide temporary credentials for the guest user. The tunnel buildup is done in a way similar to that of open mode, but authorization is not provided until the credentials are successfully validated. It allows for additional security because the individual user can be tracked according to the credentials in case of any malicious activity. Web authentication implementation requires an authentication server for validation. The steps involved in configuring guest controller and foreign controller are detailed in the following sections. Common Configuration for Open, Consent, and WebAuth Modes Foreign Controller Configuration Enable IP DHCP relay and snooping information option along with IP DHCP snooping and device tracking. Also VLAN 325 is created, which is used primarily by Cisco for wired guest access: ip dhcp relay information trust-all ip dhcp snooping information option allowuntrusted ip dhcp snooping ip device tracking vlan 325 The switch detects the MAC address of the incoming client on the port configured with access-session port-control auto and applies the defined subscriber policy. The policy is created as follows: policy-map type control subscriber <Policy_Name> #Name of pre control policy map event session-started match-all #Condition for trigger 1 class always do-until-failure 2 activate service-template <SERVICE- TEMPLATE_Name> 3 authorize Guest Controller Configuration Create Wired_client_vlan and SVI along with VLAN 325. A valid and reachable DHCP pool is required; it can be external as well: vlan <Wired_Client_VLAN> vlan325 interface <Wired_Client_VLAN> ip address <IP_ADDR> <SUBNET_MASK> Two key features are enabled on the guest anchor controller: IP device tracking IP DHCP snooping on guest VLAN (wired) Configuration: ip device tracking ip dhcp relay information trust-all ip dhcp snooping vlan <Wired_Client_VLAN> ip dhcp snooping vlan 325 ip dhcp snooping information option allowuntrusted ip dhcp snooping The policy is referred to sequentially, which in this case points to a service-template: service-template <SERVICE-TEMPLATE_Name> #Define Service Template tunnel type capwap name <CAPWAP_Name> Configuration on the switchport interface: Interface GigabitEthernet<Interface_id> switchport access vlan <vlan_id> switchport mode access access-session port-control auto service-policy type control subscriber <Policy> 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 32
7 Additional configuration required for specific modes: Open Mode Configuration Foreign Controller Configuration On the foreign controller, the following configuration is needed: guest-lan <Guest_LAN_Name> <ID> client vlan <Wired_Client_VLAN> #State the wired client vlan mobility anchor <IP_ADDRESS> no security web-auth no shutdown Guest Controller Configuration For open mode, create a guest LAN specifying the client VLAN with the Cisco 5760 WLC itself acting as the mobility anchor. In open mode, the no security web-auth command is required. guest-lan < Guest_LAN_Name> <ID> client vlan <Wired_Client_VLAN> wired client vlan mobility anchor no security web-auth no shutdown #State the Consent Mode Configuration Foreign Controller Configuration Enable HTTP and HTTPS: Guest Controller Configuration Enable HTTP and HTTPS: ip http server ip http secure-server Define the guest LAN configuration: guest-lan <GUEST_LAN_NAME> <ID> client vlan <Wired_Client_VLAN> mobility anchor <IP_ADDRESS> security web-auth security web-auth parameter-map <PARAMETER_MAP_NAME> no shutdown ip http server ip http secure-server For consent mode, create a guest LAN specifying the client VLAN with the Cisco 5760 WLC itself acting as the mobility anchor. Also, security and parameter-map are defined in the following configuration: guest-lan <GUEST_LAN_NAME> <ID> client vlan <Wired_Client_VLAN> mobility anchor security web-auth security web-auth parameter-map <PARAMETER_MAP_NAME> no shutdownn For consent mode, create a parameter map type webauth for redirecting the user to specific pages for login and on success. The consent page can be stored on flash of the switch as well. In this case, the name of the file is terms1.txt. parameter-map type webauth <PARAMETER_MAP_NAME> type consent consent timeout init-state min 5 redirect on-success # Page to redirect to after success banner file <LOCATION_OF_FILE> #File containing terms and conditions text logout-window-disabled 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 32
8 WebAuth Mode Configuration Foreign Controller Configuration guest-lan <GUEST_LAN_NAME> <ID> aaa-override client vlan <VLAN_ID> security web-auth #Enable WebAuth mobility anchor <IP_Address> no shutdown Guest Controller Configuration AAA configuration: aaa new-model aaa group server radius <Name> server <Server_IP> ip radius source-interface <Radius_Source_Interface> dot1x system-auth-control aaa authentication login default group radius aaa authentication login <Name_for_Console> none aaa server radius dynamic-author client <Client_IP> server-key <Key> auth-type any radius server <Name> address ipv4 <Auth_Server_IP> auth-port 1812 acct-port 1813 timeout 60 retransmit 3 key <key> line con 0 exec-timeout 0 0 login authentication CON_ACCESS #Disable Authentication on console stopbits 1 speed guest-lan <GUEST_LAN_NAME> <ID> aaa-override client vlan <VLAN_ID> security web-auth mobility anchor no shutdown #Enable WebAuth If VLAN 325 is already in use on the network: Solution: This solution uses VLAN 325 as the default VLAN for the wired guest access solution. To change it to another custom VLAN, the command access-session tunnel vlan <VLAN ID> can be used. This change should be made on both foreign controller and guest controllers. Troubleshooting 1. Guest LAN tunnel is not initiated on the foreign controller. Make sure that VLAN 325 is configured and is in no shut mode on both foreign controller and guest anchor switches. Check the status of guest LANs. They need to be no shutdown manually after the initial configuration. Make sure the guest port is configured for access-session port-control auto. Check the service policy service-policy type control subscriber <policy name> Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 32
9 2. Guest LAN tunnel buildup is initiated, but it eventually fails. Check the guest LAN security configuration on both foreign controller and guest anchor using the show guest-lan <guest-lan_name> command. Tunnel buildup would fail in case of a mismatch. 3. Clients are in the Auth state initially, but cannot get access, web consent, or web authentication login pages. Make sure that the security setting on both foreign controller and guest anchor match. For both web consent and web authentication, security needs to be enabled. Check the configuration for ip http server and ip https-server. Make sure that parameter-map is configured for web consent mode. 4. Client authentication fails. Check connectivity to the RADIUS server from the foreign controller switch. On the foreign controller switch, use test aaa group radius <username> <password> new-code command to check if user id/password are valid. Check if the client exists in the authentication server database. 5. Access-session shows tunnel buildup and IP address assignment, but wcdb database is missing a valid IP address. ip dhcp snooping is required for IPDT to update the wireless client database. It should be enabled globally on the foreign controller switch and both globally as well as on the client VLANs (and VLAN 325) on the guest anchor switch. 6. Changes to webconsent parameter configuration are not updated dynamically. It has been observed that when changes are made to the webconsent parameter type, the changes are not applied. A workaround is to remove the entire parameter type and reconfigure with the new configuration. Caveats 1. Tunnel buildup delay. There can be some delay between the clients connecting to the switchport on the foreign controller switch and tunnel buildup. This is mostly the case when other authentication methods such as dot1x and MAB are used and need to fail before a guest anchor tunnel can be established. 2. Cannot ping clients from the local switch. Because this is a tunnel-based approach, the traffic is sent to a DMZ controller (guest anchor), and clients are not reachable using local switch (foreign controller). 3. Clients cannot access any hosts outside the subnet. The client traffic passes through a tunnel to the DMZ controller. Any routes to and from the client subnet must be defined on the controller (external firewall/routing can be used). 4. Clients cannot get IP address using DHCP and occasionally get stuck in IPLEARN state, causing repeated tunnel teardown and buildup. Workaround is to manually do an ipconfig/release and ipconfig/renew on the client. 5. After SSO, clients need to get reauthenticated. The wired guest access session information is not synced with the standby and member switches. In case of SSO, new sessions need to be established Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 32
10 6. Wired guest access configuration using WebGUI. Version SE RELEASE SOFTWARE does not support configuring wired guest access feature using WebGUI. Appendix Command Outputs Cat3850#show switch Switch/Stack Mac Address : 20bb.c0a2.d880 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State *1 Active 20bb.c0a2.d B0 Ready Cat3850#show version Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA- UNIVERSALK9-M), Version SE RELEASE SOFTWARE (fc1) Technical Support: Copyright (c) by Cisco Systems, Inc. Compiled Wed 02-Oct-13 21:51 by prod_rel_team --Output Cut--- Base Ethernet MAC Address : 20:bb:c0:a2:d8:80 Motherboard Assembly Number : Motherboard Serial Number : FOC171010AP Model Revision Number : B0 Motherboard Revision Number : C0 Model Number : WS-C P System Serial Number : FOC1710V20X Switch Ports Model SW Version SW Image Mode * 1 56 WS-C P SE cat3k_caa-universalk9 BUNDLE Configuration register is 0x102 Cisco-5760#show switch Switch/Stack Mac Address : 1ce6.c7b Local Mac Address Mac persistency wait time: Indefinite H/W Current 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 32
11 Switch# Role Mac Address Priority Version State *2 Active 1ce6.c7b PP Ready Cisco-5760#show version Cisco IOS Software, IOS-XE Software, 5700 Series Wireless LAN Controller Software (CT5760-IPSERVICESK9-M), Version SE RELEASE SOFTWARE (fc1) Technical Support: Copyright (c) by Cisco Systems, Inc. Compiled Thu 03-Oct-13 05:20 by prod_rel_team ---Output Cut--- License Level: Ipservices License Type: Permanent Next reload license Level: Ipservices cisco AIR-CT5760 (i686) processor with K bytes of physical memory. Processor board ID FOC1704V12C 7 Virtual Ethernet interfaces 6 Ten Gigabit Ethernet interfaces 2048K bytes of non-volatile configuration memory K bytes of physical memory K bytes of Crash Files at crashinfo: K bytes of Flash at flash:. 0K bytes of Dummy USB Flash at usbflash0:. 0K bytes of at webui:. Base Ethernet MAC Address : 1c:e6:c7:b6:25:80 Motherboard Assembly Number : Motherboard Serial Number : FOC170315RJ Model Revision Number : PP Model Number : AIR-CT5760 System Serial Number : FOC1704V12C Switch Ports Model SW Version SW Image Mode * 2 6 AIR-CT SE ct5760-ipservicesk9 BUNDLE Configuration register is 0x201 (will be 0x102 at next reload) 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 32
12 Table 1 shows software release compatibility for the guest access feature. Table 1. Software Release Compatibility for Guest Access Feature Product Cisco Catalyst 3650 Cisco Catalyst 3850 Cisco 5760 WLC First Version Supported SE SE SE Table 2 lists clients used in testing. Table 2. Clients Used in Testing Guest Client Brand Operating System DELL Windows 7 Lenovo Windows 7 MacBook OSX Version Show Commands and Troubleshooting The following show commands are useful in verifying the configuration and troubleshooting most commonly seen issues. Commands to Check Summary and Details of Guest LAN Profiles Cat3850#show guest-lan summary Number of Guest LANs : 0 GLAN ID GLAN Profile Name Status Interface GUEST_LAN_WEBAUTH Enabled 33 2 GUEST_LAN_WEBCONSENT Enabled 33 3 GUEST_LAN_OPENAUTH Enabled 33 Cisco-5760#show guest-lan summary Number of Guest LANs : 0 GLAN ID GLAN Profile Name Status Interface GUEST_LAN_WEBAUTH Enabled 33 2 GUEST_LAN_WEBCONSENT Enabled 33 3 GUEST_LAN_OPENAUTH Enabled 33 Cat3850#show guest-lan GUEST_LAN_OPENAUTH Guest LAN Identifier : 3 Profile Name : GUEST_LAN_OPENAUTH Status : Enabled AAA Policy Override 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 32
13 Network Admission Control NAC-State : Number of Active Clients : 0 Exclusionlist Timeout : Infinity Session Timeout : Infinity CHD per WLAN : Enabled Webauth DHCP exclusion Interface : 33 Ingress Interface : unconfigured Guest LAN IPv4 ACL : Guest LAN IPv6 ACL : none Accounting list name DHCP Server : Default DHCP Address Assignment Required Quality of Service : Silver (best effort) Radius Servers Authentication : Global Servers Accounting : Global Servers Security Web Based Authentication Conditional Web Redirect Splash-Page Web Redirect Auto Anchor Webauth Parameter Map Mobility Anchor List IP Address Cisco-5760#show guest-lan GUEST_LAN_OPENAUTH Guest LAN Identifier : 3 Profile Name : GUEST_LAN_OPENAUTH Status : Enabled AAA Policy Override Network Admission Control NAC-State : Number of Active Clients : 0 Exclusionlist Timeout : Infinity Session Timeout : Infinity CHD per WLAN : Enabled Webauth DHCP exclusion Interface : 33 Ingress Interface : unconfigured Guest LAN IPv4 ACL : 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 32
14 Guest LAN IPv6 ACL Accounting list name DHCP Server DHCP Address Assignment Required Quality of Service Radius Servers Authentication Accounting Security Web Based Authentication Conditional Web Redirect Splash-Page Web Redirect Auto Anchor Webauth Parameter Map : none : Default : Silver (best effort) : Global Servers : Global Servers Mobility Anchor List IP Address Commands to Check Summary and Details About Access Session Profiles Cat3850#show access-session Interface MAC Address Method Domain Status Fg Session ID Gi1/0/11 e89a.8f7a.16a5 N/A DATA Auth FCC2532D29E Session count = 1 Key to Session Events Status Flags: A - Applying Policy (multi-line status for details) D - Awaiting Deletion F - Final Removal in progress I - Awaiting IIF ID allocation P - Pushed Session (non-transient state) R - Removing User Profile (multi-line status for details) U - Applying User Profile (multi-line status for details) X - Unknown Blocker More details about the access-session can be seen: Cat3850#show access-session mac e89a.8f7a.16a5 details Interface: GigabitEthernet1/0/ Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 32
15 IIF-ID: 0x B6 MAC Address: e89a.8f7a.16a5 IPv6 Address: Unknown IPv4 Address: Unknown Status: Authorized Domain: DATA Oper host mode: multi-auth Oper control dir: both Session timeout: N/A Common Session ID: FCC2532D29E Acct Session ID: 0x00000FD8 Handle: 0xDD00002B Current Policy: OPENAUTH Local Policies: Template: SERV-TEMP3-OPENAUTH (priority 150) Tunnel Profile Name: GUEST_LAN_OPENAUTH Tunnel State: 2 Method status list: empty Cat3850#show wireless client summary Number of Local Clients : 1 MAC Address AP Name WLAN State Protocol e89a.8f7a.16a5 N/A 3 UP Ethernet Open Mode Outputs Tunnel request is initiated from the foreign controller to the guest anchor for the client, and a tunnel add success indicated that the tunnel buildup process completed: *Nov 4 15:49:22.511: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/11, changed state to up *Nov 4 15:49:23.512: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/11, changed state to up *Nov 4 15:49:35.802: epm_spi_client_tunnel_add:server *Nov 4 15:49:35.802: Sending tunnel add request to WCM for server_handle DF000044, server_rh AD000053, mac e89a.8f7a.16a5, audit_ses_id FCC2532D29E, profile name GUEST_LAN_OPENAUTH, src intf 0x108B , client iif id 0x B6, client hdl *Nov 4 15:49:35.824: spi_epm_wired_tunnel_wcm_epm_response_handler *Nov 4 15:49:35.824: tunnel add success 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 32
16 1. The client is moved to virtual LAN 325 from access VLAN on the port: Cat3850#show vlan id 325 VLAN Name Status Ports VLAN0325 active Gi1/0/11, Te1/1/1, Ca1, Ca0, Ca3, Ca4 Cat3850#show vlan id 19 VLAN Name Status Ports VLAN0019 active Gi1/0/9, Gi1/0/10, Te1/1/1, Ca1, Ca0, Ca3, Ca4 2. The access session created for the particular client can be seen using the CLI: Cat3850#show access-session Interface MAC Address Method Domain Status Fg Session ID Gi1/0/11 e89a.8f7a.16a5 N/A DATA Auth FCC2532D29E Session count = 1 More details about the access-session can be seen: Cat3850#show access-session mac e89a.8f7a.16a5 details Interface: GigabitEthernet1/0/11 IIF-ID: 0x B6 MAC Address: e89a.8f7a.16a5 IPv6 Address: Unknown IPv4 Address: Unknown Status: Authorized Domain: DATA Oper host mode: multi-auth Oper control dir: both Session timeout: N/A Common Session ID: FCC2532D29E Acct Session ID: 0x00000FD8 Handle: 0xDD00002B 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 32
17 Current Policy: OPENAUTH Local Policies: Template: SERV-TEMP3-OPENAUTH (priority 150) Tunnel Profile Name: GUEST_LAN_OPENAUTH Tunnel State: 2 Method status list: empty Cat3850#show wireless client summary Number of Local Clients : 1 MAC Address AP Name WLAN State Protocol e89a.8f7a.16a5 N/A 3 UP Ethernet Cat3850#show wcdb da all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 0 Anchor Clients = 0 Foreign Clients = 1 MTE Clients = 0 Mac Address VlanId IP Address Src If Auth Mob e89a.8f7a.16a x0108B RUN FOREIGN Cisco-5760#show wireless client summary Number of Local Clients : 1 MAC Address AP Name WLAN State Protocol e89a.8f7a.16a5 N/A 3 UP Ethernet Cisco-5760#show wcdb da all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 0 Anchor Clients = Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 32
18 Foreign Clients = 0 MTE Clients = 0 Mac Address VlanId IP Address Src If Auth Mob e89a.8f7a.16a x RUN ANCHOR Cisco-5760#show wcdb database e89a.8f7a.16a5 mac: e89a.8f7a.16a5 ssid: GUEST_LAN_OPENAUTH client_type: Export Anchor client_id: 0x00635B client_index: 20 user_id: src_interface: 0x dst_interface: 0x bssid: radio_id: 0 wgbid: wlan_id: 0 global_wlan_id: 516 assoc_id: 0 vlan_id: 33 mcast_vlan_id: 33 mobility_state: ANCHOR auth_state: RUN auth_state_wcm: RUN dhcp_req_rx: 0 ipv4_source: DHCP ipsg_flag: 0 num_v4_addrs: 1 ipv4addr[0]: ipv4addr[1]: ipv4addr[2]: ipv4addr[3]: num_v6_addrs: 0 dhcp_server_ip: dhcp_class_name: Test dhcp_action_flags: 0 option 82: option_82 length: 0 dhcp_notify_preference_flag: Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 32
19 dhcp_notify_interested_options: 0 options_length: 0 options TLV is: p2p_state: P2P_BLOCKING_DISABLE bssid_iifid: 0x radio_iifid: 0x num_protocol_values: 0 ip_learnt: 0x1 flags: 0x2 switch_num: 2 asic_num: 0 state_change_history: Vlan Auth Mob Flags IPv4Src IPv4Address(s) time LEARN_IP ANCHOR 0x2 IP SNOO [1] :55: L2_AUTH_ ANCHOR 0x2 UNKNOWN [0] :55: ASSOCIAT ANCHOR 0x0 UNKNOWN [0] :55: IPLearnt IPv6Address(s) 2. 0x1 [0] 1. 0x0 [0] 0. 0x0 [0] Consent Mode Outputs 1. Tunnel request is initiated by the foreign controller to the guest anchor for the client, and a tunnel add success indicated that the tunnel buildup process completed: Cat3850# *Nov 5 14:52:52.990: epm_spi_client_tunnel_add:server *Nov 5 14:52:52.990: Sending tunnel add request to WCM for server_handle DF000044, server_rh AD000053, mac 5cf9.dd , audit_ses_id FD62A25426E, profile name GUEST_LAN_WEBCONSENT, src intf 0x1008FC F, client iif id 0x BB, client hdl B *Nov 5 14:52:53.012: spi_epm_wired_tunnel_wcm_epm_response_handler *Nov 5 14:52:53.012: tunnel add success 2. The client is moved onto virtual LAN 325 instead of the access VLAN on the port similar to the OPENAUTH mode Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 32
20 3. The access session created for the particular client can be seen using the CLI: Cat3850#show access-session Interface MAC Address Method Domain Status Fg Session ID Gi1/0/10 5cf9.dd N/A DATA Auth FD62A25426E Session count = 1 Key to Session Events Status Flags: A - Applying Policy (multi-line status for details) D - Awaiting Deletion F - Final Removal in progress I - Awaiting IIF ID allocation P - Pushed Session (non-transient state) R - Removing User Profile (multi-line status for details) U - Applying User Profile (multi-line status for details) X - Unknown Blocker Cat3850#show access-session mac 5cf9.dd details Interface: GigabitEthernet1/0/10 IIF-ID: 0x BB MAC Address: 5cf9.dd IPv6 Address: Unknown IPv4 Address: Unknown Status: Authorized Domain: DATA Oper host mode: multi-auth Oper control dir: both Session timeout: N/A Common Session ID: FD62A25426E Acct Session ID: 0x00000FE6 Handle: 0xFC Current Policy: WEBCONSENT Local Policies: Template: SERV-TEMP2-WEBCONSENT (priority 150) Tunnel Profile Name: GUEST_LAN_WEBCONSENT Tunnel State: 2 Method status list: empty 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 32
21 4. Client is also visible in the switch wcdb database: Cat3850#show wcdb da all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 0 Anchor Clients = 0 Foreign Clients = 1 MTE Clients = 0 Mac Address VlanId IP Address Src If Auth Mob cf9.dd x01008FC F RUN FOREIGN Cat3850#show wcdb da 5cf9.dd mac: 5cf9.dd ssid: GUEST_LAN_WEBCONSENT client_type: Wired Guest client_id: 0x BB client_index: 27 user_id: src_interface: 0x01008FC F dst_interface: 0x00CA7B bssid: radio_id: 0 wgbid: wlan_id: 0 global_wlan_id: 67 assoc_id: 0 vlan_id: 33 mcast_vlan_id: 33 mobility_state: FOREIGN auth_state: RUN auth_state_wcm: RUN dhcp_req_rx: 0 ipv4_source: DHCP ipsg_flag: 0 num_v4_addrs: 1 ipv4addr[0]: ipv4addr[1]: ipv4addr[2]: ipv4addr[3]: num_v6_addrs: Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 32
22 dhcp_server_ip: dhcp_class_name: Test dhcp_action_flags: 0 option 82: option_82 length: 0 dhcp_notify_preference_flag: 0 dhcp_notify_interested_options: 0 options_length: 0 options TLV is: p2p_state: P2P_BLOCKING_DISABLE bssid_iifid: 0x radio_iifid: 0x num_protocol_values: 0 ip_learnt: 0x1 flags: 0x0 switch_num: 0 asic_num: 0 state_change_history: Vlan Auth Mob Flags IPv4Src IPv4Address(s) time RUN FOREIGN 0x0 UNKNOWN [0] :52: L2_AUTH_ INIT 0x0 UNKNOWN [0] :52: ASSOCIAT INIT 0x0 UNKNOWN [0] :52: IPLearnt IPv6Address(s) 2. 0x0 [0] 1. 0x0 [0] 0. 0x0 [0] 5. At this stage, the guest anchor controller (Cisco 5760 WLC) indicates that the client is in the L3_AUTH state, because the user needs to agree to certain terms of use: Cisco-5760#show wcdb da all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 0 Anchor Clients = 1 Foreign Clients = 0 MTE Clients = Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 32
23 Mac Address VlanId IP Address Src If Auth Mob cf9.dd x L3_AUTH ANCHOR Cisco-5760#show wcdb da 5cf9.dd mac: 5cf9.dd ssid: GUEST_LAN_WEBCONSENT client_type: Export Anchor client_id: 0x client_index: 24 user_id: src_interface: 0x dst_interface: 0x bssid: radio_id: 0 wgbid: wlan_id: 0 global_wlan_id: 515 assoc_id: 0 vlan_id: 33 mcast_vlan_id: 33 mobility_state: ANCHOR auth_state: L3_AUTH auth_state_wcm: L3_AUTH dhcp_req_rx: 0 ipv4_source: DHCP ipsg_flag: 0 num_v4_addrs: 1 ipv4addr[0]: ipv4addr[1]: ipv4addr[2]: ipv4addr[3]: num_v6_addrs: 0 dhcp_server_ip: dhcp_class_name: Test dhcp_action_flags: 0 option 82: option_82 length: 0 dhcp_notify_preference_flag: 0 dhcp_notify_interested_options: Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 32
24 options_length: 0 options TLV is: p2p_state: P2P_BLOCKING_DISABLE bssid_iifid: 0x radio_iifid: 0x num_protocol_values: 0 ip_learnt: 0x1 flags: 0x2 switch_num: 2 asic_num: 0 state_change_history: Vlan Auth Mob Flags IPv4Src IPv4Address(s) time LEARN_IP ANCHOR 0x2 DHCP [1] :00: L2_AUTH_ ANCHOR 0x2 UNKNOWN [0] :58: ASSOCIAT ANCHOR 0x0 UNKNOWN [0] :58: IPLearnt IPv6Address(s) 2. 0x1 [0] 1. 0x0 [0] 0. 0x0 [0] 6. The user is presented with the screen shown in Figure 2, containing the terms of use. Figure 2. User Consent Form and Acceptance Webpage 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 32
25 7. In the last state, after the guest agrees to the terms, the state is changed to RUN, and the following log message is seen on the screen: Cisco-5760# *Nov 5 15:03:23.215: *%PEM-6-GUESTIN: 2 wcm: Guest user logged in with user account ([email protected]) MAC address 5cf9.dd AuditSessionID: FD62A25426E, IP address Client state on 5750 Guest Anchor is changed to RUN: Cisco-5760#show wcdb da all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 0 Anchor Clients = 1 Foreign Clients = 0 MTE Clients = 0 Mac Address VlanId IP Address Src If Auth Mob cf9.dd x RUN ANCHOR Cisco-5760#show wcdb da 5cf9.dd mac: 5cf9.dd ssid: GUEST_LAN_WEBCONSENT client_type: Export Anchor client_id: 0x client_index: 24 user_id: [email protected] src_interface: 0x dst_interface: 0x bssid: radio_id: 0 wgbid: wlan_id: 0 global_wlan_id: 515 assoc_id: 0 vlan_id: 33 mcast_vlan_id: 33 mobility_state: ANCHOR auth_state: RUN auth_state_wcm: RUN dhcp_req_rx: 0 ipv4_source: DHCP 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 32
26 ipsg_flag: 0 num_v4_addrs: 1 ipv4addr[0]: ipv4addr[1]: ipv4addr[2]: ipv4addr[3]: num_v6_addrs: 0 dhcp_server_ip: dhcp_class_name: Test dhcp_action_flags: 0 option 82: option_82 length: 0 dhcp_notify_preference_flag: 0 dhcp_notify_interested_options: 0 options_length: 0 options TLV is: p2p_state: P2P_BLOCKING_DISABLE bssid_iifid: 0x radio_iifid: 0x num_protocol_values: 0 ip_learnt: 0x1 flags: 0x2 switch_num: 2 asic_num: 0 state_change_history: Vlan Auth Mob Flags IPv4Src IPv4Address(s) time L3_AUTH ANCHOR 0x2 DHCP [1] :03: LEARN_IP ANCHOR 0x2 DHCP [1] :00: L2_AUTH_ ANCHOR 0x2 UNKNOWN [0] :58: ASSOCIAT ANCHOR 0x0 UNKNOWN [0] :58: IPLearnt IPv6Address(s) 3. 0x1 [0] 2. 0x1 [0] 1. 0x0 [0] 0. 0x0 [0] 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 32
27 Webauth Mode Outputs 1. The access session created for the particular client can be seen using the CLI: Cat3850#show access-session Interface MAC Address Method Domain Status Fg Session ID Gi1/0/9 5cf9.dd N/A DATA Auth FDC2A55EA40 Session count = 1 Key to Session Events Status Flags: A - Applying Policy (multi-line status for details) D - Awaiting Deletion F - Final Removal in progress I - Awaiting IIF ID allocation P - Pushed Session (non-transient state) R - Removing User Profile (multi-line status for details) U - Applying User Profile (multi-line status for details) X - Unknown Blocker Cat3850#show access-session mac 5cf9.dd details Interface: GigabitEthernet1/0/9 IIF-ID: 0x1055C C0 MAC Address: 5cf9.dd IPv6 Address: Unknown IPv4 Address: Unknown Status: Authorized Domain: DATA Oper host mode: multi-auth Oper control dir: both Session timeout: N/A Common Session ID: FDC2A55EA40 Acct Session ID: 0x00000FF1 Handle: 0x E Current Policy: WEBAUTH Local Policies: Template: SERV-TEMP1-WEBAUTH (priority 150) Tunnel Profile Name: GUEST_LAN_WEBAUTH Tunnel State: Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 32
28 2. Because the client is not authorized to access the network at this point, it is seen in the L3_AUTH state on the guest anchor switch (Cisco 5760 WLC): Cisco-5760#show wcdb da all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 0 Anchor Clients = 1 Foreign Clients = 0 MTE Clients = 0 Mac Address VlanId IP Address Src If Auth Mob cf9.dd x L3_AUTH ANCHOR Cisco-5760#show wcdb da 5cf9.dd mac: 5cf9.dd ssid: GUEST_LAN_WEBAUTH client_type: Export Anchor client_id: 0x0042A A client_index: 29 user_id: src_interface: 0x dst_interface: 0x bssid: radio_id: 0 wgbid: wlan_id: 0 global_wlan_id: 514 assoc_id: 0 vlan_id: 33 mcast_vlan_id: 33 mobility_state: ANCHOR auth_state: L3_AUTH auth_state_wcm: L3_AUTH dhcp_req_rx: 0 ipv4_source: DHCP ipsg_flag: 0 num_v4_addrs: 1 ipv4addr[0]: ipv4addr[1]: ipv4addr[2]: ipv4addr[3]: Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 32
29 num_v6_addrs: 0 dhcp_server_ip: dhcp_class_name: Test dhcp_action_flags: 0 option 82: option_82 length: 0 dhcp_notify_preference_flag: 0 dhcp_notify_interested_options: 0 options_length: 0 options TLV is: p2p_state: P2P_BLOCKING_DISABLE bssid_iifid: 0x radio_iifid: 0x num_protocol_values: 0 ip_learnt: 0x1 flags: 0x2 switch_num: 2 asic_num: 0 state_change_history: Vlan Auth Mob Flags IPv4Src IPv4Address(s) time LEARN_IP ANCHOR 0x2 DHCP [1] :52: L2_AUTH_ ANCHOR 0x2 UNKNOWN [0] :51: ASSOCIAT ANCHOR 0x0 UNKNOWN [0] :51: IPLearnt IPv6Address(s) 2. 0x1 [0] 1. 0x0 [0] 0. 0x0 [0] 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 32
30 3. After the client opens the web browser and tries to access a webpage, it is redirected to the authentication page where the guest enters the credentials, shown in Figure 3. Figure 3. User Authentication Success Webpage 4. In the last state, after the user credentials are verified using a RADIUS server, the state is changed to RUN, and the following log message is seen on the screen: Cisco-5760# *Nov 5 15:54:39.329: *%PEM-6-GUESTIN: 2 wcm: Guest user logged in with user account (test) MAC address 5cf9.dd AuditSessionID: FDC2A55EA40, IP address Cisco-5760# Client state on 5750 Guest Anchor is changed to RUN: Cisco-5760#show wcdb da all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 0 Anchor Clients = 1 Foreign Clients = 0 MTE Clients = 0 Mac Address VlanId IP Address Src If Auth Mob cf9.dd x RUN ANCHOR 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 32
31 Cisco-5760#show wcdb da 5cf9.dd mac: 5cf9.dd ssid: GUEST_LAN_WEBAUTH client_type: Export Anchor client_id: 0x B client_index: 30 user_id: test src_interface: 0x dst_interface: 0x bssid: radio_id: 0 wgbid: wlan_id: 0 global_wlan_id: 514 assoc_id: 0 vlan_id: 33 mcast_vlan_id: 33 mobility_state: ANCHOR auth_state: RUN auth_state_wcm: RUN dhcp_req_rx: 0 ipv4_source: DHCP ipsg_flag: 0 num_v4_addrs: 1 ipv4addr[0]: ipv4addr[1]: ipv4addr[2]: ipv4addr[3]: num_v6_addrs: 0 dhcp_server_ip: dhcp_class_name: Test dhcp_action_flags: 0 option 82: option_82 length: 0 dhcp_notify_preference_flag: 0 dhcp_notify_interested_options: 0 options_length: 0 options TLV is: p2p_state: bssid_iifid: radio_iifid: P2P_BLOCKING_DISABLE 0x x Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 32
32 num_protocol_values: 0 ip_learnt: 0x1 flags: 0x2 switch_num: 2 asic_num: 0 state_change_history: Vlan Auth Mob Flags IPv4Src IPv4Address(s) time L3_AUTH ANCHOR 0x2 DHCP [1] :02: LEARN_IP ANCHOR 0x2 DHCP [1] :01: L2_AUTH_ ANCHOR 0x2 UNKNOWN [0] :00: ASSOCIAT ANCHOR 0x0 UNKNOWN [0] :00: IPLearnt IPv6Address(s) 3. 0x1 [0] 2. 0x1 [0] 1. 0x0 [0] 0. 0x0 [0] Cisco-5760# Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 32
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
Central Web Authentication on Converged Access and Unified Access WLCs Configuration Example
Central Web Authentication on Converged Access and Unified Access WLCs Configuration Example Document ID: 117717 Contributed by Surendra BG, Cisco TAC Engineer. May 27, 2014 Contents Introduction Prerequisites
CT5760 Controller and Catalyst 3850 Switch Configuration Example
CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page
Universal NGWC/3850 Wireless Configuration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Universal NGWC/3850 Wireless Configuration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents 3850 Switch Wireless Configuration...
Web Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Call Flows for Simple IP Users
This chapter provides various call flows for simple IP users. Finding Feature Information, page 1 Simple IP Unclassified MAC Authentication (MAC TAL and Web Login) Call Flows, page 1 Finding Feature Information
ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note
ClearPass Policy manager Cisco Switch Setup with CPPM Technical Note Copyright 2012 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba
TrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
WiNG 5.X How-To Guide
WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC
Cisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Cisco Trust and Identity Management Solutions
CHAPTER 2 Cisco TrustSec Identity, earlier known as Cisco Identity-based Networking Services (IBNS), a part of the Cisco Trust and Identity Management Solution, is the foundation for providing access control
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Error and Event Log Messages
APPENDIXA and Event Log Messages Client Messages Login Failed Clean Access Server is not properly configured, please report to your administrator. A login page must be added and present in the system in
Configuring Wired 802.1x Authentication on Windows Server 2012
Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos [email protected] Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure
Configuring Right-To-Use Licenses
Finding Feature Information, page 1 Restrictions for Configuring RTU Licenses, page 1 Information About Configuring RTU Licenses, page 2 How to Configure RTU Licenses, page 5 Monitoring and Maintaining
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation Captive Portal with QR Code What is Captive Portal with QR code?
Symantec VIP Integration with ISE
Symantec VIP Integration with ISE Table of Contents Overview... 3 Symantec VIP... 3 Cisco Identity Services Engine (ISE)... 3 Cisco Centralized Web Authentication... 4 VIP in Action... 4 ISE Configuration...
Configuring the Device for Access Point Discovery
Configuring the Device for Access Point Discovery Finding Feature Information, page 1 Prerequisites for Configuring the Device for Access Point Discovery, page 1 Restrictions for Configuring the Device
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
How To Use Cisco Identity Based Networking Services (Ibns)
. Data Sheet Identity-Based Networking Services Identity-Based Networking Services Overview Cisco Identity-Based Networking Services (IBNS) is an integrated solution that offers authentication, access
AP6511 First Time Configuration Procedure
AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Configuring NetFlow-lite
CHAPTER 55 Note NetFlow-lite is only supported on Catalyst 4948E Ethernet Switch. This chapter describes how to configure NetFlow-lite on the Catalyst 4948E switch. NetFlow-lite provides traffic monitoring
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
NAC Guest. Lab Exercises
NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise
Unified Access Point Administrator's Guide
Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Topology Objectives Background Configure auto QoS to support IP phones. Configure CoS override for data frames. Configure the distribution
Lab 3.5.1: Basic VLAN Configuration (Instructor Version)
(Instructor Version) Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 172.17.99.11 255.255.255.0 N/A S2 VLAN 99 172.17.99.12 255.255.255.0
Configuring DHCP Snooping and IP Source Guard
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version
Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version Topology Objective Background Configure EtherChannel. Four switches have just been installed. The distribution layer switches are Catalyst
Network Detector Setup and Configuration
339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net MODE SYST RPS MASTR STAT SPEDUPLX STACK 1 2 3 4 5 6 7 8 91 0 11 12 1X 2X 11X 12X 13 14 15 16 1718 19 20 2122 23 24 13X
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
AlliedWare Plus OS How To Use Web-authentication
AlliedWare Plus OS How To Use Web-authentication Introduction Web-authentication, (also known as Captive Portal), is a simple way to provide secure guestuser access to a network. It is used in a wide range
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Configuring User Authentication
Configuring User This chapter provides the following information about configuring and monitoring user authentication on Enterasys N Series, S Series, and K Series modular switches, A Series, B Series,
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC
Guide Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC Guide 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents Introduction...
Case Study - Configuration between NXC2500 and LDAP Server
Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Ruckus Wireless ZoneDirector Command Line Interface
Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440
Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440 When the AirLink ES440 is combined with a third-party router, the combined solution supports business continuity by providing primary
Passguide 500-451 35q
Passguide 500-451 35q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 18.5 Cisco 500-451 Cisco Unified Access Systems Engineer Exam 100% Valid in US, UK, Australia, India and Emirates.
Controller Management
Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
Chapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1
Implementation of IEEE 802.1X in wired networks Best Practice Document Produced by UNINETT led working group on security (UFS 133) Authors: Øystein Gyland, Tom Myren, Rune Sydskjør, Gunnar Bøe March 2013
Unified Access Point Administrator s Guide
Page 1 Table of Contents Section 1 - About This Document...9 Document Organization... 9 Additional Documentation... 9 Document Conventions... 9 Online Help, Supported Browsers, and Limitations... 10 Section
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure
Network Security Solutions Implementing Network Access Control (NAC)
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
Configure ISE Version 1.4 Posture with Microsoft WSUS
Configure ISE Version 1.4 Posture with Microsoft WSUS Document ID: 119214 Contributed by Michal Garcarz, Cisco TAC Engineer. Aug 03, 2015 Contents Introduction Prerequisites Requirements Components Used
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
Mobility System Software Quick Start Guide
Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring
Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface
Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface Objective Configuring Quality of Service (QoS) involves classifying, marking, and policing traffic flows. It is often necessary to apply
Penn State Wireless 2.0 and Related Services for Network Administrators
The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering
RAP Installation - Updated
RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab
Using Templates. Information About Templates. Accessing the Controller Template Launch Pad CHAPTER
CHAPTER 11 This chapter describes how to add and apply templates. Templates allow you to set fields that you can then apply to multiple devices without having to reenter the common information. This chapter
Cisco ISE Profiling Design Guide. Secure Access How -To Guides Series
Cisco ISE Profiling Design Guide Secure Access How -To Guides Series Author: Craig Hyps Date: August 2012 Table of Contents Solution Overview... 4 Policy Architecture and Components... 4 Scenario Overview...
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Configuring Port Security
CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:
APPLICATION NOTES Seamless Integration of LAN and WLAN through Brocade mobility products and
Seamless Integration of LAN and WLAN through Brocade mobility products and ShoreTel VoIP Phones This solution leverages interoperable and best-of-breed networking and security products, tailored to fit
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Install Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
Designing Unified Guest Access, Wired and Wireless BRKEWN-2016
1 Designing Unified Guest Access, Wired and Wireless BRKEWN-2016 Agenda Overview : Guest Access as a Supplementary User Authentication Wireless Guest Access Control & Path Isolation Wired Guest Access
RADIUS Authentication and Accounting
5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html
Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
UAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation
UAG Series Unified Access Gateway Version 4.00 Edition 1, 04/2014 Application Note Copyright 2014 ZyXEL Communications Corporation Table of Contents Scenario 1 How to Activate a Paid Access Hotspot...
