Call Flows for Simple IP Users



Similar documents
Flow-Based per Port-Channel Load Balancing

Firewall Authentication Proxy for FTP and Telnet Sessions

RADIUS Server Load Balancing

RADIUS Server Load Balancing

Easy Performance Monitor

Ethernet Overhead Accounting

Configuring Auto-QoS

Lab Introduction to the Modular QoS Command-Line Interface

Configuring Auto-MDIX

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Easy Performance Monitor

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Virtual Fragmentation Reassembly

Easy Performance Monitor

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth

Firewall Stateful Inspection of ICMP

Switch Configuration Required to Support Cisco ISE Functions

HTTP 1.1 Web Server and Client

Configuring Right-To-Use Licenses

Image Verification. Finding Feature Information. Restrictions for Image Verification

Firewall Support for SIP

Configure ISE Version 1.4 Posture with Microsoft WSUS

The Evolution from PPPoE to IPoE sessions. Horia Miclea, Cisco Systems, Service Provider Systems Development

On-boarding and Provisioning with Cisco Identity Services Engine

QoS: Color-Aware Policer

Configuring Aggressive Load Balancing

DHCP Server Port-Based Address Allocation

VRRPv3: Object Tracking Integration

Configuring Aggressive Load Balancing

Configuring Server Load Balancing

Troubleshooting the Firewall Services Module

CCT vs. CCENT Skill Set Comparison

Controlling Access to a Virtual Terminal Line

Web Authentication Application Note

Geschreven door Administrator woensdag 13 februari :37 - Laatst aangepast woensdag 13 februari :05

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Configuring the Firewall Management Interface

TrustSec How-To Guide: On-boarding and Provisioning

Configuring Role-Based Access Control

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

Traffic Mirroring Commands on the Cisco IOS XR Software

Brocade Certified Layer 4-7 Professional Version: Demo. Page <<1/8>>

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Troubleshooting the Firewall Services Module

IOS Zone Based Firewall Step-by-Step Basic Configuration

Firewall Stateful Inspection of ICMP

Cisco TrustSec How-To Guide: Guest Services

Enabling Remote Access to the ACE

Configuring a Load-Balancing Scheme

Transferring Files Using HTTP or HTTPS

Configure Policy-based Routing

Deploying an SESM/SSG Solution

Multiprotocol Label Switching Load Balancing

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring Secure Socket Layer HTTP

How To - Implement Clientless Single Sign On Authentication with Active Directory

Cisco Application Policy Infrastructure Controller Enterprise Module (Cisco APIC-EM)

Skills Assessment Student Training Exam

Configuring DNS. Finding Feature Information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

End of Sale/End of Life Report Tool Usage Notes for CiscoWorks NCM 1.6

Router Recovery with ROM Monitor

Easy and Secure Remote Access with Cisco QuickVPN

Configuring WCCP v2 with Websense Content Gateway the Web proxy for Web Security Gateway

How To Install Cisco Asr 9000 Series Router Software On A Mini Mini Mini (Cisco Ios) Router

Configuring a Load-Balancing Scheme

Configuring Network Address Translation

Traffic Mirroring Commands on the Cisco ASR 9000 Series Router

Registering and Activating a License on the Cisco ISA500 Security Appliance

Configuring Denial of Service Protection

Lab Organizing CCENT Objectives by OSI Layer

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

Configuring a Load-Balancing Scheme

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Using Link Layer Discovery Protocol in Multivendor Networks

Cisco Performance Agent Data Source Configuration in the Branch-Office Router

A Guide to New Features in Propalms OneGate 4.0

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Cisco Nexus 1000V Virtual Ethernet Module Software Installation Guide, Release 4.0(4)SV1(1)

- QoS Classification and Marking -

Controller Management

pfsense Captive Portal: Part One

NMS300 Network Management System

Configure ISDN Backup and VPN Connection

BGP Link Bandwidth. Finding Feature Information. Contents

Portal Authentication Technology White Paper

ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note

Cisco Performance Monitor Commands

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Supporting Document LNS Configuration

How to Configure Captive Portal

WLAN Security: Identifying Client and AP Security

SolarWinds Technical Reference

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Configuring NetFlow Secure Event Logging (NSEL)

GLBP - Gateway Load Balancing Protocol

Transcription:

This chapter provides various call flows for simple IP users. Finding Feature Information, page 1 Simple IP Unclassified MAC Authentication (MAC TAL and Web Login) Call Flows, page 1 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Simple IP Unclassified MAC Authentication (MAC TAL and Web Login) Call Flows The MAC Transparent Auto Login (TAL) authentication method is associated with the web authentication method and is prevalent in public access control as used in public wireless LAN (PWLAN) applications or in limited usage as in broadband residential access. Here, many sessions are aggregated on a single VLAN or interface at the broadband remote access server (BRAS), and individual sessions are identified based on the source MAC address for the Layer 2 access subscriber. MAC TAL enables the iwag to authorize a subscriber on the basis of the subscriber s source MAC address. After authentication, the iwag applies the auto-login services on the session and the subscriber will be able to access the service. If the initial authorization based on the MAC address fails, then the iwag subscriber is redirected to the ISP s web portal, where the subscriber enters the ISP-assigned credentials (username and password) to complete the authentication in order to avail the ISP s services. The iwag then applies the services that the subscriber selected from the portal, and provides the subscriber full access to those services. This use case covers the following: iwag session creation OL-30226-03 1

Simple IP Unclassified MAC Authentication (MAC TAL and Web Login) Call Flows User authorization based on MAC address Default service activation (Internet) Auto-login service activation and access User redirection to the portal (on user authorization failure only) User authentication at the RADIUS server Profile download and auto-login service activation Access to features such as change of authorization (CoA), account logout, account stop, account ping 2 OL-30226-03

Simple IP Unclassified MAC with MAC TAL Authentication Call Flow Simple IP Unclassified MAC with MAC TAL Authentication Call Flow The following figure illustrates the unclassified MAC with MAC TAL authentication call flow for a simple IP user. Figure 1: Simple IP Unclassified MAC with MAC TAL Authentication Call Flow The following steps describe the call flow for a successful MAC TAL Web authorization for a simple IP subscriber: OL-30226-03 3

Simple IP Unclassified MAC with MAC TAL Authentication Call Flow 1 The subscriber initiates IP traffic to get connected to the Internet service. ISG notices a new subscriber address and creates an unauthenticated subscriber session. 2 ISG then sends an authorization request to the RADIUS server with the subscriber s MAC address as the username. 3 If the authorization is successful, the default Internet services are applied to the subscriber for the session. 4 The defined services are applied to the subscriber s session and the subscriber can start accessing the Internet. 5 The subscriber now has full access to the network. 6 An Accounting Start message is sent to the application provider to indicate the start of the subscriber s service. The subscriber can now access the Internet services applicable as part of the subscription. 4 OL-30226-03

Simple IP Unclassified MAC with Web Login Authentication Call Flow Simple IP Unclassified MAC with Web Login Authentication Call Flow The following figure illustrates the unclassified MAC with web login authentication MAC TAL call flow for a simple IP user. Figure 2: Simple IP Unclassified MAC with Web Login Authentication Call Flow The following steps describe the call flow for a successful MAC TAL Web authorization for a simple IP subscriber: 1 The subscriber initiates IP traffic to get connected to the Internet service. ISG notices a new subscriber address and creates an unauthenticated subscriber session. 2 ISG then sends an authorization request to the RADIUS server with the subscriber s MAC address as the username. OL-30226-03 5

Simple IP Unclassified MAC Authentication Call Flow Configuration 3 If the authorization fails, services such as OpenGarden and Layer 4 Redirect (L4R) are applied to the subscriber for a temporary period of time. 4 ISG then redirects the subscriber to the portal where the subscriber enters the username and password. The subscriber s credentials are then sent to the ISG through the account login message. 5 ISG now authenticates the subscriber on the AAA server and retrieves the subscriber s profile, which may contain a few preconfigured auto-login services. 6 On successful authentication, ISG enables the user s auto-login services (Internet). 7 Assuming that the services for accessing the Internet are not cached on ISG prior to this session, ISG sends an access request to the corresponding service provider s AAA server to download the service definition. 8 The AAA server responds with the service definition. 9 The defined service is applied to the subscriber s session and the subscriber can start accessing the Internet. The subscriber now has full access to the network. 10 On successful account login, the L4R feature is unapplied for the subscriber in ISG to prevent subscriber traffic redirection to the ISP s web portal. 11 An Accounting Start message is sent to the application provider to indicate the start of the subscriber s service. Now, the subscriber is connected to the Internet. Simple IP Unclassified MAC Authentication Call Flow Configuration The following configuration is an example of a simple IP unclassified MAC call flow. This is applicable to both the MAC TAL and web logon authentication scenarios: # AAA and RADIUS aaa new-model aaa server radius dynamic-author client 5.5.5.1 server-key cisco aaa group server radius SERVER_GROUP1 server name RAD1 aaa authentication login AUTHEN_LIST group SERVER_GROUP1 aaa authorization network default group SERVER_GROUP1 local aaa authorization network AUTHOR_LIST group SERVER_GROUP1 local aaa authorization subscriber-service default local group SERVER_GROUP1 aaa accounting network List1 start-stop group SERVER_GROUP1 aaa accounting system default start-stop group radius radius-server key cisco radius server RAD1 address ipv4 4.4.4.1 auth-port 1645 acct-port 1646 # Interface interface GigabitEthernet0/0/2.10 #Connected to the client, access interface. encapsulation dot1q 10 ip address 11.11.11.1 255.255.255.0 service-policy type control TAL ip subscriber l2-connected initiator unclassified mac-address interface GigabitEthernet0/0/3 #Connected to the RADIUS server 6 OL-30226-03

Simple IP Unclassified MAC Authentication Call Flow Configuration ip address 4.4.4.2 255.255.255.0 ip portbundle outside interface GigabitEthernet 0/0/4 #Connected to the Web portal ip address 5.5.5.2 255.255.255.0 ip portbundle outside interface Loopback0 #Loopback interface for PBHK service ip address 15.1.1.1 255.255.255.0 # Port Bundle Configurations ip portbundle length 5 source Loopback0 # Service Definitions policy-map type service OPENGARDEN_SERVICE 20 class type traffic ISG_OPENGARDEN policy-map type service L4REDIRECT_SERVICE 10 class type traffic L4REDIRECT redirect to group ISG_GROUP accounting aaa list IP_SESSION class type traffic default input drop policy-map type service PBHK_SERVICE ip portbundle # Traffic Class Definitions class-map type traffic match-any ISG_OPENGARDEN match access-group output name ACL_OUT_OPENGARDEN match access-group input name ACL_IN_OPENGARDEN class-map type traffic match-any L4REDIRECT match access-group input name ACL_IN_L4REDIRECT class-map type control match-all IP_UNAUTH_COND match timer IP_UNAUTH_TIMER match authen-status unauthenticated # Redirect Group Definition redirect server-group ISG_GROUP server ip 10.10.33.166 port 80 # Policy Map policy-map type control TAL class type control always event session-start 10 service-policy type service name PBHK_SERVICE 20 authorize aaa list AUTHOR_LIST password cisco123 identifier mac-address 30 service-policy type service name L4REDIRECT_SERVICE 40 service-policy type service name OPENGARDEN_SERVICE 50 set-timer IP_UNAUTH_TIMER 10 class type control always event account-logon 10 authenticate aaa list IP_AUTHEN_LIST 20 service-policy type service unapply name OPENGARDEN_SERVICE 30 service-policy type service unapply name L4REDIRECT_SERVICE class type control UNAUTHEN_COND event timed-policy-expiry 10 service disconnect # ACL OL-30226-03 7

Additional References ip access-list extended ACL_IN_OPENGARDEN permit ip any host 10.10.33.166 ip access-list extended ACL_OUT_OPENGARDEN permit ip host 10.10.33.166 any. ip access-list extended ACL_IN_L4REDIRECT deny tcp any host 10.10.33.166 permit tcp any any eq www permit tcp any any eq 443. Additional References Related Documents Related Topic Cisco IOS commands iwag commands Document Title Cisco IOS Master Commands List, All Releases Cisco IOS Intelligent Wireless Access Gateway Command Reference MIBs MIB No new or modified MIBs are supported by this feature. MIBs Link To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs 8 OL-30226-03

Feature Information for Technical Assistance Description The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Link http://www.cisco.com/cisco/web/support/index.html Feature Information for The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Table 1: Feature Information for Feature Name Releases Cisco IOS XE Release 3.11 Feature Information In Cisco IOS XE Release 3.11S, this feature was implemented on the Cisco ASR 1000 Series Aggregation Services Routers. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) OL-30226-03 9

Feature Information for 10 OL-30226-03