<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic central web authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677315#M268882</link>
    <description>&lt;P&gt;I have downloaded the new Cisco ISE, I've managed to configure 802.1x and MAB succesfully but I want to configure wired centralized web authentication, but I cannot find any documentation how to configure ISE and Cisco Catalyst (IOS) switches to use this feature (I only find (limited) documentation about local web auth on the switch).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to achieve the following authentication order on a switchport:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;802.1x&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;MAB&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;central web authentication&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if a guest user comes with his laptop, 802.1x is not configured on his laptop and he's not in the Mac Bypass DB, he should "failover" to web auth and get the ISE guest portal webpage with his web browser. There he enters a guest username and password (which is of course already in the ISE DB) and he should get web access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured the switchport with the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switchport access vlan 99&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport voice vlan 50&lt;/P&gt;&lt;P&gt;authentication event no-response action authorize vlan 32&lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt;authentication order dot1x mab webauth&lt;/P&gt;&lt;P&gt;authentication port-control auto&lt;/P&gt;&lt;P&gt;authentication violation protect&lt;/P&gt;&lt;P&gt;authentication fallback webprofile&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;dot1x timeout quiet-period 2&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 2&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the web-profile with access-list to permit DHCP traffic between the attached device and any DHCP server in the vlan 99, and communications with ISE (also in vlan 99) at the moment "fallback webprofile" is triggered (I don't know if this should be configured with central webauth?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW01T#sh fallback profile webprofile&lt;/P&gt;&lt;P&gt;Profile Name: webprofile&lt;/P&gt;&lt;P&gt;------------------------------------&lt;/P&gt;&lt;P&gt;Description : webauth profile&lt;/P&gt;&lt;P&gt;IP Admission Rule : NONE&lt;/P&gt;&lt;P&gt;IP Access-Group IN: 133&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, the access list:&lt;/P&gt;&lt;P&gt;Extended IP access list 133&lt;/P&gt;&lt;P&gt;10 permit ip any host 10.175.0.29&lt;/P&gt;&lt;P&gt;30 permit udp any any eq bootps&lt;/P&gt;&lt;P&gt;40 permit udp any eq bootpc any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the ISE, I configured DOT1x and MAB. In the MAB profile, I configured "continue" if user is unknown, and then an authorization profile for the web authentication:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(attributes of the profile):&lt;/P&gt;&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;/P&gt;&lt;P&gt;cisco-av-pair = url-redirect-acl=webauth&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;cisco-av-pair = url-redirect=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=https://10.175.0.29:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=http&amp;amp;action=cwa&amp;amp;action=cwa" target="_blank"&gt;https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=https://10.175.0.29:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=http&amp;amp;action=cwa&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it doesn't work. If I attach a device, it tries 802.1x, it tries MAB, then it fails over to "web authentication" but immediately fails with "no-response" message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;001420: Jul 1 12:09:19: %AUTHMGR-5-START: Starting 'webauth' for client (0011.2&lt;/P&gt;&lt;P&gt;5d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003E000000582E866B69&lt;/P&gt;&lt;P&gt;5d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003E000000582E866B69&lt;/P&gt;&lt;P&gt;from 'webauth' for client (0011.25d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0&lt;/P&gt;&lt;P&gt;AAF003E000000582E866B69&lt;/P&gt;&lt;P&gt;001422: Jul 1 12:09:19: %AUTHMGR-7-FAILOVER: Failing over from 'webauth' for cl&lt;/P&gt;&lt;P&gt;ient (0011.25d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003E000000582E866B&lt;/P&gt;&lt;P&gt;69&lt;/P&gt;&lt;P&gt;001423: Jul 1 12:09:19: %AUTHMGR-7-NOMOREMETHODS: Exhausted all authentication&lt;/P&gt;&lt;P&gt;methods for client (0011.25d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003 &lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;001420:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some configuration guide or steps available in order to make this work please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:12:06 GMT</pubDate>
    <dc:creator>bert.lefevre</dc:creator>
    <dc:date>2019-03-11T01:12:06Z</dc:date>
    <item>
      <title>central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677315#M268882</link>
      <description>&lt;P&gt;I have downloaded the new Cisco ISE, I've managed to configure 802.1x and MAB succesfully but I want to configure wired centralized web authentication, but I cannot find any documentation how to configure ISE and Cisco Catalyst (IOS) switches to use this feature (I only find (limited) documentation about local web auth on the switch).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to achieve the following authentication order on a switchport:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;802.1x&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;MAB&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;central web authentication&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if a guest user comes with his laptop, 802.1x is not configured on his laptop and he's not in the Mac Bypass DB, he should "failover" to web auth and get the ISE guest portal webpage with his web browser. There he enters a guest username and password (which is of course already in the ISE DB) and he should get web access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured the switchport with the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switchport access vlan 99&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport voice vlan 50&lt;/P&gt;&lt;P&gt;authentication event no-response action authorize vlan 32&lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt;authentication order dot1x mab webauth&lt;/P&gt;&lt;P&gt;authentication port-control auto&lt;/P&gt;&lt;P&gt;authentication violation protect&lt;/P&gt;&lt;P&gt;authentication fallback webprofile&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;dot1x timeout quiet-period 2&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 2&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the web-profile with access-list to permit DHCP traffic between the attached device and any DHCP server in the vlan 99, and communications with ISE (also in vlan 99) at the moment "fallback webprofile" is triggered (I don't know if this should be configured with central webauth?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW01T#sh fallback profile webprofile&lt;/P&gt;&lt;P&gt;Profile Name: webprofile&lt;/P&gt;&lt;P&gt;------------------------------------&lt;/P&gt;&lt;P&gt;Description : webauth profile&lt;/P&gt;&lt;P&gt;IP Admission Rule : NONE&lt;/P&gt;&lt;P&gt;IP Access-Group IN: 133&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, the access list:&lt;/P&gt;&lt;P&gt;Extended IP access list 133&lt;/P&gt;&lt;P&gt;10 permit ip any host 10.175.0.29&lt;/P&gt;&lt;P&gt;30 permit udp any any eq bootps&lt;/P&gt;&lt;P&gt;40 permit udp any eq bootpc any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the ISE, I configured DOT1x and MAB. In the MAB profile, I configured "continue" if user is unknown, and then an authorization profile for the web authentication:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(attributes of the profile):&lt;/P&gt;&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;/P&gt;&lt;P&gt;cisco-av-pair = url-redirect-acl=webauth&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;cisco-av-pair = url-redirect=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=https://10.175.0.29:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=http&amp;amp;action=cwa&amp;amp;action=cwa" target="_blank"&gt;https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=https://10.175.0.29:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;portal=http&amp;amp;action=cwa&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it doesn't work. If I attach a device, it tries 802.1x, it tries MAB, then it fails over to "web authentication" but immediately fails with "no-response" message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;001420: Jul 1 12:09:19: %AUTHMGR-5-START: Starting 'webauth' for client (0011.2&lt;/P&gt;&lt;P&gt;5d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003E000000582E866B69&lt;/P&gt;&lt;P&gt;5d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003E000000582E866B69&lt;/P&gt;&lt;P&gt;from 'webauth' for client (0011.25d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0&lt;/P&gt;&lt;P&gt;AAF003E000000582E866B69&lt;/P&gt;&lt;P&gt;001422: Jul 1 12:09:19: %AUTHMGR-7-FAILOVER: Failing over from 'webauth' for cl&lt;/P&gt;&lt;P&gt;ient (0011.25d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003E000000582E866B&lt;/P&gt;&lt;P&gt;69&lt;/P&gt;&lt;P&gt;001423: Jul 1 12:09:19: %AUTHMGR-7-NOMOREMETHODS: Exhausted all authentication&lt;/P&gt;&lt;P&gt;methods for client (0011.25d7.6c6c) on Interface Fa1/0/3 AuditSessionID 0AAF003 &lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;001420:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some configuration guide or steps available in order to make this work please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677315#M268882</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2019-03-11T01:12:06Z</dc:date>
    </item>
    <item>
      <title>central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677316#M268917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the configuration task list, based on the output you provided there doesnt seem to be ip admission rule configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also wanted to know if you had ip device tracking configured globally also. You will point your fallback profile to your ip admission rule that you created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an example of what I have in my lab:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip device tracking&lt;/P&gt;&lt;P&gt;ip admission name Webauth proxy http inactivity-time 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fallback profile Webauth&lt;/P&gt;&lt;P&gt; ip access-group Webauth in&lt;/P&gt;&lt;P&gt; ip admission Webauth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems as if the ip admission Webauth is missing from your fallback configuration, please update and let me know how this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you can troubleshoot but issue a show ip admission cache to see if the process has started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 15:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677316#M268917</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2011-07-01T15:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677317#M268968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for the fast reply.&lt;BR /&gt;I've configuried the extra settings you told me (although I thought the ip admission configuration was only for local web authentication (where the switch acts as a http server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it still doesn't work. The pc is getting the ip address from the dhcp server but if I open a browser session, I do not get redirected to the ISE portal in order to log me in with a Guest account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I look at the authentication session of the port, it looks like the ISE has correctly sent the redirect acl and redirect url to the switchport: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Switch# show auth sessions int fa 1/0/3&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; FastEthernet1/0/3&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; 0011.25d7.6c6c&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 10.175.0.229&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; 001125d76c6c&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Success&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Policy:&amp;nbsp; Should Secure&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Status:&amp;nbsp; Unsecure&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; both&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorized By:&amp;nbsp; Authentication Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan Group:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect ACL:&amp;nbsp; webauth&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect:&amp;nbsp; &lt;A href="https://ISE.onemrva.priv:8443/guestportal/gateway?sessio"&gt;https://ISE.onemrva.priv:8443/guestportal/gateway?session&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Id=0AAF003E0000175A43004FE3&amp;amp;action=cwa&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; 0AAF003E0000175A43004FE3&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x000018CF&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0xEF00075B&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Runnable methods list:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&amp;nbsp;&amp;nbsp;&amp;nbsp; Failed over&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; webauth&amp;nbsp; Not run&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, the "web authentication" is the result of a "succesful MAB". This is because I had to configure ISE to continue on MAB if the user was not found (I found that somewhere in documentation). Then I have configured a default authorization profile where the "web authentication" is triggered. This is where I've configured the redirect-url and so on and this is of course sent to the switch as a succesfull MAB:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authorization profile "webauthentication" with the "centralized web authentication" settings configured (see attributes output): &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;/P&gt;&lt;P&gt;cisco-av-pair = url-redirect-acl=webauth&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;cisco-av-pair = url-redirect=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;action=cwa"&gt;https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually, I really have no idea if I have correctly configured ISE to handle central web authentication... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I check the "show ip admission cache", nothing is seen in there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jul 2011 09:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677317#M268968</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2011-07-05T09:53:19Z</dc:date>
    </item>
    <item>
      <title>central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677318#M269014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delay I was away for the long weekend and just saw ther results or your testing, please remove the profiling rules, or the profiled endpoint if one exists for this mac address. The webauth is not being triggered because you are performing mab and succeeding. Also if you are not using profiling on the ISE appliance, then you can either remove mab from the port config, or if you want to keep mab then remove the clients mac address from the ISE database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also one thing to mention is that the page that is going to be displayed is not on the ISE portal (unless something changed but we are coming up to speed) its a page stored on the switch itself that is used for webauth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know after you make these changes and how things go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jul 2011 05:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677318#M269014</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2011-07-06T05:26:07Z</dc:date>
    </item>
    <item>
      <title>central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677319#M269102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the user guide from ISE 1.0 mentions 2 possibilities for web authentication: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Wired NAD Interaction for Central WebAuth (where ISE does have a web portal where guests can login with credentials) --&amp;gt; this is what we want to use (page 675)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Wired NAD Interaction with Local WebAuth (where the switch has a stored html webpage and forwards the credentials as a RADIUS request to ISE) (page 677)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We prefer the first option to avoid uploading/updating a webpage to every switch (we have more than 40 switch stacks). We want a central (ISE) handling of every Guest request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm quite sure that the ISE offers the portal (web page to login) possibility as he does send the url-redirect RADIUS attribute. If I go manually to that page (&lt;A href="https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;action=cwa"&gt;https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;action=cwa&lt;/A&gt;) I&amp;nbsp; receive a ISE guest login page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also want to mention that the "MAB succeed" on the switch is not because the mac-adres was found in the ISE database (as the address isn't in the database), but because I've configured the "continue" option in case the user is not found in the database (which results in a MAB succceed on the switch).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But as I cannot find any documentation about configuring all steps on both ISE and switch, I'm really not sure if what I'm trying (with the MAB continue option and so on) is right... So it is also difficult to explain every step I've configured in ISE to try to make it work.&lt;/P&gt;&lt;P&gt;Do you know if Cisco is planning some kind of configuration guide or configuration example for centralized web authentication in the (near) future?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jul 2011 09:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677319#M269102</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2011-07-06T09:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677320#M269167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i've got the same issue like you - my client opens a browser and nothing happens. although, the log output on the cli seems to be correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4503-E(config-if)#no shutdown &lt;/P&gt;&lt;P&gt;4503-E(config-if)#&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %DOT1X-5-FAIL: Authentication failed for client (Unknown MAC) on Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %AUTHMGR-7-RESULT: Authentication result 'no-response' from 'dot1x' for client (Unknown MAC) on Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %AUTHMGR-7-FAILOVER: Failing over from 'dot1x' for client (Unknown MAC) on Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %AUTHMGR-5-START: Starting 'mab' for client (00c0.9f43.4ab3) on Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %MAB-5-SUCCESS: Authentication successful for client (00c0.9f43.4ab3) on Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %AUTHMGR-7-RESULT: Authentication result 'success' from 'mab' for client (00c0.9f43.4ab3) on Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %AUTHMGR-5-VLANASSIGN: VLAN 10 assigned to Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000800BAECB4| AUTHTYPE DOT1X| EVENT APPLY&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:00: %EPM-6-IPEVENT: IP 0.0.0.0| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000800BAECB4| AUTHTYPE DOT1X| EVENT IP-WAIT&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:01: %EPM-6-IPEVENT: IP 1.1.1.50| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000800BAECB4| AUTHTYPE DOT1X| EVENT IP-ASSIGNMENT&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jul&amp;nbsp; 7 07:42:01: %EPM-6-POLICY_APP_SUCCESS: IP 1.1.1.50| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000800BAECB4| AUTHTYPE DOT1X| POLICY_TYPE URL Redirect| POLICY_NAME &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://vmlab03.test.otz.at:8443/guestportal/gateway?sessionId=000000000000000800BAECB4&amp;amp;action=cwa"&gt;https://vmlab03.test.otz.at:8443/guestportal/gateway?sessionId=000000000000000800BAECB4&amp;amp;action=cwa&lt;/A&gt;&lt;SPAN&gt;| RESULT SUCCESS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:01: %EPM-6-POLICY_APP_SUCCESS: IP 1.1.1.50| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000800BAECB4| AUTHTYPE DOT1X| POLICY_TYPE URL Match ACL| POLICY_NAME ACL_CWA| RESULT SUCCESS&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:42:01: %AUTHMGR-5-SUCCESS: Authorization succeeded for client (00c0.9f43.4ab3) on Interface Fa2/1 AuditSessionID 000000000000000800BAECB4&lt;/P&gt;&lt;P&gt;4503-E(config-if)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By accident, i found out how to get the url-redirect "working".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4503-E(config-if)#&lt;/P&gt;&lt;P&gt;4503-E(config-if)#exit&lt;/P&gt;&lt;P&gt;4503-E(config)#ip access-list extended&amp;nbsp; ACL_CWA&lt;/P&gt;&lt;P&gt;4503-E(config-ext-nacl)#exit&lt;/P&gt;&lt;P&gt;4503-E(config)#&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jul&amp;nbsp; 7 07:49:22: %EPM-6-POLICY_APP_SUCCESS: IP 1.1.1.50| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000900C10B1E| AUTHTYPE DOT1X| POLICY_TYPE URL Redirect| POLICY_NAME &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://vmlab03.test.otz.at:8443/guestportal/gateway?sessionId=000000000000000900C10B1E&amp;amp;action=cwa"&gt;https://vmlab03.test.otz.at:8443/guestportal/gateway?sessionId=000000000000000900C10B1E&amp;amp;action=cwa&lt;/A&gt;&lt;SPAN&gt;| RESULT SUCCESS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:49:22: %EPM-6-POLICY_APP_SUCCESS: IP 1.1.1.50| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000900C10B1E| AUTHTYPE DOT1X| POLICY_TYPE URL Match ACL| POLICY_NAME ACL_CWA| RESULT SUCCESS&lt;/P&gt;&lt;P&gt;4503-E(config)#&lt;/P&gt;&lt;P&gt;4503-E(config)#&lt;/P&gt;&lt;P&gt;4503-E(config)#&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:49:56: %MAB-5-SUCCESS: Authentication successful for client (00c0.9f43.4ab3) on Interface Fa2/1 AuditSessionID 000000000000000900C10B1E&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:49:56: %AUTHMGR-7-RESULT: Authentication result 'success' from 'mab' for client (00c0.9f43.4ab3) on Interface Fa2/1 AuditSessionID 000000000000000900C10B1E&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:49:56: %EPM-6-POLICY_REQ: IP 1.1.1.50| MAC 00c0.9f43.4ab3| AuditSessionID 000000000000000900C10B1E| AUTHTYPE DOT1X| EVENT APPLY&lt;/P&gt;&lt;P&gt;*Jul&amp;nbsp; 7 07:49:57: %AUTHMGR-5-SUCCESS: Authorization succeeded for client (00c0.9f43.4ab3) on Interface Fa2/1 AuditSessionID 000000000000000900C10B1E&lt;/P&gt;&lt;P&gt;4503-E(config)#&lt;/P&gt;&lt;P&gt;4503-E(config)#&lt;/P&gt;&lt;P&gt;4503-E(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmm, the only thing i do is to enter the ACL which i use for the CWA and leave it imediately again.... without changing anything... strange right?&amp;nbsp; it looks like that the switch doesn't recongize the first EPM Event where the URL Redirect is assigned from the ISE. and for what reason ever, the switch "reapplies" these Attributes when i enter the corresponding ACL context.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and immediately after that, my client get's the correct url redirection..... as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for sure, that's nothing for production &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm not really sure, but for me this looks like an switch issue. the ISE returns the correct attributes with the radius-access. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm running a Cat45k with 15.0(2)SG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mayby one of the cisco guys can light up this issue...... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 16:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677320#M269167</guid>
      <dc:creator>mogli</dc:creator>
      <dc:date>2011-07-07T16:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677321#M269215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;The ACL must exist on the switch. The source IP should be any. The destination should match the traffic you want to redirect. For example if "url-redirect-ACL= MY-ACL" then the switch config should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;(config)# &lt;STRONG&gt;ip access-list extended MY-ACL
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt; &lt;A name="wp1061856"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;(config-ext-nacl)# &lt;STRONG&gt;permit tcp any 10.0.0.0 0.0.0.255 eq www
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if it's helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jul 2011 07:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677321#M269215</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2011-07-09T07:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677322#M269226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Actually, I already had an access-list "webauth" locally on the switch. But I had used a deny ACE instead of permit for http traffic, because I read somewhere that the redirect only triggers if the ACL denies the http traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, as that (denying the www traffic) doesn't work, I tried permitting the traffic in the ACL but it's still the same (no redirect unfortunately)... I'll keep searching for a solution.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jul 2011 10:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677322#M269226</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2011-07-11T10:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677323#M269258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got it working today. Here is my switch config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius &lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; width: 1px; height: 1px; overflow: hidden; top: 0px; left: -10000px;"&gt;﻿&lt;/DIV&gt;&lt;P&gt;ip device tracking&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet x/x&lt;BR /&gt; authentication host-mode multi-domain&lt;BR /&gt; authentication order mab&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; mab&lt;BR /&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended GUEST-ACL&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any host &lt;ISE-IP-ADDRESS&gt;&lt;BR /&gt; permit tcp any any eq www&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any any&lt;BR /&gt; &lt;/ISE-IP-ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I get the Guest Portal login only for HTTP traffic. Pings and other traffic are not redirected.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jul 2011 04:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677323#M269258</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2011-07-12T04:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: central web authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677324#M269278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bert opened a tac case with me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One important thing to differentiate is the default port ACL applied on the port. That ACL is for pre-auth traffic.&lt;/P&gt;&lt;P&gt;And the ACL that ISE sends back (and that should also be on the switch). That one is for regulating traffic after user authentication.&lt;/P&gt;&lt;P&gt;Ideally they should be different &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jul 2011 06:36:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/central-web-authentication/m-p/1677324#M269278</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-07-12T06:36:27Z</dc:date>
    </item>
  </channel>
</rss>

