<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Web auth not working in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970506#M418623</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey that seemed to fix it! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the extra line from the ACL and my client is now getting the authentication page! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a bunch for your efforts to fix it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can now safely move on the finish the postures configuration &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 24 Jun 2012 21:43:29 GMT</pubDate>
    <dc:creator>raga.fusionet</dc:creator>
    <dc:date>2012-06-24T21:43:29Z</dc:date>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970483#M418550</link>
      <description>&lt;P&gt;Hey Guys, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to configure Web Auth for users with no suplicant enabled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I followed the steps mentioned on the ISE lab walkthough however when I open the browser on the client machine all I get is a "page cannot be displayed". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; From the switch perspective I think everything looks fine however I can't really tell why the client never gets the login portal. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; #sh authentication sessions int gi 1/0/36&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet1/0/36&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; c80a.a96e.367c&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 172.16.14.32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; C8-0A-A9-6E-36-7C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; both&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorized By:&amp;nbsp; Authentication Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan Group:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACS ACL:&amp;nbsp; xACSACLx-IP-CENTRAL_WEB_AUTH-4fe67b28&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect ACL:&amp;nbsp; ACL-WEBAUTH-REDIRECT-ISE&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect:&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ISE.demo.local:8443/guestportal/gateway?sessionId=AC101065000000989BC260D4&amp;amp;action=cwa" target="_blank"&gt;https://ISE.demo.local:8443/guestportal/gateway?sessionId=AC101065000000989BC260D4&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; AC101065000000989BC260D4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x000000D8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0x61000098&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Runnable methods list:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&amp;nbsp;&amp;nbsp;&amp;nbsp; Not run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh run int gi 1/0/36&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 490 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/36&lt;/P&gt;&lt;P&gt; switchport access vlan 214&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport nonegotiate&lt;/P&gt;&lt;P&gt; switchport voice vlan 221&lt;/P&gt;&lt;P&gt; ip access-group ACL-ALLOW-ISE in&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order mab dot1x&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; storm-control broadcast level 30.00&lt;/P&gt;&lt;P&gt; storm-control multicast level 30.00&lt;/P&gt;&lt;P&gt; storm-control action trap&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh access-lists ACL-ALLOW-ISE&lt;/P&gt;&lt;P&gt;Extended IP access list ACL-ALLOW-ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit ip any any (771 matches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can post screenshots from the ISE if needed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raga &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:13:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970483#M418550</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2019-03-11T02:13:45Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970484#M418552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the contents of the ACL-WEBAUTH-REDIRECT-ISE ACL? It looks like you are referencing this ACL while sending a dACL that is defined in your authorization profile called "IP-CENTRAL_WEB_AUTH", you can start by removing the dACL from the authorization profile or if you want to use the dACL you will have to add the "radius vsa send authentication", here is a link to verify the radius commands you need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.1/user_guide/ise_sw_cnfg.html#wp1059651"&gt;http://www.cisco.com/en/US/docs/security/ise/1.1/user_guide/ise_sw_cnfg.html#wp1059651&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link that covers the ACL configs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.1/user_guide/ise_sw_cnfg.html#wp1059724"&gt;http://www.cisco.com/en/US/docs/security/ise/1.1/user_guide/ise_sw_cnfg.html#wp1059724&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 03:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970484#M418552</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T03:42:09Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970485#M418554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your quick response, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the ACLs that I have on the switch right now: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh access-lists&lt;/P&gt;&lt;P&gt;Extended IP access list ACL-ALLOW-ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit ip any any (2417 matches)&lt;/P&gt;&lt;P&gt;Extended IP access list ACL-DEFAULT-ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit udp any eq bootpc any eq bootps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit udp any any eq domain&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit udp any any eq tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 deny ip any any log&lt;/P&gt;&lt;P&gt;Extended IP access list ACL-POSTURE-REDIRECT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny udp any host 172.16.10.50 eq 8905&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 deny udp any host 172.16.10.50 eq 8906&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 deny tcp any host 172.16.10.50 eq 8443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 deny tcp any host 172.16.10.50 eq 8905&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 deny tcp any host 10.1.252.21 eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit ip any any&lt;/P&gt;&lt;P&gt;Extended IP access list ACL-WEBAUTH-REDIRECT-ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip any host 172.16.10.50 (896 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any (14182 matches&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 03:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970485#M418554</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T03:45:05Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970486#M418556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;172.16.10.50 is IP address of the ISE. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 03:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970486#M418556</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T03:45:37Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970487#M418558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I disabled the dACL from the Auth Profile and now I dont see any auth attempts from the switch side, actually I get this when I check the auth status: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh authentication sessions int gi 1/0/36&lt;/P&gt;&lt;P&gt;No Auth Manager contexts match supplied criteria&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already had the &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run | inc radius&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius&lt;/P&gt;&lt;P&gt;aaa accounting dot1x default start-stop group radius&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;/P&gt;&lt;P&gt;ip radius source-interface Vlan216&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server attribute 25 access-request include&lt;/P&gt;&lt;P&gt;radius-server dead-criteria time 5 tries 3&lt;/P&gt;&lt;P&gt;radius-server host 172.16.10.50 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;radius-server key 7 02050D4808095E731F&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 03:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970487#M418558</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T03:57:01Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970488#M418560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you able to resolve the web address of the initial requests i.e &lt;A href="https://community.cisco.com/www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;, if so can you resolve ISE.demo.local? Also is the svi for vlan 214 on this switch or is this trunked up to your core? If vlan 214 is trunked to the core then you will need to allow the clients to access the management vlan of this switch on the redirection ports (80,443,8080, and 8443).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me knwo if this works,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the reference guide for the ports to open if the 214 svi doesnt exist (note figure 3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/app_note_c27-577494.html"&gt;http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/app_note_c27-577494.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 04:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970488#M418560</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T04:00:12Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970489#M418563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you bounce the port after removing the dACL? MAB should have been triggered.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 04:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970489#M418563</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T04:01:28Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970490#M418566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE Config &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/3/2/93230-auth%20profiles%20web%20auth.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/3/2/93231-dACL.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 04:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970490#M418566</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T04:02:01Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970491#M418568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the authentications report do you see the dACL request coming from the switch, when you issued the show auth sess int gig 1/0/36 in the first post, the username still had the mac address, this should have changed to the xACSACLx... as the username.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 04:07:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970491#M418568</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T04:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970492#M418571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so I few pointers: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did forget to bounce the port that is why I was not seeing auth attemps, with the DACL removed the MAB kicks in like you mentioned:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh authentication sessions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp; MAC Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; Domain&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID&lt;/P&gt;&lt;P&gt;Gi1/0/4&amp;nbsp;&amp;nbsp;&amp;nbsp; 5475.d02b.152b&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VOICE&amp;nbsp;&amp;nbsp;&amp;nbsp; Authz Success&amp;nbsp; AC1010650000007A9B2B270E&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Gi1/0/36&amp;nbsp;&amp;nbsp; c80a.a96e.367c&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DATA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authz Failed&amp;nbsp;&amp;nbsp; AC101065000000A69BFE0DAE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it still didnt work, I went back and put the dACL back in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, for some reason I had an external DNS configured on my test machine therefore I couldnt resolve ISE.demo.local, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can resolve now that I pointed it to my internal DNS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SVI is on the core, not on this switch. When you say allow the clients to access the managment vlan of this switch on the redirection ports where exactly are we talking about? Switch ACLs or ISE ACLs? And which one? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The username now shows as&amp;nbsp; xACSACLx. (I cant remember what it was before) on the ISE, but It still looks like a MAC on the switch: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh authentication sessions int gi 1/0/36&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet1/0/36&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; c80a.a96e.367c&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 172.16.14.32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; C8-0A-A9-6E-36-7C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; both&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorized By:&amp;nbsp; Authentication Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan Group:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACS ACL:&amp;nbsp; xACSACLx-IP-CENTRAL_WEB_AUTH-4fe67b28&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect ACL:&amp;nbsp; ACL-WEBAUTH-REDIRECT-ISE&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect:&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ISE.demo.local:8443/guestportal/gateway?sessionId=AC101065000000AA9C0C39F0&amp;amp;action=cwa" rel="nofollow"&gt;https://ISE.demo.local:8443/guestportal/gateway?sessionId=AC101065000000AA9C0C39F0&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; AC101065000000AA9C0C39F0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x000000EB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0x4F0000AA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Runnable methods list:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&amp;nbsp;&amp;nbsp;&amp;nbsp; Not run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something I noticed on the report is that the posture is showing as "pending" I dont know if this has anything to do with my problem ... &lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/3/2/93232-report.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again man! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 04:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970492#M418571</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T04:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970493#M418576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, I wanted to highlight the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="font-style: normal; font-variant: normal; font-weight: normal; margin-bottom: 7pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; text-align: left; text-decoration: none; text-indent: 0pt; text-transform: none;"&gt;If&amp;nbsp; the switch is not configured for SVIs on the data VLANs, the switch can&amp;nbsp; send the login page to the host using a default route. When a default&amp;nbsp; route is used, all traffic from the switch to the host is sent to the&amp;nbsp; default router, which may be one or more hops away. The default router&amp;nbsp; then routes the traffic to the host back through the access switch.&amp;nbsp; Figure 3 shows the initial TCP traffic flow for this situation.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp9000251"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-style: normal; font-variant: normal; font-weight: normal; margin-bottom: 12pt; margin-left: 47pt; margin-right: 0pt; margin-top: 12pt; text-align: left; text-decoration: none; text-indent: -47pt; text-transform: none;"&gt;&lt;STRONG&gt;Figure 3.&lt;/STRONG&gt; TCP Traffic Flow for Login Page When No Layer 3 SVI for Host VLAN Exists on Access Switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp9000252"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-style: normal; font-variant: normal; font-weight: normal; margin-bottom: 7pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; text-align: left; text-decoration: none; text-indent: 0pt; text-transform: none;"&gt;&lt;IMG border="0" height="399" hspace="0" id="wp3000003" src="http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/images/app_note_c27-577494-03.jpg" vspace="0" width="538" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp9000253"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="font-style: normal; font-variant: normal; font-weight: normal; margin-bottom: 7pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; text-align: left; text-decoration: none; text-indent: 0pt; text-transform: none;"&gt;Although&amp;nbsp; this approach introduces additional hops in the return path from the&amp;nbsp; switch to the host, it produces negligible load on the default router&amp;nbsp; and intervening infrastructure since only the WebAuth traffic from the&amp;nbsp; switch to the host follows this path. In campus designs that do not use&amp;nbsp; SVIs on the data VLAN,&lt;A href="http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/app_note_c27-577494.html#wp9000157"&gt;&lt;SUP&gt;6&lt;/SUP&gt;&lt;/A&gt; a default route is typically already configured. In this case, no&amp;nbsp; additional configuration is required to support WebAuth. However,&amp;nbsp; problems may arise in the case in which traffic to the default router is&amp;nbsp; bridged through a stateful firewall. The original SYN packet in the TCP&amp;nbsp; handshake is consumed by the access switch, so the first packet that&amp;nbsp; the firewall sees is the SYN-ACK packet from the access switch. Stateful&amp;nbsp; firewalls typically drop SYN-ACK packets if they have not seen the&amp;nbsp; original SYN packet.&lt;BR /&gt; In this case, you will need to turn off stateful inspection for ports 80 and 443 on the firewall.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp9000254"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="font-style: normal; font-variant: normal; font-weight: normal; margin-bottom: 7pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; text-align: left; text-decoration: none; text-indent: 0pt; text-transform: none;"&gt;When&amp;nbsp; a non-crypto image is used, Cisco IOS Software will automatically&amp;nbsp; redirect all HTTP packets (TCP port 80) to itself. URLs that reference&amp;nbsp; HTTPS (TCP port 443) will not trigger redirection. If HTTPS support is&amp;nbsp; required, a Cisco IOS Software crypto image will be necessary. Cisco IOS&amp;nbsp; Software crypto images redirect HTTPS traffic and can be configured to&amp;nbsp; redirect HTTP traffic as well. URLs that contain a port other than 80 or&amp;nbsp; 443 (for example, &lt;A href="http://my-acs-server:2002/"&gt;http://my-acs-server:2002&lt;/A&gt;) will not trigger redirection.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp9000255"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-style: normal; font-variant: normal; font-weight: normal; margin-bottom: 12pt; margin-right: 0pt; margin-top: 6pt; text-decoration: none; text-transform: none;"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; WebAuth can intercept nonstandard ports using an IP port-to-application&amp;nbsp; map (PAM) entry that maps a new port to HTTP (or HTTPS). In addition,&amp;nbsp; the Cisco IOS Software HTTP server needs to be reconfigured to listen on&amp;nbsp; the nonstandard port. However, the Cisco IOS Software HTTP server can&amp;nbsp; run only on a single port. Therefore, support for port 80 and a&amp;nbsp; nonstandard port are mutually exclusive. If PAM is used to remap the&amp;nbsp; port used for HTTP, then URLs that reference the default port (80) will&amp;nbsp; not trigger redirection. In addition, if traffic to the default router&amp;nbsp; is bridged through a stateful firewall, that firewall will have to turn&amp;nbsp; off stateful inspection for the remapped port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp9000256"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="font-style: normal; font-variant: normal; font-weight: normal; margin-bottom: 7pt; margin-left: 0pt; margin-right: 0pt; margin-top: 0pt; text-align: left; text-decoration: none; text-indent: 0pt; text-transform: none;"&gt;If&amp;nbsp; the crypto image is used and HTTPS is also configured, the switch will&amp;nbsp; initiate an SSL session, even if the initial HTTP request was to port&amp;nbsp; 80. The advantage of this approach is that the user's credentials will&amp;nbsp; be sent over an encrypted channel to the switch and cannot be snooped.&amp;nbsp; The disadvantage is that the browser will prompt the end user to accept&amp;nbsp; the switch's certificate, adding another step to the authentication&amp;nbsp; process. By default, the switch sends a self-signed certificate. Some&amp;nbsp; browsers display a warning or error message when receiving a self-signed&amp;nbsp; certificate. This event can be mitigated by configuring the switch with&amp;nbsp; a certificate signed by a trusted third-party certificate authority.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp9000257"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; This should be what you are running into at this point. Please use the above for reference (verify you are running k9) and also use PAM to map 8443 to https to see if that works for you. Also check and see if you are using a default route (which i am sure since radius is working).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 04:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970493#M418576</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T04:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970494#M418580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went ahead and created port mapping for port 8443, however I still get a page cannot be displayed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip port-map https port 8443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The swiche does have a crypto image just in case. And the core switch is connected thru a trunk to this switch, they are actually cdp neighbors. The ISE is connected to the core. The SVI for vlan 214 and vlan 210 (where the ISE resides) are on the core. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something I'm noticing and that I dont know if it is the expected behavior is that from the test machine if I try to do an nslookup to the ise it fails. If I disable the wired interface and do the same nslookup using the wireless interface it does resolve. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know what else to check. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 06:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970494#M418580</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T06:18:39Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970495#M418586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First can you paste the show run | inc ip http (to make sure that http-server is enabled), if that is then lets check below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that the management vlan of the switch is on vlan 216? If so, is there an ACL on the core svi or the svi of the switch that is blocking traffic from vlan 214? If so we will need to open up the ports that the redirection traffic is destined to i.e. 80,443,8443..etc also do you see the browser changing its url to the redirection page after trying google?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 06:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970495#M418586</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T06:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970496#M418590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik, http and https are enabled and dont see anything that might be blocking the traffic as far as the interfaces go: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the access switch: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFNET-R1-P-SW1#sh run | inc http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip port-map https port 8443&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFNET-R1-P-SW1#sh ip int brie | ex una&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OK? Method Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&lt;/P&gt;&lt;P&gt;Vlan216&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.16.101&amp;nbsp;&amp;nbsp; YES NVRAM&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFNET-R1-P-SW1#sh run int vlan216&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 98 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan216&lt;/P&gt;&lt;P&gt; ip address 172.16.16.101 255.255.255.0&lt;/P&gt;&lt;P&gt; ip helper-address 172.16.10.237&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the core switch: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFNET-R2-P-SW3#sh run int vlan 216&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan216&lt;/P&gt;&lt;P&gt; ip address 172.16.16.3 255.255.255.0&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFNET-R2-P-SW3#sh run int vlan 214&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan214&lt;/P&gt;&lt;P&gt; ip address 172.16.14.3 255.255.255.0&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFNET-R2-P-SW3#sh run int vlan 210&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan210&lt;/P&gt;&lt;P&gt; ip address 172.16.10.3 255.255.255.0&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regular traffic works fine if I use the dot1x suplicant, so I dont think is an ACL issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I check the browser it says "resolving google.com" and then sits there and eventually times out and says the page cannot be displayed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it basically fails to do the dns lookup, I can confirm this by opening a command prompt and trying to resolve google.com or ise.demo.local. It basically fails thru the wired connection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I enable the dot1x supplicant and try the same lookups they work just fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What can be blocking the DNS requests?? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 07:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970496#M418590</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T07:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970497#M418595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you hitting the same authorization profiles for the dot1x and mab users? I saw the following in one of the previous posts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Gi1/0/36&amp;nbsp;&amp;nbsp; c80a.a96e.367c&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DATA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authz Failed&amp;nbsp;&amp;nbsp; AC101065000000A69BFE0DAE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this is still the case, also try removing the port to application mapping and set that back to 443 and we will have to check as to why the authorization failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping the dns servers from the client?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 07:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970497#M418595</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T07:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970498#M418599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maaaaaaaaaaaaaan you should have seen my face and my celebration haha ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got it ... thanks!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So here's what I did, you asked me if I could ping the DNS server, and the answer was NO... then I remember that the only thing I could ping from the client was the ISE which made me check the ACLs on the Switch and noticed this : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended IP access list ACL-WEBAUTH-REDIRECT-ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip any host 172.16.10.50 (3053 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any (59373 matches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only host not being redirected was the ISE itself, but what about the DNS? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I added a deny for the DNS and Voila!!!! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here how my ACL looks now: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show access-list ACL-WEBAUTH-REDIRECT-ISE&lt;/P&gt;&lt;P&gt;Extended IP access list ACL-WEBAUTH-REDIRECT-ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip any host 172.16.10.50 (3653 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15 deny ip any host 172.16.10.237 (441 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any (60050 matches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It works now, I hope this is a valid solution (I dont see any other one btw) and that It would not conflict with my future configs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!!!!!!!!!!!! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 07:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970498#M418599</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T07:42:52Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970499#M418602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think that is the right config, try removing the entry you added in the switch ACL and add the 'deny ip any any' in your dACL that is configured on the ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give that a try as I think that is the proper configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 08:03:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970499#M418602</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T08:03:27Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970500#M418606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright so, I removed the line and added the deny ip any any to the dACL and now it looks like this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit udp any any eq 53&lt;/P&gt;&lt;P&gt;permit icmp any any&lt;/P&gt;&lt;P&gt;permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;permit tcp any host 172.16.10.50 eq 8443&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even why the deny ip any any am still unable to resolve names. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you think adding that line to the switch ACL could create conflict? What is usually the recomended config? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 08:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970500#M418606</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T08:31:02Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970501#M418608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the recommended config based on the troubleshooting notes - &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_troubleshooting.html#wp1044595"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_troubleshooting.html#wp1044595&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 08:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970501#M418608</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-24T08:37:24Z</dc:date>
    </item>
    <item>
      <title>ISE Web auth not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970502#M418612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked the list and the only thing I was missing was a "permit udp any eq bootpc any eq bootps" on the dACL that I just added but it made no difference. I appears to me that the "permit udp any any eq domain" on the dACL is not taking place. I can ping the ISE but not resolve its name neither I can resolve google's, unless I modify the switch's ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything else looks fine to me, if I do a show epm session I can see the ACS ACL and the redirect. Also the av-pairs are configured as the troubleshooting guide explains. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess that for now, I'll stick to my workaround and later on once I have this on production I'll open a case with Cisco. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for your help! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Luis Raga&lt;/P&gt;&lt;P&gt; &lt;A name="wp1046675" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 15:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-web-auth-not-working/m-p/1970502#M418612</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2012-06-24T15:13:27Z</dc:date>
    </item>
  </channel>
</rss>

