<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wireless Authorization Profile Forcing WEB Proxy IP in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3883042#M471846</link>
    <description>&lt;P&gt;Thank you very much, for your response.&lt;/P&gt;&lt;P&gt;For corporation computers I am using DHCP 252 option with PAC file URL that is okay. But, what about mobile phones? I am no sure that phones will understand PAC file.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2019 07:52:14 GMT</pubDate>
    <dc:creator>orkhan.rustamli.96</dc:creator>
    <dc:date>2019-07-02T07:52:14Z</dc:date>
    <item>
      <title>Wireless Authorization Profile Forcing WEB Proxy IP</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3882364#M471844</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have just started deploying my wireless system with 1850 Mobility Express solutions. I have configured Radius authentication. The only problem is that I want to create WLAN with corresponding user subnet VLAN which can only connect internet through my WSA as proxy. So is there any Radius attribute where i can use it for forcing my WSA IP and Port to mobile phones so that they can connect internet. If no I will have to create separate Wireless Subnet which is not preferable solution for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance!&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 08:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3882364#M471844</guid>
      <dc:creator>orkhan.rustamli.96</dc:creator>
      <dc:date>2019-07-01T08:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Authorization Profile Forcing WEB Proxy IP</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3882865#M471845</link>
      <description>&lt;P&gt;I believe we do this by hosting the proxy PAC on a web server and using DNS or DHCP to discovery it, per &lt;A href="https://docs.microsoft.com/en-us/windows/desktop/winhttp/winhttp-autoproxy-support" target="_blank"&gt;WinHTTP AutoProxy Support&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;I do not think any RADIUS attribute can help with that. At least I am not aware of.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 20:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3882865#M471845</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-01T20:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Authorization Profile Forcing WEB Proxy IP</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3883042#M471846</link>
      <description>&lt;P&gt;Thank you very much, for your response.&lt;/P&gt;&lt;P&gt;For corporation computers I am using DHCP 252 option with PAC file URL that is okay. But, what about mobile phones? I am no sure that phones will understand PAC file.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 07:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3883042#M471846</guid>
      <dc:creator>orkhan.rustamli.96</dc:creator>
      <dc:date>2019-07-02T07:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Authorization Profile Forcing WEB Proxy IP</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3883211#M471847</link>
      <description>&lt;P&gt;In order to support various clients in wild ranges, &lt;A href="https://en.wikipedia.org/wiki/Proxy_server#Transparent_proxy" target="_blank"&gt;&lt;SPAN class="toctext"&gt;Transparent proxy&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;is a better option. Below is what we used in our training lab using a Cisco 3650 with ip routing enabled:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;conf t
!
! create redirect ACL for WCCP
ip access-list extended wccp-redirect
 deny   ip any 10.0.0.0 0.255.255.255
 permit tcp 10.0.0.0 0.255.255.255 any eq www
 permit tcp 10.0.0.0 0.255.255.255 any eq 443
!
! enable wccp with service-id 90, matched WSA config
ip wccp 90 redirect-list wccp-redirect
!
! apply wccp to the client VLAN 50
interface Vlan50
 ip wccp 90 redirect in
!
end&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 13:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-authorization-profile-forcing-web-proxy-ip/m-p/3883211#M471847</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-02T13:00:16Z</dc:date>
    </item>
  </channel>
</rss>

