<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Error 400 with Guest Portal Redirection in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839071#M473842</link>
    <description>&lt;P&gt;Thanks for the replies. The DNS entries are configured to round robin between the 2 nodes. Attached is the Authz profile. How do I see which ISE server is handling the request?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Apr 2019 23:00:31 GMT</pubDate>
    <dc:creator>NETAD</dc:creator>
    <dc:date>2019-04-15T23:00:31Z</dc:date>
    <item>
      <title>Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3838741#M473838</link>
      <description>&lt;P&gt;Hello, I have a 2 node deployment and I'm trying to redirect to a custom URL for the guest portal. I'm doing this by check the check box for static redirection in the authz profile. When that's configured redirection isn't working all the time. Clients are sometimes are getting an error 400 with a message stating that that the radius server terminated the session. How can this be fixed please. I have ISE 2.4 with patch 6 installed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 13:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3838741#M473838</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-15T13:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3838839#M473840</link>
      <description>&lt;P&gt;Since it is an intermittent issue, I recommend working with the TAC to troubleshoot further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;-Tim&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 15:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3838839#M473840</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2019-04-15T15:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839027#M473841</link>
      <description>&lt;P&gt;can you share a screenshot of your AuthZ Rules and results?&amp;nbsp; Do you test which PSN is processing the radius request and then return the appropriate Authorization profiles?&lt;/P&gt;
&lt;P&gt;What do the DNS entries look like for the FQDNs in those Authorization Profiles?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 21:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839027#M473841</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-04-15T21:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839071#M473842</link>
      <description>&lt;P&gt;Thanks for the replies. The DNS entries are configured to round robin between the 2 nodes. Attached is the Authz profile. How do I see which ISE server is handling the request?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 23:00:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839071#M473842</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-15T23:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839862#M473844</link>
      <description>&lt;P&gt;You need two of these AuthZ profiles.&amp;nbsp; One returning a static FQDN for ise01 and one returing static FQDN for ise02&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remember that each PSN gets the same programming from the PAN.&amp;nbsp; So to make the PSN "self-aware" you need to create a AuthZ Policy Set Authorization rule as such (the ISE hostname is typically the Gig0 hostname or if the portal is running on another interface you can alias the hostname too)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="redirect.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/34838i9E9E9CF4D9730D51/image-size/large?v=v2&amp;amp;px=999" role="button" title="redirect.PNG" alt="redirect.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 21:49:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839862#M473844</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-04-16T21:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839874#M473848</link>
      <description>&lt;P&gt;This was the solution. I had to create Authz policies for each ISE node calling their hostname. Now this caused a cert warning since I'm redirecting to the IP and it's not on the cert. I'm asking now if I can add the IPs to the SAN entries. Is there another way around this or we must update the cert?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 22:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3839874#M473848</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-16T22:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840012#M473852</link>
      <description>&lt;P style="text-align: left;"&gt;You should be redirecting to the FDQN instead.&amp;nbsp; Of course this presumes that you have those FQDNs in your DNS &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P style="text-align: left;"&gt;Redirecting to an IP is not ideal - would look a bit suspect in the client's browser &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; - and adding them to cert would fix it but it's just compounding the issue.&lt;/P&gt;
&lt;P style="text-align: left;"&gt;rather add DNS entries for each ISE node, and then add the DNS entries in the SAN of the cert.&amp;nbsp; You can re-use the same cert on both ISE nodes (or create one per PSN - but doesn't matter which option - if it comes from a public CA then one cert containing two SAN entries will be cheaper than buying two separate certs).&amp;nbsp; &amp;nbsp;A wildcard cert would also work, but those are more expensive.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 04:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840012#M473852</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-04-17T04:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840015#M473856</link>
      <description>&lt;P&gt;I actually have installed a wildcard cert. I will try to forward to the fqdn instead.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 04:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840015#M473856</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-17T04:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840488#M473876</link>
      <description>&lt;P&gt;Hi Arne, should it be 2 different dns records for each node guest portal and reference those in the static redirection box?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 16:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840488#M473876</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-17T16:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840549#M473877</link>
      <description>&lt;P&gt;If you are using the actual FQDNs of the ISE PSNs in the guest redirect URL you only need one redirect rule as ISE automatically puts the FQDN of the node in the URL.&amp;nbsp; If you are hiding the real FQDNs with names like guest1.mycompany.com and guest2.mycompany.com then you will need DNS entries for each PSN with the fake names and you will need a rule for each PSN that redirects to the fake name, i.e. if authenticated by PSN1 then redirect to guest1.mycompany.com.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 17:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840549#M473877</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-04-17T17:59:40Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840575#M473879</link>
      <description>Yes you're right. This broke again when I redirected to one dns record that resolves to both nodes IP's. I'm about to create new ones. One question for you please Paul, where do I find the ifauthenticated attribute in ISE 2.4?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Apr 2019 18:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840575#M473879</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-17T18:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840581#M473881</link>
      <description>&lt;P&gt;Here you go.&amp;nbsp; Just match on the hostname only not the FQDN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.JPG" style="width: 474px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/34911i80B22345C2309BF1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.JPG" alt="Capture.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 18:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840581#M473881</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-04-17T18:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840586#M473882</link>
      <description>&lt;P&gt;Attached is what I have so far.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 19:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3840586#M473882</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-17T19:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3843477#M473883</link>
      <description>&lt;P&gt;Hello after redirecting the 2 different A records, it worked for couple days and then we got the error 400 again. Any other suggestions you recommend me trying?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 19:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/3843477#M473883</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2019-04-23T19:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/5011046#M586984</link>
      <description>&lt;P&gt;We are having this same issue, did you have any progress? (We have an open TAC case)&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 13:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/5011046#M586984</guid>
      <dc:creator>brennosalgeiro</dc:creator>
      <dc:date>2024-02-01T13:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: Error 400 with Guest Portal Redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/5112257#M589536</link>
      <description>&lt;P&gt;We've experienced this same issue as well, "[400] Bad Request" on our ISE Guest Web-Auth portal. We had separate Authz rules built in our Policy for each separate PSN, so that kind of ruled that out. I worked with TAC for two months on this. This issue was intermittent, so very difficult to t/s. It came down to re-creating the issue.&lt;/P&gt;&lt;P&gt;The issue/error seemed to come up, prior to Guest users hitting the "Accept" button ("Authenticating") on our Web-Auth page, if they had auto-reconnect enabled for our Guest SSID, and did not accept the AUP, this error would sometimes come up on their browser, seemingly randomly. If they swiped/closed the browser and relaunched the page, the error would go away and then they would get the AUP page in order to Authenticate.&lt;/P&gt;&lt;P&gt;Ultimately, the issue appears when roaming APs, we would see this in ISE EP Debugs: "PortalWebActionException: Session token validation failed.&amp;nbsp; Token does not match token in the radius session."&lt;/P&gt;&lt;P&gt;Per the TAC Engineer, this is expected behavior, as when roaming APs, ISE gets new SessionID Token from AP, therefore the original URL redirect link is now invalid, causing the [400] Bad Request error.&lt;/P&gt;&lt;P&gt;"As you can see the error is that the token in the radius session is not matching the most probable reason is that roaming is happening on that session, so the tokens are different, which explains why the issue is not happening at all times. As it is an expected behavior there are no actions to take for now."&lt;/P&gt;&lt;P&gt;Hopefully this provides answers to others, but it still does not really resolve anything for us, as if reoccurring user enters our campus, associates to AP, auto-reconnect to Guest WLAN, then roams AP, will likely get the 400 Error. Just makes it an inconvenience to our visitors/guests, if they do not know to simply just re-launch the browser.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 17:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/error-400-with-guest-portal-redirection/m-p/5112257#M589536</guid>
      <dc:creator>Brian Hanson</dc:creator>
      <dc:date>2024-05-21T17:05:00Z</dc:date>
    </item>
  </channel>
</rss>

