<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE CWA (Guest Portal) - Broken By Design in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3734062#M507548</link>
    <description>&lt;P&gt;CWA is actually performing PAP-ASCII internally between the guest portal and ISE. That TechNotes is performing DOT1X in a WPA2 Enterprise network so not applicable to CWA.&lt;/P&gt;
&lt;P&gt;I can't tell how you got HTTP 400 Bad Request, which might need a TAC case to debug.&amp;nbsp;It worked ok for me as below:&lt;/P&gt;
&lt;P&gt;The trick&amp;nbsp;to restrict users with LDAP in this case is to put them in a particular organization unit (OU); e.g. "OU=Users,OU=HCC,DC=demo,DC=local", in our lab.&lt;/P&gt;
&lt;P&gt;I first attempted a user not in the OU so it failed with user not found. Then, logged-in ok with a user in the OU.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-10-26 at 6.51.56 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/21411iE3A63EC06B0AC13B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-10-26 at 6.51.56 PM.png" alt="Screen Shot 2018-10-26 at 6.51.56 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 27 Oct 2018 02:04:19 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-10-27T02:04:19Z</dc:date>
    <item>
      <title>Cisco ISE CWA (Guest Portal) Authentication -&gt; Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3709455#M507531</link>
      <description>&lt;P&gt;In the last days I have been working with the guest portals of the Cisco ISE (v2.1.0). My result:&amp;nbsp;"Broken By Design".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are currently using Local Web Authentication (Layer 3 Auth) on the Cisco WLC. The WLC forwards the username/password by radius to the ISE. In the "Policy Set" I can then process this request as "WLC_Web_Authentication". Currently we use several Windows AD groups and different GuestType groups per tenant in the Autorizaiton Policy.&lt;/P&gt;
&lt;P&gt;The disadvantage of Local Web Authentication is that guests are thrown out of the WLAN at undefined intervals (broadcast key refresh), so guests have to enter their username and password again (mainly&amp;nbsp;with smarphones in deep sleep). Sleeping client we cannot use, because our guests WLANs are secured with PSK.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With Central Web Authentication, this is bypassed by storing the MAC address of the guest&amp;nbsp;device in an Identity Group, so with broadcast key refresh only Layer 2 authentication (PSK + MAC address) is required and no Layer&amp;nbsp;3 (PSK + WebAuth) authentication.&lt;/P&gt;
&lt;P&gt;We would also like to have Web Authentication in a larger Internet switch environment (about 80 switches) so that guests have to authenticate themselves before they can use the Internet. In this scenario, however, Local Web Authentication is hardly feasible since SSL/TLS certificates and the Captive Portal would have to be installed on every switch.&lt;/P&gt;
&lt;P&gt;That's why I tested the CWA of the ISE. The main problem is that the guest portals are designed in a way that you can't define rules for the allowed guests (Windows AD groups, GuestTypes), but only "Identy Source Seuences". But if I add an AD-connection in the Identy Source Seuences it always includes ALL users, but I only want to add a part by groups.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After some searching I found the following workaround.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-only-allow-certain-ad-group-to-register-their-devices/td-p/3461321" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-only-allow-certain-ad-group-to-register-their-devices/td-p/3461321&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554392" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554392&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By linking "SponsoredGuestPortal - CoA -&amp;gt; Rules with AD-Groups/GuestTypes -&amp;gt; HotspotGuestPortal - CoA" it is possible to assign single AD-Groups/GuestTypes, but with the following disadvantages: - the initial WLAN connection is disconnected twice (because of CoA) - Since the MAC address of the guest is moved by the HotspotGuestPortal into the final Identiy Group, no reference to the registered guest ( AD-ID or guest ID) is stored in the properties of the MAC address (under Identies).&lt;/P&gt;
&lt;P&gt;which means that in the Identity Group many MAC addresses of the guests are available by the successful registration, but you cannot see however which MAC address belongs to which AD identification.???&lt;/P&gt;</description>
      <pubDate>Fri, 26 Oct 2018 13:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3709455#M507531</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-10-26T13:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3709662#M507532</link>
      <description>yes this is the way it works. Please reach out through your sales team to our ISE product managers for feature request.</description>
      <pubDate>Wed, 19 Sep 2018 15:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3709662#M507532</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-19T15:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3710947#M507533</link>
      <description>&lt;P&gt;You are confirming that there is currently no way to create a guest portal where you can restrict access to certain user groups. Either all users of an Identy Source or none. Even if I would create a feature request now, Cisco might not care much about it.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 06:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3710947#M507533</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-09-21T06:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3710978#M507534</link>
      <description>&lt;P&gt;Christian, it is possible to tie it to separate endpoint group based on AD group and also tie the endpoint with portal user. The Flow is similar to what you have described but instead of forcing the session through hotspot portal after initial CoA, use BYOD portal. Now, you don’t want to make the endpoint go through the full BYOD process, so the trick is to make any endpoint OS to be unsupported so endpoints will be exempted from full BYOD flow. This can be achieved by:&lt;BR /&gt;Administration &amp;gt; System &amp;gt; Settings &amp;gt; Client Provisioning. Change ‘Native Supplicant Provisioning Policy Unavailable:’ setting to Allow Network Access&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-21 at 2.45.22 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19044iE26CB6573A6B7895/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-21 at 2.45.22 AM.png" alt="Screen Shot 2018-09-21 at 2.45.22 AM.png" /&gt;&lt;/span&gt;&lt;BR /&gt;Policy &amp;gt; Client Provisioning. Modify the condition or simply disable all rules&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-21 at 2.45.09 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19045i32863907DAE74768/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-21 at 2.45.09 AM.png" alt="Screen Shot 2018-09-21 at 2.45.09 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Once above is done, create matching endpoint groups, then matching BYOD portal that registers to respective endpoint groups, and finally authorization profiles for each BYOD portals.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-21 at 2.46.15 AM.png" style="width: 614px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19046iFD150C1479581F43/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-21 at 2.46.15 AM.png" alt="Screen Shot 2018-09-21 at 2.46.15 AM.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-21 at 2.45.50 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19047iBB3AB0D8D20CC194/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-21 at 2.45.50 AM.png" alt="Screen Shot 2018-09-21 at 2.45.50 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After that, create policy to permit based on endpoint group and another to provide respective BYOD portal based on AD group.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-21 at 2.46.57 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19048iEABF2F8DD5B7FF5E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-21 at 2.46.57 AM.png" alt="Screen Shot 2018-09-21 at 2.46.57 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Note that while the flow is configurable on ISE 2.1, you will need 2.4 to make the username visible in the livelog.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 15:30:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3710978#M507534</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-21T15:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728551#M507536</link>
      <description>&lt;P&gt;Thank you for this food for thought, I haven't thought about that yet.&lt;/P&gt;
&lt;P&gt;This solution has however also the following disadvantages:&lt;BR /&gt;- In the WLC you have to activate "Captive Network Assistant Bypass" in the corresponding WLAN under Layer 3 Security,&amp;nbsp;because the Mini Safari Broser (for Captive Portal sites)&amp;nbsp;is not supported by BYOD (will be used with Apple iOS devices). This means that guests have to manually call an http (no https) url in the browser. &lt;BR /&gt;- Sometimes the CoA (Dynamic Authorization failed) [reason unknown] is not working, so a guest does not complete the process (GuestPortal -&amp;gt; CoA -&amp;gt; BYODPortal).&lt;BR /&gt;If the terminal device has defined another WLAN (which is also within range), the terminal device connects to this WLAN after the CoA. Thus the guest does not see the BYOD portal. &lt;BR /&gt;- In the GuestPortal ALL identifiers are still allowed, so a not authorized but valid&amp;nbsp;account doesn't get an error message, but always gets back to the GuestPortal. The whole thing therefore looks like an error and not after a non-authorized login.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Therefore there is unfortunately still no possibility to bring guests into the WLAN/LAN using certain AD groups.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 12:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728551#M507536</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-10-19T12:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728585#M507538</link>
      <description>&lt;P&gt;Why can't we just use the RADIUS callback trick we use on other portals?&amp;nbsp; Unless I am reading this wrong you don't want to break out AD groups into different endpoint identity groups you just want to only allow certain AD groups onto the guest Internet access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Define your ISE PSNs as a RADIUS token server, call it RADIUS_Callback.&amp;nbsp; Then define a sequence that uses the Guest Users and RADIUS Callback.&amp;nbsp; Define your ISE PSNs as network devices and assign them to an NDG called ISE_PSNs.&amp;nbsp; Create a policy set for device types ISE_PSNs knowing the only time it will be hit is the guest portal doing a RADIUS callback.&amp;nbsp; Then in your authorization rules for the RADIUS Callback policy set only allow the AD groups you want.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 12:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728585#M507538</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-19T12:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728592#M507539</link>
      <description>&lt;P&gt;I have already tried the RADIUS callback trick for about 1 year, but I couldn't use it either. &lt;BR /&gt;I mean I couldn't see which portal the request came from, because we have several portals with 5 different ADs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition to the AD groups (for private end devices of the employees) we use the internal users (with different groups "GuestType_...").&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 12:50:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728592#M507539</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-10-19T12:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728613#M507540</link>
      <description>Ahh yeah sorry missed you had 5 different portals.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Oct 2018 13:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3728613#M507540</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-19T13:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3731530#M507541</link>
      <description>&lt;P&gt;I just noticed that BYOD requires a Plus license and no normal Base license. &lt;BR /&gt;&lt;BR /&gt;Question:&lt;BR /&gt;Has anyone ever built an LDAP proxy (ISE -&amp;gt; LDAP Proxy -&amp;gt; Microsoft AD)? the LDAP proxy will filter to certain AD groups, because the ISE cannot do that.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 11:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3731530#M507541</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-10-24T11:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3732271#M507543</link>
      <description>&lt;P&gt;AD itself can serve LDAP, by default. In our lab, we normally create a LDAP external ID store and add OU qualifiers to narrow the subject search base.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-10-24 at 8.27.30 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/21190iEDC98CCE0B320D26/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2018-10-24 at 8.27.30 PM.png" alt="Screen Shot 2018-10-24 at 8.27.30 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 03:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3732271#M507543</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-25T03:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3733666#M507545</link>
      <description>&lt;P&gt;Right now I doubt that LDAP can be used with CWA.&lt;/P&gt;
&lt;P&gt;Because the TechNotes only mention EAP-GTC, EAP-TLS and PEAP-TLS but no PAP_ASCII.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/119149-configure-ise-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/119149-configure-ise-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I test it, I only get the following error message at the guest portal during login.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [ 400 ] Bad Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; The request is invalid due to malformed syntax or invalid data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;------&lt;/P&gt;
&lt;P&gt;However, the solution was also described here.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/policy-and-access/sponsored-guest-portal-with-active-directory-users-and-group/td-p/2762468" target="_blank"&gt;https://community.cisco.com/t5/policy-and-access/sponsored-guest-portal-with-active-directory-users-and-group/td-p/2762468&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have an organizational unit in which all AD users are included (e.g. AllUsers) and an AD group (e.g. WLANUsers) in which the wlan users are included.&lt;BR /&gt;&lt;BR /&gt;Subject Search Base= OU=ALLUsers,OU=TEST,OU=Customer,DC=TestIntra,DC=de&lt;BR /&gt;Group Search Base= CN=WLANUsers,OU=US-TEST,DC=TestIntra,DC=de&lt;BR /&gt;&lt;BR /&gt;The aim is that the LDAP Connector only authorizes the AD users in the WLANUsers group, all other users from ALLUsers not. Would the filter be correct? &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Oct 2018 13:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3733666#M507545</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-10-26T13:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3734062#M507548</link>
      <description>&lt;P&gt;CWA is actually performing PAP-ASCII internally between the guest portal and ISE. That TechNotes is performing DOT1X in a WPA2 Enterprise network so not applicable to CWA.&lt;/P&gt;
&lt;P&gt;I can't tell how you got HTTP 400 Bad Request, which might need a TAC case to debug.&amp;nbsp;It worked ok for me as below:&lt;/P&gt;
&lt;P&gt;The trick&amp;nbsp;to restrict users with LDAP in this case is to put them in a particular organization unit (OU); e.g. "OU=Users,OU=HCC,DC=demo,DC=local", in our lab.&lt;/P&gt;
&lt;P&gt;I first attempted a user not in the OU so it failed with user not found. Then, logged-in ok with a user in the OU.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-10-26 at 6.51.56 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/21411iE3A63EC06B0AC13B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-10-26 at 6.51.56 PM.png" alt="Screen Shot 2018-10-26 at 6.51.56 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Oct 2018 02:04:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3734062#M507548</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-27T02:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3734533#M507549</link>
      <description>&lt;P&gt;Another idea is to use SAML IdP as the auth source for the guest portal. Several IdPs use groups to restrict access; e.g.,&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://duo.com/docs/using-groups" target="_blank"&gt;Using Groups | Duo Security&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Oct 2018 23:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3734533#M507549</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-28T23:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3734685#M507552</link>
      <description>&lt;P&gt;We have ADs with more than 10.000 users and it is not desired to move users within OUs, only AD groups work &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Therefore I had the idea with a LDAP proxy. In the LDAP Proxy only the desired AD groups are deposited and the ISE receives a deny from the Proxy, when the user is not in the corresponding AD group.&lt;/P&gt;
&lt;P&gt;Unfortunately you have to run a separate service (e.g. OpenLDAP) and if it works at all I don't know.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 08:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3734685#M507552</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-10-29T08:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3779874#M507553</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/other-security-subjects/is-possible-to-use-cwa-chaining-with-mab-authentication/m-p/3779687#M148685" target="_blank"&gt;https://community.cisco.com/t5/other-security-subjects/is-possible-to-use-cwa-chaining-with-mab-authentication/m-p/3779687#M148685&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 08:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3779874#M507553</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2019-01-15T08:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE CWA (Guest Portal) - Broken By Design</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3780300#M507556</link>
      <description>have you seen this? &lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/guest-portal-how-to-restrict-employee-access-to-only-specific-ad/m-p/3460223/thread-id/3355#M3360" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/guest-portal-how-to-restrict-employee-access-to-only-specific-ad/m-p/3460223/thread-id/3355#M3360&lt;/A&gt;</description>
      <pubDate>Tue, 15 Jan 2019 16:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-guest-portal-authentication-gt-broken-by-design/m-p/3780300#M507556</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-01-15T16:45:24Z</dc:date>
    </item>
  </channel>
</rss>

