<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guestusers configured to bypass guest portal fail with msg userdisabled - CSCva84435 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539007#M511017</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCva84435 is currently not reproducible. If you are able to, please contact the engineering team directly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Apr 2018 04:02:07 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-04-11T04:02:07Z</dc:date>
    <item>
      <title>Guestusers configured to bypass guest portal fail with msg userdisabled - CSCva84435</title>
      <link>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539003#M511013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer has a query if this bug has been fixed in any release or patch on ISE.&lt;/P&gt;&lt;P&gt;Seen several requests on this bug and it turned out to be &lt;SPAN style="font-size: 10pt;"&gt;mis-&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;configuration&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;To avoid hitting the error, the customers need to enable "guest portal bypass". Customer doesn't want to enable because need AUP page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer using secure SSID with hotspot portal. Need to use a secured SSID, so guests enter their credentials on their device to get onto the SSID, then are redirected to an AUP page before being granted full access. It was all working fine on 1.4 prior upgrading to 2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for fix of the bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gagan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 20:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539003#M511013</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2018-04-05T20:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: Guestusers configured to bypass guest portal fail with msg userdisabled - CSCva84435</title>
      <link>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539004#M511014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What isn't working in 2.2?&amp;nbsp; There are no guest users in a Hotspot portal.&amp;nbsp; The sole purpose of the hotspot portal is to present AUP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 22:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539004#M511014</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-04-05T22:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: Guestusers configured to bypass guest portal fail with msg userdisabled - CSCva84435</title>
      <link>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539005#M511015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Setup used to work in 1.4. Since upgrade to 2.2 stopped working.&lt;/P&gt;&lt;P&gt; Try to authenticate with guest credential using dot1x (will fail)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found a Junked bug &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: 'Times New Roman'; font-size: large;"&gt;&lt;STRONG&gt;&lt;A href="https://cdetsng.cisco.com/webui/#view=CSCvg89759"&gt;CSCvg89759&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;A href="http://wwwin.cisco.com/ops/infra/pds/cbms/cdets/legend.shtml" style="font-family: 'Times New Roman'; font-size: medium;" target="_blank" title="Help"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;IMG border="0" class="jive-image" height="15" src="https://cdetsweb-prd.cisco.com/apps/files/xslt/help.png" width="15" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: #000000; font-family: 'Times New Roman'; font-size: medium;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: 'Times New Roman'; font-size: large;"&gt;&lt;STRONG&gt;Guest user Suspend-Reinstate Allows to bypass Guest portal&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: 'Times New Roman'; font-size: large;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: 'Times New Roman'; font-size: medium;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tac-repro&lt;/STRONG&gt; from bug: &lt;/P&gt;&lt;P&gt;Configure one user type not to have "Allow guest user to bypass portal" (disabled by default)&lt;/P&gt;&lt;P&gt;Login to sponsor portal&lt;/P&gt;&lt;P&gt;Create user of said user type&lt;/P&gt;&lt;P&gt;Try to authenticate with guest credential using dot1x (will fail)&lt;/P&gt;&lt;P&gt;On sponsor portal - suspend and re-instate user.&lt;/P&gt;&lt;P&gt;Authenticate with this user again - will succeed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if this bug has been fixed or not in some release. Customer doesn't want to apply the workaround.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gagan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 22:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539005#M511015</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2018-04-05T22:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Guestusers configured to bypass guest portal fail with msg userdisabled - CSCva84435</title>
      <link>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539006#M511016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest you work with tac to investigate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 23:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539006#M511016</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-04-05T23:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: Guestusers configured to bypass guest portal fail with msg userdisabled - CSCva84435</title>
      <link>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539007#M511017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCva84435 is currently not reproducible. If you are able to, please contact the engineering team directly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2018 04:02:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guestusers-configured-to-bypass-guest-portal-fail-with-msg/m-p/3539007#M511017</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-04-11T04:02:07Z</dc:date>
    </item>
  </channel>
</rss>

