<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: H3C WX Series and Central Web Auth in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730256#M512627</link>
    <description>The subnet can only reside on one psn so there would be no replication or config sync needed right?&lt;BR /&gt;&lt;BR /&gt;Have to research the other question but likely no way to monitor from what you see now&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 22 Oct 2018 22:39:00 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2018-10-22T22:39:00Z</dc:date>
    <item>
      <title>H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560547#M512617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone had experience with integrating ISE Central Web Auth with &lt;STRONG&gt;H3C WX series&lt;/STRONG&gt; wireless controllers (e.g. H3C WX5004 and H3C WX5002V2)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a look at &lt;A href="https://community.cisco.com/docs/DOC-64547"&gt;ISE Third-Party NAD Profiles and Configs&lt;/A&gt; but that product is not listed there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a suspicion that they don't handle URL redirection.&amp;nbsp; I find their documentation is a bit tricky to understand.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 22:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560547#M512617</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-03-27T22:44:09Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560548#M512618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arne if they don’t then you can use the ISE auth vlan dhcp dns feature&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 22:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560548#M512618</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-03-27T22:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560549#M512619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did work with another account team, to prove out the WX5002 under ISE 2.0 (before Auth VLAN feature.&amp;nbsp; Most flows were successfully validated including some enhancements to ensure proper working with BYOD.&amp;nbsp; Since this testing conducted outside of Cisco QA and before we started posting to community, the NAD profile and config were never collected for posting.&amp;nbsp; From my notes, default HP Wireless profile was used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 05:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560549#M512619</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-03-28T05:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560550#M512620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Craig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I started testing ISE Guest integration with an H3C WX5004 today and we used the H3C's CLI config snippet posted on the community forum.&amp;nbsp; It's somewhat useful and we have a half working solution so far.&amp;nbsp; I am wondering how you got the CoA working?&amp;nbsp; Does the H3C understand CoA? &lt;/P&gt;&lt;P&gt;And then how do you tell it which ACL's to apply (e.g. Portal ACL vs Guest Authenticated ACL)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Arne&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 May 2018 05:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560550#M512620</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-05-01T05:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560551#M512621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mixed feedback on the CoA support.&amp;nbsp; One report for WX5002 was that it did not, but then had another team validate the same platform with CWA and other web-enabled flows with CoA.&amp;nbsp; So there may be changes based on version deployed or hw revs.&amp;nbsp; Ultimately would need validation with your specific product and version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The sample config posted shows that the H3C supports static URL.&amp;nbsp; In that case, you set the portal to be the one generated in the ISE Authorization Profile for 3rd-party redirect. The URL redirect type is set in NAD Profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is example for posted H3C config:&amp;nbsp; &lt;A href="https://community.cisco.com/docs/DOC-70347"&gt;HP-H3C-A5500-NAD-Config&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;portal server iseportal ip 10.10.13.188 port 8443 url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.10.13.188:8443/portal/gateway?portal=a6b8fa70-fc3e-11e4-a67c-005056bf2f0a&amp;amp;action=cwa" rel="nofollow" target="_blank"&gt;https://10.10.13.188:8443/portal/gateway?portal=a6b8fa70-fc3e-11e4-a67c-005056bf2f0a&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;portal free-rule 10 source ip any destination ip any&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example, the actual redirect URL was listed.&amp;nbsp; However, we provide option to set a "normalized URL" to reduce the length of entry.&amp;nbsp; Example:&lt;/P&gt;&lt;P&gt;&lt;A href="https://iseHost:8443/portal/g?p=6Rqz8dJ91WOjPibM6BAP5JQPEb" title="https://iseHost:8443/portal/g?p=6Rqz8dJ91WOjPibM6BAP5JQPEb"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; https://iseHost:8443/portal/g?p=6Rqz8dJ91WOjPibM6BAP5JQPEb&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Once user redirected to PSN, it will be redirected again to more detailed example shown in config snippet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 May 2018 16:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560551#M512621</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-05-01T16:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560552#M512622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following H3C WLAN&amp;nbsp; devices are supporting RADIUS CoA.&lt;/P&gt;&lt;P&gt;Software version:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;WX2500E-CMW520-E3703P61 (WX2540E)&lt;/LI&gt;&lt;LI&gt;WAC360-CMW520-E3703P61 (WAC360 series)&lt;/LI&gt;&lt;LI&gt;WX5004-CMW520-R2509P61 (WX5000 series)&lt;/LI&gt;&lt;LI&gt;WX3500E-CMW520-R3709P61 (WX3500E series)&lt;/LI&gt;&lt;LI&gt;WX6103-CMW520- R2509P61 (WX6000 series)&lt;/LI&gt;&lt;LI&gt;WX5500E-CMW520-R2609P61 (WX5500E series)&lt;/LI&gt;&lt;LI&gt;WX3000-CMW520-R3509P61 (WX3000E series)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HPE (H3C) 830 WLAN also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To configure the CoA client&amp;nbsp; on NAD:&lt;/P&gt;&lt;P&gt;"radius dynamic-author client trusted ip &amp;lt; ISE ip-address&amp;gt;"&lt;/P&gt;&lt;P&gt;"undo radius dynamic-author client trusted"&amp;nbsp;&amp;nbsp;&amp;nbsp; to remove it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default behavior is:&lt;/P&gt;&lt;P&gt;The device does not trust the DAE packets sent by any IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To configure the CoA port&amp;nbsp; on NAD:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;"radius dynamic-author port"&amp;nbsp; to specify the UDP port for listening for and receiving DAE packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default value: UDP port number is 3799.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To validate if your device supports CoA you should try&amp;nbsp; this command on device "radius dynamic-author client trusted ip &amp;lt; ISE ip-address&amp;gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 May 2018 07:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3560552#M512622</guid>
      <dc:creator>smashash</dc:creator>
      <dc:date>2018-05-02T07:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3729513#M512623</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/279380"&gt;@smashash&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have revisited this topic and I noticed something that I'd like confirmation on please.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The HPE wireless controller that I am working with is supported, but after speaking to HPE and Aruba engineers, they tell me that I have to use an auth-vlan mechanism on the HPE controller. And when I implemented this as they directed, I can't get it to work because I never see the CoA from ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is what happens&lt;/P&gt;
&lt;P&gt;1) HPE Controller sends MAC address to ISE&lt;/P&gt;
&lt;P&gt;2) ISE does lookup and doesn't find it - ISE sends &lt;FONT color="#FF0000"&gt;Access-Reject&lt;/FONT&gt; to HPE controller (this is the crux of it)&lt;/P&gt;
&lt;P&gt;3) HPE gets Access-Reject and places user in auth-vlan and kicks off a URL redirection (which points to ISE)&lt;/P&gt;
&lt;P&gt;4) User logs into ISE portal successfull - getsuccess page because credentials match.&lt;/P&gt;
&lt;P&gt;5) .....*BOOOOOM* - ISE doesn't send a CoA because it doesn't have a session for this portal login .... since ISE sent an Access-Reject.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;CoA only seems possible if ISE has an active session as a result of a positive MAB auth.&amp;nbsp; Is this true?&amp;nbsp; I mean, if I send an Access-Reject to a NAS, I don't expect an Accounting Start to come back as a result!!!&amp;nbsp; That would be weird.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If Craig were still around I would have asked him this, but he mentioned in earlier responses in this thread that the ISE 2.0 config was never captured.&amp;nbsp; Pity.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 03:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3729513#M512623</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-22T03:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3729628#M512624</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;
&lt;P&gt;That is correct. it requires active session in ISE to send CoA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried the Auth-VLAN (Guest-VLAN)&amp;nbsp; solution for 3rdparty NADs?&lt;/P&gt;
&lt;P&gt;more info:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-21/200604-Configure-Third-Party-NAD-Redirection-on.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-21/200604-Configure-Third-Party-NAD-Redirection-on.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 07:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3729628#M512624</guid>
      <dc:creator>smashash</dc:creator>
      <dc:date>2018-10-22T07:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3729766#M512625</link>
      <description>Ise manages actives sessions in order to send COA&lt;BR /&gt;&lt;BR /&gt;Why not use ise auth vlan instead?&lt;BR /&gt;</description>
      <pubDate>Mon, 22 Oct 2018 12:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3729766#M512625</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-10-22T12:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730252#M512626</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/279380"&gt;@smashash&lt;/a&gt;&amp;nbsp;- thanks for the link - &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&amp;nbsp;my customer has started evaluating this but it's not a trivial matter, since we have around 900 locations, each needing its own DHCP scope.&amp;nbsp; The PSN's are centrally located in two DC's.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And then the operational overhead - try adding 900 scopes into an ISE GUI!!!&amp;nbsp; And then we don't only have one PSN - we have 4. This config doesn't replicate across PSN's.&amp;nbsp; How does one manage the DHCP leases?&amp;nbsp; Is there management and monitoring for this in ISE?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 22:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730252#M512626</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-22T22:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730256#M512627</link>
      <description>The subnet can only reside on one psn so there would be no replication or config sync needed right?&lt;BR /&gt;&lt;BR /&gt;Have to research the other question but likely no way to monitor from what you see now&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 22 Oct 2018 22:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730256#M512627</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-10-22T22:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730409#M512628</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&amp;nbsp;and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/279380"&gt;@smashash&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;After a whole day of hacking around on the H3C WX 5004, we got it working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The trick was to NOT send ACCESS-REJECT as suggested by HPE&amp;nbsp;- but rather, to send ACCESS-ACCEPT.&amp;nbsp; Grrrrrr!!!!&lt;/P&gt;
&lt;P&gt;This of course causes a session to be built in ISE that is then later used for the COA function (a very crucial part of the equation).&lt;/P&gt;
&lt;P&gt;The second trick was to always perform dynamic VLAN override - ISE needs to send back the auth VLAN in the "MAC unknown in ISE" flow.&amp;nbsp; And in the "MAC known in ISE" flow we send back the Guest VLAN.&lt;/P&gt;
&lt;P&gt;Booom!&amp;nbsp; Works.&amp;nbsp; I can even send an ACL to the controller via the Radius Filter-ID attribute.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We're also running some ancient version of Comware for those who are interested - Release 2509P51&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 05:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730409#M512628</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-23T05:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730477#M512629</link>
      <description>Nice!  Good job!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Oct 2018 07:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730477#M512629</guid>
      <dc:creator>smashash</dc:creator>
      <dc:date>2018-10-23T07:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730706#M512630</link>
      <description>Nice work Arne can you put in a new document to share the clean assessment?&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3730706#M512630</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-10-23T13:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3739458#M512631</link>
      <description>&lt;P&gt;Sure thing.&amp;nbsp; Is there any particular format/template or location for this document?&amp;nbsp; I was planning to put the document under &lt;A id="link_1" class="lia-link-navigation crumb-community lia-breadcrumb-community lia-breadcrumb-forum" href="https://community.cisco.com/" target="_blank"&gt;Cisco Community&lt;/A&gt; &amp;gt; &lt;A id="link_4" class="lia-link-navigation crumb-board lia-breadcrumb-board lia-breadcrumb-forum" href="https://community.cisco.com/t5/identity-services-engine-ise/bd-p/5301j-disc-ise" target="_blank"&gt;Technology and Support &amp;gt; Security &amp;gt; Identity Services Engine (ISE)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Give me a few days and it will be done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2018 21:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3739458#M512631</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-11-05T21:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3747311#M512632</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;I finally got around to writing up my solution to this question in a &lt;A href="https://community.cisco.com/t5/security-documents/ise-guest-portal-integration-with-h3c-wx-series-controller-from/ta-p/3747303" target="_self"&gt;new article here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 12:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3747311#M512632</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-11-15T12:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: H3C WX Series and Central Web Auth</title>
      <link>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3747367#M512633</link>
      <description>Thank you!&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Nov 2018 13:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/h3c-wx-series-and-central-web-auth/m-p/3747367#M512633</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-11-15T13:20:31Z</dc:date>
    </item>
  </channel>
</rss>

