<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE and pfSense - Captive Portal in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554715#M520409</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pfSense is an open source firewall, so my guess is that you are trying to use ISE Guest Portal as a way to webauth firewall users.&amp;nbsp; ISE is not a general purpose web server and web auth via ISE assumes specific capabilities on the access device (the firewall in this example).&amp;nbsp; I would not say impossible, but will say integration may be difficult as would require understanding of how LWA flow works (whereby ISE returns credentials to NAD via POST command) which we don't document.&amp;nbsp; Typical web auth is performed via CWA (a different mechanism whereby ISE never returns credentials to NAD).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Oct 2017 18:37:04 GMT</pubDate>
    <dc:creator>Craig Hyps</dc:creator>
    <dc:date>2017-10-26T18:37:04Z</dc:date>
    <item>
      <title>Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554712#M520404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi. I was wondering if anyone has been able to get the captive portal functioning with ISE. We would like to use the ISE portals in this scenario. If anyone has, is there a step by step out there somewhere to follow? I'm running into some issues and need to demonstrate this ability. Thanks in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 16:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554712#M520404</guid>
      <dc:creator>bonedaddy76</dc:creator>
      <dc:date>2017-10-26T16:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554713#M520406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can find a really good step-by-step here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.network-node.com/blog/2016/1/2/ise-20-guest-wireless-policy" title="http://www.network-node.com/blog/2016/1/2/ise-20-guest-wireless-policy"&gt;http://www.network-node.com/blog/2016/1/2/ise-20-guest-wireless-policy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is for a sponsored guest portal but you can tweak it if you want to only do a hotspot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 17:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554713#M520406</guid>
      <dc:creator>Joseph Johnson</dc:creator>
      <dc:date>2017-10-26T17:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554714#M520407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this is a rather general comment is there a specific use case or flow you're asking for?, there are many docs on how to get started under the communities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/space/5301"&gt;Identity Services Engine (ISE)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look under guest&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" data-containerid="5301" data-containertype="14" data-objectid="64018" data-objecttype="102" href="https://community.cisco.com/docs/DOC-64018" style="font-size: 12px; font-family: arial; color: #0a63a7;"&gt;ISE Guest &amp;amp; Web Authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;under documentation there is &lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" data-containerid="5301" data-containertype="14" data-objectid="64012" data-objecttype="102" href="https://community.cisco.com/docs/DOC-64012" style="font-size: 12px; font-family: arial; color: #0a63a7; text-decoration: underline;"&gt;ISE Design &amp;amp; Integration Guides&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 18:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554714#M520407</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-10-26T18:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554715#M520409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pfSense is an open source firewall, so my guess is that you are trying to use ISE Guest Portal as a way to webauth firewall users.&amp;nbsp; ISE is not a general purpose web server and web auth via ISE assumes specific capabilities on the access device (the firewall in this example).&amp;nbsp; I would not say impossible, but will say integration may be difficult as would require understanding of how LWA flow works (whereby ISE returns credentials to NAD via POST command) which we don't document.&amp;nbsp; Typical web auth is performed via CWA (a different mechanism whereby ISE never returns credentials to NAD).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 18:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554715#M520409</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-10-26T18:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554716#M520410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks folks. I appreciate the feedback. The guides are definitely a help. Right now I'm just trying to authorize with the built-in portal and it's getting failed. I have searched quite a bit and can't find anyone who has done this with ISE (or ACS for the matter), so I guess my first issue is getting the right attributes to pfSense. Like chyps says, it is open source and I know that there is going to be some work need put in to make it all run with a portal, but I wouldn't think it would be an issue just to get a RADIUS accept. So I was hoping that someone had this working and could point me in the right direction as to what to send back in the authorization profile. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 19:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554716#M520410</guid>
      <dc:creator>bonedaddy76</dc:creator>
      <dc:date>2017-10-26T19:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554717#M520411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Per previous, this is not something we expect to work out of the box, and may not even with some special coding on pfSense side.&amp;nbsp; Access-Accept is tied to a RADIUS session, not a simple web page login.&amp;nbsp; With legacy LWA flow, the user is sent to a web page by NAD and ISE captures and returns the credentials submitted by user back to the NAD which in turn sends to ISE in a separate RADIUS request.&amp;nbsp; I am not aware of any documentation that details the requirements on NAD to allow this flow with 3rd-party.&amp;nbsp; The CWA flow relies on support for URL redirection and CoA, and I highly doubt the firewall is capable of processing this flow without a high amount of customization.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 19:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554717#M520411</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-10-26T19:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554718#M520412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, I guess to be more specific, pfSense has a built-in portal and can simply send out a RADIUS query without engaging the ISE captive portal mechanism. I've been able to get access-accepts from other devices use ISE and RADIUS, but for some reason this device is giving me problems.So I'm not sure if it's getting what it needs from ISE or if there is another issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Image.gif" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/112809_Image.gif" style="height: 366px; width: 620px;" /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 19:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554718#M520412</guid>
      <dc:creator>bonedaddy76</dc:creator>
      <dc:date>2017-10-26T19:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554719#M520413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Christopher,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your initial query was specific to portal integration so now sounds like you are reverting the conversation to be about pure RADIUS auth without any integration of ISE portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"I was wondering if anyone has been able to get the captive portal functioning with ISE. We would like to use the ISE portals in this scenario." =&amp;gt; "pfSense has a built-in portal and can simply send out a RADIUS query without engaging the ISE captive portal mechanism"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For starters, make sure you enter IP address of PSN or LB VIP into RADIUS server address in your form!&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Next, you need to enable MSCHAPv2 under the Allowed Protocols for Default Network Access, or create custom Allowed Protocols entry which include MSCHAPv2 to match your auth protocol selection.&amp;nbsp; As a quick test, you can select PAP instead which is enabled by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/'Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 20:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554719#M520413</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-10-26T20:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and pfSense - Captive Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554720#M520415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, it is about both &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt; I wanted to start out with the internal portal and make sure it works and then work in the custom portal. I just posted the pic to show what was available, but I did set up the items as you lay out above. I know pfSense can recognize the wispr attributes, I'm just not sure if anything other than an accept or reject is needed to be returned from ISE to get a good authorization.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Oct 2017 14:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-pfsense-captive-portal/m-p/3554720#M520415</guid>
      <dc:creator>bonedaddy76</dc:creator>
      <dc:date>2017-10-27T14:57:45Z</dc:date>
    </item>
  </channel>
</rss>

