<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Guest CWA and HTTPS redirection in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/4029667#M530555</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;We found that disabling “captive bypass enable” solved the issue.&lt;BR /&gt;So that the client uses it’s built in function for detecting a web portal.&lt;BR /&gt;I don’t know why, but that solved the issue.&lt;BR /&gt;</description>
    <pubDate>Fri, 14 Feb 2020 08:45:16 GMT</pubDate>
    <dc:creator>fabianwickman</dc:creator>
    <dc:date>2020-02-14T08:45:16Z</dc:date>
    <item>
      <title>ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583892#M530545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since WLC 8.0 it starts to support HTTPS redirection for CWA, post WLC v8.0 the HTTPS redirect is supported but there are concerns about WLC performance by handling large amount of SSL traffic.&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;As a result , the ISE Guest CWA redirection function heavily now relies on initiating connections to HTTP URL. As more and more web sites are now HTTPS enabled what is the best practice to handle this design? do we have to pick between performance hit by enabling HTTPS redirection on WLC, or force guest to find a HTTP website?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any guidance is much appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ling Yang&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2017 09:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583892#M530545</guid>
      <dc:creator>Ling Yang</dc:creator>
      <dc:date>2017-03-27T09:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583893#M530546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 11pt;"&gt;Since ISE 2.2 we support Apple captive portal detection for guest, we should promote that instead so users aren’t forced to open up the browser on their own which might have HTTPS based home page. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 11pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 11pt;"&gt;&lt;A href="https://community.cisco.com/docs/DOC-71122"&gt;ISE 2.2 Apple CNA (Captive Network Assistant) Mini-Browser for BYOD/Guest&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Verdana; color: #222222;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Verdana; color: #222222;"&gt;For enabling&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Verdana; color: #222222;"&gt;&lt;STRONG&gt;Configuration:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Verdana; color: #222222;"&gt;There is a special command on WLC – (WLC)&amp;gt;&lt;STRONG&gt;config network web-auth https-redirect enable&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Verdana; color: #222222;"&gt;Supported from CUWN firmware version 8.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="color: #000000; font-size: 14.666666984558105px; font-family: Calibri;"&gt;You can enable via GUI by going to MANAGEMENT -&amp;gt; HTTP-HTTPS &amp;gt; HTTPS Redirection ‘Enabled’. I think there was a WLC version where the GUI didn’t configure it properly, but seems to have been fixed now.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/118826-config-https-webauth-00.html" style="color: #954f72; text-decoration: underline; font-family: Verdana; font-size: 14px;" title="http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/118826-config-https-webauth-00.html"&gt;Configure HTTPS Redirect over Web-auth - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; font-size: 12pt; font-family: 'Times New Roman'; color: #000000; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="color: #a00b0b; font-size: 10.5pt; font-family: Verdana;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0.25in; margin-bottom: 0.0001pt;"&gt;&lt;SPAN style="color: #222222; font-size: 10.5pt; font-family: Verdana;"&gt;HTTPS redirect is not a good idea&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #222222; font-size: 10.5pt; font-family: Verdana;"&gt;a) it is evil (you are attempting to hijack a secure connection)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #222222; font-size: 10.5pt; font-family: Verdana;"&gt;b) it won't work (clients will block your evil hijack attempt)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #222222; font-family: Verdana;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;c) it doesn't scale (generating a forged SSL hijack session for each port 443 connection from each client is &lt;/SPAN&gt;&lt;SPAN style="font-size: 14px;"&gt;a lot&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt;"&gt; of processing requirement) &lt;SPAN style="color: #660000; font-family: Verdana; font-size: 13px;"&gt;CSCuu78888&amp;nbsp;&amp;nbsp;&amp;nbsp; Web GUI unresponsive after HTTPS-redirect enabled&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #222222; font-family: Verdana;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;d) &lt;/SPAN&gt;&lt;SPAN style="font-size: 14px;"&gt;certificate&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #222222; font-size: 14px; font-family: Verdana;"&gt;warnings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #1f497d;"&gt;Here are couple decent write-ups on topic, as you can see its not just a Cisco issue:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #1f497d;"&gt;&lt;A href="http://community.arubanetworks.com/t5/Technology-Blog/Captive-Portal-why-do-I-get-those-certificate-warnings/ba-p/268921"&gt;http://community.arubanetworks.com/t5/Technology-Blog/Captive-Portal-why-do-I-get-those-certificate-warnings/ba-p/268921&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #1f497d;"&gt;&lt;A href="https://medium.com/@padam.singh/https-based-redirection-and-wi-fi-captive-portals-92cc98a22981"&gt;https://medium.com/@padam.singh/https-based-redirection-and-wi-fi-captive-portals-92cc98a22981&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #1f497d;"&gt;For employees using captive portal inside the organization, the one solution is to have them set their home page to the organization’s internal landing page. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #1f497d;"&gt;For general guest users, many are built with captive portal detection and will trigger their own browser to avoid commercial browser with an https home page.&amp;nbsp;&amp;nbsp; Therefore, it is desirable to have portal bypass enabled to avoid such errors.&amp;nbsp; Also see suggestion to actually block https in redirect state to deny access until CNA or other http request can trigger redirect.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2017 20:23:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583893#M530546</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-03-27T20:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583894#M530547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have the same redirect problem on WLC 5700. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;these command does not exist on 5700. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="kwd" style="font-weight: bold; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;config network web-auth captive-bypass&lt;/SPAN&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt; {&lt;/SPAN&gt;&lt;SPAN class="kwd" style="font-weight: bold; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;enable&lt;/SPAN&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt; | &lt;/SPAN&gt;&lt;SPAN class="kwd" style="font-weight: bold; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;disable&lt;/SPAN&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;STRONG style="font-size: 14px; font-family: Verdana; color: #222222;"&gt;config network web-auth https-redirect enable&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;STRONG style="font-size: 14px; font-family: Verdana; color: #222222;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;STRONG style="font-size: 14px; font-family: Verdana; color: #222222;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;how can i do this cwa redirect apple device for 5700&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 08:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583894#M530547</guid>
      <dc:creator>murat001</dc:creator>
      <dc:date>2017-12-11T08:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583895#M530548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest you query the wireless team for their command issues&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also we don’t recommend https redirection&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 13:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583895#M530548</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-12-11T13:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583896#M530549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no this command due to WLC 5760 has IOS XE Software, but not AirOS as on WLC 2504,5520, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to enable https by command "ip http secure-server" in conf t.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2017 13:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3583896#M530549</guid>
      <dc:creator>Anton Kistruga</dc:creator>
      <dc:date>2017-12-21T13:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3706283#M530550</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a similar problem, but are not that worried about ssl-traffic handled by the wlc.&lt;/P&gt;
&lt;P&gt;However since the wlc needs to establish a ssl-connection with the client to be able to redirect it to the ISE for login, we get a certificate error on clients not using the apple captive portal detection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since the client is sending a GET to, ex Cisco.com and the WLC:s certificate is not issued to cisco.com, you will get a certificate warning when opening your browser on the guest wifi - ie. ISE-CWA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A workaround is disabling captive bypass, but what about non- apple clients?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 13:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3706283#M530550</guid>
      <dc:creator>fabianwickman</dc:creator>
      <dc:date>2018-09-13T13:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3706410#M530551</link>
      <description>I don't see any issues using a well known cert on ISE with the Apple Mini Browsers and redirect. Its not recommended to use https redirect because of these issues. &lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/ise-guest-cwa-and-https-redirection/td-p/3583892" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/ise-guest-cwa-and-https-redirection/td-p/3583892&lt;/A&gt;</description>
      <pubDate>Thu, 13 Sep 2018 15:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3706410#M530551</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-13T15:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3716026#M530552</link>
      <description>&lt;P&gt;We have a well known certificate(DigiCert) installed in our ISE-environment configured to be used as the web-auth certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue we face in the central web auth is that it is the WLC that sends it's certificate to the client before the client hits the ISE-portal. The WLC has a self signed certificate which of course is not trusted by the client.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you click "trust" on the wlc-certificate the client continues to the ISE-portal and gets the ISE-certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my question is, do you need a well known certificate on both the WLC and the ISE for cwa?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 07:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3716026#M530552</guid>
      <dc:creator>fabianwickman</dc:creator>
      <dc:date>2018-10-01T07:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3716096#M530553</link>
      <description>&lt;P&gt;No , you need only on ISE Side&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 09:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/3716096#M530553</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2018-10-01T09:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/4029128#M530554</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/312082"&gt;@fabianwickman&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;We have a well known certificate(DigiCert) installed in our ISE-environment configured to be used as the web-auth certificate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue we face in the central web auth is that it is the WLC that sends it's certificate to the client before the client hits the ISE-portal. The WLC has a self signed certificate which of course is not trusted by the client.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you click "trust" on the wlc-certificate the client continues to the ISE-portal and gets the ISE-certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my question is, do you need a well known certificate on both the WLC and the ISE for cwa?&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hi Stefan, hitting the very same issue here. Have you found a solution?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 17:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/4029128#M530554</guid>
      <dc:creator>Filippo Zangheri</dc:creator>
      <dc:date>2020-02-13T17:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest CWA and HTTPS redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/4029667#M530555</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;We found that disabling “captive bypass enable” solved the issue.&lt;BR /&gt;So that the client uses it’s built in function for detecting a web portal.&lt;BR /&gt;I don’t know why, but that solved the issue.&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Feb 2020 08:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-cwa-and-https-redirection/m-p/4029667#M530555</guid>
      <dc:creator>fabianwickman</dc:creator>
      <dc:date>2020-02-14T08:45:16Z</dc:date>
    </item>
  </channel>
</rss>

