<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Guest Access URL Redirect after authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4658163#M576368</link>
    <description>&lt;P&gt;If you have a C9800 and you want to apply a dACL AFTER successful authentication then you should have something like&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;permit udp any eq bootpc any eq bootps
permit udp any any eq domain
permit ip any host 1ab.25.32.11 port 8443 --&amp;gt;ISE PSN1 (best to specify the exact TCP port - e.g. 8443)
permit ip any host 1ab.25.32.12 port 8443 --&amp;gt;ISE PSN2 (best to specify the exact TCP port - e.g. 8443)
permit ip any host 10.1xy.10.9 --&amp;gt;DNS1   &amp;lt;--- this won't match because DNS further above will match 
permit ip any host 10.1xy.10.10 --&amp;gt;DNS2 &amp;lt;--- make this more specific by specifying DNS UDP port - and then delete the more generic rule at the top
deny ip any 10.0.0.0 /8
deny ip any 192.168.0.0/16
deny ip any 172.16.0.0/12
permit ip any any&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Jul 2022 06:09:19 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2022-07-27T06:09:19Z</dc:date>
    <item>
      <title>Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549674#M572717</link>
      <description>&lt;P&gt;We upgraded our Cisco ISE portal from v2.7 to v3.0 and following on from this we appear to have an issue with guest authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Previously, when a guest connected to our Guest SSID they was redirected to a portal to sign in. This part of the authentication is working however after sign in they was redirected to our company URL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since the upgrade the users are no longer being redirected after the authentication resulting it them believing they are not authenticated but if they connect to the SSID again they are already authenticated (dropped into endpoint identity group) and can browse the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have tried different URLs and options in the "once authenticated, take guest to" configuration, however none of these appear to be working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have also updated the portal on the Cisco ISE builder to be on the same version as ISE however this doesn't appear to have made any improvements.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone come across these problems post upgrade? Alternatively does anyone know what settings need to be enabled to that after authentication the guest access sign in automatically disappears and they are no longer redirected to a website?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 15:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549674#M572717</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2022-02-10T15:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549745#M572718</link>
      <description>&lt;P&gt;I think in the Authentication Success Settings you can choose one of the following options:&lt;/P&gt;
&lt;P&gt;- Original URL&lt;/P&gt;
&lt;P&gt;- Authentication Success page&lt;/P&gt;
&lt;P&gt;- Custom URL&lt;/P&gt;
&lt;P&gt;I think in your case you might want to select the Authentication Success page, that should take care of letting the users know that they are successfully authenticated.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 16:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549745#M572718</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-10T16:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549754#M572719</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have tried that however it still appears to leave the user in an unauthenticated state - until they reconnect to the SSID where they are able to log in as they are dropped in to the correct EIG.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 16:41:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549754#M572719</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2022-02-10T16:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549949#M572731</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1008639"&gt;@InfraISE2020&lt;/a&gt;&amp;nbsp;- just a quick suggestion - I had a similar issue with an ISE 3.0 customer and the issue turned out that on the WLC I had forgotten to include permit statements for PSN @&amp;nbsp;TCP/8443 in the ACL_ALLOWED ACL (i.e. after authentication or after successful MAC auth). I could have sworn that in earlier deployments I never had to do that. It seems a bit non-sensical, because the ISE portals should not be involved AFTER an authentication. Anyway - it's worth a try.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 22:31:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4549949#M572731</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-02-10T22:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4657386#M576349</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;&lt;P&gt;&amp;nbsp; I am also facing same issue, could plz share me Acl which u have confiugre.&lt;/P&gt;&lt;P&gt;In my case i have configure acl on ISE itself for after authentication.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Amit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 08:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4657386#M576349</guid>
      <dc:creator>amitkulshrestha</dc:creator>
      <dc:date>2022-07-26T08:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4657882#M576364</link>
      <description>&lt;P&gt;Amit, are you using an AireOS WLC or 9800?&lt;/P&gt;
&lt;P&gt;In either case, what I was referring to is the ACL that is applied to the user AFTER they have successfully authenticated on th eprtal (or passed MAB auth successfully using the "Remember Me" method).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the case of AireOS, the ACL lives on the controller and I had to include the PSN's IP address and the destination TCP port of the portal - I don't have access to this config now - but I allowed inbound access to PSN dest port 8443 and outbound from PSN source 8443&lt;/P&gt;
&lt;P&gt;The post auth ACL at a high level goes like this&lt;/P&gt;
&lt;P&gt;Allow DNS&lt;/P&gt;
&lt;P&gt;Allow ISE PSN Portals&lt;/P&gt;
&lt;P&gt;Block RFC 1918 (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)&lt;/P&gt;
&lt;P&gt;Allow Everything&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 20:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4657882#M576364</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-07-26T20:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4658074#M576367</link>
      <description>&lt;P&gt;Very Thanks Arne , for taking time to reply me ,&lt;/P&gt;&lt;P&gt;"are you using an AireOS WLC or 9800?" --&amp;gt; C9800-CL&lt;/P&gt;&lt;P&gt;"In either case, what I was referring to is the ACL that is applied to the user AFTER they have successfully authenticated on th eprtal (or passed MAB auth successfully using the "Remember Me" method)." --&amp;gt; that means acl internet access. Not redirect one?&lt;/P&gt;&lt;P&gt;"In the case of AireOS, the ACL lives on the controller and I had to include the PSN's IP address and the destination TCP port of the portal - I don't have access to this config now - but I allowed inbound access to PSN dest port 8443 and outbound from PSN source 8443" --&amp;gt; Ok .. in my case i hav C9800-CL that mean i have to place my acl on ISE. here i my acl do check and suggest corrections :-&lt;/P&gt;&lt;P&gt;permit udp any eq bootpc any eq bootps&lt;BR /&gt;permit udp any any eq domain&lt;BR /&gt;permit ip any host 1ab.25.32.11 --&amp;gt;ISE PSN1&lt;BR /&gt;permit ip any host 1ab.25.32.12 --&amp;gt;ISE PSN2&lt;BR /&gt;permit ip any host 10.1xy.10.9 --&amp;gt;DNS1&lt;BR /&gt;permit ip any host 10.1xy.10.10 --&amp;gt;DNS2&lt;BR /&gt;permit ip any any&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Amit&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 05:50:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4658074#M576367</guid>
      <dc:creator>amitkulshrestha</dc:creator>
      <dc:date>2022-07-27T05:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Guest Access URL Redirect after authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4658163#M576368</link>
      <description>&lt;P&gt;If you have a C9800 and you want to apply a dACL AFTER successful authentication then you should have something like&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;permit udp any eq bootpc any eq bootps
permit udp any any eq domain
permit ip any host 1ab.25.32.11 port 8443 --&amp;gt;ISE PSN1 (best to specify the exact TCP port - e.g. 8443)
permit ip any host 1ab.25.32.12 port 8443 --&amp;gt;ISE PSN2 (best to specify the exact TCP port - e.g. 8443)
permit ip any host 10.1xy.10.9 --&amp;gt;DNS1   &amp;lt;--- this won't match because DNS further above will match 
permit ip any host 10.1xy.10.10 --&amp;gt;DNS2 &amp;lt;--- make this more specific by specifying DNS UDP port - and then delete the more generic rule at the top
deny ip any 10.0.0.0 /8
deny ip any 192.168.0.0/16
deny ip any 172.16.0.0/12
permit ip any any&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 06:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-guest-access-url-redirect-after-authentication/m-p/4658163#M576368</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-07-27T06:09:19Z</dc:date>
    </item>
  </channel>
</rss>

