<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The Wired NAD with Local in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563659#M75625</link>
    <description>&lt;P class="pBl_BlockLabel"&gt;&lt;SPAN class="content"&gt;The Wired NAD with Local WebAuth flow follows these steps: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118454"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNF_NumFirst"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;1. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Cisco ISE requires a login.html file with HTML redirect, to be uploaded to the NAD. This login.html is returned to the client browser for any HTTP/HTTPS request made. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118466"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;2. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The client browser in turn is redirected to the Cisco ISE guest portal where the user's credentials are submitted. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118477"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;3. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;After the AUP and change password is processed (if configured in the Multi-Portal configuration), the guest portal redirects the client browser to post the user credentials on to the NAD. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118488"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;4. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The NAD makes a RADIUS request to the Cisco ISE to authenticate and authorize the user. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Refer the link &lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_guest_pol.html#wp1117489"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_guest_pol.html#wp1117489&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Dec 2014 09:33:56 GMT</pubDate>
    <dc:creator>mohanak</dc:creator>
    <dc:date>2014-12-11T09:33:56Z</dc:date>
    <item>
      <title>ISE Wired captive portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563656#M75622</link>
      <description>&lt;P&gt;I've a new ISE Integration, I've implemented captive portal for wireless and wired guests, for Wireless all is working perfect&lt;/P&gt;&lt;P&gt;For Wired I can see that ISE put the url captive on the interface of the switch but from the laptop of windows machine, I'm unable to see the link on browser, please advice&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563656#M75622</guid>
      <dc:creator>Alexmpj376</dc:creator>
      <dc:date>2019-03-11T05:15:29Z</dc:date>
    </item>
    <item>
      <title>Do you have:- Redirect ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563657#M75623</link>
      <description>&lt;P&gt;Do you have:&lt;/P&gt;&lt;P&gt;- Redirect ACL configured on the switch. If yes, please provide the syntax here&lt;/P&gt;&lt;P&gt;- Redirection policy in ISE that references the redirect ACL. If yes, please attach some screenshots here&lt;/P&gt;&lt;P&gt;- Can you browse to the captive portal by entering the address manually in the browser&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 06:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563657#M75623</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-12-11T06:58:18Z</dc:date>
    </item>
    <item>
      <title>Below is the ACLExtended IP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563658#M75624</link>
      <description>&lt;P&gt;Below is the ACL&lt;BR /&gt;&lt;BR /&gt;Extended IP access list REDIRECT&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 10 deny icmp any any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 20 deny udp any any eq bootps&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30 deny udp any any eq bootpc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 40 deny udp any any eq domain&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 50 deny ip any host 10.171.0.51&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 60 deny ip any host 10.171.0.52&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 70 permit tcp any any eq www (1226 matches)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 80 permit tcp any any eq 443 (5358 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;- The screenshot is attached&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Yes I can&amp;nbsp;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;browse to the captive portal by entering the address manually in the browser&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 07:56:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563658#M75624</guid>
      <dc:creator>Alexmpj376</dc:creator>
      <dc:date>2014-12-11T07:56:37Z</dc:date>
    </item>
    <item>
      <title>The Wired NAD with Local</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563659#M75625</link>
      <description>&lt;P class="pBl_BlockLabel"&gt;&lt;SPAN class="content"&gt;The Wired NAD with Local WebAuth flow follows these steps: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118454"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNF_NumFirst"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;1. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Cisco ISE requires a login.html file with HTML redirect, to be uploaded to the NAD. This login.html is returned to the client browser for any HTTP/HTTPS request made. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118466"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;2. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The client browser in turn is redirected to the Cisco ISE guest portal where the user's credentials are submitted. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118477"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;3. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;After the AUP and change password is processed (if configured in the Multi-Portal configuration), the guest portal redirects the client browser to post the user credentials on to the NAD. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1118488"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;4. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The NAD makes a RADIUS request to the Cisco ISE to authenticate and authorize the user. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Refer the link &lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_guest_pol.html#wp1117489"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_guest_pol.html#wp1117489&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 09:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563659#M75625</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2014-12-11T09:33:56Z</dc:date>
    </item>
    <item>
      <title> I'm using Wired NAD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563660#M75626</link>
      <description>&lt;H3 class="p_H_Head2" style="font-size: 13px; color: rgb(51, 102, 102); font-weight: bold; font-family: Arial, Helvetica, sans-serif; margin: 14px 0em 7px -0.1in; line-height: normal;"&gt;&amp;nbsp;&lt;/H3&gt;&lt;P&gt;I'm using Wired NAD interaction for Central WebAuth&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 09:52:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563660#M75626</guid>
      <dc:creator>Alexmpj376</dc:creator>
      <dc:date>2014-12-11T09:52:44Z</dc:date>
    </item>
    <item>
      <title>In the same document you</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563661#M75627</link>
      <description>&lt;P&gt;In the same document you have&lt;/P&gt;&lt;H3 class="p_H_Head2"&gt;&lt;SPAN class="content"&gt;Wired NAD Interaction for Central WebAuth &lt;/SPAN&gt;&lt;/H3&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1112857"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN class="content"&gt;If your client's machine is hard wired to a NAD, the guest service interaction takes the form of a failed MAB request that leads to a guest portal Central WebAuth login. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116389"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBl_BlockLabel"&gt;&lt;SPAN class="content"&gt;The Central WebAuth triggered by a MAB failure flow follows these steps: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1112879"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNF_NumFirst"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;1. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The client connects to the NAD through a hard-wired connection. There is no 802.1X supplicant on the client. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116474"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;2. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;An authentication policy with a service type for MAB allows a MAB failure to continue and return a restricted network profile containing a URL-redirect for Central WebAuth user interface. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116508"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;3. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The NAD is configured to post MAB requests to the Cisco ISE RADIUS server. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116541"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;4. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The client machine connects and the NAD initiates a MAB request. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116572"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;5. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The Cisco ISE server processes the MAB request and does not find an end point for the client machine. This MAB failure resolves to the restricted network profile and returns the URL-redirect value in the profile to the NAD in an access-accept. To support this function, ensure that an Authorization Policy exists featuring the appropriate "NetworkAccess:UseCase=Hostlookup" and "Session:Posture Status=Unknown" conditions. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116586"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB2_Body2"&gt;&lt;SPAN class="content"&gt;The NAD uses this value to redirect all client HTTP/HTTPS traffic on ports 8080 or 8443 to the URL-redirect value. The standard URL value in this case is: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116614"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB2_Body2"&gt;&lt;SPAN class="content"&gt;&lt;SPAN class="cXRef_Color" style="font-weight: normal"&gt;&lt;A&gt;https://ip:port/guestportal/gateway?sessionId=NetworkSessionId&amp;amp;action=cwa&lt;/A&gt;&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116644"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;6. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The client initiates an HTTP or HTTPS request to any URL using the client browser. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116686"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;7. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The NAD redirects the request to the URL-redirect value returned from the initial access-accept. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116713"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;8. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The gateway URL value with action CWA redirects to the guest portal login page. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116743"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;9. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The client enters the username and password and submits the login form. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116770"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;10. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;The guest action server authenticates the user credentials provided. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116797"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;11. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;If the credentials are valid, the username and password are stored in the local session cache by the guest action server. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116826"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;12. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;If the guest portal is configured to perform Client Provisioning, the guest action redirects the client browser to the Client Provisioning URL. (You can also optionally configure the Client Provisioning Resource Policy to feature a "NetworkAccess:UseCase=GuestFlow" condition.) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1144657"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB2_Body2"&gt;&lt;SPAN class="content"&gt;Since there is no Client Provisioning or Posture Agent for Linux, guest portal redirects to Client Provisioning, which in turn redirects back to a guest authentication servlet to perform optional IP release/renew and then CoA. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116839"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;13. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;If the guest portal is not configured to perform Client Provisioning, the guest action server sends a CoA to the NAD through an API call. This CoA will cause the NAD to reauthenticate the client using the RADIUS server. This reauthentication makes use of the user credentials stored in the session cache. A new access-accept is returned to the NAD with the configured network access. If Client Provisioning is not configured and the VLAN is in use, the guest portal performs VLAN IP renew. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1116929"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;14. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;With redirection to the Client Provisioning URL, the Client Provisioning subsystem downloads a non-persistent web-agent to the client machine and perform posture check of the client machine. (You can optionally configure the Posture Policy with a "NetworkAccess:UseCase=GuestFlow" condition.) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1159606"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;15. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;If the client machine is non-complaint, ensure you have configured an Authorization Policy that features "NetworkAccess:UseCase=GuestFlow" and "Session:Posture Status=NonCompliant" conditions. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp1159604"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pNN_NumNext"&gt;&lt;SPAN class="content"&gt;&lt;B&gt;16. &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Once the client machine is compliant, ensure you have an Authorization policy configured with conditions "NetworkAccess:UseCase=GuestFlow" and "Session:Posture Status=Compliant" conditions), From here, the Client Provisioning issues a CoA to the NAD. This CoA will cause the NAD to reauthenticate the client using the RADIUS server. This reauthentication makes use of the user credentials stored in the session cache. A new access-accept is returned to the NAD with the configured network access. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 10:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563661#M75627</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2014-12-11T10:08:23Z</dc:date>
    </item>
    <item>
      <title>See, The authorization policy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563662#M75628</link>
      <description>&lt;P&gt;See,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The authorization policy is proper since I get the url guest on the switch on the right port&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 10:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563662#M75628</guid>
      <dc:creator>Alexmpj376</dc:creator>
      <dc:date>2014-12-11T10:09:24Z</dc:date>
    </item>
    <item>
      <title>The authorization policy is</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563663#M75629</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;The authorization policy is proper since I get the url guest on the switch on the right port&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;but on the client machine I'm not getting HTTP redirect&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 10:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563663#M75629</guid>
      <dc:creator>Alexmpj376</dc:creator>
      <dc:date>2014-12-11T10:10:09Z</dc:date>
    </item>
    <item>
      <title> I can browse to the captive</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563664#M75630</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp;I can&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;browse to the captive portal by entering the address manually in the browser&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;meaning that ISE config are good&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 10:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563664#M75630</guid>
      <dc:creator>Alexmpj376</dc:creator>
      <dc:date>2014-12-11T10:18:08Z</dc:date>
    </item>
    <item>
      <title>Verify that the redirection</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563665#M75631</link>
      <description>&lt;P&gt;&lt;BR /&gt;Verify that the redirection URL specified in Cisco ISE via Cisco-av pair “URL&lt;BR /&gt;Redirect” is correct per the following options:&lt;BR /&gt;• CWA Redirection URL:&lt;BR /&gt;&lt;A href="https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;action=cwa" target="_blank"&gt;https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;action=cwa&lt;/A&gt;&lt;BR /&gt;• 802.1X Redirection URL:&lt;BR /&gt;url-redirect=https://ip:8443/guestportal/gateway?sessionId=SessionIdValue&amp;amp;a&lt;BR /&gt;ction=cpp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Dec 2014 16:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/2563665#M75631</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2014-12-15T16:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Wired captive portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/4632152#M575484</link>
      <description>&lt;P&gt;Hi guys,n&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am looking for a guest redirection to an external captive portal, not to use ISE as captive portal, could anybody provide some reference about?&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;Juan&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 05:06:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wired-captive-portal/m-p/4632152#M575484</guid>
      <dc:creator>juanfaure</dc:creator>
      <dc:date>2022-06-15T05:06:25Z</dc:date>
    </item>
  </channel>
</rss>

