<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ip http secure-active-session-modules &amp;amp; ip http active-session in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553950#M313400</link>
    <description>&lt;P&gt;&lt;BR /&gt;Look, if I'm not mistaken, if you simply check the "Disable HTTP secure server for Web Auth" option, you'll be able to do what you want.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aleabrahao_0-1779281222304.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/282463i1382F72990797E6A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="aleabrahao_0-1779281222304.png" alt="aleabrahao_0-1779281222304.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 May 2026 12:51:02 GMT</pubDate>
    <dc:creator>aleabrahao</dc:creator>
    <dc:date>2026-05-20T12:51:02Z</dc:date>
    <item>
      <title>ip http secure-active-session-modules &amp; ip http active-session-module</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553943#M313398</link>
      <description>&lt;P&gt;I'm asking this here, but its relevant for all IOS/IOS-XE platforms I think.&lt;/P&gt;&lt;P&gt;I have a C9800 WLC with both the http server and the http secure-server enabled.&amp;nbsp; The reason for this is the admin GUI is used to configure and monitor the thing, and web authentication is enabled for guest users with a generic splash page.&amp;nbsp; I want to access the admin GUI using HTTPS and the WEB auth splash page using HTTP as I don't have a public certificate.&lt;/P&gt;&lt;P&gt;I thought the commands "ip http secure-active-session-modules" &amp;amp; "ip http active-session-module" would be what I want but it appears not.&amp;nbsp; I configured this:&lt;/P&gt;&lt;PRE&gt;ip http secure-active-session-modules all
ip http active-session-modules none&lt;/PRE&gt;&lt;P&gt;But it stops the admin GUI working and I need to enable the modules for the 'ip http active-session-modules all'.&amp;nbsp; If I don't have that the admin GUI won't display.&lt;/P&gt;&lt;P&gt;It feels like I was in the right area, but either its a bug or I'm misunderstanding how its supposed to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 12:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553943#M313398</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2026-05-20T12:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: ip http secure-active-session-modules &amp; ip http active-session</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553946#M313399</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;-&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/323185"&gt;@andrew.butterworth&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; You can't have :&amp;nbsp; &lt;FONT color="#993366"&gt;&amp;nbsp;ip http active-session-modules&lt;FONT color="#FF0000"&gt; &lt;STRONG&gt;none&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;EM&gt;It's a bit like a ladder&lt;/EM&gt;;&amp;nbsp; secure access depends on lower http modules (too)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 12:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553946#M313399</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2026-05-20T12:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: ip http secure-active-session-modules &amp; ip http active-session</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553950#M313400</link>
      <description>&lt;P&gt;&lt;BR /&gt;Look, if I'm not mistaken, if you simply check the "Disable HTTP secure server for Web Auth" option, you'll be able to do what you want.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aleabrahao_0-1779281222304.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/282463i1382F72990797E6A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="aleabrahao_0-1779281222304.png" alt="aleabrahao_0-1779281222304.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 12:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553950#M313400</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2026-05-20T12:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: ip http secure-active-session-modules &amp; ip http active-session</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553973#M313405</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/323185"&gt;@andrew.butterworth&lt;/a&gt;&amp;nbsp;"&lt;SPAN&gt;and the WEB auth splash page using HTTP as I don't have a public certificate.&lt;/SPAN&gt;"&lt;BR /&gt;- at your own risk - you realise you're going against pretty much every security guideline out there right?&lt;BR /&gt;The default web auth design is to intercept the http captive portal check from the client and redirect to the https captive portal page (splash page).&lt;/P&gt;
&lt;P&gt;Can't say I've ever tried it myself but I think what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/521203"&gt;@aleabrahao&lt;/a&gt;&amp;nbsp;suggested would be the correct answer.&lt;BR /&gt;In general you should not be fiddling with the web server modules - I've only ever seen that used to mitigate a vulnerability in a specific module.&lt;/P&gt;
&lt;P&gt;Did you know you can get free certs from&amp;nbsp;&lt;A href="https://letsencrypt.org/" target="_blank" rel="noopener"&gt;https://letsencrypt.org/&lt;/A&gt;&amp;nbsp;?&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 14:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553973#M313405</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2026-05-20T14:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: ip http secure-active-session-modules &amp; ip http active-session</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553976#M313406</link>
      <description>&lt;P&gt;I appreciate its going against security best practises, but the splash screen is just an acceptable use policy with a button.&amp;nbsp; There are no real credentials sent.&lt;/P&gt;&lt;P&gt;It does appear checking that box solves the issue (it adds 'secure-webauth-disable' to the global webauth parameter-map).&amp;nbsp; Attempting to access the admin GUI using http automatically gets redirected to https, so it seems to work.&amp;nbsp; I'm not sure about any specifically crafted requests over http tcp/80 though as it accepts connections on the management interface on tcp/80.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 14:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553976#M313406</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2026-05-20T14:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: ip http secure-active-session-modules &amp; ip http active-session</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553981#M313407</link>
      <description>&lt;P&gt;Fair enough &amp;lt;smile&amp;gt;&lt;/P&gt;
&lt;P&gt;If you want to, you can disable http for the admin GUI using "no&amp;nbsp;ip http server" but make sure you have "webauth-http-enable" configured in your parameter map for http web-auth.&lt;/P&gt;
&lt;P&gt;See page 78 (labelled 104) of&amp;nbsp;&lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKEWN-2339.pdf" target="_blank" rel="noopener"&gt;https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKEWN-2339.pdf&lt;/A&gt;&amp;nbsp;and the&amp;nbsp;&lt;STRONG&gt;HTTP and HTTPS access modes for web authentication&lt;/STRONG&gt;&amp;nbsp;section of&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-18/config-guide/b_wl_17_18_cg/m_vewlc_sec_webauth_cg.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-18/config-guide/b_wl_17_18_cg/m_vewlc_sec_webauth_cg.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 15:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553981#M313407</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2026-05-20T15:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: ip http secure-active-session-modules &amp; ip http active-session</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553982#M313408</link>
      <description>&lt;P&gt;Ah, I'm sure I'd tried this previously and without 'ip http server' in the configuration, the webauth splashpage never appeared.&amp;nbsp; Its working now though, so not sure what happened there...&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 15:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553982#M313408</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2026-05-20T15:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: ip http secure-active-session-modules &amp; ip http active-session</title>
      <link>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553984#M313409</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/244975"&gt;@Rich R&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/323185"&gt;@andrew.butterworth&lt;/a&gt;&amp;nbsp;That's exactly right, you don't need to have HTTP enabled in the management settings for Web Auth to work via HTTP.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2026 15:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ip-http-secure-active-session-modules-amp-ip-http-active-session/m-p/5553984#M313409</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2026-05-20T15:13:01Z</dc:date>
    </item>
  </channel>
</rss>

