10-17-2018 07:55 AM
Hello - An ISE customer (and partner) of mine is looking for best practice guidance on ISE configuration for VLAN assignment based on AD creds via WebAuth. They would like their students to only have to WebAuth once every 90 days and are placed into a VLAN based on AD group membership.
The partner has created an ISE config where a student owned device (mostly Chromebooks)
1. joins the network for the first time and gets defaulted a WebAuth page.
2. Upon inputting AD creds ISE policy runs again and they match a policy based on AD group membership then they throw up a second WebAuth AUP page. That second WebAuth page dumps them into a specific Endpoint Group and
3. after they satisfy the second WebAuth page, ISE policy runs again and they match a VLAN switching AuthZ policy with that Endpoint Group.
4. They then manually perge endpoint groups every 90 days to force new WebAuth sessions. I think there is a better way!
I would like to confirm my idea and am curious if it is best practice. My idea:
1. Student owned device (mostly Chromebooks) joins the network for the first time and gets defaulted a WebAuth page.
2. After inputting AD creds, AUP appears. After satisfying AUP all endpoints get placed into the same Endpoint Group.
3. ISE policy runs again and we match a policy based on AD group membership and that single endpoint group. AD group determines which AuthZ VLAN switching policy gets applied and client get dumped into the right VLAN with only ONE WebAuth page.
4. We then use guest timeout settings to automatically force WebAuth every 90 days.
Questions:
1. Will this config work? Is there a better way?
2. Will authentication logging capture the AD account associated with the Endpoint during that 90 days? Is this tied together via Session ID or another way?
Thanks so much - Trying to avoid 2x WEbAuth pages!
Solved! Go to Solution.
10-17-2018 08:18 AM
1. It is best to avoid VLAN change on a MAC-filtering/Open network if possible. Recommendation is to use 802.1X instead as supplicants can deal with VLAN changes upon reauthentcation. But going back to the question, it will work, but if using reauthentcation CoA, the endpoint may not realize that the VLAN has changed and may get stuck until reconnecting to the same WLAN. ISE guest portal has feature to run client side script to renew IP address for VLAN change, but I don't believe the script works with Chromebooks. To workaround the issue, you can try forcing disconnect CoA instead. The caveat with disconnect CoA is that if there are other SSID that is being broadcasted nearby, the Chromebook may join that instead of reconnecting to the initial SSID. This only happens for initial enrollment every 90 days, but nonetheless will impact user experience.
2. If using ISE 2.4, ISE live logs will show you the user ID that was used for WebAuth for subsequent MAC-Filtering authentication.
By the way, you would be using endpoint purge setting to delete the endpoint every 90 days.
10-17-2018 08:18 AM
1. It is best to avoid VLAN change on a MAC-filtering/Open network if possible. Recommendation is to use 802.1X instead as supplicants can deal with VLAN changes upon reauthentcation. But going back to the question, it will work, but if using reauthentcation CoA, the endpoint may not realize that the VLAN has changed and may get stuck until reconnecting to the same WLAN. ISE guest portal has feature to run client side script to renew IP address for VLAN change, but I don't believe the script works with Chromebooks. To workaround the issue, you can try forcing disconnect CoA instead. The caveat with disconnect CoA is that if there are other SSID that is being broadcasted nearby, the Chromebook may join that instead of reconnecting to the initial SSID. This only happens for initial enrollment every 90 days, but nonetheless will impact user experience.
2. If using ISE 2.4, ISE live logs will show you the user ID that was used for WebAuth for subsequent MAC-Filtering authentication.
By the way, you would be using endpoint purge setting to delete the endpoint every 90 days.
10-17-2018 08:40 AM
10-17-2018 11:33 AM
Thanks Jason! Just one more confirmation if you would be so kind.
It appears that your flow still requires 2x URL-redirects, once for initial portal and again for hotspot. In regards to Howon's confirmation of my suggested flow with a single URL-redirect above, I fear it will not match the customer requirements after chatting with a colleague.
Question: Using my flow, will ISE retain the AD username to MAC assosiacation for 90 days or would the endpoint be presented a WebAuth page after disconnecting or sleeping? Without placing the endpoint in differeniated endpoint groups I fear that the client will have to satisfy another WebAuth when the session times out which is not what the customer wants.
10-17-2018 11:59 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide