04-24-2017 09:30 PM
Hi All,
I have a customer with 2 ISE boxes in a distributed environment. I have created a node group & added both ISE in the group. I have a guest portal configured with a full FQDN for the hostname & would like to do CWA for my guests.My DNS server will resolve the both ISE IP in the nslookup & the client will pickup the IP & search for the url.
If the wireless controller starts the RADIUS session with ISE-1 & if the client tries for the url in ISE-2, will there be issue with RADIUS communication.
Does the wireless controller & wireless client always communicate with the same ISE server to make the Guest working or does the client session gets replicated among the ISE boxes in the same node group
Regards
Nikhil
Solved! Go to Solution.
04-25-2017 08:09 AM
By "setting portal FQDN", I am making the assumption that you are referring to the static IP/hostname option under the URL Redirection setting in the Authorization Profile. If that is the case, then you are forcing the clients to go to a specific target and it is up to DNS, routing, and optionally an LB to get it to the appropriate target. However, ISE requires that the redirected webauth request be received by same PSN handling the RADIUS session. If go to PSN1 and user is redirected to PSN2, then webauth will fail as Jason calls out. There is no session state sharing between ISE PSNs, even if in the same node group. The node group does however help deal with session recovery when one PSN redirects client and then fails prior to completing web auth session.
Options:
Craig
04-25-2017 06:45 AM
The RADIUS server and guest redirect need to be from the same box.
You can’t setup a FQDN for a guest service in a round robin type fashion like that. You would need a load balancer to front multiple nodes
Also don’t think node groups do anything for guest services.
04-25-2017 08:09 AM
By "setting portal FQDN", I am making the assumption that you are referring to the static IP/hostname option under the URL Redirection setting in the Authorization Profile. If that is the case, then you are forcing the clients to go to a specific target and it is up to DNS, routing, and optionally an LB to get it to the appropriate target. However, ISE requires that the redirected webauth request be received by same PSN handling the RADIUS session. If go to PSN1 and user is redirected to PSN2, then webauth will fail as Jason calls out. There is no session state sharing between ISE PSNs, even if in the same node group. The node group does however help deal with session recovery when one PSN redirects client and then fails prior to completing web auth session.
Options:
Craig
04-25-2017 08:27 AM
thanks chyps
Option 1 this is normal supported option
Option 2 ISE with Static Redirect for Isolated Guest Networks Configuration Example - Cisco
Option 3 ISE Load Balancing
04-25-2017 08:39 AM
Thanks Jason & Craig for the help
Cheers
Nikhil
12-03-2018 07:02 AM
Hey Craig,
Could you elaborate more Load Balancer matching based on Session ID in URL?
We do have setup for Aruba using "Static Target" + CWA flow is going via Internet due to guest network is completly isolated enviroment. This cause that ISE sees WebAuth packets commming from some external IP address. Radius querries comming from NAD containing real internal IP of client. This way F5 is not able do session matching based on Radius Framed IP. I am interested in of matching Session ID in URL. However I dont see "Session ID" info in invoked URL on client side. I assume its not visible as this is "static URL" redirection on Aruba level. Am I wrong?
I followed this guide for Aruba configuration:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide