05-11-2017 09:51 AM
I have three major categories of wireless access "allowance" I am contemplating deploying:
1. "true" guest (CWA + sponsor) => guest SSID and guest DMZ (Internet only access)
2. employee BYOD (trust the employee based on AD user membership) - different SSID, in a different DMZ, which allows Internet access similar to guest, but may also allow access to some internal NAT-ed resources
3. regular internal access network SSID (AD users + certs on devices, etc.)
Here is my Q: assuming a foreign + anchor WLC type of deployment, can I have a set of PSNs in the guest DMZ (completely - all interfaces), to which I redirect "true" guest connections for guest portal and CWA (scenario 1, above), while having the BYOD scenario (#2, above) somehow directing to the internal PSNs (instead of the guest DMZ ones), as that would be allowed to access AD, internally, verify user's credentials, and accommodate an ACL to put the client into the BYOD DMZ? All client connections will start on the foreign WLC, of course.
Solved! Go to Solution.
05-11-2017 10:11 AM
Yes
You can setup each portal (guest, BYOD) with different interfaces and even port numbers. Your authorization rule would return the appropriate portal to the controller depending on the SSID that is connected to.
Guest SSID would match authorization and return guest portal to interface running in DMZ
Same for BYOD
05-11-2017 10:11 AM
Yes
You can setup each portal (guest, BYOD) with different interfaces and even port numbers. Your authorization rule would return the appropriate portal to the controller depending on the SSID that is connected to.
Guest SSID would match authorization and return guest portal to interface running in DMZ
Same for BYOD
05-11-2017 11:06 AM
That was fast :-) Thank you! Here is a little more, which I may have missed in my original Q (pointers to data flow diagrams would help, if you know of such): I can only allow the internal PSNs to talk to AD, but if ALL guests (true, and BYOD) need to be anchored in the DMZ WLCs, then how am I going to force the AD validation internally, vs true guest staying in the DMZ, and getting the portal from there?
Now that I read the above, it may not make sense :-), so I'll try differently:
- SSIDs *guest* and *BYOD* both broadcast
- I bring in a device and connect to *guest* -> go through foreign WLC -> ... -> guest portal coming from the DMZ PSNs ... -> anchored in the DMZ and going to the Inernet. Once my sponsored access expires, access stops
- I bring in a device, and I am an AD user, so I connect to *BYOD* -> what is the path from here so, while still having to be anchored to the DMZ WLC, I have the internal PSNs check my AD membership, instead of being redirected to the DMZ PSNs portal? My access, once successful, should live for the duration of my AD credentials validity
Is it even possible, as described above? Thx again!
05-11-2017 12:03 PM
I can only allow the internal PSNs to talk to AD, but if ALL guests (true, and BYOD) need to be anchored in the DMZ WLCs, then how am I going to force the AD validation internally, vs true guest staying in the DMZ, and getting the portal from there?
JAK - BY BYOD I assume you're talking about ISE BYOD with supplicant and certificate provisioning and onboard?
if they are guests why do they need access to AD? guest accounts live in the guest database.
Now that I read the above, it may not make sense :-), so I'll try differently:
- SSIDs *guest* and *BYOD* both broadcast
- I bring in a device and connect to *guest* -> go through foreign WLC -> ... -> guest portal coming from the DMZ PSNs ... -> anchored in the DMZ and going to the Inernet. Once my sponsored access expires, access stops
JAK - yes, make sure guest portal is running on its own port and interfaces if needed
- I bring in a device, and I am an AD user, so I connect to *BYOD* -> what is the path from here so, while still having to be anchored to the DMZ WLC, I have the internal PSNs check my AD membership, instead of being redirected to the DMZ PSNs portal? My access, once successful, should live for the duration of my AD credentials validity
JAK - if your BYOD employees are connecting thru DMZ then you're correct that PSN would need to talk to AD but why? they are trusted users connect using Single SSID flow PEAP and once onboarded use EAP-TLS. Either you move BYOD internally since they are employees
otherwise you will need to create special accounts in the guest database for them to use a portal in the DMZ if really concerned about this
05-11-2017 06:28 PM
A quick thought on this. I like to minimize SSIDs wherever possible. I usually would do what you describe with two SSIDs for the company.
SSID #1 is the true Guest SSID. If you want the guest PSNs to be dedicated PSNs sitting in the DMZ or using secondary NICs on the internal PSNs that is up to you. None of this would require AD connectivity.
SSID #2 is the secure corporate SSID that would allow 3 types of connections:
05-12-2017 05:06 AM
Thank you for the follow-ups.
More comments: guest connections (via "true" or "BYOD") should not land on the internal network => I need to put them in the DMZs IP space, because of security concerns. Creating other subnets/VLANs/routes, in the internal network, to then only allow Internet access for the BYOD, seems more difficult compared to placing them straight into a guest DMZ, already controlled to be Internet only. The only difference between "true guest" and "BYOD" (maybe I am using a different terminology than the Cisco one??) should consist in the fact that the BYOD should rely on access dependent on the user's membership in AD, w/out requiring a sponsor intervention, and provide access for as long as their AD account is valid (some checking of PSN, against AD, in the backend, would be desired, either continuous, upon every time the BYOD device connects, or at set intervals), whereas the "true guest" allowance will be dictated by the duration defined by the sponsors.
05-12-2017 05:14 AM
EDIT: looks like my definition of BYOD is confusing, as I do not mean it in the sense of Cisco! I am not planning to onboard employee devices. Just to give them a more lenient Internet access, w/out the constraints of time and sponsor bound requirements - guest access for as long as they can prove AD membership.
05-12-2017 09:46 AM
OK yes BYOD has 2 meanings, traditional sense is i just want straight internet access for my employees personal devices. with ISE BYOD means on boarding their supplicants and provisioning a certificate for more security.
What you're explaining you use AD for BYOD employee internet. You have 3 options
1. DMZ then AD creds are exposed
2. DMZ, have the users create their own accounts, self-sponsor themselves
3. Non DMZ with AD
05-15-2017 06:28 AM
Just to follow on to Jason’s message. If you want to use AD credentials but not join your guest PSNs in the DMZ to the domain (I wouldn’t join them do the domain). You have a couple options assuming you are using an anchor controller:
1) Use a PEAP SSID that is sent to the anchor controller. Have the anchor controller use the internal PSNs to authenticate this SSID. The only thing you need to open up on the firewall is anchor controller to internal PSNs RADIUS.
2) Use an open SSID with a portal setup for the employees. Setup the portal to use RADIUS authentication to the internal PSNs as the authentication mechanism. In this case you would need to allow the guest PSNs to have RADIUS access to the internal PSNs.
Also, if your firewalls are FirePower you don’t necessarily need two different DMZs to separate guests and employees. You could use SGT tags applied to the session by ISE, communicated to FMC via pxGrid and sent to the FirePower firewalls to create simple SGT tag rules:
1) Guest tag allowed Internet only.
2) Employee tag allowed some internal application access plus Internet access.
Many options available both in ISE and at the WLC layer.
Paul Haferman
Office- 920.996.3011
Cell- 920.284.9250
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide