01-26-2022 12:19 PM
ISE 3.0 patch 4
9200 Catalyst switch XE 7.3.1
Wired guest portal issue. Redirect isn't working
- Test Guest portal on ISE work successfully
- Live logs and switch port shows ISE sending the redirect URL successfully
- IPDT is configured on the switch
- http and http secure is configured on the switch
- PC is able to ping the PSN and open it up on a browser
- ACL deny udp/dns,ISE PSN, allow www and 443
- browser show fail connection to cisco.com
- Tried pasting the redirected url in the browser but get error code 404
Any ideas?
Thanks
Solved! Go to Solution.
04-12-2022 10:33 AM
The issue was the below command on the management SVI interface on the uplink switch.
ip verify unicast source reachable-via rx allow-self-ping
Since the access switch only layer 3 interface was the management interface and the only route was a default route to the management SVI on the uplink....
1- When the switch replied to the tcp "syn" with a "syn,ack" it sent the traffic to it's default gateway because the client was on a different vlan/subnet. The switch's default gateway/SVI had the above command on it preventing the syn,ack respond.
This resolves the http redirect issue.
Still have the https issue but I will close this discussion.
Thanks everyone for your support.
01-26-2022 02:26 PM
Tricky business, I know.
Can you please show us
- show access-session int xxxx detail
- The ACL used for redirection (as specified in AuthZ Profile - and show us the ACL "show run" on the switch)
- The dACL applied in the pre-authentication (should be defined in ISE)
It sounds like an ACL issue. I dealt with this recently and it was a pain
The URL redirection relies on the command "ip http server" to be enabled - I think you mentioned this already - but it has to be that exact command.
01-26-2022 03:24 PM
Hi Arne and that’s for your support.
- show access-session int xxxx detail
it shows the proper redirect ACK and URL which is one of the PSN
- The ACL used for redirection (as specified in AuthZ Profile - and show us the ACL "show run" on the switch)
the ACL look like this:
deny udp any any eq domain
deny ip any host ISEPSN
permit tcp any any eq www
permit tcp any any eq 443
- The dACL applied in the pre-authentication (should be defined in ISE)
I remove the dACL to troubleshoot. So that’s not the issue.
FYI I also tried from the PC cmd “curl -v Cisco.com” but it failed.
thanks again!
01-26-2022 03:49 PM
I am fairly sure I had to download an ACL in the pre-auth case - if anything, you can then try to ping the PSN for troubleshooting - (permit icmp) not necessarily recommended for production
This was the contents of the dACL for the pre-auth case (i.e. to get the web portal redirection phase to work)
permit udp any any eq 53 permit udp any eq bootpc any eq bootps permit tcp any host <PSN_IP> eq 443 permit tcp any host <PSN_IP> eq 8443 permit icmp any any deny ip any any
01-27-2022 05:22 AM
Hi Arne,
I added the dACL and it didn't help. The browser continue to fail to open cisco.com and not redirect.
I'm thinking it's a possible cert issue on the access switch. IDK. I'm lost. haha...
Is there a redirect debug command on the switch you are familiar with? I was looking it up but didn't find anything.
Thanks again Arne
01-30-2022 09:07 AM
Please share the exact output from your curl command.
03-09-2022 10:45 PM
oh - have you configured the command below?
ip http server
It is required to allow the switch to process URL interception. If you have disabled this command on the switch, then URL redirection will not work
03-11-2022 05:50 AM
Hi Arne,
Yup and ip http secure-server.
03-09-2022 09:15 AM
Hello,
I found an interesting Cisco documentation that states:
"HTTPS traffic interception for central web authentication redirect is not supported."
I saw this on all the cat9K documentation. This contradicts the below ISE3.0 document that states it validated the cat9K.
https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/compatibility_doc/b_ise_sdt_30.html
Any idea?
03-10-2022 09:10 PM
Note |
HTTPS traffic interception for central web authentication redirect is not supported. |
This note is about HTTPS, i.e. HTTP over SSL/TLS.
You might need an SVI on the client VLAN and subnet.
HTTP 404 means page not found. Try another ISE portal.
03-11-2022 05:56 AM
Hello Hslai,
Thanks for your rely.
"This note is about HTTPS, i.e. HTTP over SSL/TLS."
Correct. Which is 99% of they browsing. which is what Guest portal uses. Are you saying this isn't related to guest portal redirect?
"You might need an SVI on the client VLAN and subnet."
Correct. There is SVI for the end-device subnet but on the core switch...not the access switch.
"HTTP 404 means page not found. Try another ISE portal."
Correct. hmmm....I'm thinking this is more related to the session ID added to the url. To be continued....
03-12-2022 06:19 PM - edited 03-12-2022 06:20 PM
AFAIK the connection attempts from the client endpoint need intercepted by the access switch so the client needs somehow reach to the SVI on the access switch. If that is not possible, try ISE Auth VLAN.
04-12-2022 10:33 AM
The issue was the below command on the management SVI interface on the uplink switch.
ip verify unicast source reachable-via rx allow-self-ping
Since the access switch only layer 3 interface was the management interface and the only route was a default route to the management SVI on the uplink....
1- When the switch replied to the tcp "syn" with a "syn,ack" it sent the traffic to it's default gateway because the client was on a different vlan/subnet. The switch's default gateway/SVI had the above command on it preventing the syn,ack respond.
This resolves the http redirect issue.
Still have the https issue but I will close this discussion.
Thanks everyone for your support.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide