06-13-2018 08:04 AM
I'm implementing ISE on an existing Meraki wireless deployment. I can’t use the “default” integration path for guest wireless as stakeholders are insisting that the traffic must be WPA-2 PSK protected (selecting ISE for the captive portal means having open access). This means that I’m having to fudge redirection to the ISE guest portal using a splash redirect on the Meraki pointing to the ISE portal test URL. The Meraki captive portal deployment guide https://meraki.cisco.com/lib/pdf/meraki_whitepaper_captive_portal.pdf says that:
Let’s assume the client is registered as a guest and completes the GUI logon, then if ISE wants to instruct the Meraki to permit access to the client, return a URL redirect:
GET[‘base_grant_url’] + “?continue_url=” + GET[‘user_continue_url’] + “&duration=3600” (to grant access for one hour).
The guide also states that this URL shouldn’t be hardcoded as elements such as that n16 host might change and consequently it’ll all break.
Does anybody know how ISE can extract those parameters passed to it from Meraki (if it’s even possible)?
Solved! Go to Solution.
06-13-2018 10:25 AM
ISE will not be able to extract, would recommend working with Meraki team to see if they can support ISE guest with wpa as I know they can with open ssid
https://communities.cisco.com/docs/DOC-68192?mobileredirect=true
Cisco WLC 8.3 code started supported wpa with ISE
06-13-2018 10:25 AM
ISE will not be able to extract, would recommend working with Meraki team to see if they can support ISE guest with wpa as I know they can with open ssid
https://communities.cisco.com/docs/DOC-68192?mobileredirect=true
Cisco WLC 8.3 code started supported wpa with ISE
06-19-2018 10:12 AM
Please update us on status as well
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide