08-07-2017 02:20 AM
Hi
I used to use "Network Access:UseCase EQUALS Guest Flow" as the selection criteria to choose Captive Portal authentication in the Policy section. With ISE 2.3 I see no UseCase option anymore...
Is this a expected behaviour? What is the best alternative?
Regards
Roman
Solved! Go to Solution.
08-07-2017 01:26 PM
Correct. I did not catch earlier from mobile device that intent was to use this at Policy Set level. USE_CASE GuestFlow is primarily to match authorization condition, i.e. there is a reauthorization situation where user has just completed successful web auth event. It may have worked in prior model but that was not purpose and need to keep the policy set level for things that are accessible at a higher level in RADIUS conversation.
Craig
08-07-2017 04:09 AM
Make sure you remove any dictionary filters (no icon selected in library) to display all attributes. You can then enter keywords to find network access attributes.
08-07-2017 04:27 AM
is that post upgrade?
try to use the 'Editor' to find the attribute.
08-07-2017 10:08 AM
Hi
It is a fresh install of the FCS code.
I see no UseCase option (with no filters). In fact the only options available are the ones bellow...
08-07-2017 10:17 AM
Your screenshot looks like from the conditions studio for authentication policy rules. If that is the case, it's expected not having NA.UseCase, as such attribute will not work correctly during authentication evaluation.
08-07-2017 10:41 AM
In fact, my intention is to use "Network Access:UseCase EQUALS Guest Flow" as the selection criteria to choose Captive Portal authentication in the Policy section, as I have been doing from the first ISE version that supported Policy Sets many years ago...
ISE 2.3 (where I cannot use "Network Access:UseCase EQUALS Guest Flow"):
ISE 2.2 (and previous) were I could use "Network Access:UseCase EQUALS Guest Flow"):
Any other alternative?
Thanks
08-07-2017 11:36 AM
The attribute has been removed as a fix for CSCvc98033 and ISE 2.3 is the only shipping release with this fix.
It's not common to use such attributes for authentications as they would only work for re-auth of an existing session and their existence causes confusion to customers.
I do not see any workaround other than for you to re-design the policy sets and moving that inside of an policy set and under authorization.
08-07-2017 12:17 PM
I agree with Hsing. The session is not considered a guest flow until after authentication. This means you would have the same session using two different policy sets. This document has a good description for how that use case is intended to be used: https://supportforums.cisco.com/document/110031/central-web-authentication-cwa-guests-ise This is another page with a similar description: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200273-Configure-ISE-Guest-Temporary-and-Perman.html
08-07-2017 01:26 PM
Correct. I did not catch earlier from mobile device that intent was to use this at Policy Set level. USE_CASE GuestFlow is primarily to match authorization condition, i.e. there is a reauthorization situation where user has just completed successful web auth event. It may have worked in prior model but that was not purpose and need to keep the policy set level for things that are accessible at a higher level in RADIUS conversation.
Craig
08-24-2017 10:44 PM
Along the topic of this thread, am I correct in understanding that "Guest Flow" attribute is set for the RADIUS session when ISE detects the endpoint (ie the user on the endpoint) has authenticated via the CWA portal?
So on first access, user is redirected. They authenticate and then the flag is set and a CoA issued for that session. Upon re-authorization the flag is detected and appropriate access is granted.
08-25-2017 01:28 AM
Essentially that is correct.
12-18-2019 08:04 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide