08-18-2025 07:46 AM
Hello!
For a customer, i'd like to configure two captive portals respectively tied to two SSID (different usage).
However, i'd like Guest Type to be tied to one of the captive portal/SSID, basically :
- GuestType "A" can only authenticate to GuestPortal/SSID "A"
- GuestType "B" can only authenticate to Guest Portal/SSID "B"
- GuesType "B" cannot login to Guest Portal/SSID "A" and vice-versa
I there a way to perform this with ISE in 3.3 ?
Thanks a lot!
08-19-2025 04:56 PM
@MHM Cisco World - your screenshot shows the proven solution for doing ISE Portal HA, by checking which PSN is processing the request (hostname check) and then returning the appropriate URL to the endpoint. Noticed that the SSID is the same in both rules.
What @KevinMuller was asking for was to prevent Guests and Contractors from using the wrong portal - and that enforcement requires validation of the SSID AND the Internal User Group of the authenticating user.
My comment at the end of my last post mentioned the HA aspect - which your slide covered. So it's a merging of both of our suggestions.
08-19-2025 05:01 PM
08-19-2025 05:05 PM
You're right about suggesting two SSID's - it was when @KevinMuller explained his intention of restricting each guest type to a particular portal, that I added the AND rule logic to enforce that.
Something worth trying and testing.
08-20-2025 01:03 AM
You cannot checks on these conditions are for CWA you perform Host Lookup type of authentication. ISE performs the authentication process on the guest portal "internally", it doesn't go through the RADIUS Policy Sets for this. Only Endpoint ID Groups are correct conditions in the AuthZ Rules (unfortunatly ...).
I'll try enable external authentication in the ISS pointing to RADIUS Token Identity Store where the RADIUS Server is actually the same ISE to "loopback" the authentication.I've never tested that before. Anyhow, even if it works, I can only restrict one Portal not both.
08-20-2025 01:21 AM
You cannot checks on these conditions are for CWA you perform Host Lookup type of authentication. <<- I dont get what you meaning here
But
Guest when it authc in ISE it CWA
MHM
08-20-2025 01:32 AM
To clarify my statement : I'm not 100% sure we can match on the User Identity Groups instead of Endpoint Identity Group in authz conditions. As the RADIUS authentication is MAC based, the lookup should be performed on the Internal Endpoints identity store.
Tbh, I don't know if ISE re-eveluate the Policy Sets when the client hit the "submit" button when guest portal is filled with username/password, I know for sure that CoA is triggered to have a new MAC Authentication.
08-20-2025 01:45 AM
Do me or @Arne Bier mention any match of endpoint group?
Sure for guest after the guest success authc via portal it mac will add internal store and you can not use it as condition.
We match conditions before even guest authc'
WLC always send SSID guest associate with to ISE
Now ISE receive this radius request with specfic SSID' it will redirect traffic to any of your portals.
At this point you dont need to match mac in internal store since it not even found'
MHM
08-20-2025 02:03 AM
Yes, review the thread/printscreen. And this is something that is usual to do that for "Permanent Guest" that's why i'm mentionning it (i.e : https://documentation.meraki.com/MR/Encryption_and_Authentication/CWA_-_Central_Web_Authentication_with_Cisco_ISE)
"Now ISE receive this radius request with specfic SSID' it will redirect traffic to any of your portals."
Indeed, but the redirection is fine, I match the SSID and send different AuthZ profile to send users to thei respective portal. However, the Identity Store (Guest Users), remains the same for both portal, you can have hundred portals and/or SSIDs they will allrely on the same Guest Users database of ISE (if authenticated locally), no matter what SSID or portal you are hitting.
08-20-2025 02:39 AM
Even if all SSID guest mac in one internal identity store' still when guest re-auth ISE can match it SSID and hence know this mac+ssid is authc via policy 1 or 2 and apply correct download ACL.
MHM
08-20-2025 02:50 AM - edited 08-20-2025 02:50 AM
after this informal discussion I finally get why @Arne Bier many times ask why need this separate.
Download ACL in end for both guest is same allow ALL traffic from guest to network' so why this headache config.
The only reason we need this if ypu want to do some load balance between two PSN or two portal(interface) of PSN
Other than this there is no meaning of this config.
Thanks alot
I hope I get your reply to my above statement.
MHM
08-20-2025 04:02 AM
dACL is not a thing as SSID are mapped to different subnets. Once the Guest is authenticated, I just send an Access-Accept without any other attributes.
"Even if all SSID guest mac in one internal identity store' still when guest re-auth ISE can match it SSID and hence know this mac+ssid is authc via policy 1 or 2 and apply correct download ACL."
--> What if a Guest which is suppoed to authenticated to SSID "A", authenticate successfully to SSID "B" ? There is no way to prevent that, because the MAC is not yet added to the EID Group.
08-20-2025 04:11 AM
It is more sense now
AP beacon both SSID' and you want guest only content to specific SSID.
Since we dont have mac (yet) abd guest use portal to authc so
Sorry we can not force guest to use specific SSID
All my reply before assume that you have two AP and each one in different site and beacon one ssid.
Sorry for this bad news.
MHM
08-20-2025 08:12 AM
Thanks for trying to help on this topic
08-22-2025 03:53 AM
You are so welcome
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide