08-18-2025 07:46 AM
Hello!
For a customer, i'd like to configure two captive portals respectively tied to two SSID (different usage).
However, i'd like Guest Type to be tied to one of the captive portal/SSID, basically :
- GuestType "A" can only authenticate to GuestPortal/SSID "A"
- GuestType "B" can only authenticate to Guest Portal/SSID "B"
- GuesType "B" cannot login to Guest Portal/SSID "A" and vice-versa
I there a way to perform this with ISE in 3.3 ?
Thanks a lot!
08-18-2025 07:48 AM
If I understand correctly, just assign different Endpoint ID Groups to each portal. In authz policies map those EIDs to SSIDs.
08-18-2025 07:50 AM
Yes, this is something that^I've done already but it does not prevent you to have GuestType "A" authenticating on Guest Portal "B", and if the users does so, its MAC will be added to the Endpoint ID Group mapped to GuestType "A",
08-18-2025 08:01 AM
Just curious but why treat these two guest differently in the first place?
08-18-2025 07:51 AM
In wlc make sure you set calling ID to inlcude SSID
Then match SSID in authz
MHM
08-18-2025 07:56 AM
Yes, that's already what I do for "classic" CWA, but in the Identity Source Sequence mapped to the Guest Portal, there is no way to set a specific "user groups", you can only define identity store.
08-18-2025 08:00 AM
I think you can do two policy (not two authz policy) and match SSID in policy.
So each policy have it authz policy abd it portal
MHM
08-18-2025 01:58 PM
@KevinMuller what is Type A/B exactly, and how would ISE discern (in a RADIUS Access-Request) which is which? You can't rely on MAC addresses - so there is no unique client identifier that I know of, at the pre-auth stage (i.e. the stage where you want this MAC address to be steered to a particular Guest Portal).
08-19-2025 01:58 AM
Type A/B are GuestType (so basically the User ID Group to which Guest account belong).
Indeed, there is no actual way of filtering on the pre-auth as ISE only get the client's MAC, but I was thinking of restricting access to "A" portal to only guest that below to User ID Group mapped with GuestType "A" during the portal authentication. Hope it makes it clearer
08-19-2025 02:11 AM
08-19-2025 02:34 AM - edited 08-19-2025 02:36 AM
You have One SSID or two ?
If you have two use one for each policy.
MHM
08-19-2025 03:18 AM
I don’t understand why you’d want to do that. Notwithstanding the fact that it’s possible to direct a client to a specific portal based on MAC address identity - unless you had some bizarre 6th sense to know which MAC address needs which portal. The screenshot that MHM posted doesn’t solve the issue either. The portal selection can be done on ISE hostname, but that means the WLC is now the one with the 6th sense to know which PSN to target. What exact problem are you looking to solve? Is it that you want the self registering user to end up in a specific group, rather than the default (and one and only) Group for self registering guest flow?
08-19-2025 04:45 AM
Challenge is quite simple : Sponsor can create account for group "A" or group "B". Depending on the SSID you are connected to, and the associated portal (Portal are different between SSID "A" and "B"), you only allow guest account from group "A" or group "B".
Let's say you have a Guest/Visitor SSID with its associated portal where Guest account are created and associated to User ID Group "Guest". We don't want them to use their account to associated to another CWA SSID named "Contractor" which is also authenticated via ISE. Even if the Guest Portal is different the Identity Store remains the same (Guest Users) and there is no way natively to limit to specific User ID Groups (Guest Type)
08-19-2025 03:40 PM
You should create two Guest Types - Contractor and GuestOnly - each Guest Type has its own Endpoint Identity Group and rules etc. The question you're asking is how to ensure that Contractor can't authenticated on 'GuestOnly' Portal and vice-versa.
I think that would be possible in an Authorization Policy (each Guest Type that you create, also creates an internal user Identity Group that can be leveraged here)
The Rules shown above do not include handling HA (multiple PSN's) - you should add the ISE hostname check to redirect to your secondary PSN (if you have one) - that just doubles the rules to 4 in total.
The Rules that come after the redirection part will then simply check the Endpoint Identity Group and then return the Authorization Policies accordingly (Access-Accept with Session-Timeout etc.)
08-19-2025 04:10 PM
So what difference between my suggestion and your?
Really don't get.
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide