cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5396
Views
0
Helpful
10
Replies

ISE Sending Hostname in CWA Redirect

MANSOORQ123
Level 1
Level 1

Dear Support Team.

we have setup in which wireless controllers are deployed in Foreign & Anchor Scenario. (Guest WLC or Anchor is deployed in DMZ) , Controllers are running 7.3 and CWA config is done as per standard TAC documents.

When WLC redirects the session to ISE, Redirection URL has ISE hostname and is something like this

https://ise-ip-address:8443/guestportal/gateway........

we have setup Guest Access in such a way, that guest dhcp pool is using the Public DNS, we are not providing our internal DNS to guest dhcp pool, since public DNS does not have an entry for ise-ip-address, DNS resolution Fails and CWA is not happening.

is it possible that ISE can send IP address in place of its hostname, for example

https://10.15.24.20:8443/guestportal/gateway......

Any help will be highly appreciated.

Thanks

Ahad

10 Replies 10

Charlie Moreton
Cisco Employee
Cisco Employee

Ahad,

I think this will work for you:

Go to Policy > Policy Elements > Results, expand Authorization in the Left Menu.  Expand Authorization Profiles.  Click on the Authorization profile that you are using.  Scroll to Web Redirection (CWA, DRW, MDM, NSP, CPP) and place a check mark in the Static IP/Host name box.  Enter the IP address of the ISE.

Scroll to the bottom of the page and click Save

CWA_REDIRECT.GIF

Please Rate Helpful posts and mark this question as answered if, in fact, this does answer your question.  Otherwise, feel free to post follow-up questions.

Charles Moreton

Hello Charles 

Thanks a lot for your response. 

I am running Ver 1.1.4 and authorization profile syntax is a little different. I could not find "Static IP/ Host Name" in Common Tasks. I tried to pull it from Dictionaries, but could not find the same.

for CWA we have 2 rules, please view the flow in sequence.first wireless guest rule is for providing them access and other is for redirection. 2 Authorization Profiles used in these rules are also been shown below.

Rules.png

Wireless-Guest-Author Condition.png

Guest-Traffic.png

CWA_Wireless.png

Thanks again for your time to look into the issue.

Ahad

Unfortunately what Charles described is only offered as a workaround in ISE 1.2. Is there any reason for you not to upgrade? 1.2 has a ton of other features and bug fixes.

Sent from Cisco Technical Support iPad App

Dear SAM  one of the primary issue for not going to 1.2,  is Inline Posture Nodes re-initialization.  is there any possible fix in 1.1.4 for the problem that i am encountering.  " ISE sending host name in Redirect Message and Guest Users ( using public DNS) can not resolve ISE hostname, as a result  CWA is not happening.  Thanks  Ahad

There isn't a workaround for CWA without DNS in1.1.x unfortunately. If going to 1.2 currently isn't an option for you you should consider having guests use a local DNS you manage.

Sent from Cisco Technical Support iPad App

One workaround that I have gotten to work in the past when using ASA firewalls is to create a static NAT entry and leverage DNS inspection to translate the Private IP address for you.  It is important to note that in this example the domain name that the ISE PSN is registered as is on a publicly resolvable domain name which you have control of the DNS entries. 

In this example we will have a three legged ASA.  Inside, DMZ, and Outside. 

The PSN's hostname is psn.example.com.

The PSN's Private IP address is 10.1.1.100

Steps:

Create a Public DNS record for psn.example.com.  For best practices you should use an IP address that belongs to you and that is not a part of RFC 1918.  This way the public DNS servers do not reject the IP address for some other reason. In this example we will use 1.1.1.1

Enable DNS inspeciton on the ASA.

Create a Static NAT entry for 1.1.1.1 (outside) -> 10.1.1.100 (inside) and enable DNS translation. 

Now when the CWA user connects and gets a public DNS server it will query the public server for psn.exmaple.com and the public DNS server will return 1.1.1.1.  Now because of the DNS inspection the reply of 1.1.1.1 is replaced with the private IP address of 10.1.1.100.

End result is the DMZ host using a public DNS server to return a private IP address.  If you have multiple PSNs you will need to create multiple DNS and NAT.

You are welcome to try and use RFC Bogus RFC 1918 addresses, but the public DNS servers may have rules against doing so which is why i recommend using the public IP addresses that you own.  It is important to remember that even though you are creating Inside to Outside NAT entries for your ISE servers because you haven't created any inboundACL's they are not exposed to the Internet just because you created a NAT for them. 

Here is a cisco doc on how to do "DNS Doctoring"

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/72273-dns-doctoring-3zones.html

I should note that I have tested this using 1.2 with the static hostname, but I have not tested it with 1.1.4, but the underlying pricipals should be the same.

thejman85
Level 1
Level 1

You don't actually need to use those checkboxes in order to send information back to switches/WLCs, they just provide a nicer way of doing so. Take note of the cisvo-av-pair url-redirect and url-redirect-acl entries, uncheck the web authentication box and then use the Advanced Attribute Settings area to recreate them. Your url-redirect-acl entry will stay the same but you can specify the URL to be the IP/port you are looking for without ISE doing the on-demand replacement. This should give you what you wan't without needing to upgrade to 1.2.

Dear Charles / SAM / Justin / Thejman85  Many Thanks for your active contribution and inputs, it seems that upgrade to 1.2 is inevitable and should be carried out, as 1.1.4 has many other issues....  if upgrade to 1.2 resolves my issue, i will further update this post.  Thanks Again  Ahad...

mkdickinson
Level 1
Level 1

duplicate entry

  

mkdickinson
Level 1
Level 1

Thanks for the input from this forum, and Like others, believe I will have to upgrade, as I can get the IP address URL redirect to work, by not checking Web Authentication, and manually entering the Attribute Details, when I do this I get the "86017: Session cache entry missing" when trying to login after this. and this is very close to the bug in 1.2.

 

CSCue46758

Session expired error occurs during guest authentication. Cisco ISE displays the following error message:

ISE: 86107- Session cache entry missing

For Central Web Authentication, when you configure an authorization profile, and modify the cisco-av-pair (cisco-av-pair = url-redirect=https://ip:8443/guestportal/gateway?
sessionId=SessionIdValue&action=cwa), the user is redirected to the Web Authentication page, but the session expires after the user logs in.

Workaround Do any one of the following:

  • Do not replace “ip” in the cisco-av-pair with a value.
  • Do not modify cisco-av-pair. Instead, configure the Web Authentication option under Common Tasks.
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: