06-12-2021 09:40 AM - edited 06-12-2021 12:40 PM
Hello guys,
The following config is working flawlessly in a C886VA but in a C1111-8P and IOS XE 16 (or even 17) I experiencing a very strange issue. My bridged interface (now BDI2) seems that is never executing the authentication commands (authentication order webauth, authentication fallback web_auth_profile). Does anyone run into a similar problem?
! aaa new-model ! ! aaa authentication login default local aaa authentication ppp default local aaa authorization network default local aaa authorization auth-proxy default local ! ! aaa attribute list auth_list attribute type priv-lvl 0 attribute type user-maxlinks 7 attribute type proxyacl "deny tcp any host 192.168.2.1 eq 80" service auth-proxy attribute type proxyacl "deny tcp any host 192.168.2.1 eq 443" service auth-proxy attribute type proxyacl "deny tcp any host 192.168.2.1 eq 22" service auth-proxy attribute type proxyacl "deny tcp any host 192.168.2.1 eq 23" service auth-proxy attribute type proxyacl "deny ip any 192.168.0.0 0.0.0.255" service auth-proxy attribute type proxyacl "deny ip any 192.168.1.0 0.0.0.255" service auth-proxy attribute type proxyacl "deny ip any 192.168.2.0 0.0.0.255" service auth-proxy attribute type proxyacl "permit ip any any" service auth-proxy ! ip admission proxy http login expired page file flash:expired.htm ip admission proxy http login page file flash:login.htm ip admission proxy http success page file flash:success.htm ip admission proxy http failure page file flash:fail.htm ip admission init-state-time 5 ip admission inactivity-timer 120 ip admission name web_auth proxy http inactivity-time 120 list proxy_list !
username guest aaa attribute list auth_list privilege 0 password 0 xxxxxxxxxxx
! mac access-list extended MACDeniedVLAN2 deny host cccc.bbbb.aaaa any permit any any ! fallback profile web_auth_profile ip access-group preauth_list in ip admission web_auth !
interface GigabitEthernet0/1/0
switchport mode trunk
! interface Vlan2 no ip address no autostate service instance 2 ethernet encapsulation dot1q 2 rewrite ingress tag pop 1 symmetric mac access-group MACDeniedVLAN2 in bridge-domain 2 ! interface BDI2 device-tracking ip address 192.168.2.1 255.255.255.0 no ip redirects no ip unreachables ip mtu 1476 ip nat inside zone-member security InsideGuests ip tcp adjust-mss 1436 encapsulation dot1Q 2 authentication order webauth authentication fallback web_auth_profile service-policy input guest-fw ip virtual-reassembly ! ip access-list extended preauth_list 10 permit udp any any range bootps bootpc 20 permit udp any any eq domain !
ip http server
ip http authentication aaa
Tried to debug :
debug ip admission all
debug authentication feature webauth all
But absolutely nothing came. As I said in the beginning looks like the authentication commands are ignored.
Thanks for your time,
06-20-2021 02:01 AM - edited 06-20-2021 02:02 AM
Hello all,
In the following configuration guide regarding IOS XE (...17 probably;;;), i found a declaration that disappointed me:
So if finally web authentication is not supported anymore, why all configuration commands are still there without giving you a message like so many other deprecated commands??? Web authentication is also able to be converted to the "new style" (c3pl) but in any case all related commands seems to be ignored while configuration is running.
06-20-2021 11:17 AM
Thanks for the update. I am glad that you found that explanation in the documentation. It is disappointing that a command that has been deprecated can be entered and not generate any kind of error/warning message.
06-20-2021 11:36 AM - edited 06-21-2021 02:50 AM
Hello,
I really have no idea if this is an explanation. Because web authentication is not a simple command that it does not giving any error message. There are dozens of separate commands and at least two well known ways to build it (legacy and c3pl) and none of all those giving any error or warning message.
06-21-2021 03:11 AM - edited 06-21-2021 10:51 AM
Hello again,
Finally seems that Cisco decided to cut the Web Authentication from IOS XE and all router platforms running it. I manage to search using "by feature" tool and unfortunately made sure that Web Authentication gone:
https://cfnng.cisco.com/browse/routing/products
To be honest I am really sad because I spent hundred of hours reading about IOS XE and of course money on hardware and license upgrade and now all goes to the garbage.
P/S: And now I also have to "Accept as Solution" my unpleasant finding :))))))
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide