cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
8596
Views
15
Helpful
0
Comments
howon
Cisco Employee
Cisco Employee

Screen Shot 2019-09-04 at 9.38.57 AM.png

Introduction

What Is Cisco Identity Services Engine?

Cisco Identity Services Engine (ISE) is an all-in-one enterprise policy control product that enables comprehensive secure wired, wireless, and Virtual Private Networking (VPN) access.

Cisco ISE offers a centralized control point for comprehensive policy management and enforcement in a single RADIUS-based product. The unique architecture of Cisco ISE allows enterprises to gather real-time contextual information from networks, users, and devices. The administrator can then use that information to make proactive governance decisions. Cisco ISE is an integral component of Cisco Secure Access.

Cisco Secure Access is an advanced Network Access Control and Identity Solution that is integrated into the Network Infrastructure. It is a fully tested, validated solution where all the components within the solution are thoroughly vetted and rigorously tested as an integrated system.

Cisco Wireless Controllers

Unlike overlay Network Access Control solutions the Cisco Secure Access utilizes the access layer devices (switches, wireless controllers, etc.) for enforcement. The access device itself now handles functions that were commonly handled by appliances and other overlay devices, such as URL redirection for web authentications.

The Cisco Secure Access not only combines standards-based identity and enforcement models, such as IEEE 802.1X and VLAN control, it also has many more advanced identity and enforcement capabilities such as URL Redirect, Named Access Control Lists (AireSpace ACLs), Security Group Tagging (SGT), device profiling, guest and web authentications services, posture assessments, and integration with leading Mobile Device Management (MDM) vendors for compliance validation of mobile devices before and during network access.

About This Document

The following section describes the “universal configuration” for Cisco® Wireless LAN Controllers (WLC). These recommended configurations are compiled as a best practice to be used for all deployments, and they remain consistent through the different stages of deployment, as well as the different deployment types chosen.

The following diagram shows the overall layout of the components. There are two access VLANs, ACCESS VLAN for Employee users and GUEST VLAN for Guest users. Although this document doesn’t include policy configurations on ISE such as BYOD, Posture Assessment, and profiling configuration provided here allows baseline for such operations.

Screen Shot 2019-09-04 at 9.38.40 AM.png

In the appendix, there are sample configurations that can be copied and pasted with minimal modification. Also in the appendix are the additional configurations that pertain to FlexConnect mode WLAN/AP and WLANs configured in Auto-Anchor mode.

Configuration

Initial Configuration

This section covers initial bootstrapping of WLC using the CLI-based configuration tool.

  1. Initial Configuration

Option Value
Management Interface IP 10.1.60.61
Management Interface Mask 255.255.255.0
Management Interface Gateway 10.1.60.1
Management Interface VLAN ID 0 (Untagged)
Management Interface Port Number 1
Virtual Gateway IP 192.0.2.1
Mobility/RF Group Name Main
NTP Server IP 10.1.60.1

Note: Initial Configuration applies to new WLC with no prior configuration. If the ISE-related configurations are being added to a WLC with existing configuration, then proceed to the Controller Configuration section.

  1. Connect to the console port of the WLC or use virtual console for vWLC. Refer to the following settings to bootstrap the WLC.

(Cisco Controller)
Welcome to the Cisco Wizard Configuration Tool
Use the '-' character to backup
Would you like to terminate autoinstall? [yes]:yes
AUTO-INSTALL: process terminated -- no configuration loaded
System Name [Cisco_91:e2:64] (31 characters max):
Enter Administrative User Name (24 characters max): admin
Enter Administrative Password (3 to 24 characters): ********
Re-enter Administrative Password : ********
Service Interface IP Address Configuration [static][DHCP]:dhcp
Enable Link Aggregation (LAG) [yes][NO]: no
Management Interface IP Address: 10.1.60.61
Management Interface Netmask: 255.255.255.0
Management Interface Default Router: 10.1.60.1
Management Interface VLAN Identifier (0 = untagged): 0
Management Interface Port Num [1 to 8]: 1
Management Interface DHCP Server IP Address: 10.1.100.100
Virtual Gateway IP Address: 192.0.2.1
Mobility/RF Group Name: Main
Network Name (SSID): EXAMPLE
Configure DHCP Bridging Mode [yes][NO]: no
Allow Static IP Addresses [YES][no]: no
Configure a RADIUS Server now? [YES][no]: no
Warning! The default WLAN security policy requires a RADIUS server.
Please see documentation for more details.
Enter Country Code list (enter 'help' for a list of countries) [US]:us
Enable 802.11b Network [YES][no]: yes
Enable 802.11a Network [YES][no]: yes
Enable 802.11g Network [YES][no]: yes
Enable Auto-RF [YES][no]: yes
Configure a NTP server now? [YES][no]: yes
Enter the NTP server's IP address: 10.1.60.1
Enter a polling interval between 3600 and 604800 secs: 3600
Configuration correct? If yes, system will save it and reset. [yes][NO]: yes

 

We recommend that you set the Cisco WLC virtual gateway address to 192.0.2.1. The address you use must be a non-routed IP with a fully qualified domain name (FQDN) mapped in the Domain Name System (DNS). This FQDN/ IP address should be added to certificates generated by your CA. This configuration stops users from seeing “untrusted certificate” errors when they are redirected to the WLC’s virtual gateway.

  1. After the WLC resets, configure the rest of the WLC settings. This guide includes both GUI and CLI-based configuration for the following sections.

Note: Please note that the SSID named ‘EXAMPLE’ configured during the initialization will not be used in this guide and can be removed by running the following command after the WLC resets.

(WLC) >config wlan delete 1

 

Controller Configuration

This section covers configuration related to the controller. This includes interface and VLAN configurations for endpoint devices and global controller settings.

  1. Interface Configuration

Options Employee Guest
Interface Name ACCESS GUEST
VLAN ID 10 50
Dynamic IP 10.1.10.61 10.1.50.61
Subnet Mask 255.255.255.0 255.255.255.0
Gateway 10.1.10.1 10.1.50.1
DHCP Server 10.1.200.10 10.1.200.10
Port 1 1
  1. Configure dynamic interfaces. For GUI, go to Controller Interfaces.

(WLC) >config interface create ACCESS 10
(WLC) >config interface create GUEST 50

 

  1. Assign a physical port for the dynamic interfaces created above. In this example, all interfaces are assigned to same physical interface and utilize trunking.

(WLC) >config interface port ACCESS 1
(WLC) >config interface port GUEST 1

 

  1. Configure ip addresses on the interfaces.

(WLC) >config interface address dynamic-interface ACCESS 10.1.10.61 255.255.255.0 10.1.10.1
(WLC) >config interface address dynamic-interface GUEST 10.1.50.61 255.255.255.0 10.1.50.1

 

  1. Configure DHCP server for user interfaces.

(WLC) >config interface dhcp dynamic-interface ACCESS primary 10.1.200.10
(WLC) >config interface dhcp dynamic-interface GUEST primary 10.1.200.10

 

  1. Disable DHCP proxy globally and use router’s SVI to forward DHCP request to the DHCP server. For GUI, go to Controller Advanced DHCP.

(WLC) >config dhcp proxy disable

Note: When dhcp proxy is disabled, WLC bridges DHCP requests to the upstream router. The upstream router should be configured with ‘ip helper-address’ for the DHCP server, and as an ISE PSN node for profiling purposes. While the WLC device sensor can capture DHCP attributes for ISE, it lacks several DHCP attributes, such as the DHCP options attribute. By configuring the upstream router to forward DHCP requests to the ISE node, ISE can collect additional DHCP information for profiling purposes.

  1. (Optional) Enable fast-ssid-change feature to accommodate apple devices transitioning from different SSIDs for dual SSID deployment. For GUI, go to Controller General

(WLC) >config network fast-ssid-change enable

Note: When fast SSID changing is enabled, the controller allows clients to move between SSIDs. When the client sends a new association for a different SSID, the client entry in the controller connection table is cleared before the client is added to the new SSID. When fast SSID changing is disabled, the controller enforces a delay before clients are allowed to move to a new SSID, which impacts user experience in dual SSID BYOD deployment.

Security Configuration

This section covers configuration related to the security, which includes RADIUS server and ACLs. The RADIUS servers are using ID values of 11 and 12 so as to not overwrite any existing RADIUS settings.

  1. Create a RADIUS Authentication server. In this example, there are two ISE nodes, 10.1.200.11 and 10.1.200.12. CoA is enabled, and timeout is set to 5 seconds (default is 2 seconds). Device Management via RADIUS is disabled, and these RADIUS servers are dedicated for network user authentication. For GUI configuration, go to Security AAA RADIUS Authentication New…

(WLC) >config radius auth add 11 10.1.200.11 1812 ascii ISEc0ld
(WLC) >config radius auth disable 11
(WLC) >config radius auth management 11 disable
(WLC) >config radius auth retransmit-timeout 11 5
(WLC) >config radius auth rfc3576 enable 11
(WLC) >config radius auth enable 11
(WLC) >config radius auth add 12 10.1.200.12 1812 ascii ISEc0ld
(WLC) >config radius auth disable 12
(WLC) >config radius auth management 12 disable
(WLC) >config radius auth retransmit-timeout 12 5
(WLC) >config radius auth rfc3576 enable 12
(WLC) >config radius auth enable 12

 

  1. (Optional) Ensure that the MAC address format sent in the Calling-Station-ID field matches the ISE. This should be the default setting.

(WLC) >config radius auth mac-delimiter hyphen

 

  1. (Optional) Configure the format of the RADIUS Called-Station-ID attribute with additional information. The default format is APMAC:SSID. The option for this attribute varies depending on the WLC code version. This field can be used to provide location-based authentication using AP location information that endpoint associated for initial authentication.

(WLC) >config radius callStationIdType ap-macaddr-ssid

Note: This is different from MSE location integration that uses endpoint location using WiFi triangulation.

  1. Configure RADIUS fallback mode so the primary ISE node is used when it is back online. Without this option, a second or tertiary server is used, even if the primary server is back online. For GUI, go to Security AAA RADIUS Fallback.

(WLC) >config radius fallback-test username RADIUS-TEST
(WLC) >config radius fallback-test mode active

Note: Selecting active causes the Cisco WLC to revert to a server with a lower priority from the available backup servers. To select a server, it uses RADIUS probe messages to proactively determine whether a server that has been marked inactive is back online. The controller ignores all inactive servers for all active RADIUS requests. Selecting passive mode causes the Cisco WLC to revert to a server with a lower priority from the available backup servers without using extraneous probe messages. The controller ignores all inactive servers for a time period, and retries later when a RADIUS message needs to be sent.

  1. (Optional) The interval specifies the probe interval in the case of active mode fallback or inactive time in the case of passive mode fallback. The default value is 300 seconds.

(WLC) >config radius fallback-test mode interval 300

 

  1. Disable RADIUS aggressive failover mechanism so the RADIUS server is not marked dead in error.

(WLC) >config radius aggressive-failover disable

Note: If the aggressive failover feature is enabled in the WLC, the WLC is too aggressive to mark the AAA server as "not responding". One reason you should not enable this feature is because the AAA server is possibly not responsive only to a particular client, if you configured silent discard. It could also be a response to other valid clients with valid certificates. The WLC can still mark the AAA server as "not responding" and "not functional". To overcome this, disable the aggressive failover feature. If this is disabled, then the controller only fails over to the next AAA server if there are three consecutive clients that fail to receive a response from the RADIUS server.

  1. Create RADIUS Accounting servers. For GUI, go to Security AAA RADIUS Accounting New…

(WLC) >config radius acct add 11 10.1.200.11 1813 ascii ISEc0ld
(WLC) >config radius acct disable 11
(WLC) >config radius acct retransmit-timeout 11 5
(WLC) >config radius acct enable 11
(WLC) >config radius acct add 12 10.1.200.12 1813 ascii ISEc0ld
(WLC) >config radius acct disable 12
(WLC) >config radius acct retransmit-timeout 12 5
(WLC) >config radius acct enable 12

 

  1. Create ACL_WEBAUTH_REDIRECT ACL. For GUI, go to Security Access Control Lists Access Control Lists New…

(WLC) >config acl delete ACL_WEBAUTH_REDIRECT
(WLC) >config acl create ACL_WEBAUTH_REDIRECT
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8443 8444
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8443 8444
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8905 8905
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8905 8905
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8443 8444
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8443 8444
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8905 8905
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
(WLC) >config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8905 8905
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 17
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 53 53
(WLC) >config acl rule add ACL_WEBAUTH_REDIRECT 1
(WLC) >config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
(WLC) >config acl rule protocol ACL_WEBAUTH_REDIRECT 1 17
(WLC) >config acl rule source port range ACL_WEBAUTH_REDIRECT 1 53 53
(WLC) >config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535

 

  1. (Optional) If desired, DNS ACL entries can be added to the redirect ACL. This allows endpoint access to the Google Play store during the NSP process.

(WLC) >config acl url-domain add play.google.com ACL_WEBAUTH_REDIRECT
(WLC) >config acl url-domain add android.clients.google.com ACL_WEBAUTH_REDIRECT
(WLC) >config acl url-domain add www.googleapis.com ACL_WEBAUTH_REDIRECT
(WLC) >config acl url-domain add ggpht.com ACL_WEBAUTH_REDIRECT
(WLC) >config acl url-domain add android.pool.ntp.org ACL_WEBAUTH_REDIRECT
(WLC) >config acl url-domain add market.android.com ACL_WEBAUTH_REDIRECT
(WLC) >config acl url-domain add mtalk.google.com ACL_WEBAUTH_REDIRECT
(WLC) >config acl url-domain add gvt1.com ACL_WEBAUTH_REDIRECT

Note: To accommodate client devices with language setting other than English may require additional domains to be added. Up to 20 domain entries can be added per ACL.

  1. Apply ACL to the data path

(WLC) >config acl apply ACL_WEBAUTH_REDIRECT

Note: When a client is in the redirect state such as POSTURE_REQ , CWA, Client Provisioning, the default behavior of the WLC is to block all traffic except DHCP/DNS. The ACL_WEBAUTH_REDIRECT ACL (which is called in the url-redirect-acl AV Pair received from Cisco ISE) is applied to the client, and it can reach only resources specifically allowed in the ACL.

  1. Create a BLACKHOLE ACL.

(WLC) >config acl delete BLACKHOLE
(WLC) >config acl create BLACKHOLE
(WLC) >config acl rule add BLACKHOLE 1
(WLC) >config acl rule action BLACKHOLE 1 permit
(WLC) >config acl rule protocol BLACKHOLE 1 6
(WLC) >config acl rule source port range BLACKHOLE 1 0 65535
(WLC) >config acl rule destination address BLACKHOLE 1 10.1.200.12 255.255.255.255
(WLC) >config acl rule destination port range BLACKHOLE 1 8444 8444
(WLC) >config acl rule add BLACKHOLE 1
(WLC) >config acl rule action BLACKHOLE 1 permit
(WLC) >config acl rule protocol BLACKHOLE 1 6
(WLC) >config acl rule source address BLACKHOLE 1 10.1.200.12 255.255.255.255
(WLC) >config acl rule source port range BLACKHOLE 1 8444 8444
(WLC) >config acl rule destination port range BLACKHOLE 1 0 65535
(WLC) >config acl rule add BLACKHOLE 1
(WLC) >config acl rule action BLACKHOLE 1 permit
(WLC) >config acl rule protocol BLACKHOLE 1 6
(WLC) >config acl rule source port range BLACKHOLE 1 0 65535
(WLC) >config acl rule destination address BLACKHOLE 1 10.1.200.11 255.255.255.255
(WLC) >config acl rule destination port range BLACKHOLE 1 8444 8444
(WLC) >config acl rule add BLACKHOLE 1
(WLC) >config acl rule action BLACKHOLE 1 permit
(WLC) >config acl rule protocol BLACKHOLE 1 6
(WLC) >config acl rule source address BLACKHOLE 1 10.1.200.11 255.255.255.255
(WLC) >config acl rule source port range BLACKHOLE 1 8444 8444
(WLC) >config acl rule destination port range BLACKHOLE 1 0 65535
(WLC) >config acl rule add BLACKHOLE 1
(WLC) >config acl rule action BLACKHOLE 1 permit
(WLC) >config acl rule protocol BLACKHOLE 1 17
(WLC) >config acl rule source port range BLACKHOLE 1 0 65535
(WLC) >config acl rule destination port range BLACKHOLE 1 53 53
(WLC) >config acl rule add BLACKHOLE 1
(WLC) >config acl rule action BLACKHOLE 1 permit
(WLC) >config acl rule protocol BLACKHOLE 1 17
(WLC) >config acl rule source port range BLACKHOLE 1 53 53
(WLC) >config acl rule destination port range BLACKHOLE 1 0 65535

 

  1. Apply ACL to the data path

(WLC) >config acl apply BLACKHOLE

 

WLAN Configuration

This section covers configuration related to the Secured WLAN for Employee devices. This includes WLAN settings. The WLANs are using ID value of 11 and 12 so as not to overwrite any existing WLAN settings. This example configures two WLANs:

  • ‘ISE’ is a secured WLAN with WLAN ID 11, used for employee access and Single SSID BYOD flow.

  • ‘OPEN’ is an open WLAN with WLAN ID 12, used for guest access.

  1.  
Option Secured WLAN Open WLAN
WLAN ID 11 12
WLAN Name ISE OPEN
SSID ISE OPEN
Interface ACCESS GUEST
L2 Security WPA/WPA2 & 802.1X MAC Filtering
L3 Security None None
RADIUS Auth Server 11 & 12 11 & 12
RADIUS Acct Server 11 & 12 11 & 12
RADIUS Interim ACCT Enabled Enabled
Interim Update Interval 0 Seconds 0 Seconds
AAA Override Enabled Enabled
Idle Timeout 180 Seconds 180 Seconds
NAC NAC_RADIUS NAC_RADIUS
Device Sensor DHCP & HTTP DHCP & HTTP
  1. Create ISE WLAN using WLAN ID 11. For GUI, go to WLANs Create New Go.

(WLC) >config wlan create 11 ISE ISE

 

  1. Assign previously created interface ‘ISE’ to the WLAN.

(WLC) >config wlan interface 11 ACCESS

 Note: When WLANs are added to the WLC, it is already enabled with WPA and 802.1X.

  1. Assign previously created RADIUS Auth and Acct servers to the WLAN.

(WLC) >config wlan radius_server auth add 11 11
(WLC) >config wlan radius_server auth add 11 12
(WLC) >config wlan radius_server acct add 11 11
(WLC) >config wlan radius_server acct add 11 12

 

  1. Configure interim accounting updates for the endpoints. Following setting applies to 8.x code.

(WLC) >config wlan radius_server acct interim-update 0 11
(WLC) >config wlan radius_server acct interim-update enable 11

Note: For 7.6 code disable interim accounting. Although disabled the WLC will still send accounting updates for mobility events for the endpoint.

(WLC) >config wlan radius_server acct interim-update disable 11

 Note: For any other previous versions.

(WLC) >config wlan radius_server acct interim-update 3600 11
(WLC) >config wlan radius_server acct interim-update enable 11

 

  1. Configure WLAN to accept AuthZ attributes from ISE.

(WLC) >config wlan aaa-override enable 11

 

  1. (Optional) Configure idle timeout.

(WLC) >config wlan usertimeout 180 11

 

  1. Enable nac-radius for the WLAN.

(WLC) >config wlan nac radius enable 11

 

  1. Enable device sensor for http and dhcp.

(WLC) >config wlan profiling radius all enable 11

 

  1. Enable Secured WLAN.

(WLC) >config wlan enable 11

 

  1. Create OPEN WLAN using WLAN ID 12.

(WLC) >config wlan create 12 OPEN OPEN

 

  1. Assign previously created interface ‘GUEST’ to the WLAN.

(WLC) >config wlan interface 12 GUEST

 

  1. Disable L2 security for open WLAN.

(WLC) >config wlan security wpa disable 12

 

  1. Enable MAC filtering for CWA.

(WLC) >config wlan mac-filtering enable 12

 

  1. Assign previously created RADIUS Auth and Acct servers to the WLAN.

(WLC) >config wlan radius_server auth add 12 11
(WLC) >config wlan radius_server auth add 12 12
(WLC) >config wlan radius_server acct add 12 11
(WLC) >config wlan radius_server acct add 12 12

 

  1. Configure interim accounting updates for the endpoints. Following setting applies to 8.x code.

(WLC) >config wlan radius_server acct interim-update 0 12
(WLC) >config wlan radius_server acct interim-update enable 12

Note: For 7.6 code disable interim accounting. Although disabled the WLC will still send accounting updates for mobility events for the endpoint.

(WLC) >config wlan radius_server acct interim-update disable 12

 Note: For any other previous versions.

(WLC) >config wlan radius_server acct interim-update 3600 12
(WLC) >config wlan radius_server acct interim-update enable 12

 

  1. Configure WLAN to accept AuthZ attributes from ISE

(WLC) >config wlan aaa-override enable 12

 

  1. Configure session timeout.

(WLC) >config wlan session-timeout 12 1800

 

  1. Configure idle timeout.

(WLC) >config wlan usertimeout 180 12

 

  1. (Optional) Configure other parameters necessary for open WLAN.

(WLC) >config wlan chd 12 disable
(WLC) >config wlan ccx AironetIeSupport disable 12
(WLC) >config wlan dhcp_server 12 0.0.0.0 required

 

  1. Enable nac-radius for the WLAN.

(WLC) >config wlan nac radius enable 12

 

  1. Enable device sensor for http and dhcp.

(WLC) >config wlan profiling radius all enable 12

 

  1. Enable Open WLAN.

(WLC) >config wlan enable 12

 

Management Configuration

This section covers configuration related to the General Controller Management. This includes Captive Portal Bypass, and HTTPS redirect settings.

  1. Enable captive portal bypass to disable mini browser from popping up when Apple device associates to the WLAN. This will be in effect after the WLC has been restarted. There is no GUI for this configuration.

(WLC) >config network web-auth captive-bypass enable

 

  1. (Optional) Enable HTTPS redirect on 8.x code. For GUI, go to Management HTTP-HTTPS HTTPS Redirection Enabled.

(WLC) >config network web-auth https-redirect enable

 Note: This is not recommended in production environment due to added load on the controller and reduced web auth sessions that WLC can handle when enabled.

  1. Save configuration.

(WLC) >save config

 

  1. Reload the controller to have captive portal bypass setting take effect.

(WLC) >reset system

 

Appendix A: Sample Configuration

Configuration for WLC Running 8.x Code

Configuration for previous versions of WLC is identical with the exception of interim accounting settings under each of the WLAN configuration. Please refer to main section of the document for proper configuration for previous versions.

config interface create ACCESS 10
config interface create GUEST 50
config interface port ACCESS 1
config interface port GUEST 1
config interface address dynamic-interface ACCESS 10.1.10.61 255.255.255.0 10.1.10.1
config interface address dynamic-interface GUEST 10.1.50.61 255.255.255.0 10.1.50.1
config interface dhcp dynamic-interface ACCESS primary 10.1.200.10
config interface dhcp dynamic-interface GUEST primary 10.1.200.10
config dhcp proxy disable
config radius auth add 11 10.1.200.11 1812 ascii ISEc0ld
config radius auth disable 11
config radius auth management 11 disable
config radius auth retransmit-timeout 11 5
config radius auth rfc3576 enable 11
config radius auth enable 11
config radius auth add 12 10.1.200.12 1812 ascii ISEc0ld
config radius auth disable 12
config radius auth management 12 disable
config radius auth retransmit-timeout 12 5
config radius auth rfc3576 enable 12
config radius auth enable 12
config radius fallback-test username RADIUS-TEST
config radius fallback-test mode active
config radius aggressive-failover disable
config radius acct add 11 10.1.200.11 1813 ascii ISEc0ld
config radius acct disable 11
config radius acct retransmit-timeout 11 5
config radius acct enable 11
config radius acct add 12 10.1.200.12 1813 ascii ISEc0ld
config radius acct disable 12
config radius acct retransmit-timeout 12 5
config radius acct enable 12
config acl delete ACL_WEBAUTH_REDIRECT
config acl create ACL_WEBAUTH_REDIRECT
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 17
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config acl rule destination port range ACL_WEBAUTH_REDIRECT 1 53 53
config acl rule add ACL_WEBAUTH_REDIRECT 1
config acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config acl rule protocol ACL_WEBAUTH_REDIRECT 1 17
config acl rule source port range ACL_WEBAUTH_REDIRECT 1 53 53
config acl apply ACL_WEBAUTH_REDIRECT
config acl delete BLACKHOLE
config acl create BLACKHOLE
config acl rule add BLACKHOLE 1
config acl rule action BLACKHOLE 1 permit
config acl rule protocol BLACKHOLE 1 6
config acl rule source port range BLACKHOLE 1 0 65535
config acl rule destination address BLACKHOLE 1 10.1.200.12 255.255.255.255
config acl rule destination port range BLACKHOLE 1 8444 8444
config acl rule add BLACKHOLE 1
config acl rule action BLACKHOLE 1 permit
config acl rule protocol BLACKHOLE 1 6
config acl rule source address BLACKHOLE 1 10.1.200.12 255.255.255.255
config acl rule source port range BLACKHOLE 1 8444 8444
config acl rule destination port range BLACKHOLE 1 0 65535
config acl rule add BLACKHOLE 1
config acl rule action BLACKHOLE 1 permit
config acl rule protocol BLACKHOLE 1 6
config acl rule source port range BLACKHOLE 1 0 65535
config acl rule destination address BLACKHOLE 1 10.1.200.11 255.255.255.255
config acl rule destination port range BLACKHOLE 1 8444 8444
config acl rule add BLACKHOLE 1
config acl rule action BLACKHOLE 1 permit
config acl rule protocol BLACKHOLE 1 6
config acl rule source address BLACKHOLE 1 10.1.200.11 255.255.255.255
config acl rule source port range BLACKHOLE 1 8444 8444
config acl rule destination port range BLACKHOLE 1 0 65535
config acl rule add BLACKHOLE 1
config acl rule action BLACKHOLE 1 permit
config acl rule protocol BLACKHOLE 1 17
config acl rule source port range BLACKHOLE 1 0 65535
config acl rule destination port range BLACKHOLE 1 53 53
config acl rule add BLACKHOLE 1
config acl rule action BLACKHOLE 1 permit
config acl rule protocol BLACKHOLE 1 17
config acl rule source port range BLACKHOLE 1 53 53
config acl rule destination port range BLACKHOLE 1 0 65535
config acl apply BLACKHOLE
config wlan create 11 ISE ISE
config wlan interface 11 ACCESS
config wlan radius_server auth add 11 11
config wlan radius_server auth add 11 12
config wlan radius_server acct add 11 11
config wlan radius_server acct add 11 12
config wlan radius_server acct interim-update 0 11
config wlan radius_server acct interim-update enable 11
config wlan aaa-override enable 11
config wlan usertimeout 180 11
config wlan nac radius enable 11
config wlan profiling radius all enable 11
config wlan enable 11
config wlan create 12 OPEN OPEN
config wlan interface 12 GUEST
config wlan security wpa disable 12
config wlan mac-filtering enable 12
config wlan radius_server auth add 12 11
config wlan radius_server auth add 12 12
config wlan radius_server acct add 12 11
config wlan radius_server acct add 12 12
config wlan radius_server acct interim-update 0 12
config wlan radius_server acct interim-update enable 12
config wlan aaa-override enable 12
config wlan session-timeout 12 1800
config wlan usertimeout 180 12
config wlan chd 12 disable
config wlan ccx AironetIeSupport disable 12
config wlan dhcp_server 12 0.0.0.0 required
config wlan nac radius enable 12
config wlan profiling radius all enable 12
config wlan enable 12
config network web-auth captive-bypass enable
save config

 

Configuration for Cisco IOS Switch Interface Connected to the WLC

description WLC Port 1
switchport trunk encapsulation dot1q
switchport trunk native vlan 60
switchport mode trunk

 

Configuration for Cisco IOS Switch SVI

interface vlan 10
description ACCESS
ip address 10.1.10.1 255.255.255.0
ip helper-address 10.1.200.10
ip helper-address 10.1.200.11
interface vlan 50
description GUEST
ip address 10.1.50.1 255.255.255.0
ip helper-address 10.1.200.10
ip helper-address 10.1.200.11

 

Appendix B: Design Considerations

FlexConnect AP & WLAN

FlexConnect mode, formerly known as H-REAP mode, allows APs to locally switch user traffic for certain WLANs typically deployed in branch offices. That allows wireless traffic to stay within the branch office. In this design, when an endpoint associates to a FlexConnect enabled WLAN, the endpoint authenticates inside the CAPWAP tunnel from the LAP to the controller. However, once authenticated, the traffic is switched locally from the LAP to the local LAN instead of through the central Wireless Controller. The integration with ISE and FlexConnect mode AP has been supported since WLC v7.5. However, the integration requires a specific configuration. Aside from configuring WLANs and APs into FlexConnect mode, the Redirect ACLs also must be re-created as FlexConnect ACLs, and downloaded to the FlexConnect group or individual APs.

First create ACL_WEBAUTH_REDIRECT & BLACKHOLE FlexConnect ACLs

config flexconnect acl create ACL_WEBAUTH_REDIRECT
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.12 255.255.255.255
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 8443 8444
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule destination address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 6
config flexconnect acl rule source address ACL_WEBAUTH_REDIRECT 1 10.1.200.11 255.255.255.255
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 8905 8905
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 17
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 0 65535
config flexconnect acl rule destination port range ACL_WEBAUTH_REDIRECT 1 53 53
config flexconnect acl rule add ACL_WEBAUTH_REDIRECT 1
config flexconnect acl rule action ACL_WEBAUTH_REDIRECT 1 permit
config flexconnect acl rule protocol ACL_WEBAUTH_REDIRECT 1 17
config flexconnect acl rule source port range ACL_WEBAUTH_REDIRECT 1 53 53
config flexconnect acl apply ACL_WEBAUTH_REDIRECT
config flexconnect acl create BLACKHOLE
config flexconnect acl rule add BLACKHOLE 1
config flexconnect acl rule action BLACKHOLE 1 permit
config flexconnect acl rule protocol BLACKHOLE 1 6
config flexconnect acl rule source port range BLACKHOLE 1 0 65535
config flexconnect acl rule destination address BLACKHOLE 1 10.1.200.12 255.255.255.255
config flexconnect acl rule destination port range BLACKHOLE 1 8444 8444
config flexconnect acl rule add BLACKHOLE 1
config flexconnect acl rule action BLACKHOLE 1 permit
config flexconnect acl rule protocol BLACKHOLE 1 6
config flexconnect acl rule source address BLACKHOLE 1 10.1.200.12 255.255.255.255
config flexconnect acl rule source port range BLACKHOLE 1 8444 8444
config flexconnect acl rule destination port range BLACKHOLE 1 0 65535
config flexconnect acl rule add BLACKHOLE 1
config flexconnect acl rule action BLACKHOLE 1 permit
config flexconnect acl rule protocol BLACKHOLE 1 6
config flexconnect acl rule source port range BLACKHOLE 1 0 65535
config flexconnect acl rule destination address BLACKHOLE 1 10.1.200.11 255.255.255.255
config flexconnect acl rule destination port range BLACKHOLE 1 8444 8444
config flexconnect acl rule add BLACKHOLE 1
config flexconnect acl rule action BLACKHOLE 1 permit
config flexconnect acl rule protocol BLACKHOLE 1 6
config flexconnect acl rule source address BLACKHOLE 1 10.1.200.11 255.255.255.255
config flexconnect acl rule source port range BLACKHOLE 1 8444 8444
config flexconnect acl rule destination port range BLACKHOLE 1 0 65535
config flexconnect acl rule add BLACKHOLE 1
config flexconnect acl rule action BLACKHOLE 1 permit
config flexconnect acl rule protocol BLACKHOLE 1 17
config flexconnect acl rule source port range BLACKHOLE 1 0 65535
config flexconnect acl rule destination port range BLACKHOLE 1 53 53
config flexconnect acl rule add BLACKHOLE 1
config flexconnect acl rule action BLACKHOLE 1 permit
config flexconnect acl rule protocol BLACKHOLE 1 17
config flexconnect acl rule source port range BLACKHOLE 1 53 53
config flexconnect acl rule destination port range BLACKHOLE 1 0 65535
config flexconnect acl apply BLACKHOLE

 

Once created, add them to the FlexConnect Aps.

config ap flexconnect policy acl add ACL_WEBAUTH_REDIRECT AP_NAME
config ap flexconnect policy acl add BLACKHOLE AP_NAME

Note: While FlexConnect mode supports additional configurations such as Local authentication, those options have not been tested as part of ISE integration. Also, while this document goes over the required configuration using individual APs, it is generally easier to configure FlexConnect groups to manage settings for the APs. Also note following caveats for FlexConnect mode AP Local Switching deployment with ISE:

  • Endpoints utilizing FlexConnect must be able to access the ISE node

  • FlexConnect ACL does not support DNS ACL

  • TrustSec for locally switched traffic is not supported

While it is the FlexConnect ACL that gets applied to the FlexConnect endpoint sessions, older versions of WLC may fail to apply the FlexConnect ACL without regular ACL with same ACL name already in place. At minimum it will require a regular ACL name registered to the WLC. In that case, simply create an empty ACL as following:

config acl create ACL_WEBAUTH_REDIRECT
config acl apply ACL_WEBAUTH_REDIRECT
config acl create BLACKHOLE
config acl apply BLACKHOLE

 

Auto-Anchored WLAN

Customers often configure Auto-Anchor (AKA Guest Tunneling) to tunnel guest WLAN traffic to an anchor controller residing in a DMZ for added security. This is a supported configuration with ISE Central WebAuth. However, there is specific configuration to make this work. This can be setup normally for an Auto-Anchor setup with one exception, which is the RADIUS Accounting server needs to be disabled on the Anchor Controller WLAN. Assuming the OPEN WLAN is being anchored, here is an example of WLAN setting on the anchor controller.

config wlan create 12 OPEN OPEN
config wlan interface 12 GUEST
config wlan security wpa disable 12
config wlan mac-filtering enable 12
config wlan radius_server auth disable 12
config wlan radius_server acct disable 12
config wlan radius_server acct interim-update disable 12
config wlan aaa-override enable 12
config wlan session-timeout 12 1800
config wlan usertimeout 180 12
config wlan chd 12 disable
config wlan ccx AironetIeSupport disable 12
config wlan dhcp_server 12 0.0.0.0 required
config wlan nac radius enable 12
config wlan profiling radius all enable 12
config wlan enable 12

Note: The RADIUS settings are disabled in the preceding example, however, the anchor controller will receive the ACL name to apply to the session from ISE relayed by the foreign controller in the mobility message. It is essential that the anchor controller configuration includes the redirect ACL, so it can be applied to the user session when called upon by the foreign controller.

 

Appendix C: Use case specific sample configurations

Configuration for WLC Running 8.x Code for 802.1X WLAN

Configuration for previous versions of WLC is identical with the exception of interim accounting settings under the WLAN configuration. Please refer to main section of the document for proper configuration for previous versions.

ISE IP 10.1.200.11
RADIUS shared secret ISEc0ld
RADIUS ID 11
User VLAN 10
User VLAN Name ACCESS
User VLAN dynamic IP 10.1.10.61
User VLAN DHCP server 10.1.200.10
User VLAN gateway 10.1.10.1
User WLAN Name ISE
User WLAN ID 11

 

config interface create ACCESS 10
config interface port ACCESS 1
config interface address dynamic-interface ACCESS 10.1.10.61 255.255.255.0 10.1.10.1
config interface dhcp dynamic-interface ACCESS primary 10.1.200.10

config radius auth add 11 10.1.200.11 1812 ascii ISEc0ld
config radius auth disable 11
config radius auth management 11 disable
config radius auth retransmit-timeout 11 5
config radius auth rfc3576 enable 11
config radius auth enable 11

config radius acct add 11 10.1.200.11 1813 ascii ISEc0ld
config radius acct disable 11
config radius acct retransmit-timeout 11 5
config radius acct enable 11

config wlan create 11 ISE ISE
config wlan interface 11 ACCESS
config wlan radius_server auth add 11 11
config wlan radius_server acct add 11 11
config wlan radius_server acct interim-update 0 11
config wlan radius_server acct interim-update enable 11
config wlan aaa-override enable 11
config wlan usertimeout 180 11
config wlan nac radius enable 11
config wlan profiling radius all enable 11
config wlan enable 11

 

 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: