02-01-2017 11:43 AM - edited 03-23-2020 02:35 PM
Please reference this table for defect info
Apple CNA (Captive Network Assistant, AKA Apple mini browser) is a Apple iOS feature that allows a browser like window to pop-up whenever network access is needed and the CNA determines that the network requires user interaction to gain full network access. This typically happens when the user associates to an open wireless LAN and even though an IP address is provided to the device, the network still restricts the user to take further actions, such as accepting an AUP, providing a shared password, or logging in as a guest user. This enhances user experience as it saves the user from manually opening up a Safari browser window. It also provides assistance even during non-initial association to the WLAN. For instance, if the endpoint device goes into sleep mode and the session is torn down on the WLC and subsequently the user tries to use a non-web browser application that requires network connectivity, the iOS device can sense that the device is in captive portal state and pop-up the mini browser for user to take further action to gain network access. As one can see having the iOS CNA feature operate on a guest network is a good idea, however, when BYOD is enabled on the same WLAN, as is the case with ISE dual-SSID flow, the CNA breaks the ISE BYOD process. One of the reason for that is due to ISE BYOD process forcing the CNA mini browser to go into the background as it asks the end user to accept the iOS profiles, which includes CA certificate and enrollment package, and when the CNA mini browser is moved to the background it immediately disconnects the device from the WLAN, which in turn breaks the BYOD process.
Prior to ISE 2.2, the ISE was setup to warn the user that the browser is not supported and user had no easy way aside from reporting it to the network administrator and subsequently the administrator had to enable captive bypass on the WLC which disabled the pop-up of the CNA mini browser on the controller level. Unfortunately, the captive bypass feature on WLC 8.3 and below required to be ran controller wide, which meant that all of the WLANs that the controller was servicing disabled the apple CNA. Cisco ISE version 2.2 is the first version to support Dual-SSID BYOD flow through Apple CNA. This document explains how to configure the ISE and Cisco WLC to provide Dual-SSID BYOD even when the captive portal bypass feature is disabled on the WLC. For other options on how to deal with Apple CNA, please go to: Dealing with Apple CNA (AKA Mini browser) for ISE BYOD
This document will leverage pre-defined policy rules and elements for dual SSID BYOD configuration. Also, this document assumes that the WLC is already configured with baseline WLC configuration for ISE. For more information on the baseline WLC ocnfiguration please refer to: How To: Universal Wireless Controller (WLC) Configuration for ISE
Cisco ISE version 2.2+
Cisco WLC 7.6+ for DNS ACL feature; not possible with FlexConnect local switching WLAN as DNS ACL is not supported for locally switched traffic
Note: If running WLC 8.4+ code then the captive portal bypass can be enabled per WLAN instead of globally. It still does not allow administrator to use a single WLAN for both CNA enabled guest access and employee BYOD, but allows them to enable captive portal bypass selectively per WLAN instead of controller wide.
I've corrected it to read 'It still does not allow administrator to use a single WLAN for both CNA enabled guest access and employee BYOD, but allows them to enable captive portal bypass selectively per WLAN instead of controller wide.'
Thomas,
Did you ever get past this point? I'm running into the same issue. I'm running ISE 2.2 Patch 9 and testing with an iPad running 11.4 (15F79)
In order for the 'Done' to appear, the iOS device has to be on the Internet or fooled into thinking it is. If you look at the ACL_APPLE_CNA, you can see that it is denying 1.1.1.1 but allowing everything else. If the flow works the endpoint should be assigned the ACL_APPLE_CNA which you can confirm by going to WLC GUI > Monitor > Clients > Client MAC address and scroll down to see the ACL that is applied. If the correct ACL is applied and the Done is not shown then verify that ACL matches what is shown above. If the ACL other than ACL_APPLE_CNA is applied then you will not get the Done to show.
If just stumbled into this discussion after watching the www.labminutes.com DUAL SSID BYOD Onboarding with this CNA trick.
I can't get it to work. I never match the Authorization Condition: Session.BYOD-Apple-MiniBrowser-Flow - and hence I don't end up applying the appropriate ACL
Here is my setup
ISE 2.4 patch 3
Cisco WLC 8.5.131.0
Apple iOS 12.
Is this feature still broken? I have lost the thread on whether this is an iOS issue or an ISE issue?
To make the BYOD onboarding as smooth as possible, it would be nice to allow Apple users to authenticate in the CNA (mini browser) just because it removes any user guesswork.
If its not matching that rule then likely its an issue with iOS 12 that just came out and not updating the posture feed. 2 separate issues it seems perhaps. But Apple AFAIK hasn't updated ios 12 to work with it. Will research it. I found this as well CSCve39167 would recommend working through the TAC and escalating if there is a fix because it hasn't been verified.
also just learned that Apple iOS 12 is not yet provided in feed CSCvm57650
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: