cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
216
Views
3
Helpful
7
Replies

ip http secure-active-session-modules & ip http active-session-module

I'm asking this here, but its relevant for all IOS/IOS-XE platforms I think.

I have a C9800 WLC with both the http server and the http secure-server enabled.  The reason for this is the admin GUI is used to configure and monitor the thing, and web authentication is enabled for guest users with a generic splash page.  I want to access the admin GUI using HTTPS and the WEB auth splash page using HTTP as I don't have a public certificate.

I thought the commands "ip http secure-active-session-modules" & "ip http active-session-module" would be what I want but it appears not.  I configured this:

ip http secure-active-session-modules all
ip http active-session-modules none

But it stops the admin GUI working and I need to enable the modules for the 'ip http active-session-modules all'.  If I don't have that the admin GUI won't display.

It feels like I was in the right area, but either its a bug or I'm misunderstanding how its supposed to work.

 

7 Replies 7

Mark Elsen
Hall of Fame
Hall of Fame

 

   - @andrew.butterworth                  You can't have :   ip http active-session-modules none
                                                         It's a bit like a ladder;  secure access depends on lower http modules (too)

 M.



-- Let everything happen to you  
       Beauty and terror
      Just keep going    
       No feeling is final
Reiner Maria Rilke (1899)

aleabrahao
Meraki Community All-Star
Meraki Community All-Star


Look, if I'm not mistaken, if you simply check the "Disable HTTP secure server for Web Auth" option, you'll be able to do what you want.
aleabrahao_0-1779281222304.png

 

I am not a Cisco employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

Rich R
VIP
VIP

@andrew.butterworth "and the WEB auth splash page using HTTP as I don't have a public certificate."
- at your own risk - you realise you're going against pretty much every security guideline out there right?
The default web auth design is to intercept the http captive portal check from the client and redirect to the https captive portal page (splash page).

Can't say I've ever tried it myself but I think what @aleabrahao suggested would be the correct answer.
In general you should not be fiddling with the web server modules - I've only ever seen that used to mitigate a vulnerability in a specific module.

Did you know you can get free certs from https://letsencrypt.org/ ?

------------------------------
Please click Helpful if this post helped you and Accept as Solution (drop down menu at top right of this reply) if this answered your query.
------------------------------
TAC recommended codes for AireOS WLC's   and   TAC recommended codes for 9800 WLC's
Best Practices for AireOS WLC's,   Best Practices for 9800 WLC's   and   Cisco Wireless compatibility matrix
Check your 9800 WLC config with Wireless Config Analyzer using "show tech wireless" output or "config paging disable" then "show run-config" output on AireOS and use Wireless Debug Analyzer to analyze your WLC client debugs
Field Notice: FN63942 APs and WLCs Fail to Create CAPWAP Connections Due to Certificate Expiration
Field Notice: FN72424 Later Versions of WiFi 6 APs Fail to Join WLC - Software Upgrade Required
Field Notice: FN72524 IOS APs stuck in downloading state after 4 Dec 2022 due to Certificate Expired
- Fixed in 8.10.196.0, latest 9800 releases, 8.5.182.12 (8.5.182.13 for 3504) and 8.5.182.109 (IRCM, 8.5.182.111 for 3504)
Field Notice: FN70479 AP Fails to Join or Joins with 1 Radio due to Country Mismatch, RMA needed
Field Notice: FN74383 APs Running 17.12.4/5/6/6a May Run Out of Flash Space Preventing Upgrades
How to avoid boot loop due to corrupted image on Wave 2 and Catalyst 11ax Access Points (CSCvx32806)
Field Notice: FN74035 - Wave2 APs DFS May Not Detect Radar After Channel Availability Check Time
Leo's list of bugs affecting 2800/3800/4800/1560 APs
Default AP console baud rate from 17.12.x is 115200 - introduced by CSCwe88390

I appreciate its going against security best practises, but the splash screen is just an acceptable use policy with a button.  There are no real credentials sent.

It does appear checking that box solves the issue (it adds 'secure-webauth-disable' to the global webauth parameter-map).  Attempting to access the admin GUI using http automatically gets redirected to https, so it seems to work.  I'm not sure about any specifically crafted requests over http tcp/80 though as it accepts connections on the management interface on tcp/80.

Fair enough <smile>

If you want to, you can disable http for the admin GUI using "no ip http server" but make sure you have "webauth-http-enable" configured in your parameter map for http web-auth.

See page 78 (labelled 104) of https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKEWN-2339.pdf and the HTTP and HTTPS access modes for web authentication section of https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-18/config-guide/b_wl_17_18_cg/m_vewlc_sec_webauth_cg.html 

------------------------------
Please click Helpful if this post helped you and Accept as Solution (drop down menu at top right of this reply) if this answered your query.
------------------------------
TAC recommended codes for AireOS WLC's   and   TAC recommended codes for 9800 WLC's
Best Practices for AireOS WLC's,   Best Practices for 9800 WLC's   and   Cisco Wireless compatibility matrix
Check your 9800 WLC config with Wireless Config Analyzer using "show tech wireless" output or "config paging disable" then "show run-config" output on AireOS and use Wireless Debug Analyzer to analyze your WLC client debugs
Field Notice: FN63942 APs and WLCs Fail to Create CAPWAP Connections Due to Certificate Expiration
Field Notice: FN72424 Later Versions of WiFi 6 APs Fail to Join WLC - Software Upgrade Required
Field Notice: FN72524 IOS APs stuck in downloading state after 4 Dec 2022 due to Certificate Expired
- Fixed in 8.10.196.0, latest 9800 releases, 8.5.182.12 (8.5.182.13 for 3504) and 8.5.182.109 (IRCM, 8.5.182.111 for 3504)
Field Notice: FN70479 AP Fails to Join or Joins with 1 Radio due to Country Mismatch, RMA needed
Field Notice: FN74383 APs Running 17.12.4/5/6/6a May Run Out of Flash Space Preventing Upgrades
How to avoid boot loop due to corrupted image on Wave 2 and Catalyst 11ax Access Points (CSCvx32806)
Field Notice: FN74035 - Wave2 APs DFS May Not Detect Radar After Channel Availability Check Time
Leo's list of bugs affecting 2800/3800/4800/1560 APs
Default AP console baud rate from 17.12.x is 115200 - introduced by CSCwe88390

Ah, I'm sure I'd tried this previously and without 'ip http server' in the configuration, the webauth splashpage never appeared.  Its working now though, so not sure what happened there...

aleabrahao
Meraki Community All-Star
Meraki Community All-Star

@Rich R @andrew.butterworth That's exactly right, you don't need to have HTTP enabled in the management settings for Web Auth to work via HTTP.

I am not a Cisco employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
Review Cisco Networking for a $25 gift card