12-06-2021 06:05 PM
We are experiencing issue with Chrome and Edge browser where guests are not able to see the login page.
Firefox is working fine as the advance option is visible. Clicking the "Advanced" then it will redirect to the login page seems to be the workaround.
Anyone experiencing the same issue and what is the solution?
Thanks
12-07-2021 02:32 AM
Very old software on the WLC, out of support since a while.
Regardless, what is the IP address of your virtual interface?
12-07-2021 02:37 AM
hi,
my virtual interface ip is 1.1.1.1
Does upgrading the software to 8.2.170 or 8.3 fixes the issue?
Thanks
12-07-2021 03:48 AM
No, this is a safety feature of newer Chrome based browsers. You need to change your virtual interface IP Address to a private one, for example 192.0.2.254.
12-07-2021 11:29 AM
Hi Patoberli,
Thanks, will give this a try and let you know. Will this need to be done after hours or can be done during business hours without breaking any connection?
Cheers
12-08-2021 03:14 PM
12-08-2021 03:43 PM
The MIC in WLC will expire on 2025.
Certificate Name: Cisco SHA1 device cert
Subject Name :
C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AIR-CT2504-K9-dceb94954f80, emai lAddress=support@cisco.com
Issuer Name :
--More-- or (q)uit
O=Cisco Systems, CN=Cisco Manufacturing CA
Serial Number :
66EFC96400000009E09D
Validity :
Start : Jul 20 06:03:16 2015 GMT
End : Jul 20 06:13:16 2025 GMT
Signature Algorithm :
sha1WithRSAEncryption
Hash key :
SHA1 Fingerprint : 4f:04:96:90:c3:63:1e:27:53:df:90:31:90:62:6f:8b:69:34:f0:e3
MD5 Fingerprint : 64:5e:d6:04:ac:f1:77:27:24:6a:49:7f:b1:d2:30:ca
12-08-2021 04:06 PM
12-08-2021 04:47 PM
12-08-2021 05:25 PM
needs to be a public cert, not a self signed certificate.
12-08-2021 06:09 PM
12-07-2021 03:13 AM
need a public certificate on installed for the webauth portal
12-08-2021 09:04 AM
1. @patoberli - if by private you mean RFC1918 then 192.0.2.254 is not! https://datatracker.ietf.org/doc/html/rfc1918
2. Like @Haydn Andrews says you should use a public cert with a resolvable DNS name for your IP which matches your cert.
Even if you do that you can still see cert errors because that's an unavoidable effect of browser security and all web sites switching to https. So the only way to avoid that is to access a http site then the redirect will not trigger cert errors/warnings. http://neverssl.com is a good one to use. All modern browsers and OS already use http captive portal detection for exactly this reason.
eg: https://support.mozilla.org/en-US/kb/captive-portal uses http://detectportal.firefox.com/canonical.html
12-09-2021 12:41 AM
12-09-2021 02:20 AM
Noted thanks @patoberli but the RFC (which is still draft not standard) does say
These blocks are not for local use
so they should not actually be deployed in networks, even privately.
But granted that using them in the same way as RFC1918 is unlikely to cause any problems within a private network.
Regardless of that the problem here is with the cert not the IP - it needs a resolvable DNS name with a matching PUBLIC (not self signed) cert.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide