Ise Guide
Ise Guide
Jason Kunst
September 2018
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Table of Contents
Introduction ................................................................................................................................................................................................ 4
About Cisco Identity Services Engine (ISE)............................................................................................................................ 4
About This Guide .................................................................................................................................................................. 4
Define .......................................................................................................................................................................................................... 6
What is Guest Access?.......................................................................................................................................................... 6
Guest Access with Hotspot Guest Portals ............................................................................................................................ 6
Guest Access with Credentialed Guest Portals ..................................................................................................................... 6
Licensing ............................................................................................................................................................................... 6
Design .......................................................................................................................................................................................................... 6
ISE Deployment Model Considerations ................................................................................................................................ 6
Survivability .......................................................................................................................................................................... 8
Configuration Best Practices for Cisco WLC ......................................................................................................................... 8
Apple Captive Network Assistant (CNA) ............................................................................................................................... 9
IP Address and VLAN changes.............................................................................................................................................. 9
Caveats................................................................................................................................................................................. 9
Wireless Deployment Models............................................................................................................................................. 10
Deploy ....................................................................................................................................................................................................... 10
Configuring the WLC for ISE Web Authentication .............................................................................................................. 10
Configure ISE as RADIUS Authentication Server on WLC ............................................................................... 10
Configure a Guest WLAN (SSID) ..................................................................................................................... 12
Configure an ACL to Redirect Guest Devices to the ISE Guest Portal ............................................................. 14
Configure a Catalyst Switch for Guest Access .................................................................................................................... 16
Configure ISE for Guest Access ........................................................................................................................................... 18
Add the Network Access Device to ISE ........................................................................................................... 19
Policy Set for Credentialed Guest Access ....................................................................................................... 19
The Guest “Remember Me” Feature .................................................................................................................................. 23
Policy Configuration for the Guest “Remember Me” Feature ....................................................................... 23
Using an Authorization Profile to Redirect Guest Endpoints to ISE .................................................................................... 26
Access Control for Guest Traffic ......................................................................................................................................... 28
Configure the Minimum Settings for Self-Registered Guest Flow ...................................................................................... 31
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Configuring Guest Type Access Times, Location, and Time Zone .................................................................. 33
Configuring From First Login ......................................................................................................................... 33
Working with Locations and Time Zones ....................................................................................................... 35
Configure Settings for the Sponsored Guest Flow .............................................................................................................. 36
Guest Portal for the Sponsored Flow ............................................................................................................. 36
Working with Sponsor Accounts .................................................................................................................... 42
Using Sponsor Accounts from Active Directory ............................................................................................. 42
Set Up the Active Directory Sponsor Group in All_Accounts ......................................................................... 44
Set Up ISE Sponsor Portal FQDN-Based Access.............................................................................................. 46
Configure Basic Portal Customization ................................................................................................................................ 48
Setting up a Well-Known Certificate .................................................................................................................................. 50
Create a Certificate-Signing Request and Submit it to a Certificate Authority .............................................. 51
Import Certificates to the Trusted Certificate Store ....................................................................................... 53
Bind the CA-Signed Certificate to the Signing Request .................................................................................. 54
Operate...................................................................................................................................................................................................... 55
Validation of flows ............................................................................................................................................................. 55
Testing Web Portals ....................................................................................................................................... 55
Clearing Guest Endpoints............................................................................................................................... 56
Monitoring Guest Connections ...................................................................................................................... 56
Troubleshooting Common Issues ....................................................................................................................................... 58
How Do I Get Support?....................................................................................................................................................... 59
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Introduction
Cisco ISE is a leading, identity-based network access control and policy-enforcement system. It is a common policy engine for controlling end-point
access and network device administration for enterprises. ISE allows an administrator to centrally control access policies for wired, wireless, and VPN
endpoints in a network.
ISE builds context about endpoints, including users and groups (Who), device type (What), access time (When), access location (Where), access type
(Wired/Wireless/VPN) (How), threats, and vulnerabilities. By sharing vital contextual data with technology partner integrations and the
implementation of the Cisco TrustSec® policy for software-defined segmentation, ISE transforms a network from a conduit for data into a security
enforcer that accelerates the time-to-detect and time-to-resolution of network threats.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
STEP 1 STEP 3
DEFINE DEPLOY
STEP 2 STEP 4
DESIGN OPERATE
There are four major sections in this document. The Define section shows how to define problem areas, plan for
deployment, and other considerations; the Design section shows how to design a guest access network; the Deploy
section provides guidance about the various configurations and best practices; and lastly, the Operate section
shows how to manage a guest network controlled by Cisco ISE.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Define
What is Guest Access?
When people outside your company attempt to use your company’s network to access the internet or the resources and services in your network,
you can provide them with network access using Guest Access portals. Guests typically include authorized visitors, contractors, customers, or other
temporary users who require access to your network.
The two types of Guest Access portals supported by this guide are:
• Guest Access with Hotspot Guest Portals
• Guest Access with Credentialed Guest Portals
Licensing
ISE guest access requires base license for each guest endpoint. For more information about licensing, see the community page for ISE Licensing.
Design
ISE Deployment Model Considerations
A frequent question that is asked is about safely deploying an ISE Guest portal in DMZ. While multiple options exist, it is the customers' prerogative
to determine the best approach, based on their requirements. The following are some general guidelines:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
ISE PSN with an interface in the DMZ - You will have a separate
interface on the internal ISE PSN for Guest portal traffic by having
an interface in the DMZ. Here, you will only allow communication
to the PSN from the wireless controllers and clients for RADIUS
and the Guest portal. This same PSN can be utilized to offer the
Sponsor portal. Two PSNs with interfaces in the DMZ are
recommended for redundancy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Survivability
If a PSN loses contact with the PAN, you will see one of behaviors listed below. This list provides an overview of the major issues you may
encounter. We recommend that you plan for WAN redundancy to mitigate these risks.
• Sponsors are unable to create, update, or delete guest accounts related to users connecting to a specific PSN.
• Sponsor portal operations are severely impacted.
• Hotspot and self-registration flows will fail.
• Existing guest accounts will be able to access the network.
1. SECURITY > AAA > RADIUS > Authentication Servers > Apply Cisco ISE Default Settings —
Checking the Apply Cisco ISE Default Settings check box enables Change-Of-Authorization (CoA), sets
the RADIUS authentication port to 1812/UDP, and duplicates and creates the settings for a RADIUS
accounting server.
2. WLAN > Security > AAA Servers > Apply Cisco ISE Default Settings — Checking the Apply Cisco
ISE Default check box enables Allow AAA Override, sets NAC State = ISE NAC, and enables Radius
Client Profiling for DHCP/HTTP Profiling (Probes).
Note: The NAC State setting of ISE NAC (RADIUS NAC, prior to AireOS Version 8.5) enables ISE
to send a CoA request, which allows a user to authenticate and access the network. Essentially, this
setting gives ISE the ability to change the state of a client on the fly, without requiring a new session.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
For example, after being redirected to ISE for portal authentication, the client is authenticated and
allowed access to the network.
For more information about best practices and timers with Cisco Wireless Controller, refer to How To: Universal
Wireless Controller (WLC) Configuration for ISE.
In order to support network separation, we recommend that you set up a Guest WLAN with 802.1X, set up guest types as Guests and Contractors,
and allow them to bypass the web login. However, note that you will not be able to utilize the settings in the guest types, such as allowed login
hours, or how many times a user can log in to the portal with different devices.
If it is absolutely necessary to separate guest traffic with web authentication and not 802.1X, we recommend that you set up a low DHCP timer for
initial network access so that when a device switches networks, it can renew its IP address in the new VLAN. Alternatively, you can use Cisco
TrustSec solution, and deploy scalable group tags for segmentation.
Caveats
At the time of publishing this document, we have the following caveat:
• IPv6 is not supported on ISE Guest portals.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Note: Because of the caveat specified in CSCul83594, you cannot enable RADIUS accounting on two
WLCs. Both WLCs sending accounting start and stop messages with different session IDs, will
confuse ISE. When this occurs, an "Error 500" message is displayed to end users (typically, when
they are redirected to the ISE portal). This issue occurs on a per WLAN basis. If you have other
WLANs that are not using ISE services, this issue might not occur. The issue lies with the new
simplified configuration check box on the WLC named “Apply Cisco ISE Default Settings”. When
enabling the check box, it automatically configures an authentication server and an accounting server
with the same IP and settings. The same settings are ported to the WLAN configuration too. The
problem occurs when you configure enable the checkbox on both WLCs.
If you are using FlexConnect, we recommend that you use central switching mode. Local switching does not support URL-based DNS ACLs. If you
want to use FlexConnect Local switching, for example, branch, be aware of the following caveat:
Without using URL-based ACLs, you cannot easily implement ACLs that open up cloud-based SSO providers, such as SAML or social media access.
One workaround is to permit access to all the internet and enable URL-redirect only for internal sites (for example, for employee SAML SSO).
Writing IP ACLs for social media access could be cumbersome because they typically resolve to several IP addresses.
Deploy
Configuring the WLC for ISE Web Authentication
This section shows how to configure the necessary security settings on the WLC to work with ISE. If you are working with a switch, see Configure a
Switch for Guest Access.
Note: This section provides information about how to set up a single controller. If you want to create
a configuration using a foreign anchor model, see the documents listed under Wireless Deployment Models.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 5 Enter the ISE IP address for Server IP address and the RADIUS shared secret for Shared Secret fields.
Step 6 Check the Apply Cisco ISE Default Settings check box.
Note: Checking the “Apply Cisco ISE Default Settings” check box enables support for CoA,
which is required for ISE. It also duplicates this setting for RADIUS Accounting.
Step 7 Click Apply.
Step 8 Click the Security tab and choose, Security > AAA > RADIUS > Accounting.
ISE will be automatically configured as a RADIUS accounting server, as shown in the following figure:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 3 Enable the Status check box, and from the Interface/Interface Group(G) drop-down list, choose your interface, in this case, guest.
Note: From WLC Version 8.3.102, ISE guests with WPA+PSK are supported. This is not
related to Identity PSK (IPSK). For more information, see Release Notes for Cisco Wireless Controllers
and Lightweight Access Points for Cisco Wireless Release 8.3.102.0. This allows enterprises to protect their
network from users on other floors or in the parking lot from connecting to your OPEN
SSID, and exhausting the DHCP pools or ISE base licenses. To enable this feature, perform
the following procedure:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
The following defaults are enabled when you selected Apply Cisco ISE Default Settings in the AAA servers window:
• Allow AAA Override – Enabled
• NAC State – ISE NAC
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
o Changes the state from a web redirection state to permit access state.
• Radius Client Profiling - DHCP Profiling and HTTP Profiling are enabled.
o Used for identifying your device type, for example, whether you are using an iPad or iPhone; the WLC packages the
device-identifying data and sends it to ISE via RADIUS accounting packets.
Note: If you are using local switching (see Wireless Deployment Models), leave this enabled.
Note: When you apply Cisco ISE Default Settings, it enables Captive Portal Bypass, which
suppress the Apple mini browser. We recommend that you disable Captive Portal Bypass to
make the mini browser (Captive Network Assistant) pop up automatically when connecting
to a guest network, and use it for guest access.
Step 1 In the WLC GUI, choose Security > Access Control Lists > Access Control Lists.
The Access Control Lists window is displayed, as shown in the figure below. This window lists the ACLs that are configured on the
WLC. It also enables you to edit or remove any of the ACLs.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 3 In the Access Control List Name field, enter ACL_WEBAUTH_REDIRECT as the ACL name, as shown below:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Note: 198.18.133.27 is the IP address of ISE in this example. We recommend that you use
your ISE IP address, and add all the PSN nodes that are servicing the Guest portal with this
ACL. If you change the TCP port number for your Guest portal, make the same change
here (from 8443 to the new port number).
If your deployment is set up in a DMZ, and your guest network already has ACLs in place, you can skip on to the next section. If you
have setup your guest network in a configuration where your network has access to internal resources then you will need to
configure an ACL to permit guest access to the internet and block access to internal resources after guest authorization. To ensure
that the rules of the new ACL to permit guest access to the internet. This ACL must permit access to the internet, your ISE PSN IP
address(s), and the internal resources that you want them to have access to as seen in the screenshot below. You can use the same
procedure above to setup a permit internet ACL using the following example.
Note: In the above example, 198.18.133.0/24 is the internal network that guests cannot
access. If your guest network is in a DMZ, you will not have to limit access to your internal
network since the DMZ is outside the internal network.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
This section covers the minimal required configuration on a Catalyst Series switch to work with ISE guest. This was validated with IOS and IOS-XE
platforms.
When using network devices with ISE, make sure they are running the minimum code version provided in the corresponding compatibility guide. If
you need a higher code revision, you should test it in a lab before going into production. The ISE team does not test all the devices with all the code
versions. If you need additional support, reach out to the respective device teams at Cisco.
If your switch is not listed, and you have a question about its compatibility with ISE, see the community post, Does ISE Support My Network Access
Device?
Use the following links for information about general best practices on Cisco Catalyst switches with ISE.
• How To: Universal 3850 Wired Class-based Policy Language (C3PL) Configuration for ISE
• How To: Universal IOS Switch Config for ISE
Your switch must meet the following requirements to work in an ISE guest setup:
• Layer 3 SVI for your guest network – the switch requires a routable Layer 3 interface that can communicate with endpoints in order
to redirect the browser to the ISE Guest portal.
• Ip device tracking – usually enabled by default but critical on tracking the endpoint
• Switch management IP – Communicates with ISE via RADIUS in order to control AAA functionality.
• Global RADIUS and AAA configurations – The switch is configured for AAA using ISE.
• Pre-Auth ACL – This is manually configured on the switch. When a user device initially connects to the network, this ACL restricts
what that device can access until authenticated by ISE. The device must at least be able to communicate with ISE to see the Guest
portal. You can also open access to a company portal by adding a link to the Guest portal. For example, you might want to give
access to a hospital’s welcome page containing information about the hours of operation, a directory of departments, and so on.
• Redirect ACL – This is manually configured on the switch to identify traffic that will be redirected to the Guest portal. Here, you can
also identify traffic that is not redirected, for example, to the company website mentioned previously.
• Enable HTTP service – This configuration on the switch redirects the endpoint HTTP requests to the Guest portal. Note: HTTPS
redirection is not recommended. For more information about this, see ISE Guest CWA and HTTPS redirection.
• Change of Authorization (COA) – Cisco Network Access Devices utilize RADIUS COA to allow changes in the Guest use case from a
redirect state to a permit state. For example: A device connects to the wire. When its first authorized its based of simple MAB (MAC
Authentication Bypass). ISE is setup to redirect any basic MAB from unknown endpoints to the Central Web Authentication (CWA)
portal. This portal can host an Acceptable Use Policy (AUP) page like a hotspot or a credentialed login portal. The user clicks to
accept or enters their credentials. At this point ISE sends a COA to the switch with a new authorization result. This time without a
redirect ACL and likely with a permit ACL that allows internet access. For more information on RADIUS COA see Chapter: RADIUS
Change of Authorization in the Authentication, Authorization, and Accounting Configuration Guide, Cisco IOS Release 15SY
This sample configuration gives full network access even if the user is not authenticated; therefore, you might want to restrict access to
unauthenticated users.
In this configuration, HTTP and HTTPS browsing does not work without authentication (per the other ACL) since ISE is configured to use a redirect
ACL (named redirect). Here is the definition on the switch:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
This access list must be defined on the switch in order to define on which traffic the switch will perform the redirection. (It matches on permit.) In
this example, any HTTP or HTTPS traffic that the client sends triggers a web redirection. This example also denies the ISE IP address so traffic to the
ISE goes to the ISE and does not redirect in a loop. (In this scenario, deny does not block the traffic; it just does not redirect the traffic.) If you use
unusual HTTP ports or a proxy, you can add other ports.
Another possibility is to allow HTTP access to some web sites and redirect other web sites. For example, if you define in the ACL a permit for
internal web servers only, clients could browse the web without authenticating but would encounter the redirect if they try to access an internal
web server.
The last step is to allow CoA on the switch. Otherwise, the ISE cannot force the switch to reauthenticate the client after the login to the guest
portal.
aaa server radius dynamic-author
client <ISE ip address> server-key <radius shared secret>
This command is required for the switch to redirect based on HTTP traffic:
ip http server
interface GigabitEthernet1/0/1
description ISE Port
switchport access vlan 100
switchport mode access
authentication open
authentication order mab dot1x
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
mab
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast
spanning-tree bpduguard enable
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
From ISE 2.3, the only way to configure authentication and authorization rules is to use Policy Sets. By default, sample authorization rules are
available for credentialed guest access. This section describes how to enable these rules.
Step 1 Navigate to Policy > Policy Sets.
Step 2 Click the arrow to expand the default policy set, as shown in the figure below:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 4 Scroll down until you see the built-in Wi-Fi policies for Guest Access and then enable them.
Guest-access authorization with ISE happens in two stages. The initial flow is a MAC authentication Bypass
(MAB), where ISE authorizes the endpoint for URL redirect to itself. This results in the web traffic from the guest
user’s device to be redirected to the ISE Guest portal. Note that at this stage, the network device (switch or WLC)
and ISE will track the endpoint’s network connection with a common session ID. When a guest user logs in with
guest credentials, the guest user ID is merged with the existing MAB session. This part of the process is termed
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
as Guest Flow, where an existing MAB session gets guest user context appended to it. Therefore, there are two
authorization rules for guest access; the Wi-Fi Redirect to Guest Login rule redirects unknown endpoints to the
Cisco_WebAuth profile for presenting to a Guest portal, and the Wi-Fi Guest Access rule is used after users enter
their credentials (Guest Flow). This grants them internet access (permit access).
Guest user accounts can be created with several attributes that determine their roles and responsibilities in the
network. ISE has 3 built-in guest types. As an administrator, you can create your own custom guest types. The
following are the built-in guest types:
• Contractor — Users who need access to the network for an extended amount of time, up to a year.
• Daily — Guests who need access to the resources on the network for just 1 to 5 days.
• Weekly — Users who need access to the network for a couple of weeks.
Step 1 Enable both the Wi-Fi Redirect to Guest Login and the Wi-Fi Guest Access policies.
Step 2 Click Save.
Step 3 Under Policy Sets, you can edit the existing rule for Wi-Fi_Guest_Access policy. Click the pencil icon. Make the changes, as shown in
the figures below, and then click Save.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
When you complete this procedure, your policy will look like this. Remember to save the new policy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
2. The web traffic from the guest device is redirected to the ISE Guest portal, where users can sign-up for an account or enter
their credentials.
3. Once users enter their guest credentials, they are in the Guest Flow, and will be granted access to the Wi-Fi Guest Access
rule.
4. The device is permitted access to the internet.
Note that if the device goes to sleep or if users leave the network and come back, they will be required to go through the login
process again.
Guest users are required to log in to the ISE Guest portal every time they connect to the network. For example, users may put their
device to sleep, resume from sleep mode, or get a new wireless session ID. The default wireless user Idle Timeout value on the WLC is
180 seconds. This user experience can be avoided with the Guest Remember Me feature on ISE.
Note: Another way to remember guests is to use the Sleeping Client feature in the wireless
controller. This feature keeps the wireless session cached in memory. The potential
problem with this is that only a certain number of sessions can be stored in the controller’s
memory. However, this document does not cover that feature.
Note: This is the same configuration that is used for a hotspot portal. The only difference is
that with hotspot, you redirect guests to a hotspot portal instead of to a self-registered
Guest portal.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 4 Under Editor, remove the Guest_Flow by clicking the (x) icon.
Step 6 Define the condition as IdentityGroup:Name Equals Endpoint Identity Groups: GuestEndpoints.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Note: Clicking on Save with allow you to use the Guest Endpoints MAB condition again in another rule
if you like, since its not complex you don’t need to re-use so instead we go direct to Use.
Note: For wired guest access, the policy can be modified in two ways. The
WiFi_Redirect_to_Guest_Login policy can be duplicated, and in the new rule, the endpoint’s session
can be matched with Wired_MAB instead of Wireless_MAB. Alternatively, the
WiFi_Redirect_to_Guest_Login policy can be edited to match Wireless_MAB or Wired_MAB with
an “OR” condition check.
The Remember Me feature is a simple MAB function based on the GuestEndpoint Endpoint Identity group.
The MAC address of any guest user’s device that is authenticated once will automatically be registered under
GuestEndpoint within ISE. A user has to accept an Acceptable Use Policy (AUP) for hotspot access, or enter
certain credentials for credentialed guest flows only once. From then on, access is based on the guest device’s
registered MAC address. Thus, the guest will not be redirected to the ISE portal for AUP or login, on subsequent
network connections, until the MAC address is purged from the GuestEndpoint group. The default purge period
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
is 30 days and can be customized for individual environments. Note that this is not guest account purging, just a
guest device’s MAC address. To change the endpoint purge period, perform either of these tasks:
• For Hotspot, endpoint purge configuration can be done under portal settings.
• For credentialed guest flow navigate to Administration > Identity Management > Settings >
Endpoint Purge
o As long as the endpoint is in the Endpoint group called out in the authorization rule then the
device will have access without having to login to the credentialed portal. You can set the
EndpointPurge rule as low as 1 day. An example would be if GuestEndponts AND
ENDPOINTPURGE: ElapsedDays LESSTHAN 9999. This will remove all endpoints in the
guest database when the purge runs on its daily schedule.
• For Credentialed guest accounts, the endpoint duration can be configured under the Guest Type settings.
Note: The ACL is case-sensitive and must match the definition in the Network Device
exactly.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
o From the Value drop-down list, choose the appropriate default portal (Hotspot, Self-Registration, or Sponsored).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
While VLAN segmentation helps in keeping the traffic separate, as explained in the IP Address and VLAN changes section, it is not a good idea to
change VLANs dynamically for guests. The use of IP ACLs can be a remedy for this issue. For guest traffic segmented on DMZ, an ACL to permit all IP
traffic can be applied, and for the guest traffic within a campus network, an IP ACL to deny access to private IP addresses will suffice in most of the
cases. This section describes the optional tasks of authoring and authorizing an ACL for a guest user connecting internally.
Step 1 Navigate to Policy > Policy Elements > Results > Authorization > Downloadable ACLs.
Step 2 Click Add.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
• Permit the ISE PSN IP address on port 8443 (allow access to Guest portal).
• Permit access to internal sites, if necessary.
• Deny access to internal networks.
• Permit everything else.
Step 4 The DACL on ISE can be validated by the Check DACL Syntax option.
Step 6 Click Authorization, then click Authorization Profiles, and finally, click Add.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 7 Configure the Authorization Profile, as shown in the following figures (the left figure indicates for a wired guest and the right figure
indicates for a wireless guest):
Note: AireOS does not support downloadable ACLs. Therefore, ACLs must be configured
locally on the wireless controller (or access points in FlexConnect mode). The ACL names
must match in both ISE and in AireOS. The Guest ACL configuration on the WLC is very similar
to the DACL configuration on ISE.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
This completes the steps required to get a portal up and running with your network device (switch or WLC).
If you are using a hotspot portal for guest access, you can go to the Configure Basic Portal Customization section.
If you are using the self-registration or sponsored flows (Credentialed Guest Access), then additional configuration is required. Continue with the
next section, Configure the Minimum Settings for Self-Registered Guest Flow.
Step 1 Navigate to Work Centers > Guest Access > Portals & Components > Guest Portals, and click Self-Registered Guest Portal (default).
Step 2 Under Portal Behavior and Flow Settings, select Self-Registration Success Settings.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 3 Scroll down to the bottom of the window and check the Allow guests to log in directly from the Self-Registration Success page check
box.
Note: This setting is highly recommended for use with “Remember Me” functionality. This allows the
device to be remembered after the user initially logs into the Guest Portal. Using this flow is a better
user experience as they only have to log in once per device until the device is purged.
Step 6 Expand Post-Login Banner Page Settings, and uncheck the Include a Post-Login Banner page check box.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
In ISE 2.1, the option of From first login was introduced in the Guest Type. This option improves the ISE Guest Access setup. However, by default,
the From sponsor-specified date option is selected for all guest types. We recommend that you switch all your guest types to use From first login.
From first login enables a guest account immediately after a sponsor creates that account, or when the user self-registers on the Guest portal. This
is particularly useful for those who want simple guest access that is activated immediately and lasts for a specific amount of time. The account can
be valid for a day or a week, and you do not have to worry about limiting access to a set time of day or a specific amount of time.
With the From first login option, you do not have to worry about creating location and associated time zones unless you want to limit the time
range during which a user can log in to the Guest portal. If you want to set strict limits on access hours, you should set up locations and time zones.
However, if you only want guests to be able to use the account starting at a specified time, you will have to work with the sponsor-specified date.
For more information about this, see Working with Locations and Time Zones.
Step 1 Navigate to Work Centers > Guest Access > Portals & Components > Guest Types.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 2 Change the following settings for a specific guest type of interest or all guest types (except SocialLogin(default)).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Instead of the From first login option, if the sponsor-specified date option is chosen for guest account start time, the location and time zones
corresponding to the locations where the guests will be accessing the network, must be configured. Your guest or sponsor can easily choose the
time zones when the accounts are activated. Use this setting if you require a specific set of times during which your guests can use their account for
network access. Unlike the From first login option that activates an account immediately, this setting activates an account at a specific time, which
is when the account is registered by the guest, or when the sponsor sets its start time.
Note: If you do not configure a location, the account will not get activated at the correct time, and the
user will not be able to log in.
Ensure that the time on your ISE server is correct. Even if it is only a few minutes faster than your browser, you may notice that it takes a few
minutes for the accounts created using self-registration or sponsored flows to start working. When this happens, an Authentication Failed
message is displayed to the end user using the Guest portal.
Also, under Operations > RADIUS > Live Logs in ISE, you can see failure entry details stating that the account is not yet active.
If you need to restrict access to certain times of the day, you must configure locations and time zones. If only one location is configured in your
portal and sponsor group, guests and sponsors will not be presented with the option to select a location.
Since only one location, San Jose, is available out-of-the-box, there is a problem with new setups in other time zones. For example, when an ISE
administrator sets up a system in Boston, it is 9. a.m. there. The admin goes to the self-registration window or the Sponsor portal window to create
an account, thinking that he/she is working with the local time. However, the time zone is PST. The account (unless the admin is using From First
Login) will not be activated for another 3 hours, and the guests will not be able to log in. Unless the guest users connect to the network in PST time,
a separate location configuration must be done in ISE to cater to those users in different time zones.
Deployments in the PST time zone can use the San Jose location that is built into ISE. If that time zone is acceptable to you, skip to the Configure
Settings for the Sponsored Guest Flow section.
Note: You cannot change the name of the default San Jose location. However, you do not have to
remove it because it will not be displayed if you do not choose to use it.
For more information about location and SSIDs, see Assign Guest Locations and SSIDs in the Administrators guide.
To configure guest locations and time zones, perform the following steps:
Step 1 Navigate to Work Centers > Guest Access > Settings > Guest Locations and SSIDs.
The Guest Locations and SSIDs window is displayed.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 2 Enter a Location Name and Time zone, for example, Boston (EST) using EST5EDT or America/New York.
Do not delete the San Jose Location.
Step 3 Click Add.
Step 4 Click Save.
From a guest user’s perspective, there are a couple of options to provide sponsored guest access:
• Self-registered guest access with sponsor approval – A guest user registers the account by filling in all the mandated fields during the
initial Guest Flow, and upon notification, the sponsor approves or declines access.
• Sponsored guest access – A guest user cannot register an account, but has to collect the credentials from the sponsor via SMS or email to
log in to the guest network. To configure this, see Configure Sponsored Guest Access.
Step 1 Navigate to Work Centers > Guest Access > Portals & Components > Guest Portals. Click Self-Registered Guest Portal (default).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 2 Under Portal Behavior and Flow Settings, select Registration Form Settings.
Step 3 Check the Person being visited check box and the Require guests to be approved check box.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 4 Scroll down and chose the notification methods applicable to your environment.
Step 6 If you’re decided to use self-registration portal as configured above then next you will need to configuration an Authorization Policy,
Configure Authorization Policy
The default self-registration portal can be used for both self-registered and sponsored guest access. The following table explains the options for
both the scenarios:
Self-registered guest user Yes (Optional) Can approve or deny guest access Self-Registered Guest Portal
Must create guest account and share credentials Sponsored Guest Portal
Sponsored guest user No
to guest user Or
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
If you are looking at only sponsored guest access, and do not want to allow guests to self-register, perform these steps:
Step 1 Navigate to Work Centers > Guest Access > Portals & Components > Guest Portals, and click Self-Registered Guest Portal (default).
Step 2 Under Portal Behavior and Flow Settings, select Login Page Settings.
Step 3 Uncheck the Allow guests to create their own accounts check box.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 4 On the right-hand side, when you click Guest Flow, the flow should appear, as shown in the figure below:
Note: The Guest Flow for both Self-Registered Guest Portal (with the Allow guests to create
their own accounts option unchecked) and Sponsored Guest Portal is exactly the same. The
default sponsored Guest portal is available under Work Centers > Guest Access > Portals &
Components > Guest Portals.
Step 1 Navigate to Policy > Policy Elements > Results, select Authorization Profiles, and check the Cisco_WebAuth check box.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 2 Ensure that the authorization policy redirects guest users to the portal you are using. Use the following configuration as an example:
Step 3 Ensure that the ISE authorization policy results for Cisco_WebAuth profile for guest user’s initial MAB session. To do so, check the
corresponding policy under Policy > Policy Sets: Default > Authorization Policy > Wi-Fi_Redirect_to_Guest_Login.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Set up your sponsors by either creating an internal account or configuring ISE to integrate with Active Directory. If you are integrating with Active
Directory, skip to the
Using Sponsor Accounts from Active Directory section
To create an internal account, perform the following steps:
Step 1 Navigate to Administration > Identity Management > Identities > Users.
Step 2 Click Add.
Perform the procedures described in this section and the Setup the Active Directory Sponsor Group in All_Accounts only if you are integrating your
Guest Access system with an Active Directory server that contains your sponsor groups.
For more information see the Active Directory as an External Identity Source section in the Cisco Identity Service Engine Administrator Guide.
To create sponsor accounts from Active Directory, perform the following steps:
Step 1 Navigate to Administration > Identity Management > External Identity Sources.
Step 2 Select Active Directory.
Step 3 Click Add.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 4 Enter the Join Point Name and Active Directory Domain.
Step 5 Click Submit.
A “Would you like to join all ISE Nodes to the Active Directory Domain?” message is displayed.
Step 6 Click Yes.
Step 7 You are asked to enter your credentials to join the domain. Note that the Specify the Organizational Unit field is optional. Click the
information icons next to each field for more details on what is required.
Step 8 Click OK.
Note: The domain credentials are not saved by ISE. The credentials are used only once to
create a machine account for ISE in the Active Directory.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 14 After you choose your groups, the configuration will look, as shown in the following figure:
You have now completed the task of setting up Active Directory Groups that can be mapped to your sponsor groups.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 2 From the members list under Available User Groups, move the domain users under Selected User Groups, as shown in the figure
below:
It is important to configure correct locations that can be used when sponsors create your guest accounts. If you are fine with using
San Jose as the location, or do not have to use locations because of your guest types, you can skip Steps 5-8.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 5 From the Select the locations that guests will be visiting section, select the locations you want your sponsors to use, as shown in the
figure below.
A Sponsor portal allows a sponsor to create temporary accounts for guests, visitors, contractors, consultants, and so on. It also allows you to view
the accounts that guests create for themselves.
The following are the three options that are available to access the Sponsor portal; the first two methods require no special configuration, and can
be accessed via the ISE admin GUI:
• Using the Manage Accounts button – Navigate to Work Centers > Guest Access > Manage Accounts.
This window is reserved for administrators to quickly see what is going on with guests. However, we recommend that you do not use
this to manage guests and sponsors. Use it only to quickly access the guest listing, mainly for deployments that do not use a Sponsor
Portal. We highly recommend that you set up an easy-to-use Sponsor portal.
• Using the Portal Test URL - This URL can be sent to your sponsors so that they can easily bookmark the site. This is the default
option.
• Using Sponsor Portal FQDN – This is an easy-to-remember URL that requires some additional configuration.
We recommend that you provide your sponsors with an easy Sponsor Portal URL, for example, Error! Hyperlink reference
not valid..
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Note: Clicking Portal test URL displays the Sponsor portal with a complicated URL that
can be sent to your sponsors. However, if you continue with the subsequent steps, a
simpler URL can be generated.
Step 4 Close the Portal Test URL window as this was only to test its working.
Step 5 In the Sponsor Settings and Customization window, click Portal Settings.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 6 In the Fully qualified domain names (FQDN) and host names field, enter a friendly Sponsor portal FQDN:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
ISE provides you with the advantage of basic customization built into the product. ISE also makes it easy to see what changes you are
making in real time. Notice that the top of the window provides you with options to change logos, the banner, and main text
elements. You can also choose from built-in color themes. Depending on your portal settings and portal type, you will see different
options on the left side of the window. You can tweak the text in the different areas too.
Step 4 To change the theme colors of your portal, use a built-in Portal Theme or the Tweaks option, as shown in the following figure:
Step 5 After performing customization, preview the window by clicking Desktop Preview.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Note: Portal testing provides a real end-user experience and helps you validate a certain
configuration, without the need for a real endpoint or network access session.
You have now completed basic customization of your Guest portal. You can do the same with your Sponsor portal if you are using Sponsored Guest
Access. To do this, navigate to Work Centers > Guest Access > Portals & Components > Sponsor Portals > Select the default portal, and follow the
same steps you used to customize your Guest portal.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
In the example described in this section, a certificate from SSL.com is used as an example of a provider that will work correctly with ISE. However,
we do not recommend any specific provider. We only recommend that before purchasing a certificate, you get a test certificate from the CA to test
with.
Note: Each certificate provider may refer to a certificate type by different names. It often helps to call
the company, or use their online contact options to explain what is needed in the SAN fields. Tell them
that you are looking for a certificate containing a wildcard and FQDN in the SAN field, and a FQDN
in the CN= field.
For more information about wildcard certificates and certificates in general, see the following section in these
documents:
• Cisco Identity Services Engine Administrator Guide - Wildcard Certificate Support in Cisco ISE
• MovingPackets.net article - When SSL Certificates Go Wild
• Aaron Woland’s Network World Blog - Wildcard certificates and how to use with ISE
• Aaron Woland’s - HowTo: Implement Cisco ISE and Server Side Certificates
The steps listed here show an example of how to set up a Unified Communications Certificate (UCC) with a wildcard in SAN from SSL.com, which is
a subordinate of Comodo:
Step 1 Navigate to Administration > System > Certificates > Certificate Signing Requests.
Step 2 Click Generate Certificate Signing Requests (CSR).
Step 3 Enter the values for generating a CSR, as shown in the following figure:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Usage
▪ Certificate(s) will be used for: Multi-use
▪ Allow Wildcard Certificates: Checked
Subject
▪ Common name: <yourdomain.com>
▪ Replace the other sections of the subject with the
information pertaining to your organization.
▪ Subject Alternative Name (SAN)=
SAN DNS Name 1 = <yourise.yourcompany.com>
SAN DNS Name 2 = <*.yourcompany.com>
▪ Retain the default value for the last two fields.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Note: Some CAs might email the signed certificate to you. The resulting download or
email attachment is often in the form of a zip file that contains the newly signed certificate
and the public certificates of the CA. Save the digitally signed certificate, root CA
certificate, and other intermediate CA certificates (if applicable) to the local system
running your client browser in order to be imported. For more information about
importing, see the section below, Import Certificate to the Trusted Certificate Store.
This section shows you how to import the necessary certificates to ensure trusted client and server communication. Along with the server
certificate, ISE also presents the root and intermediate (if required) certificates to the client when communicating.
Note: Not all providers have intermediate certificates that are required to be installed. Intermediate
certificates come from the subordinate CAs. The example provided here uses SSL.com, which is a
subordinate of Comodo. Comodo is a subordinate to the AddTrust root CA. Therefore, this example
shows how to import a root certificate as well as certificates for the two subordinates.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
The values specified above are specific to this example. Otherwise, the values vary according to your service provider's chain.
Now that you have received the digitally signed certificate from your CA, and imported the CA certificates, the next step is to bind the certificate
signed by the CA to the CSR, from ISE. This pairs the certificate and private key that was used to generate the CSR.
Step 1 Navigate to Administration > System > Certificates > Certificate Signing Requests.
Step 2 Select the entry for your signing request.
Step 3 Click Bind Certificate, as shown in the figure below:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
Step 5 After you click Submit, the system will restart and be inaccessible for about 5 minutes.
This completes the task of setting up ISE with a well-known certificate for ISE. For more information about working with certificates, see the
Managing Certificates section of the Cisco Identity Services Enginer Administration Guide.
Operate
Validation of flows
After configuring your ISE server, use the following steps to validate your deployment:
Note: For guest flows, you can use the Portal Test URL at the top of the Portal Settings window to
quickly test the flow, without having any network device or real clients.
Step 1 Navigate to Work Centers > Guest Access > Portal & Components > Guest Portals.
Step 2 Choose the Guest portal you want to test.
Step 3 Click the associated portal test URL.
If, for some reason, your portal does not load, here are a few tips:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
• The test portal always opens up with ISE’s real IP address. If the ISE node is behind a NAT router, its public IP address must be replaced in
the test URL.
• If DNS is not resolving correctly, you can replace the ISE’s FQDN with IP address.
From this point, you can go through the complete flow. Note that the final success redirection to a static or originating URL needs a real session for
this to work completely.
If, however, you are going to perform different flows with the same device, you should do the following between each flow test:
Step 1 Turn off the Wi-Fi on the device, go to the device settings and click Forget SSID if you have multiple profiles set up.
Step 2 On the WLC, clear the session for the device by navigating to Monitor > Clients.
Step 3 On ISE, navigate to Context Visibility > Endpoints and remove guest devices.
If you want to switch between a hotspot portal and a credentialed portal using the same authorization rules, you can do so by going into your
Authorization profile and switching between the two.
Here is an example of what you will see when going through a flow with an endpoint.
Look at the image below, from bottom to top, the flow the device or user goes through is depicted:
1. Device connects to SSID and is authorized to be redirected to the webauth portal because the mac address is unknown.
2. The user accepts the AUP or logs in to the portal, and the guest user device is added to the GuestEndpoint group.
4. The device is authorized (granted access) based off the endpoint group and permitted access.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
The following procedure shows how a guest credentialed access will present itself. Look at the image, from bottom to top, the flow the device or
user goes through is depicted:
1. Device connects to SSID and is authorized to be redirected to the webauth portal because the mac address is unknown.
2. The user logs in to the portal, and the guest user device is added to the GuestEndpoint group.
4. The user is authorized and permitted access per the guest flow.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
The Managed Accounts is reserved for administrators to quickly see what is going on with guests. Note that we do not recommend this to manage
guests and sponsors. It should be used only to quickly access guest listing, mainly for those systems that do not use a Sponsor portal. We, however,
recommend that you set up an easy-to-use Sponsor portal.
Step 1 Using a machine in the internal network, connect to the Sponsor Portal via the Sponsor portal easy FQDN or use the Portal Test URL
for Sponsor portal access. This is explained in in the Setup ISE Sponsor Portal FQDN Based Access section.
Step 2 Log in with a sponsor account.
Step 3 Create a guest account.
Step 4 Using another client, connect to the Guest SSID.
Step 5 Log in with the newly created guest account.
For additional configuration and customization options, visit our Guest Web Auth community page.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Cisco ISE Deployment Guide
Deploying ISE for Guest Network Access
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.