B c9800 Wireless Controller
B c9800 Wireless Controller
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 1 About 1
Requirements 1
About This Solution 2
Topology 3
Before You Present 4
Get Started 4
Hands-on Description 5
CHAPTER 2 Scenarios 7
What's Next 85
Requirements
The table below outlines the requirements for this preconfigured demonstration.
Required Details
Endpoint router with dCloud Endpoint Router Kit, example (819HWD router), registered and
Standalone Access Point configured for dCloud
(CAPWAP in EZVPN with
Note Internal AP will not work with this demo and should be disabled.
TCP port 443 required) or
Standalone Access Point
Supported wireless access point for the C9800-CL v17.2. For more information
(CAWAP with UDP port
refer to Release Notes for Cisco Catalyst 9800 Series Wireless Controller,
5246 and 5247 required).
Cisco IOS XE Amsterdam 17.3.x.
Note It is required that you have at least two end user devices for this demonstration—one for monitoring
and connecting to the backend components, and at least one device to onboard.
If you plan on onboarding a laptop during the demonstration, it is required that you have a second laptop.
The first laptop would be necessary to access the dCloud Workstation1 via RDP or the component
portal(s) directly using the VPN option (to show the ISE UI and other demo features) and the second
laptop would be necessary to demonstrate joining the hotspot or guest networks.
Topology
This content includes preconfigured users and components to illustrate the scripted scenarios and features of
the solution. Most components are fully configurable with predefined administrative user accounts. You can
see the IP address and user account credentials to use to access a component by clicking the component icon
in the Topology menu of your active session and in the scenario steps that require their use.
Equipment Details
Get Started
Follow the steps to schedule a session of the content and configure your presentation environment.
Procedure
Step 2 For best performance, connect to the workstation with Cisco AnyConnect VPN [Show Me How] and the local
RDP client on your laptop. [Show Me How]
Workstation 1: 198.18.133.36, Username: admin, Password: C1sco12345
Note You can also connect to the workstation using the Cisco dCloud Remote Desktop client [Show Me
How]. The dCloud Remote Desktop client works best for accessing an active session with minimal
interaction. However, many users experience connection and performance issues with this method.
Step 3 On Workstation1, ensure your Country is enabled on the demo wireless controller (WLC). [Show Me How]
Note The WLC login for this demo requires session specific credentials. The username is the name you
use to log in to the dCloud UI and the password is the session ID. You can obtain this information
from the session details section of your active demo. The username is provided and must be used
with the unique session ID as password.
You now have the option of connecting to Workstation1 through the AP. [Show Me How]
You may need to complete additional demonstration preparation activities, based on the location of your
demonstration.
• Complete the additional demonstration preparation activities for demonstrating at a Cisco Office. [Show
Me How]
• Complete the additional demonstration preparation activities for demonstrating at a Customer Site. [Show
Me How]
Hands-on Description
This hands-on lab will walk students through multiple exercises to provide an introduction to the new Cisco
9800 WLAN Controller. Here is an overview of the steps you will walk through in this lab.
• Use the Basic WLAN Design Flow to create a WLAN
• Test the WLAN
• Review the Configuration that was generated from the Basic Design Flow
• Review the CLI for the WLAN Configuration
• ISE Configuration
• Validate C9800 is added to ISE as Network Device
• Modify Native Supplicant Provisioning Profile
• Review Portals
• BYOD Portal
• Hotspot Portal
• Create/Review downloadable ACLs (dACLs)
• Create/Modify Authorization Profiles
• NSP_Onboard
• Cisco_WebAuth
• Internet_Only
• Create Policy Sets
• Create Policy for Internal SSID
• Create Policy for Guest SSID
• Client Testing for Guest & BYOD
• Hotspot Flow
Exercise Description
In this Exercise you will use the Basic WLAN Setup to perform the following tasks.
Define a Location
The Basic Wireless configuration starts from defining a location. This is the location that will deploy APs
and the APs will support the defined wireless services.
Procedure
Step 1 Connect to the Lab network. Connect to the 9800 public IP address provided by the session details. Log in
with username/session ID.
Step 2 Select the Wireless Setup icon from the top right of the 9800 browser interface and select Basic.
Example:
Step 4 For General, create a Location Name of Podx_location where x is your pod number. Leave the Location
Type as Local and Client Density as Typical.
Example:
Note While we set this Location Name to Pod1_location, remember that assigning a Podx_location
name is relative. As a user, you can name your own location name as desired. Pod name\number is
needed mostly in a group environment to keep multiple user AP SSIDs from overlapping.
Step 5 Select the Wireless Networks tab and then click Add.
Example:
Use the default setting for all other settings. Explore the other tabs and notice the configuration options. Also
notice the other tabs under the Security tab.
Step 9 After exploring select Save & Apply to Device which will return you to Add Location Setup.
Step 10 Under Policy Details, for VLAN/VLAN Group, select mgmt. Click Add.
Notice the characteristics of the policy, all centralized services.
You created the WLAN and the policy applied to that WLAN.
Procedure
Step 2 Select AP and then click the arrow to add the AP to the APs on this Location column. Click Apply.
Example:
Procedure
Example
Review Configuration
You have now created a fully functional WLAN. Take the time to explore the configurations that have been
applied.
Procedure
Step 2 Navigate to Configuration > Tags & Profiles > WLANs and notice the podx_admin WLAN that was
configured. Select the WLAN and explore the details of the WLAN.
Step 3 Go to Configuration > Tags & Profiles > Policy and select Podx_location_WLANID_1. Explore the details
of the policy.
Step 4 Go to Configuration > Tags & Profiles > Tags.
Notice there are 4 Tags – Policy, Site, RF, AP. Review the details of each tab for Podx_location. For the AP
tab under Static you’ll see your AP selected with Policy, Site and RF Tag all applied to Podx_location.
Step 5 Go to Configuration > Wireless > Access Points. Select the AP.
Notice the details of the APs settings. Also notice under Tags section that Podx_location is applied to Policy,
Site & RF.
Example:
Step 6 Click the Save icon at the top right of the 9800 browser interface.
Example:
This opens a new window that shows a comparison between the Startup Config on the 9800 and the current
Running Config. Notice the CLI commands added to the 9800 after going through the Basic WLAN Config.
Test Connectivity
The Basic Wireless configuration starts from defining a location. This is the location that will deploy an AP
and the AP will support the defined wireless services.
Procedure
Step 1 Connect to the 9800 public IP address and then log in with the credentials provided for you ahead of time.
Step 2 Using your personal laptop, connect to the lab network, pod1_admin using ciscocisco.
Step 3 Using a Chrome browser go to 198.19.11.10 and log in with username/session ID.
Under the dashboard you’ll see that the AP is joined to the controller.
What to do next
In the next section we will create another SSID using the advance flow and connect to the device.
In the previous exercise this is an abstracted from the user when using the basic configuration model.
Exercise Description
In this Exercise you will use the Advanced WLAN Setup to:
Step 5 In Tags & Profile to the right side of the WLAN Profile section click on the + to start creating a new WLAN
Profile
Example:
Use the default setting for all those not listed above.
Step 1 In Tags & Profile to the right side of the Policy Profile section click on the + to start creating a new Policy
Profile
Step 2 Configure the Policy Profile using following settings. Use the default for any setting not specified.
Example:
Step 1 In Tags & Profile to the right side of the Policy Tag section, click + to start creating a new Policy Tag Profile
Step 2 For Name, enter localPsk.
Step 3 In the tag window, click Add to map WLAN to a Policy Profile.
Step 1 In Tags & Profile, under the Apply section, click Tag APs.
Step 2 Select the Access Point and click Tag APs above the table.
Example:
Step 1 Using your personal laptop or mobile, connect to the lab network pod1-psk using the credentials username
PSK and password cisco123.
Step 2 Navigate to the Dashboard and observe that the client has joined the Access Point.
Step 3 Click on the client to open the details page and browse through the details.
Exercise Description
In this exercise you will:
Step 1 Verify that the client is connected to the SSID pod1-psk and browse different sites.
Example:
Step 4 Hover on the pie chart to show the application name. Click Direction to verify the traffic in different direction.
Example:
Step 5 Click Applications to the view list of all the application detected.
Example:
Parameter Value
Policy Name YoutubeBlock
Add Class-Maps +
AVC/User Define AVC
Match All
Drop Enabled
Match Type protocol
Selected Protocols (Select using the Arrow) Youtube
Example:
Step 6 Attempt to browse YouTube on the client connected to the pod1-psk WLAN and note that YouTube is now
blocked.
Step 7 Navigate to Configuration > Services > QOS and delete the QoS Policy YoutubeBlock.
Exercise Description
Step 3 Navigate to the main dashboard and verify that the Client Devices Types dashboard shows the clients joined.
Example:
Step 4 Navigate to Monitoring > Services > Local Profiling to show the detected device and details.
Example:
Create a local profiling policy to apply different policies based on device types
Procedure
Parameter Value
Service Template Name iPhone
VLAN ID 2
Example:
Parameters Values
Policy Map Name apple
Service Template iPhone
Device Type eq, Apple-Device
Example:
Parameter Value
Local Subscriber Policy Name apple
Example:
Step 12 Click on the device and then navigate to General > Security Information in the client information box.
It shows the service template applied under the local policies and the device is now part of VLAN 2 (employee
VLAN) and not the mgmt VLAN.
Procedure
Step 1 Navigate to Monitoring > Wireless > Clients, click on the client to open the client details dialog, and then
open the Client 360 view.
Step 2 Observe the additional information that Samsung Clients share with Cisco WLC’s and APs when local profiling
is enabled.
The exact model number, Carrier, Software version, and Client RSSI displayed comes from Samsung devices.
Example:
Step 3 For any non-Apple device, after you are connected to the proper network, see the Device Type assigned as
Un-Classified Device.
Example:
Step 4 Click on the device MAC Address and see its 360 view details.
Example:
Exercise Description
The following diagram shows illustrates the steps we'll configure on the 9800 controller. Some of the settings
are preconfigured. For any preconfigured settings, we will review the settings.
Procedure
Step 1 Using your personal laptop, connect to the lab network pod1-psk using credentials username: PSK and
password cisco123.
Step 2 Using a Chrome browser go to 198.19.11.10 and log in with username/session ID.
The dashboard indicates the AP is joined to the controller.
Step 3 Navigate to Configuration > Security > AAA > Servers / Groups > Servers.
Step 4 Click Add and enter the information in the following table.
Example:
Use the default settings for any values not in the table.
Parameter Value
Name* ISE01
IPv4 /IPv6 Server Address* 198.18.133.27
PAC Key (Not selected)
Key Type Clear Text
Key* (and confirm) C1sco12345
Support for CoA Enabled
Example:
Parameter Value
Name ISE
Dead-Time (mins) 10
Available Servers ISE01 (move to assigned)
The Dead-Time setting controls how long the RADIUS server in the group will be marked as dead when it
fails to authenticate or fails to respond to RADIUS probes. This setting is only useful when more than one
RADIUS server configured.
Example:
Step 5 Navigate to Configuration > Security > AAA > AAA Advanced > Global Config and confirm the default
settings which dictates how the controller will communicate with the RADIUS server:
RADIUS Server Load Balance: When enabled, and if there are more than one RADIUS server, the controller
will send RADIUS requests to each RADIUS servers in sequence based on batch settings.
Step 1 Navigate to Configuration > Security > AAA > AAA Method List > Authentication, and then click Add.
Step 2 Create the Authentication list using following information which will be used for both OPEN SSID
(dCloud_Guest) and SECURE SSID (dCloud_Internal):
Name default
Type Dot1x
Group-Type Group
Available Server Groups ISE (move to assigned)
Notes The existing default method list entry of Type login is SSH to the WLC for CLI access.
For authentication list, another name can be used. We are using default so it is named same as
authorization list for which the name default has a special meaning. If clients fail to associate,
and authentication requests are not showing up in the ISE Live Log, try setting the authentication
list name to default as shown above.
Example:
Parameter Value
Name default
Type Network
Group-Type Group
Available Server Groups ISE (move to assigned)
Notes The existing default method list entry of Type execis SSH to the WLC for CLI access.
The Authorization name default is significant here since there is no Authorization list that can be
defined within the 802.1X WLAN. By using default as name, C9800 can use ISE to get additional
authorization details such as dACL operation. If the default authorization list cannot be used or
desired, then a named authorization list can be created and can be referenced via RADIUS server
as a Cisco VSA. The Cisco VSA to use is Method-List={authorization-method-list}, which can be
configured in ISE advanced attribute settings.
Example:
Parameter Value
Name default
Type identity
Available Server Groups ISE (move to assigned)
Example:
Procedure
Step 1 Navigate to Configuration > Security > Web Auth, and then click Add
Example:
Step 2 For Parameter-map name*, enter Captive_Bypass_Portal, and then click Apply to Device.
Example:
Create VLANs
Important Do not change anything in this section. This is already done for you because it is a basic item on the
controller.
Procedure
Step 1 Navigate to Configuration > Layer 2 > VLAN > VLAN and then click Add.
Step 2 Add two VLANs using the following table for User VLAN and Guest VLAN.
These VLANs will be mapped to SECURE SSID (dCloud_Internal) and OPEN SSID (dCloud_Guest)
respectively using policy profiles and tags.
VLAN ID 2 3
Name employee guest
State Activated Activated
Example:
Note There is no reference to an authorization list for dCloud_Internalx SSID. This is not an issue for
AAA override operation that applies authorization directly from RADIUS ACCESS-ACCEPT
response. However, this is an issue for applying dACL as it requires additional RADIUS
communication which requires an authorization list. To address this issue, either use the special
name default as the authorization list as configured in above or configure ISE to send Cisco VSA
Method-List={authorization-method-list} with ACCESS-ACCEPT when dACL is used.
Example:
Example:
Procedure
Step 1 Navigate to Configuration > Tags & Profiles > Policy and then click Add.
Step 2 Add a Policy Profile for both WLANs using the following table.
Any configuration not defined in the table assumes the default setting.
Example:
Step 1 Navigate to Configuration > Tags & Profiles > Tags and, under Policy, click Add.
Step 2 For Name, enter iseEnabled.
Step 3 Click Add to map following WLANs to matching policy profiles.
Example:
Procedure
Step 1 Navigate to Configuration > Security > ACL, and then click Add.
Step 2 Complete the following configuration.
a) For ACL Name, enter ACL_WEBAUTH_REDIRECT.
b) For ACL Type, select IPv4 Extended.
c) For Sequence, enter 10.
d) For Action, select permit.
e) For Source Type, select any.
f) For Destination Type, select any.
g) For Protocol, select tcp.
h) For Source Port, select None.
i) For Destination Port, select eq. For the associated Select Port, select www((http)80).
j) Click Add.
Example:
(Optional) Create URL Filter for BYOD Flow (Referenced via RADIUS)
Note Use this only as a reference, we are not using it in the lab delivery.
Unlike AireOS which allows DNS entries to be part of redirect ACL, separate URL filter have to be
created and be called upon via RADIUS attribute from ISE to permit access to Internet hosts using
FQDNs. We will not be using Android in this lab but leave this configuration as an example of usage
with the 9800s.
Procedure
Step 1 Navigate to Configuration > Security > URL Filters, and then click Add.
Step 2 Using following table, set the following values in the Edit URL Filter window.
The example allows access to the Google Play store for BYOD. The PRE-AUTH URL filter always works
if the Action is Permit regardless of whether the filter is set to Permit or Deny.
Name BYOD-URL-Filter
Type PRE-AUTH
Action Permit
URLs *.google.com
accounts.youtube.com
gstatic.com
*.googleapis.com
*.appspot.com
ggpht.com
gvt1.com
market.android.com
android.pool.ntp.org
*.googleusercontent.com
*.google-analytics.com
Example:
Exercise Description
The following diagram shows the related ISE configuration at a high level. Many of the settings are already
preconfigured on ISE. For preconfigured settings, we will review the settings.
Procedure
Step 1 On workstation1, open Firefox or Chrome, connect to ISE 2.4 at 198.18.133.27, and then log in with
admin/C1sco12345.
Step 2 Navigate to Administration > Network Resources > Network Devices.
Step 3 Verify that WLC1 is listed. Click WLC1 and review the following settings.
Setting Value
Name WLC1
IP Address 198.19.11.10/32
Device Profile Cisco
RADIUS authentication Settings X
Shared Secret C1sco12345
CoA Port 1700
Example:
Step 4 Click Network Devices at the top to return to the list of network devices.
Procedure
Step 1 Navigate to Policy > Policy Elements > Results > Client Provisioning > Resources.
Step 2 Select Cisco-ISE-NSP and then click Edit.
Example:
This is the Native Supplicant Profile referenced and used in the ISE Client Provisioning Policy (Policy >
Client Provisioning Policy > Apple iOS Devices).
Step 3 Select ISE, and then click Edit to modify the Wireless Profile.
Step 4 Change the SSID Name from ISE to dCloud_Internalx and confirm the rest of the settings.
Note The SSID Name must match exactly with the same character case to the secure SSID name (e.g.
dCloud_Internalx) configured in Create WLAN Profiles, on page 50 or the client will not reconnect
with the certificate after completing BYOD.
Parameter Value
SSID Name * dCloud_Internalx
Security * WPA2 Enterprise
Allowed Protocol * TLS (MS-CHAPv2 if available)
Certificate Template EAP_Authentication_Certificate_Template
Note MS-CHAPv2 can be also set if available into the allowed protocols, you will see this into the Policy
Set authorization section for this specific SSID.
Example:
Step 5 Click Submit, and then click Submit again at the bottom of the page.
Procedure
Step 1 Navigate to Work Centers > BYOD > Portals & Components > BYOD Portals.
Step 2 Click BYOD Portal (default). Ensure all the settings match the image below.
Step 3 Expand BYOD Settings and ensure the settings match the image below.
Example:
Procedure
Step 1 Navigate to Work Centers > Guest Access > Portals & Components > Guest Portals.
Step 2 Click Hotspot Guest Portal (default).
Step 3 Review the portal flow and the setting details.
Step 4 Expand Acceptable Use Policy (AUP) Page Settings.
We are using an access code dcloud to prevent anyone from utilizing our hotspot who maybe near our wireless
signal.
Example:
Procedure
Step 1 Navigage to Policy > Policy Elements > Results > Authorization > Downloadable ACLs.
Step 2 Click Add.
Step 3 Enter CWA.
Step 4 Expand Check DACL Syntax to verify the ACL is correct and then enter the lines for CWA from the following
table.
Note For the other ACLs, please use the table as reference. These are already built on ISE for you.
INTERNET_ACCESS permit udp any host 198.18.133.1 Deny internal IP for dCloud and internal
eq domain client networks and allow rest of the IP
This ACL already exists on
permit tcp any host 198.18.133.27 for Internet Access and to ISE (portal
ISE, use this as an example
eq 8443 success pages) and DNS.
for what to include and why.
permit tcp any host 198.18.133.27
eq 8084
deny ip any 198.18.0.0
0.1.255.255
permit ip any any
Example:
Procedure
Step 1 Navigate to Policy > Policy Elements > Results > Authorization > Authorization Profiles.
Step 2 Select NSP_Onboard, and then click Edit.
Step 3 Verify that DACL Name is selected and ISE_PROVISION_ACCESS is indicated.
Example:
Note This is the downloadable ACL to permit/deny defined during onboarding. If not using the default
authorization method, add Cisco VSA Method-List={authorization-method-list} under Advanced
Attribute Settings.
Note The authorization result shows a BYOD flow, with an ACL send to the controller to indicate
redirection state and utilize the default BYOD Portal. ACL_WEBAUTH_REDIRECT is created in
Step Step 2, on page 62 in Create Redirect ACL (Referenced via RADIUS), on page 62.
Tip [For Reference only] This lab is not using the BYOD-URL-Filter, which permits access to certain
internet sites during BYOD for Android devices. If you need that in your own lab, add the following
Cisco VSA under Advanced Attribute Settings: Cisco:cisco-av-pair =
url-filter-preauth=BYOD-URL-Filter, where BYOD-URL-Filter exactly matches the name configured
in C9800 WLC in Step Step 2, on page 63 in (Optional) Create URL Filter for BYOD Flow
(Referenced via RADIUS), on page 63.
Procedure
Example:
Note The authorization result shows a hotspot flow, with a named ACL sending to the controller to
indicate redirection state and utilize the default Hotspot Portal. ACL_WEBAUTH_REDIRECT is
created in Step 2, on page 62 in Create Redirect ACL (Referenced via RADIUS), on page 62.
Configure Internet_Only
We will create Internet Only Authorization Profile. Here you’re creating permissions to allow internet access
for associated rules.
Procedure
Step 7 In the text box under Attribute, enter Called to narrow the selection list, and then pick Called-Station-ID.
Example:
Step 9 In the attribute value, enter dCloud_Internal. This value is case sensitive.
Note Match the attribute value with the WLAN name pattern for dCloud_Internal configured in Create
WLAN Profiles, on page 50.
Example:
Step 1 In the View column for the dCould-Internal policy set, click >.
Step 2 Expand Authorization Policy.
Step 3 Click x next to DenyAccess for default rule profiles.
Step 4 Select NSP_Onboard from the list.
Note This rule is used for those devices not using EAP-TLS and requires BYOD onboarding.
Example:
Step 13 After returning to the dCloud_Internal Policy Sets page, for Profiles, select PermitAccess.
Example:
Note The default setup for guest would include most of these authentication policies. We are showing it in
case you are not using the defaults.
Procedure
Step 1 In the View column for the dCloud_Guest policy set, click >.
Step 2 Expand Authentication Policy.
Step 3 In the Use column, select Internal Endpoints.
Step 4 Click > Options.
Advanced options are displayed.
Step 17 After returning to the dCloud_Guest Policy Sets page, for Profiles, select Internet_Only
Example:
Step 19 In the top left corner of the page, click the Policy Sets hyperlink to return to main policy set page.
Step 1 On your client device, go to your wireless configuration, and then connect to dCloud_Guestx.
On Apple iOS devices the Captive network assistant should pop up.
Step 2 Enter the access code dcloud (all lowercase), and then click Accept.
Your device connects and you should be able to browse the internet.
Step 4 In ISE, navigate to Operations > RADIUS > Live Logs and notice the following.
You may need to change some of the column sizes and scroll to the right to see all information.
• Device first connects as an Apple-Device.
• Users enters code and accepts AUP.
• Device is registered and placed into Guest Endpoint group with internet access.
• Notice how the device was identified as an iPhone after it hit the portal. This is part of our device profiling
service.
Example:
Step 6 Navigate to Context Visibilty > Endpoints and look through the endpoint information available there.
Step 7 Disable the wireless connection on your device.
Step 8 Under Context Visibility, delete the selected endpoint.
Example:
Notice how the device was identified as an iPhone after it hit the portal. This is part of our device profiling
service.
Example:
What's Next
Check out the other ISE demos at http://cs.co/selling-ise-demos
Talk about it on the dCloud Community.