cancel
Showing results for 
Search instead for 
Did you mean: 

Web Redirect to captive portal for Cisco switch with Per-User-ACL (dACL)

Web Redirect to captive portal for Cisco switch with Per-User-ACL (dACL)

Antonio_Opromol
Contributor II
Hi, I'm adding a Cisco catalyst swicth 2960G with IOS version 15.0(2)SE11 to my lab environment with a x450-G2 and XIQ-SIte engine (complete of ExtremeControl engine).
I've defined the new switch in the NAC engine with the follow radius attributes:
uCORHrzSXe2w22LBG56g_Cisco_Radius_Attributes.pngAnd my Policy mapping for the role were user assume for the web authentication redirection is:
mhvKz6yjTkKyzY0NqRFN_Policy Mapping.png
If I try to use the redirect method that use Policy Based Routing as I do for X450-G2, I've got and error that Cisco don't support CoS defined as I do in the redirect rule for EXOS:
Q7N3ASQWSWmNjGtALxeS_CoS.png
Another problem is that I need to define also ACL on the Redirect ACL on the Cisco switch because if I don't do the authentication fail.
ujnfHBZQAu6PhdrVUtc5_ACL_redirect.png
When the device is authenticated, is not redirected to the Extreme NAC captive portal (my ip in the lab is 192.168.30.35)
S4j3IeIeS5yXYtZDMeNE_CIsco port Per-User-ACL.png
How can i do Web Redirect using Per-User-ACL method?

Thanks

4 REPLIES 4

Antonio_Opromol
Contributor II
Solved.
The problem was my http server on cisco switch with no ip address on the non default vlan ...giving an IP the redirect works.

Antonio_Opromol
Contributor II
I Ryan,

now web redirection with Per-User-ACL works in my lab.
My access ports are configured as:
interface GigabitEthernet0/x
switchport access vlan 10
switchport mode access

and the uplink port between my cisco and x450-g2 is 
interface GigabitEthernet0/1
description "Uplink with X450-G2 port 16"
switchport trunk native vlan 10
switchport mode trunk


If I use the VLAN 10 in my policy mapping for the Policy Role, and all works well, in the sense that the web redirection works well, and also if I connect with a user with a policy role in where I set a different VLAN, this is correctly set in the port.
But If I use a different VLAN in the Policy role used for the web redirection (for example a different on-boarding vlan that is not the native VLAN defined in my trunk uplink interface) , the redirection on cisco switch in this case don't work.
Any ideas?
Thanks

Antonio_Opromol
Contributor II

Hi Ryan,

 

my intention is to use only Per-user-ACL with Cisco in my configuration, so if Custom2 and Custom3 attributes are not necessary with this method, I remove these from my configuration, but in this case I don’t know how to redirect my guest user to the NAC porta using only the Policy Roles and  services associated to my Redirect Role Profile (I’m using PBR only for the Extreme’s switches and I use the CoS in the http rule in the Policy Domain associated to these switches only).

 

Do you have and example on how use dACL with web redirect?

 

Thanks,
Antonio

Ryan_Yacobucci
Extreme Employee

Hello,

I have a few questions based on your screenshots.
If you check the "Authorization" column in control what was actually sent for authorization? Did Control actually send the per-user ACL lines or did it send the custom2 and customer3 AVPs which is typically what we seen when using cisco.

These custom2 and custom3 attributes use a web based redirect and not a PBR. You should only need one or the other, so if you're using the redirect ACL with URL redirect you don't need PBR to redirect as well. You won't need to redirect packets that have already been redirected to NAC URL.

If you take a packet capture on a client in this state do you see the clients web packets get a 307 Temporary Redirect with the URL you configured? 

Yes we have per-user-ACL capabilities with Cisco where we can send the ACL lines through RADIUS attributes, but you appear to not be using that by using the cisco-avipair=redirecturl attribute.

Thanks
-Ryan


GTM-P2G8KFN