After installing vWLC and ISE, add ISE as a AAA server on the vWLC.
Log into the vWLC. Click the security tab at the top.
On the left hand menu click Authentication under Radius/AAA.
Click the New button to add a new AAA server.
Enter the IP address of the ISE server, be sure port number is 1812, and that Support for COA is checked. Create a Shared Secret and make note of it as ISE will need to be configured with the same secret. Click Apply.
Next click Accounting from the Security/AAA menu on the left. Hit New and enter the required information.
Next we will log into ISE and configure the WLC as a network device.
Go to Work Centers, then Network Resources.
Click Add and fill out the WLC information. Check Radius Auth. Settings and be sure to fill out the Shared Secret we filled out earlier in the WLC.
The next step is to configure our Guest WLAN/SSID.
Log into your WLC and click the WLANs tab. Choose Create New from the drop down box and click Go.
Enter a profile name and SSID.
Select Status Enabled, and the correct interface for your guest traffic.
Next click the Security tab.
Change Layer 2 Security to None, and check MAC Filtering.
Click AAA Servers, and change the Authentication and Authorization servers to the ISE server via the drop down boxes.
Click the Advanced tab.
Check Allow AAA Override.
Under NAC change the drop down to ISE NAC.
Uncheck Flex Connect Local Switching if enabled.
Check DHCP/HTTP profiling under Radius Client Profiling.
Click Security, and find Access Control Lists on the left hand menu.
Click New, and for the ACL name type ACL_WEBAUTH_REDIRECT
Click Apply, then click the ACL name to start editing.
Click Add New Rule.
Create a rule allowing destination DNS (udp/53) from any to any.
Create a rule allowing source DNS from any to any.
Create a rule allowing tcp from ISE to any.
Create a rule allowing tcp from any to ISE.
Note: In production you would want to limit the DNS entries to just your trusted DNS server.
Create a new ACL if you’d like to place any restrictions on your guest network. e.g., blocking access to any private IP space.
Next we’ll create ISE policies to redirect users who connect to the Guest network to a web portal. Once the AUP has been accepted they will get a new policy applied to them restricting their access to internet only via the ACL we created earlier. We’re going to be using the default hotspot portal but you can design your own portals with custom graphics. Cisco also has an ISE portal builder which has an excellent WYSIWYG editor to make custom portal building a snap. The portal builder requires a Cisco login and can be found here: https://isepb.cisco.com/#/
Log in to ISE. Go to Work Centers, Guest Access,Policy Elements.
Click Results and and go to Authorization Profiles.
Click Add to create a new profile.
Give the policy a descriptive name and description.
Scroll down a bit in the Common Tasks and check Web Redirection.
Select Hotspot from the drop down. Enter ACL_WEBAUTH_REDIRECT as the ACL and the value will be the Hotspot guest portal (if you’ve uploaded a customer portal you can select it here).
Click Add again, enter a new name and description. This policy will apply the guest restriction ACL we created on the WLC.
Scroll down into the Common Tasks and find Airespace ACL, enter the name of the Guest ACL you created earlier. Click Submit.
Now, go to Work Centers, Guest Access, Policy Sets.
Expand the Default policy set by clicking the arrow on the right.
Expand the Authentication Policy be clicking the arrow.
Find MAB (MAC Address Bypass) and expand the options menu. Be sure the option for “If User not found” is set to Continue.
Next we’ll create our new Authorization Polices for the Guest network. Expand Authorization Policy and select a space to insert the polices. Locate a rule and click the gear, select insert above or below rule to place the new policies where you’d like them.
Enter a name for the policy. Select Wireless_MAB as the condition, and Guest_Hotspot as the Profile.
Add a new profile above the one we just created
This will be for applying the Guest ACL for the user once going through the portal. Conditions will be Wireless_MAB, IdentityGroup = GuestEndpoints, and Guest_Flow. Result will be the Guest_Access policy we created which applies the ACL we created on the WLC.
This should be enough configuration to get the Guest Hotspot SSID up and running. Connecting to the new SSID should pop up the AUP, once accepted you should then have access to the internet.
Here are some more notes/little projects from playing around with the AWS free tier. This time, hosting a static webpage on S3, setting permissions on the bucket, and using Route 53 to point my domain to a statically hosted site.
Note: I bought and registered a new domain through AWS to play around with the free tier (wrmem.io), this automatically adds the hosted zones in Route 53.
In your AWS console navigate to S3. Click Create Bucket to begin creating your new bucket that will host the static webpage.
On the create bucket settings enter a dns compliant name, for example I’ll be hosting my static page at static.wrmem.io
From here you can just hit create. It’s best to leave the defaults for the bucket and adjust settings/permissions later when you upload your hosted content.
Create a second bucket for the www. subdomain, this will be configured as a re-direct to the original bucket we created. Again enter the dns complaint name and hit create to leave the default bucket settings.
Click the original bucket you created and under the Overview tab hit Upload.
For this example I uploaded a basic index.html with a simple ‘hello world’ type message.
<h1>Thisismy staticwebsite hosted on AWS</h1>
Next we need to set the permissions on this S3 bucket to allow for the public to be able to read its contents. This can be done via an S3 bucket policy.
In your S3 bucket, click Permissions, then Bucket Policy.
In the Bucket Policy editor you can paste the following code (making changes to whatever your resource may be):
The code allows for the public to read/get objects from the S3 resource static.wrmem.io/*
After making the change you should now see the Public sub heading alerting you that this bucket is now publicly accessible.
Next we’ll need to set the bucket to allow for web hosting.
In your bucket click Properties then find the Static Website Hosting option.
Enter options for the index file and then hit save.
Next we’ll need to setup our re-direct for the www. bucket.
Enter the www.whatever bucket. Click Properties then find the Static Website Hosting option.
Select Redirect requests and point it to the domain you want.
All we need to do next is point our dns for static.wrmem.io to our bucket.
Go to your Route 53 console and enter your hosted zones.
Select the zone you want to edit.
Click Create Record Set.
For the name I entered static.wrmem.io, and the alias points to my S3 region. Click Create.
After creating the dns record go ahead and test. For my configuration it’s simply navigating to http://static.wrmem.io/ in my browser.
There are a few different methods you can use to bring back telnet, including copying over the binaries from a Sierra install to /usr/local/bin (as seen here) or using a session manager like SecureCRT, but since I’ve been using Homebrew to manage a few other packages for a while now I figured I’d just go ahead and use that.
First install Homebrew from your terminal (warning: please don’t copy and paste code snippets from a web browser straight into your terminal, please double check your sources)
Just got in a new UCS C server and was going through the process of configuring Cisco’s flavor of out of band management called CIMC or Cisco Integrated Management Controller. Similar to HP’s iLO or Dell’s iDrac, CIMC allows one to remotely control and manage their server via the web or SSH with handy tools like integrated KVM and ISO mounting.
To configure CIMC, connect your keyboard/monitor and power up the server.
Press F8 when the Cisco logo appears.
When configuring CIMC for the first time it may ask for a user/password. Try admin/password or admin/Cisco1234
Enter a new password when prompted.
Use your arrow keys to navigate the menus. Press SPACE to select/deselect options.
When completed press F10 to save your settings, wait 45 seconds and hit F5 to refresh and verify the settings you entered.
Hit ESC to exit.
You should now be able to access the CIMC web GUI by going to HTTPS://CIMC_IP/