Cisco Mobility Express

CONFIGURATION GUIDE

The purpose of the following manual is to describe the necessary configuration of Cisco Mobility Express equipment for integration with Octopus Platform.

1- Pre-requisites

  • If there is a firewall in the network that might block the traffic, you will need to allow access to some domains to enable user's authentication:

    • Radius Servers:

      • Primary: <IP_Radius_1> 1812 and 1813 UDP ports

      • Secondary: <IP_Radius_2> 1812 and 1813 UDP ports

    • Splash Portal server: 

      • Domain <captive_portal_domain> 80 and 443 TCP ports

  • For the operation of the Guest and Enterprise modules configuration, it will be necessary to previously contract the Octopus platform licenses with the respective modules.

2- Guest module configuration

2.1 Radius Servers

The next step is to configure the Radius Server parameters to which the user authentication requests will be sent. Access to Management > Admin Accounts > RADIUS and select the following options:

  • Authentication Call Station ID Type: AP MAC Address:SSID

  • Authentication MAC Delimiter: Hyphen

  • Accounting Call Station ID Type: AP MAC Address:SSID

  • Accounting MAC Delimiter: Hyphen

Then the two radius of authentication will be created. To do this, click on the "Add Radius Authentication Server" button for each of the two, and enter the values:

Radius 1

  • State: Enabled

  • CoA: Deshabilitado.

  • Server IP Address: <IP_Radius_1>

  • Shared Secret: <Secret>

  • Confirm Shared Secret: <Secret>

  • Port Number: 1812

  • Server Timeout: 3

Radius 2

  • State: Enabled

  • CoA: Deshabilitado.

  • Server IP Address: <IP_Radius_2>

  • Shared Secret: <Secret>

  • Confirm Shared Secret: <Secret>

  • Port Number: 1812

  • Server Timeout: 3

Then enter the Radius Accounting servers, by clicking on the button: "Add Radius Accounting Server"

Radius 1

  • State: Enabled

  • Server IP Address: <IP_Radius_1>

  • Shared Secret: <Secret>

  • Confirm Shared Secret: <Secret>

  • Port Number: 1813

  • Server Timeout: 3

Radius 2

  • State: Enabled

  • Server IP Address: <IP_Radius_2>

  • Shared Secret: <Secret>

  • Confirm Shared Secret: <Secret>

  • Port Number: 1813

  • Server Timeout: 3

Activation Interium-Update

For proper monitoring of the service in the WIFI platform, the Accounting Interium-Update packages must be activated. It is possible to activate by CLI with the command:

config wlan radius_server acct interim-update 600 <Wlan_id>

2.2 WLAN configuration

The next step is to create a new WLAN or modify an existing one. To do this go to the Wireless Settings> WLANs section and create or modify a WLAN with the following parameters.

General

  • Profile Name: Name that we want to give to the WLAN Guest profile

  • SSID: network name or SSID Guest that will radiate.

  • Admin State: Enabled

  • Radio Policy: All

  • Broadcast SSID: Activado

WLAN Security

  • Guest Network: Enable

  • Captive Network Assitant: Disabled.

  • Captive Portal: External Splash page

  • Captive Portal URL (revisar apartado 2.3 para que la redirección de la url sea http o https)

    • http Option: http://<captive_portal_domain>/login/hotspot/cisco

    • https Option: https://<captive_portal_domain>/login/hotspot/cisco

  • Access Type: Radius

  • Radius Server: In the Radius Server tab, press the button "Add Radius Authentication Server" and add the radius created with Add to Pre Auth ACLs option enabled. The same operation by clicking the "Add Radius Accounting Server" option and adding the created radius.

  • Preath ACL:Press the "Add URL Rules" button and enter the necessary domains to provide the service, with the "Permit" option activated. Please find below the domains that you will have to add to make the captive portal works properly depending on the services configured in the captive portal.

If you wish to add extra domains (Social Networks, Paypal, etc...) they can be consulted from the following link.

Example:

Advanced

Enable the option: Allow AAA Override

2.3  HTTP or HTTPS login process configuration

There are two configuration options for the validation of the captive portal: One through http connectivity, where the traffic would not be encrypted, and the other through https.

HTTP option

For this it will be necessary to execute the following commands:

config network web-auth https-redirect disable config network web-auth secureweb disable save config reset system

In the WLAN configuration section, the redirect URL will be indicated. If these options are modified, the changes will only take effect once the controller is restarted.

HTTPS option

If you choose to configure this secure validation option, it is very important to know that a DNS resolution is required between the subdomain associated with the certificate and the virtual IP of the controller, otherwise the validations will not be redirected to the AP WLC and the authentication will fail. This DNS entry must be configured in the DNS servers delivered by DHCP to the clients.

To find out the virtual interface IP, it can be done with the command: show interface summary

Archivo adjunto desconocido

Firstly, it is necessary to load a new certificate associated to the subdomain name to make the login. Certificates are offered, for which it will be necessary to configure and start an FTP transfer with the following commands:

transfer download mode ftp transfer download datatype webauthcert transfer download serverip <XX.XX.XX.XX> transfer download path <PATH> transfer download filename ciscosecurelogin.pem transfer download username <username> transfer download password <password> transfer download port <port> transfer download certpassword <certpassword> transfer download start

Next, the following commands must be entered by CLI

 

2.4  Otras configuraciones

To allow VPN clients full authentication without the need for web-auth security, and avoid connection drops run the following commands:

Disable logout pop-up just logged in. If the browser does not have the pop-up blocker enabled, it can cause problems in the logout and login processes. To disable it run the following command:

For simultaneous connections of several devices with the same username, the parameter "Max Concurrent Logins for a user name" must be set to 0 so that there is no limit. To do this, enter the command

 

2.5 List of Authorized MACs

In order to allow the users to authenticate in the captive portal correctly, it is necessary to identify the NAS that will send the authentication requests to the Radius Server. In this case, it is required to add the MAC addresses asigned to the Wifi interface of every Access Point that will radiate the configured SSID.

To do this, enter the next command by CLI:

 

3 - Enterprise module configuration

In order to integrate the configurations of this module with the platform, it is necessary to contract the Octopus Platform Enterprise Module.

3.1  MAC Caching

To enable MAC Caching or MAC Authentication functionality, it is necessary to edit the created WLAN and enable this option.

3.2 Configuration of “Access Profiles” funtionality in the Octopus Platform

Through the Octopus platform it is possible to configure a series of reply attributes of the Access-Accept packets, grouped in the so-called Access Profile. These Access Profiles allow to activate a series of functionalities in the Cisco. Although the most common and proprietary Cisco radius dictionaries are available, the following is a list of some of the most interesting ones:

Attribute

Description

Format

Attribute

Description

Format

Airespace-Data-Bandwidth-Average-Contract

Airespace-Real-Time-Bandwidth-Average-Contract

Airespace-Data-Bandwidth-Burst-Contract

Airespace-Real-Time-Bandwidth-Burst-Contract

They define speed limits for a given session, both upstream and downstream. It is necessary to configure all four.

Kilobyte

Airespace-Guest-Role-Name

Assignment of a QoS Role Name, previously created in Cisco Catalyst 9800.

 

Airespace-ACL-Name

Assignment of an Access Control List, previously created in Cisco Catalyst 9800.

 

cisco-av-pair

String with many possibilities

 

Reply-Message

Useful for troubleshooting functions, since it allows to identify associated elements of the Octopus platform, such as an access profile, access method, location, ...

 

Example of an Access Profile configuration with the attributes explained above:

 

QoS Role Name Assignment: Although the configuration parameters can be sent directly from the radius server, it is also possible to assign a QoS Role, which can be associated from the platform with the radius Airespace-Guest-Role-Name attribute.

 

3.3 Identity PSK Configuration

Some devices that connect to our networks, especially IoT devices, do not have the ability to make connections through secure validations such as 802.1X and therefore connect through WPA-PSK validations. This type of validation has security drawbacks since the key is unique and any device can connect. Cisco's Identity PSK functionality allows two-factor authentication through MAC filtering and PSK keys, which can be assigned per device or device groups, enabling large-scale security and control. To configure Identity PSK:

Cisco Configuration

Go to Wireless Settings > WLANs, add or edit a WLAN and configure in the WLAN Security tab:

  • MAC Filtering: Enable

  • Security type: WPA2 Personal

  • Add RADIUS Authentication Server

    • Server: Configured in point 2.1 of the manual.

Advanced Tab

  • Allow AAA Override: Enable

Click on Apply to save the configuration

WPA2 Personal is a security method using PSK authentication. After a successful MAC authentication, the RADIUS server returns the following Cisco AVPair attributes:

  • psk-mode - The value can be ASCII, HEX, asciiEnc, or hexEnc.

  • psk

Octopus platform configuration > Access Profile

Radius attributes to configure:

  • cisco-av-pair = “psk-mode=ascii”

  • cisco-av-pair += “psk=password”

 

Possible to combine with local policy with the attribute

  • cisco-av-pair += “role=policyCiscoMobilityExpress”