The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to configure and troubleshoot ISE Self Registered Guest Portal functionality.
Cisco recommends that you have experience with ISE configuration and basic knowledge of these topics:
Self Registered Guest Portal, allows guest users to self-register along with employees to use their AD credentials to gain access to network resources. This Portal allows you to configure and customize multiple features.
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
This scenario presents multiple options available for guest users when they perform self-registration.
Here is the general flow:
Step 1. Guest user associates to Service Set Identifier (SSID): Guest-WiFi. This is an open network with MAC filtering with ISE for authentication. This authentication matches the second authorization rule on the ISE and the authorization profile redirects to the Guest Self Registered Portal. ISE returns a RADIUS Access-Accept with two cisco-av-pairs:
Step 2. The guest user is redirected to ISE. Rather than provide credentials in order to log in, the user clicks Register for Guest Access. The user is redirected to a page where that account can be created. An optional secret registration code can be enabled in order to limit the self-registration privilege to people who know that secret value. After the account is created, the user is provided credentials (username and password) and logs in with those credentials.
Step 3. ISE sends a RADIUS Change of Authorization (CoA) Reauthenticate to the WLC. The WLC re-authenticates the user when it sends the RADIUS Access-Request with the Authorize-Only attribute. ISE responds with Access-Accept and Airespace ACL defined locally on the WLC, which provides access to the Internet only (final access for guest user depends on the authorization policy).
Note: Extensible Authentication Protocol (EAP) sessions, ISE must send a CoA Terminate in order to trigger re-authentication because the EAP session is between the supplicant and the ISE. But for MAB (MAC filtering), CoA Reauthenticate is enough; there is no need to de-associate/de-authenticate the wireless client.
Step 4. The guest user has desired access to the network.
Multiple additional features like posture and Bring Your Own Device (BYOD) can be enabled (discussed later).
There is a similar configuration for Accounting. It is also advised to configure the WLC to send SSID in the Called Station ID attribute, which allows the ISE to configure flexible rules based on SSID:
3. Create a Guest Type by navigating to Work Centers > Guest Access > Portal & Components > Guest Types. Refer to the previously created Endpoint Identity Group under this new Guest Type and Save.
4. Create a new Guest Portal Type: Self-Registered Guest Portal. Navigate to Work Centers > Guest Access > Guest Portals.
5. Choose the portal name, refer to the Guest Type created before and send credential notification settings under Registration Form settings to send the credentials via Email.
Refer to this document on how to configure the SMTP server on ISE:
Leave all of the other settings to default. Under Portal Page Customization, all pages presented can be customized. By default, the Guest account is valid for 1 day and it can be extended to the number of days configured under the specific Guest Type.
6. Configure these two Authorization Profiles by Navigating to Work Centers > Guest Access > Policy Elements > Results > Authorization Profiles.
8. Navigate to Authorization policy on the same page. Create this Authorization Rules, as shown in this image.
New users when associate with the Guest SSID are not yet part of any identity group and therefore match the second rule and get redirected to Guest Portal.
After the user logs in successfully, ISE sends a RADIUS CoA and the WLC performs re-authentication. This time, the first authorization rule is matched (as endpoint becomes part of defined endpoint identity group) and the user gets Permit_internet authorization Profile.
9. We can also provide Temporary Access to the Guests by using the condition Guest flow. That condition is checking active sessions on ISE and it is attributed. If that session has the attribute indicating that previously guest user has authenticated successfully condition is matched. After ISE receives Radius Accounting Stop message from Network Access Device (NAD), session is terminated and later removed. At that stage the condition Network Access:UseCase = Guest Flow is not satisfied anymore. As a result, all subsequent authentications of that endpoint hits generic rule redirecting for guest authentication.
Note: At a time, you can use either the Temporary Guest access or Permanent Guest Access but not the both.
Refer to this document for ISE Guest Temporary and Permanent access configuration in detail.
Use this section in order to confirm that your configuration works properly.
3. If there are any problems with the password or the user policy, navigate to Work Centers > Guest Access > Settings > Guest Username Policy in order to change settings. Here is an example:
4. After successful account creation, you are presented with credentials (password generated as per guest password policies) also guest user gets the email notification if it is configured:
5. Click Sign On and provide credentials (additional Access Passcode can be required if configured under the Guest Portal; this is another security mechanism that allows only those who know the password to log in).
6. When successful, an optional Acceptable Use Policy (AUP) can be presented (if configured under the Guest Portal). The user is presented with a change password option and the Post-Login Banner (also configurable under Guest Portal) can also display.
7. The last page (Post-Login Banner) confirms that access has been granted:
This section provides information you can use in order to troubleshoot your configuration.
At this stage, ISE presents these logs under Operations > RADIUS > Live Logs, as shown in the image.
Here is the flow:
Reports (Operations > Reports > Guest > Master Guest Report) also confirms that:
A sponsor user (with correct privileges) is able to verify the current status of a guest user.
This example confirms that the account is created, and the user has been logged in to the portal:
For every stage of this flow, different options can be configured. All of this is configured per the Guest Portal at Work Centers > Guest Access > Portals & Components > Guest Portals > Portal Name > Edit > Portal Behavior and Flow Settings. More important settings include:
If the Require guests to be approved option is selected under Registration Form Settings, then the account created by the guest must be approved by a sponsor. This feature can use email in order to deliver a notification to the sponsor (for guest account approval):
If the Simple Mail Transfer Protocol (SMTP) server is misconfigured, then the account is not created:
The log from guest.log confirms that there is an issue with sending Approval Notification to the Sponsor email as the SMTP server is misconfigured:
2020-11-07 07:16:38,547 ERROR [GUEST_ACCESS_SMTP_RETRY_THREAD][] cpm.guestaccess.apiservices.util.SmtpMsgRetryThreadUtil -::- An exception occurred while sending email :
javax.mail.MessagingException: Could not connect to SMTP host: outbound.cicso.com, port: 25, response: 421
2020-11-07 07:16:38,547 ERROR [https-jsse-nio-10.106.32.25-8443-exec-1][] cpm.guestaccess.apiservices.notification.NotificationService -::- sendApprovalNotification
com.cisco.cpm.guestaccess.exception.GuestAccessSystemException: com.cisco.cpm.guestaccess.exception.GuestAccessSystemException: Unable to send mail. Failure occured
When you have the proper email and SMTP server configuration, the account is created:
After you enable the Require guests to be approved option, the username and password fields are automatically removed from the Include this information on the Self-Registration Success page section. This is why, when sponsor approval is needed, credentials for guest users are not displayed by default on the web page that presents information to show that the account has been created. Instead, they must be delivered by Short Message Services (SMS) or email. This option must be enabled in the Send credential notification upon approval using section (mark email/SMS).
A notification email is delivered to the sponsor:
The sponsor click the Approval link and logs into the Sponsor portal and the account is approved:
From this point on, the guest user is allowed to log in (with the credentials received by email or SMS).
In summary, there are three email addresses used in this flow:
Guest credentials can be also delivered by SMS. These options must be configured:
If the Allow guests to register devices option is selected after a guest user logs in and accepts the AUP, you can register devices:
Notice that the device has already been added automatically (it is on Manage Devices list). This is because Automatically register guest devices were selected.
If the Require guest device compliance option is selected, then guest users are provisioned with an Agent that performs the posture (NAC/Web Agent) after they log in and accept the AUP (and optionally perform device registration). ISE processes Client Provisioning rules to decide which Agent must be provisioned. Then the Agent that runs on the station performs the posture (as per Posture rules) and sends results to the ISE, which sends the CoA reauthenticate to change authorization status if needed.
Possible authorization rules can look similar to this:
The first new users who encounter Guest_Authenticate rule redirect to the Self Register Guest portal. After the user self-registers and logs in, CoA changes authorization status and the user is provided with limited access to perform posture and remediation. Only after the NAC Agent is provisioned and the station is compliant does CoA change authorization status once again in order to provide access to the Internet.
Typical problems with posture include lack of correct Client Provisioning rules:
This can also be confirmed if you examine the guest.log file:
2020-11-09 09:23:32,157 ERROR [https-jsse-nio-10.106.32.25-8443-exec-7][] guestaccess.flowmanager.step.guest.ClientProvStepExecutor -:guest18:- CP Response is not successful, status=NO_POLICY
If Allow employees to use personal devices on the network option is selected, then corporate users who use this portal can go through BYOD flow and register personal devices. For guest users, that setting does not change anything.
What does "employees using portal as guest" mean?
By default, guest portals are configured with the Guest_Portal_Sequence identity store:
This is the internal store sequence that tries the Internal Users first (before Guest Users) and then AD credentials, Since the Advanced settings is to proceed to the next store in the sequence when a selected identity store cannot be accessed for authentication, an Employee with internal credentials or AD credentials is able to login to the portal.
When at this stage on the guest portal, the user provides credentials that are defined in the Internal Users store or Active Directory and the BYOD redirection occurs:
This way corporate users can perform BYOD for personal devices.
When instead of Internal Users/AD credentials, Guest Users credentials are provided, normal flow is continued (no BYOD).
It allows you to run activeX or a Java applet, which triggers DHCP to release and renew. This is needed when CoA triggers the change of VLAN for the endpoint. When MAB is used, the endpoint is not aware of a change of VLAN. A possible solution is to change VLAN (DHCP release/renew) with the NAC Agent. Another option is to request a new IP address via the applet returned on the web page. A delay between release/CoA/renew can be configured. This option is not supported for mobile devices.
Revision | Publish Date | Comments |
---|---|---|
3.0 |
10-Jul-2023 |
Recertification. |
1.0 |
24-Nov-2020 |
Initial Release |