Browser-Based Authentication Bypass

The Browser-Based Authentication Bypass feature enables web browsers to bypass authentication methods such as HTTP Basic, Web Authorization Proxy, and Windows NT LAN Manager (NTLM) (passive or explicit). Specific web browsers can be configured for authentication, and other browsers can be configured to bypass authentication.

This module provides information about the feature and how to configure it.

Finding Feature Information

Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

Prerequisites for Browser-Based Authentication Bypass

  • You must configure at least one of these authentication methods—HTTP Basic, Web Authorization Proxy, or Windows NTLM—with browser-based authentication bypass.

  • Use browser-based authentication bypass with the Default User-Group Policy feature.

Information About Browser-Based Authentication Bypass

Browser-Based Authentication Bypass Overview

While using web browsers, as part of the user authentication, a pop-up or dialog box appears in some web browsers. The Browser-Based Authentication Bypass feature helps to bypass this user authentication and thus avoid the authentication pop-ups.

With the Browser-Based Authentication Bypass feature, you can configure web browsers that must be authenticated and browsers that can bypass user authentication. Bypassing is supported for authentication methods such as HTTP Basic, Web Authorization Proxy, and Windows NT LAN Manager (NTLM) (passive or explicit).

The Browser-Based Authentication Bypass feature supports the following web browsers:
  • Chrome

  • Firefox

  • Internet Explorer 8 (IE8)

  • IE9

  • Safari

A network administrator configures a list of regular expression (regex) patterns in the IP admission module. When the IP admission module receives the HTTP Get request, the module compares the user-agent string in the HTTP header to the regex pattern that the administrator has configured for the bypass method.

The following rules apply to the Browser-Based Authentication Bypass feature:
  • If a configured regex pattern does not match the user-agent field, a web browser is authenticated on the basis of the configured web authentication method.

  • If a configured regex pattern matches the user-agent field, authentication is bypassed for the web browser and the HTTP traffic goes through to the Cisco Web Security cloud.

How to Configure Browser-Based Authentication Bypass

Configuring Browser-Based Authentication Bypass

SUMMARY STEPS

    1.    enable

    2.    configure terminal

    3.    parameter-map type regex regex-map

    4.    pattern expression

    5.    exit

    6.    ip admission name admission-name bypass regex regex-map [absolute-timer minutes]

    7.    Perform one of the following tasks:

    • ip admission name admission-name ntlm
    • ip admission name admission-name http-basic
    • ip admission name admission-name proxy http

    8.    interface type number

    9.    ip admission admission-name

    10.    end


DETAILED STEPS
     Command or ActionPurpose
    Step 1 enable


    Example:
    Device> enable
     

    Enables privileged EXEC mode.

    • Enter your password if prompted.

     
    Step 2 configure terminal


    Example:
    Device# configure terminal
     

    Enters global configuration mode.

     
    Step 3 parameter-map type regex regex-map


    Example:
    Device(config)# parameter-map type regex regex-map1
     

    Configures a parameter-map type with a regular expression (regex) to match a specific traffic pattern and enters parameter-map type inspect configuration mode.

     
    Step 4 pattern expression


    Example:
    Device(config-profile)# pattern Chrome
     

    Configures a matching pattern that compares the user-agent field in the HTTP Get request and the regex pattern.

     
    Step 5 exit


    Example:
    Device(config-profile)# exit
     

    Exits parameter-map type inspect configuration mode and enters global configuration mode.

     
    Step 6 ip admission name admission-name bypass regex regex-map [absolute-timer minutes]


    Example:
    Device(config)# ip admission name rule1 bypass regex regex-map1 absolute-timer 10
     

    Creates an IP Network Admission Control (NAC) rule to enable browser-based authentication bypass.

     
    Step 7 Perform one of the following tasks:
    • ip admission name admission-name ntlm
    • ip admission name admission-name http-basic
    • ip admission name admission-name proxy http


    Example:
    Device(config)# ip admission name rule1 ntlm
    Device(config)# ip admission name rule1 http-basic
    Device(config)# ip admission name rule1 proxy http
     
    Configures one of the following authentication methods:
    • Windows NT LAN Manager (NTLM)

    • HTTP Basic

    • Web Authorization Proxy

     
    Step 8 interface type number


    Example:
    Device(config)# interface gigabitethernet0/1/0
     

    Configures an interface and enters interface configuration mode.

     
    Step 9 ip admission admission-name


    Example:
    Device(config-if)# ip admission rule1
     

    Creates a Layer 3 Network Admission Control (NAC) rule to be applied to the interface.

     
    Step 10 end


    Example:
    Device(config-if)# end
     

    Exits interface configuration mode and enters privileged EXEC mode.

     
    What to Do Next

    For any parameter-map change to be reflected, remove and configure the ip admission name admission-name bypass regex regex-map [absolute-timer minutes] command in global configuration mode.

    Verifying Browser-Based Authentication Bypass

    SUMMARY STEPS

      1.    enable

      2.    show ip admission cache

      3.    show ip admission configuration


    DETAILED STEPS
      Step 1   enable

      Enables privileged EXEC mode.

      • Enter your password if prompted.



      Example:
      Device> enable

      Step 2   show ip admission cache

      Displays the current list of network admission entries and verifies the browser authentication bypass.



      Example:

      Device# show ip admission cache
      
      Client Name N/A, Client IP 172.31.108.123, Port 63142, timeout 60, Time Remaining 60, state ESTAB (Browser Auth Bypass)
      

      Step 3   show ip admission configuration

      Displays the Network Admission Control (NAC) configuration.



      Example:

      Device# show ip admission configuration
      
      Auth-proxy name webauth-profile
      !
      browser bypass, regex parameter-map name: reg-map inactivity-time 12 minutes absolute-timer 10 minutes


      Configuration Examples for Browser-Based Authentication Bypass

      Example: Configuring Browser-Based Authentication Bypass

      Device> enable
      Device# configure terminal
      Device(config)# parameter-map type regex regex-map1
      Device(config-profile)# pattern Chrome
      Device(config-profile)# exit
      Device(config)# ip admission name rule1 bypass regex regex-map1 absolute-timer 10
      Device(config)# ip admission name rule1 ntlm
      Device(config)# interface gigabitethernet0/1/0
      Device(config-if)# ip admission rule1
      Device(config-if)# end

      Additional References for Browser-Based Authentication Bypass

      Related Documents

      Related Topic

      Document Title

      Cisco IOS commands

      Cisco IOS Master Command List, All Releases

      Security commands

      Cisco Web Security

      "Cisco Web Security" module in the Security Configuration Guide: Zone-Based Policy Firewall

      Authenticating and authorizing connections

      "Configuring Authentication Proxy" module in the Authentication Proxy Configuration Guide

      Technical Assistance

      Description Link

      The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies.

      To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds.

      Access to most tools on the Cisco Support website requires a Cisco.com user ID and password.

      http:/​/​www.cisco.com/​support

      Feature Information for Browser-Based Authentication Bypass

      The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.

      Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.
      Table 1 Feature Information for Browser-Based Authentication Bypass

      Feature Name

      Releases

      Feature Information

      Browser-Based Authentication Bypass

      15.3(3)M

      The Browser-Based Authentication Bypass feature enables web browsers to bypass authentication methods such as HTTP Basic, Web Authorization Proxy, and Windows NTLM (passive or explicit).

      The following command was introduced: ip admission name bypass regex.