- Finding Feature Information
- Information About Customization of Authentication Proxy Web Pages
- How to Configure Custom Authentication Proxy Web Pages
- Configuration Examples for Customization of Authentication Proxy Web Pages
- Additional References
- Feature Information for Customization of Authentication Proxy Web Pages
Customizing Authentication Proxy Web Pages
The Customization of Authentication Proxy Web Pages feature allows you to provide four substitute HTML pages to be displayed to the user in place of the switch's internal default HTML pages during web-based authentication. The four pages are Login, Success, Fail, and Expire.
- Finding Feature Information
- Information About Customization of Authentication Proxy Web Pages
- How to Configure Custom Authentication Proxy Web Pages
- Configuration Examples for Customization of Authentication Proxy Web Pages
- Additional References
- Feature Information for Customization of Authentication Proxy Web Pages
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Customization of Authentication Proxy Web Pages
The switch's internal HTTP server hosts four HTML pages for delivery to an authenticating client during the web-based authentication process. The four pages allow the server to notify the user of the following four states of the authentication process:
You can substitute your custom HTML pages for the four default internal HTML pages or you can specify a URL to which the user will be redirected upon successful authentication, effectively replacing the internal Success page.
How to Configure Custom Authentication Proxy Web Pages
- Configuring the Custom Authentication Proxy Web Pages
- Specifying a Redirection URL for Successful Login
- Verifying the Configuration of Custom Authentication Proxy Web Pages
Configuring the Custom Authentication Proxy Web Pages
To specify the use of your custom authentication proxy web pages, first store your custom HTML files on the switch's internal disk or flash memory and then perform this task.
DETAILED STEPS
Specifying a Redirection URL for Successful Login
To specify a redirection URL for successful login, perform this task.
Note |
You can specify a URL to which the user will be redirected upon successful authentication, effectively replacing the internal Success HTML page. |
DETAILED STEPS
Verifying the Configuration of Custom Authentication Proxy Web Pages
Perform this task to verify the configuration of custom authentication proxy web pages and the redirection URL for successful login:
DETAILED STEPS
Configuration Examples for Customization of Authentication Proxy Web Pages
- Example: Configuring Custom Authentication Web Pages
- Example: Configuring a Redirection URL for Successful Login
Example: Configuring Custom Authentication Web Pages
Device> enable Device# configure terminal Device(config)# ip admission proxy http login page file disk1:login.htm Device(config)# ip admission proxy http success page file disk1:success.htm Device(config)# ip admission proxy http failure page file disk1:fail.htm Device(config)# ip admission proxy http expired page file disk1:expired.htm Device(config)# end
Example: Configuring a Redirection URL for Successful Login
Device> enable Device# configure terminal Device(config)# ip admission proxy http success redirect www.company.com Device(config)# end
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
Authentication, authorization, and accounting |
Authentication, Authorization, and Accounting (AAA) Configuration Guide |
Access lists and the Cisco IOS Firewall |
"Access Control Lists: Overview and Guidelines" module of the Security Configuration Guide: Access Control Lists publication. |
Technical Assistance
Description | Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for Customization of Authentication Proxy Web Pages
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for Customization of Authentication Proxy Web Pages |
Feature Name | Releases | Feature Information |
---|---|---|
Web Authentication Enhancements - Customization of Authentication Proxy Web Pages |
15.2(2)T |
The Customization of Authentication Proxy Web Pages feature allows you to provide four substitute HTML pages to be displayed to the user in place of the switch's internal default HTML pages during web-based authentication. The four pages are Login, Success, Fail, and Expire. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.