Configuring Cisco 2500 WLC

Configuring Cisco WLC for IPS GUAM and Guest Self-Registration

This section explains the steps to configure Cisco 2500 WLC for deploying IPS GUAM and Guest Self-Registration feature. This section provides examples of how to configure the Cisco WLC. For more information, see Cisco documentation.

Configuration Required on Cisco WLC for Local AP mode

Configuring RADIUS server

  1. Login to Cisco WLC. Select Security > AAA > RADIUS. Configure IPS server as authentication and accounting servers.
  2. Support for RFC 3576 - Enable this option to trigger RADIUS disconnect when required.

Using CLI

Before creating the radius server, you need to allot an index number to it which is not currently in use. To find out the index numbers which are currently in use in WLC, use the following command:

show radius summary

Go through the authentication servers and accounting servers section in the displayed output. Use an unused index number for adding radius authentication or accounting server.

config radius auth add <RADIUS auth server ID> <RADIUS server IP> 1812 ascii <password>

config radius auth disable < RADIUS auth server ID >

config radius auth rfc3576 enable < RADIUS auth server ID >

config radius auth enable < RADIUS auth server ID >

config radius acct add <RADIUS acct server ID > <RADIUS server IP> 1813 ascii <password>

Configuring ACLs

  1. On the CISCO WLC main screen go to Security > Access Control Lists. Create an IPv4 ACL list to allow DNS, DHCP and IPS (Traffic).

Using CLI

To see all the ACLs that are configured on the controller enter the following command:

show acl summary

To create an ACL with name test

config acl create test

To create a rule in the test ACL

config acl rule add test 1 # Creating Rule No 1

config acl rule protocol test 1 17 # 17 is UDP protocol

config acl rule source port range test 1 68 68 # 68 is DHCP client port number

config acl rule action test 1 permit # Allow access

 

config acl rule add test 2 # Creating Rule No 2

config acl rule protocol test 2 17

config acl rule source port range test 2 67 67 # 67 is DHCP server port number

config acl rule action test 2 permit

 

config acl rule add test 3 # Creating Rule No 3

config acl rule protocol test 3 17

config acl rule source port range test 3 53 53 # Port 53 for DNS

config acl rule action test 3 permit

 

config acl rule add test 4 # Creating Rule No 4

config acl rule protocol test 4 17

config acl rule destination port range test 4 53 53

config acl rule action test 4 permit

 

config acl rule add test 5 # Creating Rule No 5

config acl rule source address test 5 3.3.3.2 255.255.255.255

config acl rule action test 5 permit

 

config acl rule add test 6 # Creating Rule No 6

config acl rule destination address test 6 3.3.3.2 255.255.255.255

config acl rule action test 6 permit

Configuring WLAN

To configure Cisco WLAN:

  1. On the CISCO WLC main screen select WLANs tab and create a new WLAN.
  2. Select to General tab and enable Status checkbox
  3. Select Security > Layer 2 in WLANs tab. Select ‘None’ from the Layer 2 Security drop-down list.
  4. Select Security > Layer3 in WLANs tab.
    • From the Layer 3 security drop-down list select 'Web Policy'.
    • For Preauthentication ACL, associate the ACL that is created earlier for IPv4.
    • Over-ride Global Config - Select the Enable check box.
    • From the Web auth type drop-down list select External (Re-direct to external server)
    • URL – Enter the IPS (Guest sign-in URL) for redirection URL.

  5. Select Security > AAA Servers tab. Configure RADIUS server for authentication and accounting.
  6. Select the Interim Update check box.

    Instead of management port, if some other Interface/Interface Group (G) is selected during WLAN creation then Radius Server Overwrite interface option must be enabled.

  7. Select Advanced tab and enable Allow AAA Override checkbox.

Using CLI

Before creating a new WLAN verify the existing WLANs on the WLC using the following command and use an unused index id for the new WLAN.

show wlan summary

To create a new WLAN

config wlan create <WLAN_ID> <Profile name> <SSID>

Ex: - config wlan create 10 Test Test # Test is the WLAN name and SSID

config wlan interface <WLAN_ID> <interface-name>

Ex: - config wlan interface 10 management # assigning the WLAN to management port

config wlan security wpa disable <WLAN_ID>

config wlan security web-auth enable <WLAN_ID>

config wlan custom-web global disable <WLAN_ID>

config wlan custom-web ext-webauth-url <ext-webauth-url> <WLAN_ID>

config wlan custom-web webauth-type external <WLAN_ID>

config wlan security web-auth acl <WLAN_ID> <ACL_name>

config wlan radius_server auth add <WLAN_ID> <Radius_auth_server_ID>

config wlan radius_server acct add <WLAN_ID> <Radius_acct_server_ID>

config wlan radius_server overwrite-interface enable <WLAN_ID> ( This command is required only if instead of management, some other interface is configured for WLAN. Please

check steps 2 and 5)

config wlan radius_server acct interim-update enable <WLAN_ID>

config wlan radius_server acct interim-update <Interval> <WLAN_ID>

config wlan aaa-override enable <WLAN_ID>

config wlan enable <WLAN_ID>

Configuring AP Group

On the CISCO WLC main screen go to WLANs > Advanced > AP Groups screen and map WLAN to the Local AP (Campus Only mode) group.

Using the CLI

config wlan apgroup interface-mapping add <APgroup Name> <WLAN ID> <interfacename>

 

To save the configuration use the following command:

save config

Configuration Required on Cisco WLC for Remote AP mode

Configuring RADIUS server

  1. Login to Cisco WLC. Go to Security > AAA > RADIUS. Configure IPS server as authentication and accounting server.
  2. Support for RFC 3576 - Enable this option to trigger RADIUS disconnect when required.

    Support for RFC3576 for RADIUS disconnect does not work properly with Cisco 2500, 5500, 7500, and 8500 series.

Using the CLI

Before creating the radius server, you need to allot an index number to it which is not currently in use. To find out the index numbers which are currently in use in WLC, use the following command

show radius summary

Go through the authentication servers and accounting servers section in the displayed output. Use an unused index number for adding radius authentication or accounting server.

config radius auth add <RADIUS auth server ID> <RADIUS server IP> 1812 ascii <password>

config radius auth disable < RADIUS auth server ID >

config radius auth rfc3576 enable < RADIUS auth server ID >

config radius auth enable < RADIUS auth server ID >

config radius acct add <RADIUS acct server ID > <RADIUS server IP> 1813 ascii <password>

Configuring FlexConnect ACLs

  1. Select Security > Access Control Lists > FlexConnect ACLS. Create a FlexConnect ACL list to allow DNS, DHCP and IPS (Traffic).

Using the CLI

To see all the ACLs that are configured on the controller enter the following command:

show flexconnect acl summary

To create a new ACL

config flexconnect acl create <ACL name>

To create rules in the newly created ACL

config flexconnect acl rule add <ACL name> <Rule number1>

config flexconnect acl rule protocol <ACL name> <Rule number1> 17 # 17 is UDP

config flexconnect acl rule source port range <ACL name> <Rule number1> 68 68 # 68 is DHCP client port number

config flexconnect acl rule action <ACL name> <Rule number1> permit # Allow access

 

config flexconnect acl rule add <ACL Name> <Rule number2>

config flexconnect acl rule protocol <ACL name> <Rule number2> 17

config flexconnect acl rule source port range <ACL name> <Rule number2> 67 67 # 67 is DHCP server port number

config flexconnect acl rule action <ACL name> <Rule number2> permit

 

config flexconnect acl rule add <ACL name> <Rule number3>

config flexconnect acl rule protocol <ACL name> <Rule number3> 6

config flexconnect acl rule source port range <ACL name> <Rule number3> 53 53 # Port 53 for DNS

config flexconnect acl rule action <ACL name> <Rule number3> permit

config flexconnect acl rule add <ACL name> <Rule number4>

config flexconnect acl rule protocol <ACL name> <Rule number4> 6

config flexconnect acl rule destination port range <ACL name> <Rule number4> 53 53 #port 53 for DNS

config flexconnect acl rule action <ACL name> <Rule number4> permit

 

config flexconnect acl rule add <ACL name> <Rule number5>

config flexconnect acl rule source address <ACL name> <Rule number5> <IPS IP> <Subnetmask>

config flexconnect acl rule action <ACL name> <Rule number5> permit

 

config flexconnect acl rule add <ACL name> <Rule number6>

config flexconnect acl rule destination address <ACL name> <Rule number6> <IPS IP> <Subnetmask>

config flexconnect acl rule action <ACL name> <Rule number6> permit

Configuring WLAN

  1. Go to WLANs tab and create a new WLAN.
  2. Navigate to General tab and enable Status checkbox.
  3. Go to Security > Layer 2 in WLAN settings. From the Layer 2 Security drop-down list Select ‘None’.
  4. Go to Security > Layer3 in WLANs tab.
    • From the Layer 3 security drop-down list select 'Web Policy'.
    • For Preauthentication ACL, associate the FlexConnectACL that is created earlier.
    • Over-ride Global Config - Select the Enable check box.
    • From the Web auth type drop-down list select External (Re-direct to external server)
    • URL - Enter the IPS (Guest sign-in URL) for redirection URL.

  5. Go to Security > AAA Servers in WLANs tab. Configure RADIUS server for authentication and accounting.
  6. Select the Interim Update check box.
  7. Select Advanced tab and enable Allow AAA Override checkbox.

Using the CLI

Before creating a new WLAN verify the existing WLANs on the WLC using the following command and use an unused index id for the new WLAN

show wlan summary

To create a new WLAN:

config wlan create <WLAN_ID> <Profile name> <SSID>

eg: config wlan create 10 Test Test # Test is the WLAN name and SSID

config wlan interface <WLAN_ID> <interface-name>

eg: config wlan interface 10 management # assigning the WLAN to management port

config wlan security wpa disable <WLAN_ID>

config wlan security web-auth enable <WLAN_ID>

config wlan custom-web global disable <WLAN_ID>

config wlan custom-web ext-webauth-url <ext-webauth-url> <WLAN_ID>

config wlan custom-web webauth-type external <WLAN_ID>

config wlan security web-auth flexacl <WLAN_ID> <ACL_name>

config wlan radius_server auth add <WLAN_ID> <Radius_auth_server_ID>

config wlan radius_server acct add <WLAN_ID> <Radius_acct_server_ID>

config wlan radius_server overwrite-interface enable <WLAN_ID> ( This command is required only if instead of management, some other interface is configured for WLAN.

Please check steps 2 and 5)

config wlan radius_server acct interim-update enable <WLAN_ID>

config wlan radius_server acct interim-update <Interval> <WLAN_ID>

config wlan aaa-override enable <WLAN_ID>

config wlan enable <WLAN_ID>

Configuring AP Group

  1. On the CISCO WLC main screen go to WLANs > Advanced > AP Groups screen and map WLAN Flexl AP (Remote AP mode) group.

Using the CLI

config wlan apgroup interface-mapping add <APgroup Name> <WLAN ID> <interfacename>

Adding ACLs in FlexConnect Group

To add ACLs in FlexConnect Group:

  1. Select Wireless >FlexConnect Groups. Click on the required FlexConnect Group and select ACL Mapping > Policies. Add all the required FlexConnect ACLs to this group. This configuration is required when admin wants to push ACL name using RADIUS return attributes from IPS.

Using the CLI

To see all the flexconnect groups that are configured on the controller enter the following command:

show flexconnect group summary

To add policy ACLs in the flexconnect group use the following command:

config flexconnect group <flex-group> policy acl add <flexconnect_ACL>

Save the config using the following command:

save config