Cisco NAC Guest Server Installation and
Configuration Guide
Release 1.1.0
March 2008
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-15986-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS M ANUAL ARE SUBJECT TO CHA NGE WITHOUT NO TICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSI BILITY FOR THEIR APPLICA TION OF ANY PRODUCT S.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORT H IN THE INFORMATION PACKET T HAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THE SE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAI M ALL WARRANTIE S, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NO NINFRINGEM ENT OR ARISING FROM A COURS E OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING ,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE S.
CCDE, CCVP, Cisco Eos, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Net work are trademar ks; Changing the Way We Work, Live, Play, and
Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the
Cisco
Certified Internetwork Expert logo, Cisco IOS, Cis co Press, Cis co S ystems, Cisco Syste ms Ca pita l, th e Cis co Systems logo, Cisco Unity, Collaboration Without
Limitation, Enter prise /Solv er, EtherC ha nnel , EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort
MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise,
The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx
United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0801 R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unint entional an d coinc idental.
Cisco NAC Guest Server Installation and Configuration Gu ide
Add an LDAP Server4-11
Edit an Existing LDAP Server4-12
Delete an Existing LDAP Server Entry4-14
Configuring RADIUS Authentication4-15
Add a RADIUS Server4-16
Edit an Existing RADIUS Server4-17
Delete an Existing RADIUS Server Entry4-18
Configuring Sponsor Authentication Settings4-18
Changing the Order of Authentication Servers4-18
Sponsor Timeouts4-19
CHAPTER
CHAPTER
iv
5Configuring User Group Permissions5-1
Adding User Groups5-1
Editing User Groups5-4
Deleting User Groups5-6
Specifying the Order of User Groups5-7
Mapping to Active Directory Groups5-8
Mapping to LDAP Groups5-8
Mapping to RADIUS Groups5-10
6Configuring Guest Policies6-1
Setting the Username Policy6-1
Setting the Password Policy6-2
Setting the Guest Details Policy6-3
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Contents
CHAPTER
CHAPTER
CHAPTER
7Integrating with Cisco NAC Appl iance7-1
Adding Clean Access Manager Entries7-1
Editing Clean Access Manager Entries7-3
Deleting Clean Access Manager Entries7-4
Configuring the CAM for Reporting7-4
Adding a RADIUS Accounting Server7-5
Configure the CAM to Format RADIUS Accounting Data7-6
Creating Multiple Accounts from Text Entry15-7
Creating Multiple Accounts from CSV File15-8
Creating Multiple Random Accounts15-8
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Printing/Email/SMS Multiple Accounts15-9
Viewing Multiple Account Groups15-10
Viewing Multiple Account Groups15-10
Finding Multiple Account Groups by username15-11
Finding Multiple Account Groups on the Active Accounts Report.15-11
Editing Guest Accounts15-12
Suspending Guest Accounts15-12
Viewing Active Accounts and Resending Details15-13
Reporting on Guest Users15-13
Contents
APPENDIX
AOpen Source License AcknowledgementsA-1
NoticesA-1
OpenSSL/Open SSL ProjectA-1
License IssuesA-1
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
vii
Contents
viii
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
About This Guide
March 5, 2008, OL-15986-01
This preface includes the following sections:
• Audience
• Purpose
• Document Conventions
• Product Documentation
• Obtaining Documentation and Submitting a Service Request
Audience
This guide is for network adm inistrato rs who are im plement ing Cisco NAC Guest Server to provision
guest access on their networks. Cisco NAC Guest Server works alongside Cisco NAC Appliance, Cisco
Unified Wireless Networks and other Cisco Network Enforcement devices to provide the captive portal
and enforcement point for guest access.
Purpose
The Cisco NAC Guest Server Install ation and Co nfiguration Guid e describes how to install and
configure the Cisco NAC Guest Server appliance. It describes the simple initial installation of the
appliance via CLI and the configuration and administration of the Guest Access Portal through the
web-based interface .
Document Conventions
ItemConvention
Indicates command line output.Screen font
Indicates informat ion you ente r.Boldface screen f ont
Indicates variables for which you supply values. Italic screen font
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
ix
ItemConvention
Indicates web admin conso le modules, me nus, tabs, links an d
submenu link s.
Indicates a menu item to be selected. Administration > User Pages
Product Documentation
Table 1 lists documents are available for Cisco NAC Guest Server on Cisco.com at the following URL:
http://www.cisco.com/en/US/products/ps6128/tsd_products_sup port_se ries_home .html
TipTo access external URLs referenced in this document, right-click the link in Adobe Acrobat and select
“Open in Weblink in Browser.”
Table 1Cisco NAC Appliance Document Set
About This Guide
Boldface font
Document Title Refer to This Document For Information On:
Release Notes for Cisco NAC Guest Server,
Release 1.1.0
Cisco NAC Guest Server Installation and
Configuration Guide (this docu ment )
Cisco NAC Appliance Service Co ntract /
Licensing Support
Cisco NAC Appliance Product LiteratureOnline in ks to Ord er ing Gui de Bu lle tin s, D ata
Cisco NAC Appliance - Clean Access Manager
Installation and C onfiguration G uide
Cisco NAC Appliance - Clean Access Server
Installation and C onfiguration G uide
Cisco Wireless LAN Controller Configuration
Guide, Rel eas e 4.0
Details on the latest Cisco NAC Guest Server
release.
Hardware information, initi al installation, setup and
configuration instructions for Cisco NAC Guest
Server.
Information on serv ice cont r act su ppo rt, lic ensing
support and RMA su ppo rt f or Ci sco NAC
Appliance, Cisco NAC Profiler and Cisco NAC
Guest Server.
Sheets, Q&A and Chalk Talk presentations
Configuration guides for NAC Appliance Manager
and Server
Configuration inform ation for Cisco Wireless LAN
Controllers
Obtaining Documentation and Su bmitting a Service Reque st
For information on obtaining docume ntatio n, submittin g a service request, an d gatherin g additiona l
information, see the monthly What’s
revised Cisco
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
Cisco NAC Guest Server Installation and Configuration Guide
x
technical documentation, at:
New in Cisco Product Documentation, which also lists all new and
OL-15986-01
Introduction
CHA PTER
1
Welcome to Cisco NAC Guest Server
The Cisco NAC Guest Server is a complete provisioning and reporting system that provides temporary
network access for guests, visitor s, contra ctors, consultants or cu stomer s. The Guest Ser ver works
alongside Cisco NAC Appliance or Cisco Wireless LAN Controller which provide the captive portal and
enforcemen t poin t for gue st ac cess.
Cisco NAC Guest Server allows any user with privileges to ea sily cre ate tem porar y g ue st ac c ounts and
sponsor guests. Cisco NAC Guest Server performs full authentication of sponsors, the users who create
guest accounts, and allows spo nsors t o provide a ccou nt d eta ils t o th e gue st by p rint out, em ail o r SMS.
The entire experience , from user accou nt cre ation to gu est netwo rk acces s, is stor ed for au dit and
reporting.
When guest accounts are created, they are eit her pro visioned wit hin the Cisco N AC Appliance Manager
(Clean Access Manager) or stored within the built-in database on the Cisco NAC Guest Server. When
using the Guest Server’s built-in database, external network access devices, such as the Cisco Wireless
LAN Controller, can authenticate users against the Guest Server using the RADIUS (Remote
Authentication Dial In User Service) protocol.
The Cisco NAC Guest Server provisions the guest account for the amount of time specified when the
account is created. Up on e xpiry o f the a ccount , the Gu est Ser ver either deletes the a ccount directly from
the Cisco NAC Appliance Manager or sends a RADIUS message whi ch notifies the network ac cess
device (NAD) of the amount of valid time remaining for the account before the NAD should remove the
user.
Cisco NAC Guest Server provides vital guest network access accounting by consolidating the entire
audit trail from g ue st a ccoun t c re ation t o gue st u s e of t he a cco unt so t hat repor ts can be pe rfo rm ed
through a centra l ma nage ment inter face.
Guest Access Concepts
Cisco NAC Guest Server makes use of a number of terms to explain the co mpone nts ne ed ed to provide
guest access.
Guest User
The Guest User is the person who needs a user account to access the network.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
1-1
Before You Start
Chapter 1 Welcome to Cisco NAC Guest Server
Sponsor
The Sponsor is t he pe rson w ho c reate s th e gue st u ser a cco unt. Th is per son i s of ten an em ploy ee o f the
organization that provides the network ac cess. Sponso rs can be spec ific individuals with cert ain job
roles, or can be any employee who can authenticate against a corporate directory such as Microsoft
Active Directory (AD).
Network Enforcement Devic e
These devices a re th e ne tw o rk i nf ras truc ture co mpo nent s th at p ro v id e t he n etw o r k acc ess. Additionally,
network enforceme nt device are resp onsibl e f or pu shing guest use rs to a ca ptive portal wh er e they c an
enter their guest account details. When a guest enters his or her temporary user name and password, the
network enforcement device checks those credentials against the guest accounts created by the Guest
Server.
Guest Server
This is the Cisco NAC Guest Server , which ties t ogethe r all the piec es of guest a ccess. T he Guest Se rver
links the sponsor creating the guest account, the account details passed to the guest, the guest
authentication against the network enforcement device, and the network enforcement device’s
verification of the guest with the Guest Server. Additionally, the Cisco NAC Guest Server consolidates
accounting informa tion fro m network enfo rcemen t devices to provide a singl e point of gue st access
reporting.
Before You Start
This section describes the fo llowing:
• Package Contents
• Rack Mounting
• Cisco NAC Guest Server Li cens ing
• Upgrading Firmware
• Additional Information
Package Contents
Verify the contents of the packing box (Figure 1-1) to ensure that you have received all items necessary
to install your Cisco NAC Guest Server. Save the packing material in case you need to repack the unit.
If any item is missing or damaged, cont act your Ci sco repre sentative or reseller fo r instructi ons.
1-2
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 1 Welcome to Cisco NAC Guest Server
185434
rd
Rack mounting kit
DB-9 serial null modem cable
Figure 1-1Shipping Box Contents
Before You Start
RJ-45 cable
(straight-through)
Cisco NAC Guest Server
NoteBecause product sof tware is p re load ed on to t he Cisco NAC Guest Server applia nce, the sh ipping
contents do not include a separate software installation CD.
Rack Mounting
The Cisco NAC Guest Server occupie s o ne rac k unit ( 1U ). A rack -mo unti ng kit is inc lude d in t he
shipment. For rack-mounting information and instructions, refer to the 1U Rack Hardware Installation Instructions for HP Products document also included in the shipment .
Cisco NAC Guest Server Licensing
Documentation
Information
Cisco
Cisco NAC
Getting Started
Appliance
Packet
Guide
Important
Information
Safety
AC power co
Yo u need to obta in a nd insta ll a FlexLM p rod uct l icen se f or your Ci sco NAC Guest Server via i ts web
interface for your system to work. See
on how to obtain and install license(s) for your system.
For additional details, refer to Cisco NAC Appliance Service Contract / Licensing Su ppo rt.
Upgrading Firmware
The Cisco NAC Guest Server is based on th e C is co NAC Appliance 331 0 (NAC-3310) hardware
platform. The Cisco NAC Guest Server appliance is subject to any system B IOS/Fir mware upgrad es
required for the server model on whi ch it is based . NAC-3310 is based on the HP ProLiant DL140 G3
and may require per iodi c firm ware upg ra des.
OL-15986-01
NoteFor further details refer to Supported Hardware and System Requirements for Cisco NAC Appliance
(Cisco Clean Acce ss) .
Accessing the Administration Interface, page 3-1 for instructions
Cisco NAC Guest Server Installation and Configuration Guide
1-3
Before You Start
Additional Information
For late-breaking or additional details for this release, refer to the Release Notes for Cisco NAC Guest
Server, Release 1.0.0.
For the latest online updates to this guide, visit
http://www.cisco.com/en/US/products/ps6128/products_installation_and_configuration_guides_list.ht
ml
See Product Documentation for a list of related documentation for Cisco NAC Guest Server.
For details on how to obtain technical support, refer to section Obtaining Documentation and Submitting
a Service Request .
Chapter 1 Welcome to Cisco NAC Guest Server
1-4
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
CHA PTER
Installing Cisco NAC Guest Server
This chapter contains the following sections:
• Connecting the Cisco NAC Guest Server
• Command Line Configuration
• Re-Imaging the Appliance
Connecting the Cisco NAC Guest Server
The Cisco NAC Guest Server is based on th e C is co NAC Appliance 331 0 (NAC-3310) hardware
platform and comes prelo aded wi th a d efaul t system image. When y ou rece i ve the Gue st Serv er , perfor m
the initial configuration described in
CD installation to re-image the appliance, refer to Re-Imaging the Appliance for instructions.
T o perform initial con figuration, you will ne ed to connect to your appliance an d access its command line,
as described be low.
Command Line Co nfigurat ion , p age 2-3. If you need to perfo rm
2
OL-15986-01
Step 1You can access the Cisco NAC Guest Server command line in one of two ways:
a. Connect a monitor and keyboard directly to the machine via the keyboard/video monitor connectors
on the back panel of the machine (
b. Connec t a null modem serial cable fr om a workstation (PC/laptop ) to the serial port on the appl iance.
Open a serial connection on the workstation using terminal emulation software (such as
HyperTerminal or SecureCRT) with settings set to 9600 baud, 8 data bits, no parity, 1 stop bit, no
flow control.
Step 2Connect a stra ight -th rou gh Ca tegory 5 Eth ern et cabl e to the eth0 (NIC 1) 1 0/ 100 /1000 Eth er net p ort o n
the back panel of the appli ance an d to your local ar ea network.
Step 3Connect the AC power cord to t he ba ck pa nel o f the appl ia nce a nd to a g rou nded AC outlet , and power
on the appliance(
Step 4Proceed to the instructions in Command Line Configurat ion, pag e 2-3.
Figure 2-1).
Figure 2-2)(pref er re d m eth od).
Cisco NAC Guest Server Installation and Configuration Guide
2-1
Connecting the Cisco NAC Guest Server
Figure 2-1Cisco NAC Guest Server Front Panel
Chapter 2 Installing Cisco NAC Guest Server
4 6
123
5 7
180955
898
1Hard disk drive (HDD) bay6HDD activity LED indicator (green)
CD-ROM/DVD drive
2
UID (Unit identification) button with LED
indicator (blue)
3
Power button with LED indicator (bicolor:
green/amber)
7
Thumbscrews for the front bezel
8
4System health LED indicator (amber)9Front USB ports
Activity/link status L ED indi ca tors f or NI C 1
(eth0) and NIC2 (eth1) (green)
5
Figure 2-2Cisco NAC Guest Server Rear Panel
231637
54
180957
151312111098
14
1Ventilation holes9UID button with LED indicator (blue)
2Thumbscrew for the top cover10 Rear USB ports (black)
Thumbscrews for the PCI riser board
assembly
3
4NIC 3 (eth2) and NIC 4 (eth3) PCI Express
GbE LAN (RJ-45) ports (Intel)
513 PS/2 keyboard port ( purpl e)
Standard height/full-length PCI E xpress
x16/PCI-X riser board slot cover
6
Power supply ca ble so cket
7
Video port (blue)
11
12 Serial port
PS/2 mouse port (gree n)
14
10/100 Mbps iLO LAN port for IPM I
management (RJ-45)
15
NIC 1 (eth0) and NIC 2 (eth1) integrated GbE
LAN (RJ-45) ports (Broadcom)
8
2-2
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 2 Installing Cisco NAC Guest Server
NoteThe three LAN ports each have their own LED indicators for activity/link status and network speed.
Command Line Configuration
A very minimal amount of command line configuration is needed on the Cisco NAC Guest Server
appliance. This is to perform two tasks.
• Configure IP Address and Default Gateway, page 2-3 so that the appliance can be accessed on the
network
• Change Root Password, page 2-5 on the appliance from the default
Configure IP Address and Default Gateway
Command Line Configuration
To allow the appliance to be accessed on the ne twork you nee d to configure the IP addre ss and defaul t
gateway for the first interface on the appliance (eth0 or NIC1). To configure these details perform the
following steps.
Step 1Using either keyboar d and monit or conn ection t o the appli ance, or seri al consol e conne ction,
authenticate to the command line interface. The user name for the console is root and th e default
password is cisco (
Figure 2-3Authenticate to the Console
Figure 2-3).
OL-15986-01
Step 2To configure the network settings, type the co mm an d syst em-c onfig-network an d pr ess <Enter>. The
Select A Device me nu ap pe ar s (
Figure 2-4).
Cisco NAC Guest Server Installation and Configuration Guide
2-3
Command Line Configuration
Figure 2-4Choose eth0 Interface
Step 3Select the eth0 interface from the list using the up and down arrow keys and press <Enter>.
Chapter 2 Installing Cisco NAC Guest Server
Step 4You can now enter all the correct network settings for the appliance (Figure 2-5).
Figure 2-5Change Network Configuration Details
Enter the following information:
• Static IP—The IP Address that you want to assign to the Cisco NAC Guest Server
• Netmask—The corresponding subnet mask
2-4
• Default gateway IP—The de fault gateway for the network
You can use the Tab key, Arrow keys or <Enter> to move between fields,. When f inished, ta b to the OK
button and press <Enter>.
Step 5Exit the system-config-network by selecting Quit from the network selection screen (Figure 2-6).
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 2 Installing Cisco NAC Guest Server
Figure 2-6Quit the Utility
Step 6At the command line either reboot the appliance by typing reboot and pressing <Enter> or follow the
instructions to
Command Line Configuration
Change Root Password, page 2-5 be fo re e nt eri ng reboot.
Change Root Password
NoteYou should change the ro ot p assword from the default of cisc o, it is advised to use a complex password
for enhanced security.
Step 1From the command line enter the command passwd and press <Enter>.
Step 2Enter the n ew password and pr ess <Ent er>.
Step 3Repeat the password and press <Enter>.
Continue to System Setup, page 3-1 to access and configure the admin console.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
2-5
Re-Imaging the Appliance
Re-Imaging the Appliance
When the Cisco NAC Guest Server is shipped, the system image already preloaded on the unit, so
imaging is unnecessary. If you need to re-image the appliance to factory defaults, you can download the
system image ISO from Cisco Secure Software Downloads on Cisco.Com and burn this ISO file to a
blank CD-ROM.Once you have the system image on a bootable CD, you can perform the following steps
to install the system image onto the appliance. Refer to the
Release 1.1.0 for additional details.
CautionImaging the appliance will delete all data on the appliance, there will be no method of recovery of data
from the Guest Server after imaging has been started. Make sure to backup any data that you need before
starting this process.
Step 1Insert the bootable CD into the CD-ROM drive of the Cisco NAC Guest Server appliance.
Step 2Decide whethe r to perfor m the insta llation usi ng a connect ed keyboard and mon itor or over a serial
console. Connect either a keyboard and monitor to the back of the unit, or attach a null modem cable to
the serial port on the back of the appliance. From the computer the serial cable is attached you will need
to run a terminal emulati on pr ogram with setting s set to 9600 baud , 8 data bi ts, no par ity, 1 stop bit, no
flow control.
Step 3Once you have connected to the appliance and inserted the CD containing the image, power on the
appliance. Switch the applianc e on, or if alre ady starte d switch it off and the n back on agai n.
Chapter 2 Installing Cisco NAC Guest Server
Release Notes for Cisco NAC Guest Server,
Step 4The appl ian ce s hould now bo ot f rom the C D -ROM drive and the in itia l i nsta ll sc re en di sp lays
(
Figure 2-7).
Figure 2-7Initial Install Screen
Step 5At the Initial Install Screen, choose how to run the installation according to how you are connected to
the appliance.
• If directly connecte d using a keyboard an d monitor, type insta ll and press <Enter>.
• If you using a serial connect ion, type serial a t the boot prom pt, then pre ss <Enter>.
2-6
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 2 Installing Cisco NAC Guest Server
NoteIf you press <Enter> by mistake on a serial connection, the imaging process will still run, but
there is no display until the appliance reboots at the end of the process.
Step 6The system image automatically installs on the hard disk (Figure 2-8).
Figure 2-8Transferring Install Image
Re-Imaging the Appli ance
Step 7When the install image is successfully, transferred the system reboots automatically (Figure 2-9).
Figure 2-9Appliance Reboots
Step 8The CD-ROM automatically ejects from the appliance.
NoteRemove the CD and stor e it sa fely so tha t the a pplia nc e do es no t ac cide ntal ly re boot fr om i t a t
a later time.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
2-7
Re-Imaging the Appliance
Step 9The appliance boots and runs the final setu p of the image automatical ly . The imaging process is comple te
when the login screen displays (
Figure 2-10Imaging Complete
Figure 2-10).
Chapter 2 Installing Cisco NAC Guest Server
Step 10Login as user root, and con tinue to th e instru ctions in Command Lin e Configuratio n, page 2-3 to
complete the installation.
2-8
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
CHA PTER
System Setup
The system can be configured through the web interface to provide the networking configuration for the
appliance and other system settings that are important such as time and SSL certificate. The Cisco NAC
Guest Server is administered entirely using a web interface over either HTTP or HTTPS.
This chapter includes the following sections:
• Accessing the Administration Interface
• Configuring Network Settings
• Date and Time Settings
• SSL Certificate
• Configuring Administrator Authentication
Accessing the Administration Interface
3
Upon first accessing the web administration interface of the Cisco NAC Guest Server, you will need to
install a product license. You can obtain a license using the instructions in the PAK shipped with the
appliance or by registering for a evaluation license at
NoteFor additional details on evaluation licenses refer to Cisco N AC Appliance Service Contract / Licensing
Support.
This section describes the fo llowing:
• Obtain and Install Cisco NAC Guest Server License
• Access Cisco NAC Guest Server Administration Interface
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
3-1
Accessing the Admin is tration Interface
Obtain and Install Cisco NAC Guest Server License
Use the following steps to obtain and install your FlexLM product license files for Cisco NAC Guest
Server.
Step 1With FlexLM lic en si ng, y ou will receiv e a Product Author iza tio n Key (PAK) for each Guest Serv e r t ha t
you purchase. The PAK is affixed as a sticky label on the Software License Claim Certificate card that
is included in y our p ac kage .
Chapter 3 System Setup
Warning
Step 2Log in as a registered CCO user and fill out the Customer Registration form found at the PAK Cisco
The PAK is NOT the Cisco NAC Guest Server license. The PAK is used to obtain the Cisco NAC Guest
Server license, as described below.
Technical Support site:
http://www.cisco.com/go/license. During customer registration, sub mit each
PAK you receive and the eth0 MAC address of your Cisco NAC Guest Server.
Warning
The eth0 MAC address entered for the Guest Server must be in UPPER CASE (i.e. hexadecimal letters
must be capitalized). Do not enter colons (“:”) in between characters.
Please follow the instructions on the license web pages carefully to ensure that the correct MAC
addresses are entered.
Step 3For each PAK that you submit, a license file is generated and sent to you via email.
Step 4Save each license file you receive to disk.
Step 5Open a web brows er to th e Ci sco NAC Guest Ser ver admin int er face by ente rin g th e IP address that yo u
configured throug h the co mm and l ine a s the U RL.
• For HTTP access, open http://<guest_server_ip_address>/admin
• For HTTPS access, open https://<guest_server_ip_address>/admin
Step 6In the Guest Server License Form(Figure 3-1), click the Browse button and locate the license file.
3-2
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 3 System Setup
Accessing the Administration Interface
Figure 3-1Guest Server License Form (example)
Step 7Click Submit to install the license.
Access Cisco NAC Guest Server Administration Interface
Step 8The Cis co NAC Guest Ser ver A dm i nis tra tio n in te rfa ce ( Fi gure 3-2) displays. This is the administrator
interface to the appliance.
Step 9Login as the admin user. The default user name/password i s admin/admin.
Figure 3-2Admin Login
OL-15986-01
NoteCisco recommends setting up SSL access and change the default admin user password for security. Refer
to SSL Certificate, page 3-7 and Edit Existing Admin Account, page 3-11 for details.
Cisco NAC Guest Server Installation and Configuration Guide
3-3
Configuring Network Settings
Step 10After the license is installed, the administrator interface is brought up in web browser as follows:
• For HTTP access, open http://<guest_server_ip_address>/admin
• For HTTPS access, open https://<guest_server_ip_address>/admin
NoteEntering the Guest Server IP address without the” /admin” as the URL brings up the sponsor interface.
See Chapter 4, “Configuring Sponsor A uthenti cation” for details.
Configuring Network Settings
Configure remaining network settings before performing any other operation. This minimizes the need
to restart the appliance later on.
Step 1From the admi nist rati on home pa ge se le ct Server > Network Settings from the left hand menu
(
Figure 3-3).
Chapter 3 System Setup
Figure 3-3Administr ation Home Page
3-4
Step 2The Network Sett ings page provide s all the ne twork setting s that ca n be change d on the appli ance
(
Figure 3-4).
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 3 System Setup
Date and Time Settings
Figure 3-4Networ k Settings
Yo u can chan ge the fol lowing Network Settin gs:
• Domain Name—Ente r the domai n name for your organizati on (e.g. ci sco.co m)
• Hostname—Enter the name of the appliance as defined in DNS (without DNS suffix)
• IP Address—Enter the IP address of the eth0 interface on the appliance
• Subnet Mask—Enter the c orresp onding subn et mask
• Default Gateway—The default gateway for the network to which the appliance is connected
• Nameserver 1—IP addr e ss of t he pri mar y D NS ser ver
• Nameserver 2—IP address of the secondary DNS server
Step 3Click the Save S e t t i n g s button to save the changes that you made.
Step 4Once ch an ge s a re s aved, y ou ne ed t o res tar t t he G ues t S er ver t o en sure all p roc es ses us e th e co rr ect I P
address. Click th e Restart button, and the rest art proc ess will begin on th e Gues t Server within 60
seconds.
Date and Time Settings
Correct date and time are critical to the Cisco NAC Guest Server. The Guest Server authenticates guest
users based upon t he t ime th eir a ccou nts are valid. I t i s im por tant for the tim e t o be c orrec t so gu est
accounts are created and removed at the correct time. If possible, Cisco recommends using a Network
Time Protocol (NTP) server to synchronize the time and date.
OL-15986-01
Step 1From the administration interface select Server > Date/Time Settings from the left hand menu
(
Figure 3-5).
Cisco NAC Guest Server Installation and Configuration Guide
3-5
Date and Time Settings
Step 2Select the correct Date and Time for the location of the Guest Server.
Chapter 3 System Setup
Figure 3-5Date/Time Settings
Step 3Click the Set System Date and Time button to apply the time and date.
Step 4Select the correct Timezone for the location of the Guest Server.
Step 5Apply the settings by clicking the Set System Timezone button.
NoteIf you change the time zone, this action automatically adjusts the date and time on the server.
Step 6If you have an NTP se rver available on the net work, ente r the a ddr ess of t he NT P server.
Step 7Click the Set NTP Server button. This sa ves the settings and restarts the NTP proces s so the new settings
take effect.
NoteWhen setting the NTP server it may take some time for synchronization to occur . Synchroniza tion occurs
much faster if the time is set to be close to the NTP serve r (and saved with the Set button) before clicking
the Set NTP Server button.
3-6
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 3 System Setup
SSL Certificate
Both sponsors and administrators can access the Cisco NAC Guest Server using either HTTP or HTTPS.
For more secure access Cisco recommends using HTTPS access.
Accessing the Guest Se rver us ing HTT P or HT TPS
Yo u can co nfigure wheth er sponsors and admin istrators ac cess the portal using HTTP, both HTTP and
HTTPS, or HTTPS only.
SSL Certificate
Step 1From the administration interface, select Server > SSL Settings from the left hand m enu ( Figure 3-6).
Figure 3-6SSL Settings Main Page
Step 2The Main SSL Settings page provides t he following options:
• Redirect http to https—W hen enable d, any sponsor or adm inistrat or acce ssing the Gu est Server
using HTTP is automatically redirected to the HTTPS interface. If this setting is not enabled, then
no redirection occurs .
OL-15986-01
• Allow http access—When enabled, allows sponsors and administrators to access the portal with
standard HTTP. If this is not enabled, sponso rs and admi nistrato rs are redi rected if the first option
is set, or if not set, are shown a web page explaining that HTTP ac cess is not available.
Step 3When you h ave made your cha nge s, c lick the Save Settings button.
Cisco NAC Guest Server Installation and Configuration Guide
3-7
SSL Certificate
NoteThe Main SSL Settings page also provides the Restart Web Server button. You need to restart the Web
Server component of the appliance when new certificates are generated or uploaded to the appliance.
Clicking the Restart button makes the Guest Server use the new certificates.
Cisco NAC Guest Server ships with a default certificate installed. If you are planning on using HTTPS,
Cisco highly recommends generating a new temporary certificate/private key. When doing this, a
certificate signing request (CSR) is also generated that can be used to obtain a CA signed certificate.
The whole process of generating a temporary certificate, CSR and private key is performed on the Create
page. Entering the correct details on the Create page automatically generates the required files.
Step 1From the administration interface, select Server > SSL Settings from the left hand menu, then select
Create from the menu at the top of the p age (
Figure 3-7Create SSL Page
Figure 3-7).
Chapter 3 System Setup
3-8
Step 2Enter the details on the screen to provide the details for the temporary certificate and CSR.
• Common Name—This is either the IP address of the Cisco NAC Guest Ser v er, or the fully qualif ied
domain name (FQDN) for the Guest Server. The FQDN must resolve correctly in DNS.
• Organization—The na me o f your o rganizati on o r com pa ny.
• Organizational Unit—The nam e of the depar tment or business un it that owns the device.
• City—The city where the server is located.
• State—The state where the server is located.
• 2 Letter Country Code—The 2 letter ISO abbreviation for the country where the Guest Server is
located, such as US for United States, GB for Great Britai n or United Ki ngdom.
Step 3Click Cr eate Cert if icate. This creates a temporary self-signed certificate, a new private key and also the
corresponding C SR w hic h can be u sed fo r obt a ining a cer tificat e f rom a C er tificate A utho rit y ( CA).
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 3 System Setup
Step 4To use the new temporary certificate you must restart the web server process. Click the Main tab from
the top of the screen, then click the Restart Web Server button (
NoteIf you want the CSR, you ca n download it f rom the download pa ge as d escr ib ed i n Downloading
Certificate Files, page 3-9.
Downloading Certificate Files
Downloading the CSR and Certificate
You will need to download the CSR from the appliance so that it can be sent to a Certificate Authority
to obtain a certificate. Cisco strongly recommends backing up the certificate and private key.
Step 1From the administration interface select Server > SSL Settings from the left hand me nu.
Step 2Select Download from the menu at the top of the page (Figure 3-8).
SSL Certificate
Figure 3-6).
Figure 3-8Download Certificate Files
Step 3Click the relevant link to download the CSR or SSL Certificate.
Step 4Save the SSL Certificate to a secure backup location .
Downloading the Private Key
The private key can only be obtained through an SFTP connection to the Guest Ser ver. For windows
platforms, you can get a fr ee SFTP cli ent from
Step 1Open an SFTP connection to the Cisco NAC Guest Server, the authentication credentials are the same
as for the command line . This is t he usernam e of root and the pass word you have assigned for this
account. The default password is cisco, Cisco recommends you change this as detailed in
Configuration, page 2-3.
Step 2Download the /etc/pki/tls/private/localhost.key file and store it in a secure backup locati on.
http://winscp.net.
Command Line
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
3-9
Configuring Administrator Authentication
Upload Certificate Files
The Cisco NA C Guest Server prov ides a method of importing/uploading certif icate files to the appliance.
The Upload SSL Certifi cate p ages i s used to in stal l a CA-signed certificate o r t o re store files previously
backed up.
NoteThe certificate files are n ot bac ked up as part of a ny backup pr oc ess. You must manually back them up
as described in Downloading Certificate Files, page 3-9.
Step 1From the administration interface select Server > SSL Settings from the left hand me nu.
Step 2Select Upload from the menu at the top of the page (Figure 3-9).
Figure 3-9Upload Certificate Files
Chapter 3 System Setup
Step 3In the Upload SSL Certificate page, click th e Browse button to locate the SSL Certificate file, Root CA
Certificate or Private Key file you want to upload and click the Upload button.
Configuring Administrator Authenticati on
Cisco NAC Guest Server has a single d efaul t admi nist rator a ccou nt, cal led “ a dmin.” The Admin
Accounts pages under the Authentication menu allow you to create, edit and delete additional
administrator accounts.
This section describes the fo llowing
• Add New Admin Account
• Edit Existi ng Admi n Acc oun t
• Delete Existing Admin Account
Add New Admin Account
Step 1From the administration interface select Authentication > Admin istrat ors from the l eft hand menu.
3-10
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 3 System Setup
Step 2In the Adm in Ac c ounts page ( Figure 3-10), click the Add User button.
Configuring Administrator Authentication
Figure 3-10Admin Accounts
Figure 3-11Add Admin User
Step 3In the Add Adm i nistra tor pa ge ( Fig ure 3-11), enter all the admin user credentials.
• First Name—Type the first name of the admin user
• Surname—Type the last name of the admin user.
• Email Address—Type the email address of the admin user
• Username—Type the user name for the admin account.
• Password—Type the password for the admin accoun t.
• Repeat Password—Retype th e password f or the adm in a ccou nt
Step 4Click the Add Administrator button.
• If there are any err ors, th e a ccou nt is not ad ded and a n er ror messa ge d isplay s at th e to p of th e p age.
• If successfully added, a success message displays at the top of the page and you can add additional
admin accounts.
Edit Existing Admin Account
Yo u can mod ify the settin gs of admi n account s that are already cre ated .
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
3-11
Configuring Administrator Authentication
Step 1From the administration interface select Authentication > Administrators from the le ft hand me nu.
Figure 3-12Admin Users to Edit
Step 2In the Adm in Ac count s page (Figure 3-12), select the user from the list and click the Edit User button.
Step 3In the Edit Administrator page (Figure 3-13), edit the user credentials.
Chapter 3 System Setup
Figure 3-13Edit Admin Account
• First Name—Edit the first name of the admin user
• Surname—Edit the las t name of the admi n user.
• Email Address—Edit the email address of the admin user
• Username—Edit the user name for the admin account.
NoteLeaving the Password and Repea t Password fields e mpty keeps the existing p assword.
3-12
• Password—Edit the password for the admin account.
• Repeat Password—Edit the password for th e admin ac count.
Step 4Click the Save S ettin g s button.
• If there are any errors, the acc ount is not cha nged an d an error me ssage displa ys at the top of the
page.
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 3 System Setup
• If successfully ch an ged, a succ ess me ssage d ispl ays a t t he t op of t he pa ge a nd yo u ca n ma ke
additional change s to the sa me ad min acc oun t.
Delete Existing Admin Account
Yo u can re move existing ad mi n ac c ount s fr om the a dmi nist rat ion i n terfa ce.
Step 1From the administration interface select Authentication > Admin istrat ors f rom t he l eft hand menu.
Figure 3-14Select Admin Account to Delete
Configuring Administrator Authentication
Step 2In the Admin Accou nts pa ge(Figure 3-14), select the user from the list and click the Delete User button.
Step 3At the prompt “ Are you sure you want to delete the user”, click OK to delete the user or Cancel to cancel
the deletion.
If successfully deleted, a success message displays at the top of the page and you can perform additional
admin account oper ation s.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
3-13
Configuring Administrator Authentication
Chapter 3 System Setup
3-14
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
CHA PTER
4
Configuring Sponsor Authentication
Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor
authentication is the method used to authenticate sponsor users on the Guest Server. There are four
options available:
• Local User Authentication—Create sponsor accounts directly on the Cisco NAC Guest Server.
See Configuring Local Sponsor Authen ticatio n
• Active Di rectory Authe nticatio n—Authentic ate spo nsors a gainst an e x isting Ac ti v e Di rectory (AD)
implementation. See
• LDAP Authentication—Authen ticate spon sors against a Lightwe ight Dir ectory Acce ss Protoco l
(LDAP) server. See
• RADIUS Authentication—Authenticate sponsors against a RADIUS server. See Configuring
RADIUS Authentication.
You may s pecify multiple authentication services for authenticating sponsors to the Cisco NAC Guest
Server and then specify the order in which you want to authenticate sponsors. For details see
Sponsor Authentication Settings.
Configuring Active Directory (AD) Authentication.
Configuring LDAP Authentication.
Configuring
Configuring Local Sponsor Authentication
Local authentication allow s you to set up sponsor user accounts directly on the Cisco N A C Guest Server.
Local authentication allows you to do the following:
• Add New Local User Account
• Edit Existi ng User A cco unt
• Delete Existing User Account
Add New Local User Account
Step 1From the administration interface select Authentication > Sponsors > Local User Database from the
menu (
Figure 4-1).
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
4-1
Configuring Local Sponsor Authentication
Figure 4-1Local Us ers
Step 2Click the Add User button to bring up the local sponsor co nfiguration page (Figure 4-2).
Figure 4-2Add Local Us er
Chapter 4 Configuring Sponsor Authentication
4-2
Step 3In the Add a Local User Account page, enter all the sponsor user credentials:
• First Name—Type the first name of the sponsor.
• Last Name—Type the last name of the sponsor.
• Username—Type the user name for the spo nsor a c count .
• Password—Type the password for the sponsor account.
• Repeat Password—Retype th e pa ssword f or the sponso r ac count
• Groups—Select the grou p f or the sponso r ac count from the dr opd own. Chapter 5, “Configuring
User Group Permissi ons” pr ovides further deta ils on groups.
• Email Address—Type email address of the sponsor.
Step 4Click the Add User button.
• If there are any errors, th e account is not ad de d and an error mes sage displays at th e top of the page.
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
• If successfully added, a success message displays at the top of the page and you can add additional
user accounts.
Edit Existing User Account
Yo u can mod ify the settin gs of lo cal us er accou nts th at are al ready creat ed.
Step 1From the administration interface select Authentication > Sponsors > Local User Database from the
menu (
Figure 4-3).
Figure 4-3Local Us ers to Edit
Configuring Local Sponsor Authentication
Step 2Select the user from the list and click the Edit User butto n .
Step 3In the Edit a Lo cal U ser Acco unt pa ge, edit the use r cred ent ials (Fi gure 4-4).
Figure 4-4Edit Local Sponsor Account
• First Name—Edit the first n ame fo r th e sponsor a ccou nt.
• Last Name—Edit t he l ast name for t he s pons or ac coun t.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
4-3
Configuring Local Sponsor Authentication
NoteLeaving the Password and Repea t Password fields e mpty keeps the existing p assword.
• Password—Change the password for the sponsor accou nt.
• Repeat Password—Retype the ch anged pass word for the spo nsor accou nt.
• Groups—Select the grou p f or the sponso r ac count from the dr opd own. Chapter 5, “Configuring
User Group Permissi ons” pr ovides further deta ils on groups.
• Email Address—Edit the email address of the sponsor.
Step 4Click the Save S ettin g s button.
• If there are any errors, the acc ount is not cha nged an d an error me ssage displa ys at the top of the
page.
• If successfully ch an ged, a succ ess me ssage d ispl ays a t t he t op of t he pa ge a nd yo u ca n ma ke
additional changes to the sa m e use r ac c ount.
Chapter 4 Configuring Sponsor Authentication
Delete Existing User Account
Yo u can delet e existing sponso r user acco unts from t he admini stration interface .
Step 1From the administration interface select Authentication > Sponsors > Local User Database from the
menu(
Figure 4-5).
Figure 4-5Select User to Delete
Step 2Select the user from the list and click the Delete User button.
Step 3Confirm deletion of th e u ser a t the p rom pt.
4-4
• If successfully de lete d, a succ ess me ssa ge d ispl ays a t t he top o f th e page and yo u c an p erfo rm
additional local user ac coun t operat ions .
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
Configuring Active Directory (AD) Authentication
Configuring Active Directory (AD) Authentication
Active Directory Authentication authenticates sponsor users to the Guest Server using their existing AD
user accounts. This keep s sp onsors fro m having to reme m ber a no ther se t o f user n ame s and pa sswords
just to authenticate to the Guest Serve r . It also enable s the administr ator to quickl y roll out Guest Access
because there is n o n ee d to c rea te an d m a nage a dditi onal sp onso r ac co unts. A ct ive Directory
authentication allows you to do the following:
• Add Active Directory Domain Contro ller
• Edit Exis ti n g D o m ain Contro ll e r
• Delete Existing Domain Controller Entry
AD authentication supports authentication against multiple domain controllers. The domain controllers
can be part of the s ame A ctive Director y to p rovide resi lienc e, o r they c an be in different Ac tive
Directories so that the Guest Server can authenticate sponsor users from separate domains, even where
no trust relationship is configured .
All Activ e Directory Authentication is per formed against indi vidual domain cont roller entries. A domain
controller entry consists of 6 items:
• Server Name—A text description to identify the domain controller. As a best practice, Cisco
recommends identi fying the domai n control ler an d the account suffix in this field (although it ca n
be set to anything tha t yo u cho ose .)
• User Account Suffix—Every user in Act ive Directory has a f ull user lo gon na m e whic h appe a rs as
“username@domain.” Typing the @domain suffix (including the @ symbol) in this field allows
sponsor users not t o have to en ter t hei r full u ser l og on na me.
• Domain Controller IP Addre ss—The IP add ress of the do main con troller tha t the sponsor use r
authenticates against.
• Base DN—The root of t he A c tive Directory. This allows an LDAP search to be p erfor me d t o find
the user group of t he spon sor.
• AD Username— The u ser a cco unt t h at has pe rm issions t o sea rc h the AD . T his al lows an L DAP
search for the user group of the sponsor.
• AD Password—The password for the user account that has permissions to search the AD.
T o allow you to authenticate different user account suffixes against the same domain controller, you can
create multiple domain controller entries with the same IP address and different user Account suffixes.
All that needs to be different in each entry is the Server Name, User Account Suffix and Base DN.
To provide resilience in the event of a domain controller failure, you can enter multiple entries for the
same User Account Suffix with d ifferent Domain Contr oll er I P A ddr esses. Al l that needs to be different
in each entry is the Server Name.
The Guest Server attempts to authenticate sponsors against each Domain Controller entry according to
the Authentication Order specified in
Configuring Sponsor Authentication Setti ngs, page 4-18.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
4-5
Configuring Active Di rectory (AD) Authenticat ion
Add Active Directory Domain Controller
Step 1From the administration interface select Authentication > Sponsors > Active Directory Servers from
the menu. (
Figure 4-6Active Directory Authenticatio n
Figure 4-6).
Chapter 4 Configuring Sponsor Authentication
Step 2Click the Add DC butt on.
Step 3In the Add Active Directory Domain Controller page, enter all the details for authenticating against a
specific AD Domain Controller (
Figure 4-7Add Active Directory Domain Controller
• Server Name—Type a text description of the AD Server Name and account suffix for the domain
Figure 4-7).
controller, for example: CCA.CI SCO.C OM.
4-6
• User Account Suffix—Type the User Account Suffix and incl ude the l eadin g @, for exampl e:
@cca.cisco.com. Every AD user has a full user logon name that appears as “username@domain.”
To allow sponsors not to have to type their full user logon name, type the @domain part (including
the @ symbol) in this field.
• Domain Controller —Type the IP address or DNS name for the dom ain contro ller. This is the IP
address of the DC against which the sponsor authenticates.
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
• Base DN—Type the Base Distinguished Name (DN) of the domain controller. This is the name of
the root of the di rect ory tree. It is used so that w hen gr oup search es a re perf orm ed, t he Gues t Serv er
knows from where to start. An example of the base DN for the domain cca. cisco.com is
DC=cca,DC=cisc o,DC =com .
• AD Username—Type a username that has permissions to searc h the Active Directory using LDAP.
This allows the Guest Server find out details about users such as the list of groups to which they
belong.
• AD Password—In addition to the AD Username, type the password for that account.
• Confirm AD Password— Retype the password to make sure it is correct.
• Status—Select the status of the Domain Controller. If it is set to Active, the Guest Server will use
it for authenticating sponsors. If it is set to Disabled, it will not be used.
Step 4Optionally click the Test Connection button to verify the settings are correct for the domai n controller.
The Test Connection will authenticate with the specified AD Username and Password to verify the
settings.
Step 5Click the Add Domain Controller butto n .
Configuring Active Directory (AD) Authentication
Edit Existing Domain Controller
Step 1From the administration interface select Authentication > Sponsor > A ctive Director y Servers from
the menu.
Step 2Select the Active Directory Domain Controller from the list and click the Edit DC button (Figure 4-8).
Figure 4-8Select Domain Controller to Edit
Step 3In the Active Directory Domain Controller page (Figure 4-9), edit the details for authenticating against
this AD domain controller.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
4-7
Configuring Active Di rectory (AD) Authenticat ion
Figure 4-9Edit DC Settings
Chapter 4 Configuring Sponsor Authentication
Step 4Modify set tings as need ed:
• User Account Suffix—Edit the User Ac count Suffix and includ e the lead ing @, for examp le:
@cca.cisco.com. Every AD user has a full user logon name that appears as “username@domain.”
To allow sponsors not to have to type their full user logon name, type the @domain part (including
the @ symbol) in this field.
• Domain Controller IP Address—Edit the IP ad dress for the domain controller. This is the IP address
of the DC against which the sponsor authenticates.
• Base DN—Edit the Base Distinguished Name (DN) of the domain controller. This is the name of
the root of the di rect ory tree. It is used so that w hen gr oup sea rches a re perf orm ed, t he Gues t Serv er
knows from where to start. An example of the base DN for the domain cca. cisco.com is
DC=cca,DC=cisc o,DC =com .
• AD Username—Edit the username that has permissions to search the Active Directory using LDAP .
This allows the Guest Server find out details about users such as the list of groups to which they
belong.
NoteIf you do not want to change the password, leaving both passwor d entries em pty preserves the
existing password.
• AD Password—Edit the password for that AD user account that has search permissions.
• Confirm AD Password—Retype the password to make sure it is correct.
• Status—Select the status of the Domain Controller. If it is set to Active, the Guest Server will use
it for authenticating sponsors. If it is set to Disabled, it will not be used .
4-8
Step 5Optionally click the Test Connection button to verify the settings are correct for the domai n controller.
The Test Connection will authenticate with the specified AD Username and Password to verify the
settings.
Step 6Click the Save S ettin g s button.
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
Delete Existing Domain Controller Entry
Step 1From the administration interface, select Authentication > Sponsor > Active Directory Servers from
the menu.
Step 2Select the domain controller from the list (Figure 4-10).
Figure 4-10Delete Domain Controller entries
Configuring LDAP Authentication
Step 3Click the Delete DC button.
Step 4Confirm deletion of the Domain Cont roller at the promp t.
If there are any errors, the DC is not changed and an error message displays at the top of the page. If
successfully deleted, a succe ss me ssage disp lays at t he top of the p age and you can per for m ad ditio na l
Domain Controller operations.
Configuring LDAP Authentication
LDAP Authentication authenticates sponsor users to the Guest Server using their existing LDAP user
accounts. This keeps sponsors from having to reme mber ano ther set of user nam es and passwords just
to authenticate to the Guest Server. It also enables the administrator to quickly roll out Guest Access
because there is no need to create and manage additional sponsor accounts. LDAP authentication allows
you to do the following:
• Add an LDAP Server
• Edit an Existing LDAP Server
• Delete an Existing LDAP Server Entry
LDAP authentication supports authentication against multiple LDAP Servers.
An LDAP server entry consists of multiple items:
OL-15986-01
• LDAP Server Name—A text description to identify the LDAP Server.
• LDAP Server URL—This is the URL to access the LDAP server such as ldap://ldap.cisco.com.
• Port—The TCP port used to contact the LDAP server, such as port 389.
• Ve rsio n—Th e LDAP version to use (versi on 1, 2 or 3).
Cisco NAC Guest Server Installation and Configuration Guide
4-9
Configuring LDAP Authentication
• Base DN—This is the Distinguished Name of the container object where an LDAP search to find
the user begins, such as O U=E ng ineeri ng,O =Ci sco.
• User Search Filter—The User Search Filter de f ines how user entries are n amed in th e LDAP server.
For example, you can define them as uid (uid=%US ERNAME%) or cn (cn=%USE RNAME%).
• Group Mapping—There are two main methods that LDAP servers use for assigning users to groups:
1. Storing the group membership in an attri bute of the user objec t. W ith this meth od the user ob ject
2. Storing the user membership in an attribute of the group object. With this method there is a
T o determine which method to use, Cisco recommends checking the LDAP documentation for your
server or using an L DAP browser like t he one available at
the attributes of the server.
• Username—The us er accoun t that has perm issions to searc h the L D AP ser ver. This is needed so that
the Cisco NAC Guest Server can search for the user account and gro up mapping informatio n.
• Password—The password for the user account t hat has permissi ons to search the LDAP server.
Chapter 4 Configuring Sponsor Authentication
has one or more attributes that list the grou ps that the user is a member of. If you r LDAP server
uses this method of storing group membership, you need to enter the name of the attribute which
holds the groups the use r is a mem be r of.
group object that contains a list of the users who are members of the group. If your LDAP server
uses this method, you need to specify the group to check under the LDAP mapping section of a
User Group you want t o m atch t h e user to.
http://www.ldapbrowser.com/ to check
To provide resilience in the event of an LDAP server failure, you can enter multiple entries for high
availability LDAP servers pointing to the same database. All that needs to be different in each entry is
the Server name and URL.
The Guest Server attempts to authenticate sponsors against each LDAP server entry in the order specified
by Authentication Order detailed in the
Configuring Sponsor Authen ticatio n Se ttings sec tion.
To verify that you have the corr ec t L DAP cred en tial s fo r co nne cti ng t o yo ur LDAP server, Cisco
recommends testing an LDAP browser like the one available at
http://www.ldapbrowser.com/.
4-10
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
Add an LDAP Server
Step 1From the administration interface select Authentication > Sponsor s > LDAP Servers from the menu
(
Figure 4-11).
Figure 4-11LDAP Authentication
Step 2Click the Add LDAP butto n .
Step 3In the Add LDAP Server page, enter all the details for authenticating against a specific LDAP server
(
Figure 4-12).
Configuring LDAP Authentication
Figure 4-12Add LDAP Server
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
4-11
Configuring LDAP Authentication
• LDAP Server Name—Type a text description of the LDAP Server Name. For example:
Cisco LDAP - ldap.cisco.c om.
• LDAP Server URL—Enter the URL for accessing the LDAP server, such as ldap://ldap.cisco.com
or ldaps://ldap.cisco.com.
• Port—Enter the TCP port used to connect to the LDAP server. The common port for LDAP is 389.
• Ve rsion— The version of LDAP that the server supports (version 1, 2 or 3).
• Base DN—This is the Distinguished Name of the container object where an LDAP search to find
the user will be started from, such as OU=U sers,O=Ci sco.co m or OU=Engi neering, O=Cisco.
• User Search Filter—The User Search Filter de f ines how user entries are n amed in th e LDAP server.
For example you can d efine them t o be uid (u id= %USE RNAME%) or cn (cn= %U SERNAME%).
The %USERNAME% should be placed where the username will be inserted in a search.
• Group Mapping—There are two main methods that LDAP servers use for assigning users to groups:
1. Storing the group membership in an attri bute of the user objec t. W ith this meth od the user ob ject
Chapter 4 Configuring Sponsor Authentication
has one or more attributes that list the grou ps that the user is a member of. If you r LDAP server
uses this method of storing group membership, you need to enter the name of the attribute which
holds the groups the use r i s a m em ber of. Thi s att ribute m ay be ca lle d som ethi n g like
groupMembership, m em berO f, o r g roup.
2. Storing the user membership in an attribute of the group object. With this method there is a
group object that contains a list of the users who are members of the group. If your LDAP server
uses this method, you need to specify the group to check under the LDAP mapping section of a
User Group you want t o m atch t h e user to.
T o determine which method to use, Cisco recommends checking the LDAP documentation for your
server or using an L DAP browser like t he one available at
the attributes of the server.
• Username—The us er accoun t that has perm issions to searc h the L D AP ser ver. This is needed so that
the Cisco NAC Guest Server can search for the user account and gro up mapping informatio n.
• Password—The password for the user account t hat has permissi ons to search the LDAP server.
• Confirm Password—Repeat the password to make sure it matches.
• Status—Select the status of the LDAP server. If it is set to Active the Guest Server will use it for
authenticating sponsors. If it is set to Disabled it will not be used.
Step 4Optionally click the Test Connection button to verify the settings are correct for the LDAP server. The
Test Connection will bind with the username and password specified to the LDAP server to verify that
it can bind successfully.
Step 5Click the Add LDAP Server button.
Edit an Existing LDAP Server
http://www.ldapbrowser.com/ to check
4-12
Step 1From the administration interface select Authentication > Spons or > LDAP Servers from the menu.
Step 2Select the Active Dir ect ory Do main Cont roll er fro m t he list an d clic k t he Edit DC button (Figure 4- 13).
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
Figure 4-13Select LDAP Server to Edit
Step 3In the LDAP Server pa ge ( Figure 4- 14), edit the details for authenticating against this LDAP server.
Figure 4-14Edit LDAP Server Settings
Configuring LDAP Authentication
OL-15986-01
Step 4Modify set tings as need ed:
• LDAP Server URL—Enter the URL for accessing the LDAP server, such as ldap://ldap.cisco.com
or ldaps://ldap.cisco.com.
• Port—Enter the TCP port used to connect to the LDAP server. The common port for LDAP is 389.
• Ve rsion— The version of LDAP that the server supports (version 1, 2 or 3).
• Base DN—This is the Distinguished Name of the container object where an LDAP search to find
the user will be started from, such as OU=U sers,O=Ci sco.co m or OU=Engi neering, O=Cisco.
Cisco NAC Guest Server Installation and Configuration Guide
4-13
Configuring LDAP Authentication
• User Search Filter—The User Search Filter de f ines how user entries are n amed in th e LDAP server.
For example you can d efine them t o be uid (u id= %USE RNAME%) or cn (cn= %U SERNAME%).
The %USERNAME% should be placed where the username will be inserted in a search.
• Group Mapping—There are two main methods that LDAP servers use for assigning users to groups:
1. Storing the group membership in an attri bute of the user objec t. W ith this meth od the user ob ject
2. Storing the user membership in an attribute of the group object. With this method there is a
T o determine which method to use, Cisco recommends checking the LDAP documentation for your
server or using an L DAP browser like t he one available at
the attributes of the server.
• Username—The us er accoun t that has perm issions to searc h the L D AP ser ver. This is needed so that
the Cisco NAC Guest Server can search for the user account and gro up mapping informatio n.
Chapter 4 Configuring Sponsor Authentication
has one or more attributes that list the grou ps that the user is a member of. If you r LDAP server
uses this method of storing group membership, you need to enter the name of the attribute which
holds the groups the use r i s a m em ber of. Thi s att ribute m ay be ca lle d som ethi n g like
groupMembership, m em berO f, o r g roup.
group object that contains a list of the users who are members of the group. If your LDAP server
uses this method, you need to specify the group to check under the LDAP mapping section of a
User Group you want t o m atch t h e user to.
http://www.ldapbrowser.com/ to check
• Password—The password for the user account t hat has permissi ons to search the LDAP server.
• Confirm Password—Repeat the password to make sure it matches.
NoteIf you do not want to change the password, leaving both passwor d entries em pty preserves the
existing password.
• Status—Select the status of the LDAP Server. If it is set to Active the Guest Server will use it for
authenticating sponsors. If it is set to Disabled it will not be used.
Step 5Optionally click the Test Connection button to verify the settings are correct for the LDAP server. The
Test Connection will bind with the username and password specified to the LDAP server to verify that
it can bind successfully.
Step 6Click the Save S ettin g s button.
Delete an Existing LDAP Server Entry
Step 1From the administration interface select Authentication > Spons or > LDAP Servers from the menu.
Step 2Select the LDAP Server from the list (Figure 4-15).
4-14
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
Figure 4-15Delete LDAP Server entries
Step 3Click the Delete LDAP button .
Step 4Confirm deletion of the L DAP Server at the p rompt .
If there are any errors, the LDAP Server is not changed and an error message displays at the top of the
page. If successfully deleted , a success messa ge displays at the top of the pa ge and you can per form
additional LDAP Server operations.
Configuring RADIUS Authentication
Configuring RADIUS Authentication
RADIUS Authentication authenticates sponsor users to the Guest Server using their existing RADIUS
user accounts. This keep s sp onsors fro m having to reme m ber a no ther se t o f user n ame s and pa sswords
just to authenticate to the Guest Serve r . It also enable s the administr ator to quickl y roll out Guest Access
because there is no nee d to crea te and ma nage addi tional sponsor ac counts. RADIUS au the nticat ion
allows you to do the following:
• Add a RADIUS Server
• Edit an Existing RADIUS Server
• Delete an Existing RADIUS Server Entry
RADIUS authentication supports authentication against multiple RADIUS servers, you can
A RADIUS server entry consists of multiple items:
• RADIUS Server Name—A text description to identify the LDAP Server.
• Server IP Address—This is the IP Address of the RADIUS Server.
• Port—The UDP port to conta ct the ldap se rver, commonly either 16 45 or 1812.
• Secret—The shared secret used to secure communications between the RADIUS server and the
Cisco NAC Guest Server.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
4-15
Configuring RADIUS Authentication
Add a RADIUS Server
Step 1From the administration i nterface select A uthenticati on > Sponsors > RADIUS Servers from the menu
(
Figure 4-16).
Figure 4-16RADIUS Authentication
Step 2Click the Add Radius button.
Step 3In the Add RADIUS Server page, enter all the details for authenticating against a specific RADIUS
server (
Figure 4-17).
Chapter 4 Configuring Sponsor Authentication
Figure 4-17Add RADIUS Server
• Server Name—Type a text description of the RADIUS Server Name, for exampl e:
Cisco RADIUS - radius.cisco.com.
• Server IP Address—Enter the IP address or domain name of the RADIUS server.
• Port—Enter the UDP port used to connect to the RADIUS server. The common ports for RADIUS
authentication ar e port s 1645 or 1812.
• Radius Secret—The sh ared secre t used to secu re the communi cations betw een the Cisco NA C Guest
Server and the RADIUS server.
• Status—Select the status of the RADIUS Server. If it is set to Active, the Guest Server will use it
for authenticating sponsors. If it is set to Disabled, it will not be used.
Step 4Click the Add Radius Server butto n .
4-16
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
Edit an Existing RADIUS Server
Step 1From the administration interface select Authentication > Sponsor > Radius Servers from the menu.
Step 2Select the RADIUS server from the list and click the Edit Radius butto n ( Figure 4-18).
Figure 4-18Select RADIUS Server to Edit
Step 3In the RADIUS Server Details page (Figure 4-19), edit the details for authenticating against this
RADIUS server.
Configuring RADIUS Authentication
Figure 4-19Edit RADIUS Server Settings
Step 4Modify set tings as need ed:
• Server IP Address—Enter the IP address or domain name of the RADIUS server.
• Port—Enter the UDP port used to connect to the RADIUS server. The common ports for RADIUS
authentication ar e port s 1645 or 1812.
• Radius Secret—The sh ared secre t used to secu re the communi cations betw een the Cisco NA C Guest
Server and the RADIUS server.
NoteIf you do not want to change the shared se cret, leaving both secret en tries empty prese rves the
existing sh ar ed s e cr et.
OL-15986-01
• Status —Select the status of the RADIUS Server. If it is set to Active, the Guest Server will use it
for authenticating sponsors. If it is set to Disabled, it will not be used.
Cisco NAC Guest Server Installation and Configuration Guide
4-17
Configuring Sponsor Authe nti cation Settings
Step 5Click the Save S ettin g s button.
Delete an Existing RADIUS Server Entry
Step 1From the administration interface select Authentication > Sponsor > Radius Servers from the menu.
Step 2Select the RADIUS server from the list (Figure 4-20).
Figure 4-20Delete RADIUS Server Entries
Chapter 4 Configuring Sponsor Authentication
Step 3Click the Delete Radius button.
Step 4Confirm deletion of the RADIU S server at the pro mpt.
If there are any errors, the RADIUS server is not changed and an error message displays at the top of the
page.If successfu lly del eted, a succ e ss mes sag e di splays at th e top of the page an d you ca n perf orm
additional RADIUS ope ra tions.
Configuring Sponsor Authentication Settings
Changing the Order of Authentication Servers
When a sponsor authen ticates agains t the Cisco N A C Guest Ser ver it tri es each authent ication serv er that
has been defined in order until it successful ly authen ticates a spon sor. If none of the authenticatio n
servers can auth ent icate the spo nso r an er ror mes sage is ret urned .
As you can define many different authentication servers of different kinds you can order them in any way
that you want on a server-by-server basis.
Step 1From the administration interface select Authentication > Sponsor > Authentication Order from the
menu (
Figure 4-21).
4-18
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 4 Configuring Sponsor A uth entication
Figure 4-21Authentication Order.
The first server to be authenticated against is at the top of the list and the last at the bottom.
Step 2Select the server that you want to re-order from the list and click either the move up or move down
button. Perform this action with all the servers until they are in the correct order.
Step 3To save the authentication order click the Change Order button .
Sponsor Timeouts
Configuring Sponsor Authentication Settings
When a sponsor is logged in to the Cisco NAC Guest Server they should be logged out after a period of
inactivity. You can set the inactivity period through the sponsor settings page.
Step 1From the administration interface select Authentication > Sponsor > Settings from the menu
(
Figure 4-22).
Figure 4-22Session Timeouts.
Step 2Enter the session timeout value (in minutes). When a sponsor has been inactive for this amount of time,
their session expire and the n ext act ion they pe rfor m takes the m to the lo gin p ag e.
Step 3Click the Save S ettin g s button to save the session timeout.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
4-19
Configuring Sponsor Authe nti cation Settings
Chapter 4 Configuring Sponsor Authentication
4-20
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
CHA PTER
5
Configuring User Group Permissions
User groups are the me thod by whi ch t o assign pe rm issio ns to the s pons ors. You can set role-based
permissions for sponsors to allow or restrict access to different functions, such as creating accounts,
modifying accounts, gene rating re ports, an d sendi ng accoun t details to guests by email or SM S.
Once you have created a user group you should then create mapping rules to map the sponsor to a group
based upon information returned from the authentication server such as Active Directory Group, LDAP
Group membership, or RADIUS Class attribute.
TipBy default all users are assigned to the DEFA ULT group. I f you only want to have a single classification
of sponsors, you c a n edi t th e DE FAULT group.
This chapter describes the following:
• Adding User Group s
• Editing User Groups
• Deleting User Groups
• Specifying the Order of U se r G roups
• Mapping to Active Directory Groups
• Mapping to LDAP Groups
• Mapping to RADIUS Groups
Adding User Groups
Yo u can crea te a new sponsor user group usi ng the following steps.
Step 1From the administration interface select Authentication > User Grou ps fro m th e l eft hand me nu
(
Figure 5-1).
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
5-1
Adding User Groups
Step 2Click the Add Group button to add a new user group.
Step 3From the Add a New User Group page (Figure 5-2), enter the name for a new user group.
Chapter 5 Configuring User Group Permissions
Figure 5-1User Groups
Figure 5-2Add New User Group
Step 4Click the Add Group button to add a user group. You can now edit the settings for the new user group.
(
Figure 5-3).
Figure 5-3Edit New User Group
5-2
Step 5Set Permissions for the new User Group as follows:
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 5 Configuring User Gro up Permissions
• Allow Login—Select Yes to allow sponsors in this group to access the Cisco NAC Guest Server.
Otherwise, select No.
• Create Account—Select Yes to allow sponsors to create guest account s. Select No otherwise .
• Create Bulk Accounts—Select Yes to allow sponsors to be able to create multiple accounts at a time
by pasting in the details. Otherwise, select No.
• Create Random Accounts—Sel ect Yes to allow sponsors to be able to create multiple random
accounts without initially capturing guests details. Otherwise, select No.
• Import CSV— Select Yes to allow sponsors to be able to create multiple accounts at a time by
importing the details from a CSV file. Otherwise, select No.
• Send Email—Select Yes to allow sponsors to send account details via email from the Guest Server
to the guest user. Otherwise, select No.
• Send SMS—Select Yes to allow sponsors to send account details via SMS from the Guest Se rver to
the guest user. Otherwise, select No.
• Edit Account—Choose one of the following permissions for editing the end date/time on guest
accounts:
–
No—Sponsors are not allowed to edit any accounts.
Adding User Groups
–
Own Account—Spo nsor s are all owed to ed i t on ly t he a cco unts they c reate d.
–
All Accounts—Sponsors a re allowed to edit any guest ac counts.
• Suspend Account—Ch oose o ne of t he foll owing op tions f or susp endi ng a ccoun ts :
–
No—Sponsors are not allowed to suspend any accounts.
–
Own Account—Spo nsor s are a llowed to susp en d o nly th e a ccoun t s they c rea ted .
–
All Accounts—Sponsors are allowed to suspend any guest accounts.
• Active Accounts—Choose one of the following permissions for viewing reporting details for active
accounts
–
No—Sponsors are n ot a ll owed to view repor tin g det ai ls on a ny acc oun ts.
–
Own Account—Spo nsors a re a ll owed to vi ew reporti ng detai ls f or only the ac count s th ey
created.
–
All Accounts—Sponsors are allowed to view reporting details on any active guest accounts.
• Full Reporting—Choos e one of the fo llowing permissions for runni ng full repor ting:
–
No—Sponsors are n ot a llowed to run ful l repo rt ing on any acco unts.
–
Own Account—Sponsors are allowed to run full reporting for only the accounts they created.
–
All Accounts—Sponsors a re allowed to run full repor ting on any active guest account s.
• Number of days in the future—This sp ecif ies h o w lon g in the future t hat gu ests can c reate ac counts.
Specify the maximum number of days that they are allowed to create accounts in the future.
OL-15986-01
• Maximum duration o f acc oun t—Thi s specifies t he m axim um l engt h (i n days) tha t the sp onso r ca n
configure for an account .
• Show account dates as—This defines the metho d a sponsor can use to specify wh en an acc ount is
valid. There are two options :
–
Start Date/End Date —The s ponsor i s sho wn a cal endar th ey c an use to speci fy the time and date
an account s tart s an d end s .
Cisco NAC Guest Server Installation and Configuration Guide
5-3
Editing User Groups
–
Template Options—You can specify a list of preset durations that the sponsor can use when
creating accoun ts, suc h as 1 h our, 1 day, or 3 days. If t his i s sele cte d the tem pla te opti ons are
shown on the Create Guest page. The maximum template option cannot be greater than the value
specified in the maximum duration.
Step 6Click the Save Group button to add the group with the permi ssions spec ified.
NoteUntil you click the Save Group button on this screen, th e group wi ll not be creat ed.
Step 7Follow the instructions in Mapping to Active Directory Groups, page 5-8, Mapping to LDAP Groups,
page 5-8 or Mapping to RADIU S G roups, page 5-10 so that yo u can corre ctly m ap users t o your g rou p
based upon group inf orm ati on f rom t he au th entic a tion se rver.
Editing User Groups
The following steps describe how to edit sponsor user gro ups.
Chapter 5 Configuring User Group Permissions
Step 1From the administration interface select Authentication > User Grou ps fro m th e l eft hand me nu .
Step 2Select the group y ou wish to edit a nd click the Edit Group bu tt o n (Figure 5- 4).
Figure 5-4Select the User group to Edit
Step 3In the Edit an existing User Group page (Figure 5-5), change the settings for the group .
5-4
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 5 Configuring User Gro up Permissions
Figure 5-5Edit User Group
Editing User Groups
Step 4Edit Permissions for the User Group as follows:
• Allow Login—Select Yes to allow sponsors in this group to access the Cisco NAC Guest Server.
Otherwise, select No.
• Create Account—Select Yes to allow sponsors to create gu est acc ounts. Othe rwise , select No.
• Create Bulk Accounts—Se lect Yes to allow sponsors to be able to create multiple accounts at a time
by pasting in the details. Otherwise, select No.
• Create Random Accounts—Sel ect Yes to allow sponsors to be able to create multiple random
accounts without initially capturing guests details. Otherwise, select No.
• Import CSV— Select Yes to allow sponsors to be able to create multiple accounts at a time by
importing the details from a CSV file. Otherwise, select No.
• Send Email—Select Yes to allow sponsors to send account details via email from the Guest Server
to the guest user. Otherwise, select No.
• Send SMS—Select Yes to allow sponsors to send account details via SMS from the Guest Se rver to
the guest user. Otherwise, select No.
• Edit Account—Choose one of the following permissions for editing the end date/time on guest
accounts:
–
No—Sponsors are not allowed to edit any accounts.
–
Own Account—Spo nsor s are all owed to ed i t on ly t he a cco unts they c reate d.
–
All Accounts—Sponsors a re allowed to edit any guest ac counts.
• Suspend Account—Ch oose o ne of t he foll owing op tions f or susp endi ng a ccoun ts :
OL-15986-01
–
No—Sponsors are not allowed to suspend any accounts.
–
Own Account—Spo nsor s are a llowed to susp en d o nly th e a ccoun t s they c rea ted .
–
All Accounts—Sponsors are allowed to suspend any guest accounts.
Cisco NAC Guest Server Installation and Configuration Guide
5-5
Deleting User Groups
Chapter 5 Configuring User Group Permissions
• Active Accounts—Choose one of the following permissions for viewing reporting details for active
accounts
–
No—Sponsors are n ot a ll owed to view repor tin g det ai ls on a ny acc oun ts.
–
Own Account—Spo nsors a re a ll owed to vi ew reporti ng detai ls f or only the ac count s th ey
created.
–
All Accounts—Sponsors are allowed to view reporting details on any active guest accounts.
• Full Reporting—Choos e one of the fo llowing permissions for runni ng full repor ting:
–
No—Sponsors are n ot a llowed to run ful l repo rt ing on any acco unts.
–
Own Account—Sponsors are allowed to run full reporting for only the accounts they created.
–
All Accounts—Sponsors a re allowed to run full repor ting on any active guest accoun ts.
• Number of days in the future—This sp ecif ies h o w lon g in the future t hat gu ests can c reate ac counts.
Specify the maximum number of days that they are allowed to create accounts in the future.
• Maximum duration o f acc oun t—Thi s specifies t he m axim um l engt h (i n days) tha t the sp onso r ca n
configure for an account .
• Show account dates as—This defines the metho d a sponsor can use to specify wh en an acc ount is
valid. There are two opt ions:
–
Start Date/End Date —The s ponsor i s sho wn a cal endar th ey c an use to speci fy the time and date
an account s tart s an d end s .
–
Template Options—You can specify a list of preset durations that the sponsor can use when
creating accoun ts, suc h as 1 h our, 1 day, or 3 days. If t his i s sele cte d the tem pla te opti ons are
shown on the Create Guest page. The maximum template option cannot be greater than the value
specified in the maximum duration.
Step 5Click the Save Group button to save the changes to the group.
Step 6Follow the instruction in Mapping to Active Directory Groups, page 5-8, Mapping to LDAP Groups,
page 5-8 or Mapping to RADIU S G roups, page 5-10 so that yo u can corre ctly m ap users t o your g rou p
based upon group inf orm ati on f rom t he au th entic a tion se rver.
Deleting User Groups
Step 1From the administration interface select Authentication > User Grou ps fro m th e l eft hand me nu .
5-6
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 5 Configuring User Gro up Permissions
Figure 5-6List Groups to Delete
Step 2Select the group you wi sh to delete and click the Delete Group butt o n ( Figur e 5-6).
Step 3Confirm deletion at t he prompt .
NoteIf any Local Users are part of thi s group, you must delet e the user befo re dele ting the use r group.
Alternatively, you can move Local Users to a nothe r group t o “emp t y” i t be fo re d ele tin g the use r gro up.
Specifying the Order of User Groups
Specifying the Order of User Groups
When a sponsor logs in to the Cisco NAC Guest Server, the system checks each group in turn to see if
the sponsor should be given the privileges of that group. The groups are processed in the order in which
they appear in the User Groups list box (
the privileges of the DEFAULT group.
Step 1From the administration interface select Authentication > User Grou ps fro m th e l eft hand me nu .
Figure 5-7Order User Groups
Step 2Select the gr oup y ou wish t o ord er and c lick the up or down button until the group is in position
(
Figure 5-7).
Figure 5-7). If a user does not match a user group, they are given
OL-15986-01
Step 3Repeat for al l gr oups un t il t hey appe ar in t he o rder yo u r equi re.
Step 4Click the Change Order button to save the order.
Cisco NAC Guest Server Installation and Configuration Guide
5-7
Mapping to Active Directo ry Groups
Mapping to Active Directory Groups
If a sponsor authenticates to the Cisco N A C Guest Serv er using Acti ve Directory authentica tion then the
Cisco NAC Guest Server can map them into a user group by their membership in Active Directory
groups.
If you have configured AD aut hen tic ati on ( as descr ibe d in Co nfigurin g Ac tive Directory ( AD)
Authentication, page 4-5), then the Guest Server automatically retrieves a list of all the groups
configured within all the AD servers configured.
Selecting an Active Direct ory Gr oup fro m the dr opdown provide s all spo nsor use rs who ar e i n th is AD
group the permissions of this group.
Step 1Select Active Directory Mapping from the top menu when in the add user group or ed it user group
screen.
Figure 5-8Active Directory Group Mapping
Chapter 5 Configuring User Group Permissions
Step 2Select the group you wish to mat ch agains t and clic k the Ass ig n Group button.
NoteBy default, Active Directory only returns a maximum of 1000 groups in response to a Cisco NAC Guest
Server search. If you have more th an 1000 gr oup s and have not i ncr ea sed th e LDAP search siz e, i t i s
possible that the group you want to match will not appear. In this situation, you can manually enter the
group name in the Ac tive Directo ry Group combo bo x.
Mapping to LDAP Groups
If a sponsor authenticates to the Cisco NAC Guest Server using LDAP authentication then the Cisco
NAC Guest Server can ma p them int o a u ser gr oup by the ir me mber shi p of LDAP group s.
Based on the settings of the LDAP server that you authenticate against the Cisco NA C Guest Ser ver will
use one of two method s f or mapp ing the spo nsor usin g g roup infor ma tion.
There are two mai n met hods t hat LDAP servers use f or assi gning u ser s to gr oups .
Cisco NAC Guest Server Installation and Configuration Guide
5-8
OL-15986-01
Chapter 5 Configuring User Gro up Permissions
1. Storing the group membership in an attri bute of the user objec t. W ith this meth od the user ob ject
has one or more attributes that list the grou ps that the user is a member of. If your LDAP server
uses this method of storing group membership then you need to enter t h e name of the attribute
which holds the groups the user is a member of.
2. Storing the user membership in an attribute of the group object. With this method there is a
group object that contains a list of the users who are members of the group. If your LDAP server
uses this method then yo u ne ed to sp ecify the group to chec k u nde r th e L DAP mapping section
of a User Group you want to m a tch the user to.
When you define the LDAP server you will have specified one of these options.
If the LDAP server supports the first option then you will have to specify to check the user attribute for
a certain string.
If the LDAP server supports th e second option then you will need to enter the full DN of the group you
want to check membership of. The Cisco NAC Guest Server will then look in the attribute to make sure
that it contains t h e na me of t h e user who ha s log ged i n.
Step 1Select LDAP Mapping from the top menu when in the add user gro up or edit user gr oup screen
(
Figure 5-9).
Mapping to LDAP Groups
Figure 5-9LDAP Group Mapping
Step 2If your LDAP server uses user attributes to store group membership then enter the group name to check
is either conta ine d or eq ua ls t he sp ec ified st ring .
Step 3If your LDAP server stores group membership in the group object then specify the full DN of the group
you want to check and the name of the attribute that will be checked for the sponsors username.
Step 4Click the Assign Attributes button to save the LDAP group m appi ng.
NoteYo u can specif y both opti ons for the sa me grou p. The opti on that you ch eck de pends on the set ting on
the LDAP server with which the sponsor successfully authenticates.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
5-9
Mapping to RADIUS Gr oups
Mapping to RADIUS Groups
If a sponsor authenticates to the Cisco NAC Guest Server using RADIUS authentication then the Cisco
NA C Guest Server can map them into a user group b y using information returne d to the Cisco NA C Guest
Server in the authentication request.
The information must be placed into the class attribute on the RADIUS server.
Step 1Select Radius Mapping from the t op me nu wh en i n the add us er gr oup or edi t u ser g rou p pag e
(
Figure 5-10).
Figure 5-10RADIUS Group Mapping
Chapter 5 Configuring User Group Permissions
Step 2Enter the str ing you want to mat ch agai ns t th e c lass a ttribute t hat is re turn ed in t he RA D IUS
authentication reply. You can specify from the drop-down if you want to exactly match the string (equals
the string) or match a substring (contains the string).
Step 3Click the Assign Group button.
5-10
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Configuring Guest Policies
Organizations commonly have policies in place for creating accounts for their internal users and
systems, such as t he for mat or l engt h of t he u ser na me a nd /or co mplexit y o f pa ssword. Th e Cisco NAC
Guest Server allows you to c on figure gue st use r name and pa ssword c reat ion poli cies t o m atc h y our
organization’s policy or to create a policy specific to guest accounts.
Yo u can also use th e guest det ai ls po licy to de fine spec ific gue st user info rm ati on on t he C isco NAC
Guest Server.
Setting the Username Policy
The Username Policy determ ines how to create user name s for all guest ac counts.
Step 1From the administration interface, select Guest Policy > Username Policy from the left hand me nu
(
Figure 6-1).
CHA PTER
6
Figure 6-1Guest Username Policy
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
6-1
Setting the Password Polic y
Step 2Choose one of thr ee options fo r creat ing the use r name for th e guest ac count .
• Username Policy 1 (email)
• Username Policy 2 (FirstLast)
• Username Policy 3 (Random)
Chapter 6 Configuring Gue st Policies
Use the guest’s email address as the username. If an overlapping account with the same email
address exists, a random number is added to the end of the email address to make the username
unique. Overlapping accounts are accounts that have the same email address and are valid for an
overlapping period o f ti m e.
Create a username based on combini ng the first name and last name of t he guest. You can set a
Minimum Usernam e Length for this u sername from 1 to 20 ch aract ers (defaul t is 10). U ser nam es
shorter than the minimum length are padded up to the minimum specified length with a random
number.
Create a username based upon a rand o m mi xtu r e of Alphabetic, Num er i c or Ot he r ch ar acters. Type
the characters to include to generate the random characters and the number to use from each set of
characters .
NoteThe total length of the username is determined by the total number of characters included.
Step 3When done, cli ck Set Policy to have the username policy take effect.
Setting the Password Policy
The password policy determines how to create the password for all guest accounts.
Step 1From the administration interface, select Guest Policy > Password Policy from the left hand me nu
(
Figure 6-2).
6-2
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 6 Configuring Guest Policie s
Figure 6-2Password Policy
Step 2In the Alphabetic Characters section, enter the characters to use in the password and the amount to
include.
Step 3In the Numeric Characters section , enter the numerals to u se in the password and the amount to includ e.
Setting the Guest Details Policy
Step 4In the Other Characters section, enter the special characters to use in the password and the amount to
include.
CautionFor passwords, use only the following characters for the “Other Characters” field: ! $ ^ & * ( ) - _ = +
[ ] { } ; : @ # ~ , > ?.
Do not use the following characters in the “Other Characters” field, as they are not supported by the
Clean Access Manager API: £ % < ¬ ` ' \ |.
Step 5Click Set Policy to save the settings.
NoteThe total length of the password is determined by the total number of characters included. You can
choose between 0 a nd 20 c hara cte rs pe r ty pe (al ph abeti c, n um eric , or o ther ).
Setting the Guest Details Policy
The guest details policy determines what data the sponsor needs to enter to create a guest account.
Step 1From the administration interface, select Guest Policy > Guest D eta ils from the left hand menu
(
Figure 6-3).
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
6-3
Setting the Guest Details Policy
Figure 6-3Guest Details Policy
Step 2You can specify one of three settings for each requirement:
Chapter 6 Configuring Gue st Policies
• Required—If a field is set to required it is displayed on the create guest page and it is mandatory for
the sponsor to complete.
• Optional—If a field is se t to opt ion al it i s d isplay ed on t he c rea te guest pag e however the spons or
can choose not to compl ete the field.
• Unused—If a field is set to u nuse d the n it i s not d isp lay ed on t he cr e ate gue st pa ge and no value i s
required.
Step 3Click the Save S ettin g s button to save the guest details policy.
NoteThere are five additional fields that can have any information that you require entered into them. These
are described on t he sc reen a s Op tion 1 thr oug h Op tion 5 . If you wa nt to use these fields, Cisc o
recommends customizing the text that is shown to the sponsor by editing the templates as described in
User Interface Templates, page 10-1.
6-4
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
CHA PTER
7
Integrating with Cisco NAC Appliance
This chapter describes the following:
• Adding Clean Acce ss Mana ger En tri es
• Editing Clean Access Manager Entries
• Deleting Clean Access Manager Entries
• Configuring the CAM for Reporting
Guest users commonly authenticate to networks via a captive portal through which they provide their
authentication deta ils using a web br owser. Cisco NAC Appliance provides a secure gues t user access
portal which administrators can customize.
The Cisco NAC Guest Server integrates with the Clean Access Manager through the use of the Cisco
NAC Appliance API. This is an HTTPS-based API that requires the Guest Server to communicate with
the Clean Access Manager, also known as the Clean Access Manager (CAM).
NoteRefer to the “A PI Support” section of the applicable Cisco NAC Appliance - Clean Access Manager
Installation and Configuration Guide for details on the Cisco NAC Appliance API.
The Cisco NAC Guest Server creates the guest user accounts on the CAM as Local User accounts
assigned to a sp ecific rol e t hat you de fine for gu est use rs. T he Gue st Se rver c reate s n ew accounts t hat
are valid every minute. Every minute it also removes accoun ts that have expired. When accoun ts are
suspended, the Guest Server removes both the accounts from the CAM and the guest users from the
network if they are logged in.
The Clean Access Manager ca n also send acc ountin g informat ion to the Cisco NAC Guest Server via
RADIUS accounting. This informat ion is used fo r repor ting and trac king of guest s by access time and
IP address.
You may add multiple Clean Access Managers to the Cisco NAC Guest Server. When accounts are
provisioned they are created on all ac tive Clean Access Ma nagers th at are de fined.
Adding Clean Access Manager Entries
The following steps describe how to configure t he Ci sco NAC Guest Server and Cisco NAC Appliance
Manager so that they can communi cate wi th one anothe r. You must add API informati on to the Cisco
NAC Guest Server for each Clean Access Manager on which you want the Guest Server to create
accounts.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
7-1
Adding Clean Access Manager Entries
Step 1From the Guest Server administration interface, select Devices > NAC Appliance from the left hand
menu (
Figure 7-1).
Figure 7-1Cisco NAC Appliances
Step 2Click the Add NAC button (Figure 7-2).
Figure 7-2Add Clean Access Manager
Chapter 7 Integrating with Cisco NAC Appliance
7-2
Step 3Enter the following settings in the NAC Appliance Details page (Figure 7-2):
• Name—Type a descriptive name for the Clean Access Manager.
• Hostname of Address—Type the DNS name or IP address for the CAM.
• Admin Username—Ent er an admi n usernam e which has API permission to th e CAM.
• Password—Type the password for the account.
• Repeat Password—Retype the password to en sure it matc hes correc tly.
• Role—Type the name of the User Role on the CAM to which you will assign guest users. This
should match exactly with the User Role name configured on the CA M, incl uding co rrec t case.
• Server Status—Set the status to be Active for the CAM to have accounts provisioned on it by the
Cisco NAC Guest Server.
Step 4Click the Add NAC Manager button.
Step 5Optionally click the Test Connection button to ensure that the settings are working correctly.
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 7 Integrating with Cisco NA C Appliance
Step 6In the Clea n Access Manager adm in console, navigate to Monitoring > Event Logs and verify that the
account nacguest_test was successfully created and then deleted.
Editing Clean Access Manager En tries
The following steps describe how to edit an existing entry for a Clean Access Manager.
Step 1From the Guest Server administration interface, select Devices > NAC Appliance from the left hand
menu (
Figure 7-3).
Figure 7-3List of Cisco NAC Appliances
Editing Clean Access Manager Entries
Step 2Select the Cisco NAC Appliance that you want to edit from the list and click the Edit NAC butt on
(
Figure 7-4).
Figure 7-4Edit a Clean Access Manager
Step 3In the NAC Appliance Settings page (Figure 7-4), enter the following settings:
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
7-3
Deleting Clean Access Manager Entries
• Hostname of Address—Type the DNS name or IP address for the CAM.
• Admin Username—Ent er an admi n usernam e which has API permission to th e CAM.
• Password—Type the password for the account.
• Repeat Password—Retype the password to en sure it matc hes correc tly.
• Role—Type the name of the User Role on the CAM to which you will assign guest users. This
should match exactly with the User Role name configured on the CA M, incl uding co rrec t case.
• Server Status—Set the status to be Active for the CAM to have accounts provisioned on it by the
Cisco NAC Guest Server.
Step 4Click the Save S e t t i n g s button.
Step 5Optionally click the Test Connection button to ensure that the settings are working correctly.
Step 6In the Clea n Access Manager adm in console, navigate to Monitoring > Event Logs and verify that the
account nacguest_test was successfully created and then deleted.
Chapter 7 Integrating with Cisco NAC Appliance
Deleting Clean Access Manager Ent ries
The following steps describe how to delete Cisco NAC Appliance entries.
Step 1From the Guest Server administration interface, select Devices > NAC Appliance from the left hand
menu (
Figure 7-5).
Figure 7-5List of Cisco NAC Appliances
Step 2Select the Cisco NAC Appliance that you want to delete from the list and click the Delete NAC button.
You will receive a warning message which you must agree to for the appliance entry to be deleted.
Configuring the CAM for Reporting
In order for the Cisco NAC Guest Server to correctly display details for gu est users when reporti ng is
run, you need to configure the CAM to send RADIUS accounting information to the Guest Server.
Additionally, the CAM needs to format the information correctly.
Cisco NAC Guest Server Installation and Configuration Guide
7-4
OL-15986-01
Chapter 7 Integrating with Cisco NA C Appliance
NoteFor detailed instructions on how to access and configure settings on the CAM, refer to the applicable
Cisco NAC Appliance - Clean Access Manager In stal lation and Co nfiguration Guid e.
Adding a RADIUS Accounting Server
Step 1Log into t he C A M web conso le as an adm in us er w it h an a ppr opriat e pa ssword (de fault
username/password is admin/cisco 123).
NoteAny CAM admin user with Edit pr ivileges can perform t his con figuration.
Step 2Navigate to User Manag ement > Auth Servers > Accounting > Server Config
Figure 7-6Configure RADIUS Accounting Server
Configuring the CAM for Reporting
OL-15986-01
Step 3Click the checkbox for Enable RADIUS Accounting and configure the following fields:
• Server Name— Type the IP address of the Cisco NAC Guest Server
• Server Port —Type 1813 as the port
• Timeout (sec)—Type a timeout value; 10 seconds is typically sufficient.
• Shared Secret—Type the shared secret used with the Cisco NA C Gue s t Se rver. This must m atch the
shared secret conf igured on the Guest Ser ver when adding the C AM as a RADIUS client to th e Guest
Server, as described in
Adding RADIUS Clients, pa ge 8-2. Make sure both shar ed se crets are t he
same.
• NAS-IP-Address—Type the address of the CAM itself as the NAS-IP-Address.
Step 4Click the Update button.
Cisco NAC Guest Server Installation and Configuration Guide
7-5
Chapter 7 Integrating with Cisco NAC Appliance
Configurin g the CAM for Reporting
Configure the CAM to Format RADIUS Accounting Data
The CAM can be conf igured to place man y dif feren t attrib utes into the RADIU S account ing pack ets and
the attributes them selves can be form at te d in m any different ways. You need to configure the CAM to
send attribute information in a specific format so that the Cisco NAC Guest Server can understand it.
NoteRefer to the “RADIUS Accounting” section of the applicable Cisco NAC Appliance - Clean Access
Manager Installation and Configuration Guide for additional details.
Step 1Log into the CAM admin console, and navigate to User Management > Auth Servers > Accounting >
Shared Events (
Figure 7-7Shared Events
Figure 7-7).
Step 2On the Shared Events page, click the Edit button to the right of the User_Name attributes entry
7-6
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 7 Integrating with Cisco NA C Appliance
Figure 7-8Edit User Name Attribute
Configuring the CAM for Reporting
Step 3In the Edit User_Name attribute page (Figure 7-8), click the Reset Element button to remove the
existing samp le d ata for ma t.
Step 4Select User Name from the Add D ata drop down me nu.
Step 5Click the Add Data button.
Step 6Click the Commit Changes button .
Step 7The main Shared Events lists page reappears (Figure 7-9). Verify that the Data column lists
“[User_Name]”.
Figure 7-9Shared Events with Username Changed
Step 8Click the New Entry... link to the right of the page (Figure 7-9) to add additional attributes.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
7-7
Configurin g the CAM for Reporting
Figure 7-10Add Calling Station Id Attribute
Chapter 7 Integrating with Cisco NAC Appliance
Step 9In the New Shared Events attribute form (Figure 7-10), select Calling_Station_Id from the Send
RADIUS Attributes dropd own menu.
Step 10Click the Change Attribute butt o n .
Step 11Select User IP from the Add Data dropdown menu.
Step 12Click the Add Data button.
Step 13Click Commit Changes.
NoteRemember to add the CAM as a RADIUS client using the instructions in Chapter 8, “Configuring
RADIUS Clients.”
7-8
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Overview
CHA PTER
8
Configuring RADIUS Clients
This chapter describes the following
• Overview
• Adding RADIUS Cli ents
• Editing RADIUS Clients
• Deleting RADIUS Clients
Remote Authentication Dial In User Service (RADIUS) is an AAA (authentication, authorization and
accounting) pr otoc ol. Cisco NAC Guest Server uses t he RA D IUS p rot oco l t o auth en ticat e a nd audi t
guests who login through RADIUS-capable network enforcement devices, such as Cisco Wireless LAN
Controllers.
Although the Cisco NAC Appliance uses its own API a nd a di fferent met hod fo r c rea tin g ac count s and
authenticating users, as described in
RADIUS Accounting to record user activity and therefore still needs to be configured as a RADIUS
client.
When a guest authentic ates against a RADIUS clien t, such as the W ir eless LAN Cont roller , the RADI US
client uses RADIUS authentication to ask the Cisco NAC Guest Server whether the user authentication
is valid. If the guest authentication is valid, the Cisco NAC Guest Server returns a message stating that
the user is valid and the amount of time remaining before the user session expires. The RADIUS client
must honor the sessi on-t ime out attri bute to re move the gue st w h en t he g ue st a ccoun t t ime expir es.
NoteThe Cisco Wireless LAN Controller needs to be specifically configured to Allow AAA Override. This
enables it to honor the session-timeout attribute returned to it by the Cisco NAC Guest Server.
In addition to authentication, the RADIUS client device reports details to the Cisco NAC Guest Server,
such as the time the session started, time session ended, user IP address, and so on. This information is
transported over the RADIUS Accounting protocol.
TipIf there is a Firewall b etween the Cisco NA C Guest Serv er and the RADIUS client, you will need to allow
traffic from UDP Port 1812 (RADIUS authentication) and UDP Port 1813 (RADIUS accounting) to pass.
Chapter 7, “Integrating with Cisco NAC Appliance,”it still uses
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
8-1
Adding RADIUS Client s
NoteAny time you make a change to a RADIUS component on the Cisco NAC Guest Server, you will need
to Restart the RADIUS service for the changes to become active.
Adding RADIUS Clients
Step 1From the administration interface select Devices > Radius Clients from the left hand menu.
Figure 8-1RADIUS Clients
Chapter 8 Configuring RADIUS Clients
Step 2In the Radius Clients page (Figure 8-1), click the Add Radius button to add a RADIUS client.
Figure 8-2Add RADIUS Client
Step 3In the Add Radi us Clie nt pa ge (Fi gure 8-2), type a de scri ptive Name for the RADIUS client.
Step 4Type the IP Address of the RADIUS client. This needs to match the IP address from which the RADIUS
request originates.
8-2
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 8 Configuring RADIU S C lients
Step 5Type a shared Secret for the RADIUS client. This must match the shared secret specified in the
configuration of the RADI US c lie nt.
Step 6Retype the shared secret in the Confirm Secret field.
Step 7Type a Descriptio n o f t h e cl ie nt a nd any ot her i n for mat ion neede d.
Step 8If you want the RADIUS client to send any additional attributes upon successful authentication enter the
attribute name and value and click the Add button. You can enter as many attributes as you need. If you
want to remove an attribute select the attribute from the table and click the Delete button.
Step 9Click the Add Radius Client button.
Step 10From the administration inte rface select Device s > Radius Clients (Figure 8-1)from the left hand menu.
Step 11Click the Restart button to restart the RADIUS service to make the changes take effect.
Editing RADIUS Clients
Editing RADIUS Clients
Step 1From the administration interface select Devices > Radius Clients from the left hand menu.
Figure 8-3RADIUS Clients List
Step 2In the Radius Clients page (Figure 8-3), select the RADIUS client from the list and click the Edit R adius
button.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
8-3
Deleting RADIUS Clie nts
Step 3In the Edit Radius Client page (Figure 8-4), edit the IP Address of the RADIUS client.
Chapter 8 Configuring RADIUS Clients
Figure 8-4Edit RADIUS Client
Step 4Edit the shared secret used between the client and the Cisco NAC Guest Server in the Secret and
Confirm Secret fi elds.
Step 5Make any desired c hange s to the Description.
Step 6If you want the RADIUS client to send an y additional attrib utes upon succ essful authen tication enter the
attribute name and value and click the Add button. You can enter as many attributes as you need. If you
want to remove an attribute select the attribute from the table and click the Delete button.
Step 7Click Save Settings.
Step 8From the administration interface select D evices > Radius Cli ents (Figure 8-1)from the left hand menu.
Step 9Click the Restart button to restart the RADIUS service to make the changes take effect.
Deleting RADIUS Clients
Step 1From the administration interface select Devices > Radius Clients from the left hand menu.
8-4
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 8 Configuring RADIU S C lients
Figure 8-5List RADIUS Clients
Step 2In the Radius Clients page (Figure 8-5), select the RADIUS client from the list.
Step 3Click the Delete Radius button and confirm the action.
Step 4From the administration interface select D evices > Radius Cli ents (Figure 8-1)from the left hand menu.
Deleting RADIUS Clients
Step 5Click the Restart button to restart the RADIUS service to make the changes take effect.
NoteAny time you make a change to a RADIUS component, you will need to restart the RADIUS service for
the changes to become active.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
8-5
Deleting RADIUS Clie nts
Chapter 8 Configuring RADIUS Clients
8-6
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
CHA PTER
9
Guest Account Notification
When a guest account is crea ted, the de tails of th e accoun t need to be p assed from the sponsor to the
guest. The Cisco NAC Guest Server provides a number of ways to do this:
• Manually reading the details to the guest from the screen
• Printing the details out on paper
• Sending the details in an email
• Sending the details as an SMS text message
Sponsors always have the option o f re adin g a nd p rint ing out gue st a cco unt detai ls t o gue sts.
Email and SMS text message notification require email servers to be configured, but can be configured
based upon policy.
NoteEmail and SMS guest account no tif ication p olicies need to be conf igur ed globally, then enabled per user
group for individual sponsor permissions.
This chapter describes the following
• Configuring Email Notification
• Configuring SMS Notification
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
9-1
Configuring Email Notifica ti on
Configuring Email Notification
The following steps describe how to configure email settings for the Cisco NAC Guest Server to
correctly deliver guest account details via email.
Step 1From the administration interface, select Devices > Email Settings from the left hand menu.
Figure 9-1Email Settings
Chapter 9 Guest Account Notification
Step 2In the Email Settings page (Figure 9-1), click Yes for the Enable Email option to enable email
functionality globally for the Cisco NAC Guest Server.
Step 3For SMTP Server, type the IP address of the outbound SMTP server to which you need to deliver email.
If you enter localh ost, or lea ve th is field e mpty , t he Cisco N A C Guest Serv er attempts to deli ver the email
directly to the guest’s SMTP server.
Step 4In the Sent From E mai l A ddress field, typ e the ema il addr ess fr om w hic h y ou wa nt gu est noti fication
emails to be sent (for example, host@company.com).
Step 5Click the Save S ettin g s button.
Step 6Click the Restart button. After any change to email settings, you need to Restart the Sendmail service
by clicking the Restart button so that the settings take effect.
9-2
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 9 Guest Account Notification
Configuring SMS Notification
Short Message Service (SMS) is delivered through an SMS gateway service that supports SMTP (Simple
Mail Transport Protocol) delivery. You need to have an internal SMS gateway service or subscribe to an
external service to be able to deliver guest details via SMS.
Step 1From the administration interface select Devices > SMS Settings from the left hand menu.
Figure 9-2SMS Settings
Configuring SMS Notification
Step 2In the SMS Settings page (Figure 9-2), change the Enable SMS option to Yes to globally enable SMS on
the Cisco NAC Guest Server.
Step 3SMS requires an SMTP server to deliver the email to the SMS gateway. Click the Email Settings link
to configure the SMTP Server as described
Step 4In the Sent From field, type the sending email address for the email to be sent to the SMS gateway.
Step 5Click Save Settings.
NoteDepending on how details are routed to the SMS provider, you will need to customi ze t he SMS porti on
Configuring Email Notification.
of the User Interf ace templa te to in clud e the gu est’s mobile phone number in the corr ect fo rmat for y our
SMS gateway. See Editing the SMS Template, page 10-6 for details.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
9-3
Configuring SMS Notific ation
Chapter 9 Guest Account Notification
9-4
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Customizing the Application
This chapter describes the following
• User Interface Templates
• Adding a User Interface Template
• Editing a User Interface Template
• Deleting a Template
• Setting the Default Interface Mapping
• Setting User Default Redirection
User Interface Templates
Cisco NAC Guest Server allows you to customize the sponsor user interface text and guest notification
text using User Interface Templates. You can change the labels for the sponso r interface , provide
different instructions for guest users, or create a translated template to provide the sponsor interface and
guest instructions in another language altogether.
Cisco NAC Guest Server provides a default template (in English) that can be used as is without any
further modification. If you want to change the default presentation for sponsors and guests, you can add
one or multiple t emp lat es tha t yo u can store se para te ly on the Guest Ser ver a nd modi fy as desi red .
CHA PTER
10
OL-15986-01
Once your user interface template is configured, you will need to set the default template mapping so
that the Guest Server starts using the correct template. Once a sponsor has authenticated they can choose
a different template to use and save it in the preferences. This enables each sponsor to have the
application displayed in a different template or language.
If you are customizi ng the inte rface fo r anothe r langua ge, crea te a new templat e for the lang uage and
edit all pages with the translated text.
Typically, you create a customi ze d te mp late wh en you nee d t o mo di fy the ac co unt deta ils and
instructions that are pr ovided to the guest, such as the Acceptable Use Policy. Cisco NAC Guest Server
provides Print, Email, and SMS templates that allow you to customize the information that is printed,
emailed, or text m essage d t o g uest s.
NoteWhen customizing, it is a g ood idea to open t he sponsor inter face in a second bro wser for re ference. Thi s
allows you to view how the configuration tabs map to the actual sponsor interface p ages. You can bring
up the sponsor in terfa ce by e nte ring t he G ues t Se rver IP a ddress w ith out the “/a dm in” a s the UR L, fo r
example, http://<guest_server_ip_address> or https://<guest_server_ip_address>.
Cisco NAC Guest Server Installation and Configuration Guide
10-1
Adding a User Interface Template
Adding a User Interface Template
When you add a new template, it is automatically based on the default template to facilitate editing.
Step 1From the administration interface select User Interface > Templates from the left hand me nu.
Figure 10 -1User Interface Templates
Chapter 10 Customizing the Application
Step 2On the User Interface Templates page (Figure 10-1), click the Add Template button
Figure 10 -2Add Template Page
Step 3In the Add New Template page (Figure 10-2), type a Template Name. Th is can be any de sc riptive text
to identify the template later from the Current Templates list (Figure 10-1).
Step 4Click the Add Template button.
The Edit User Interface Template page for the new template displays, initially with all details copied
from the default template. If you only need to make small changes, this allows you not to have to retype
all the entries.
Step 5Modify these se ttin gs as de sire d, a s de scribe d in Editing a User Interface Template, page 10-2 next.
Editing a User Interface Templ ate
10-2
TipWhen customizing, it is a g ood idea to open t he sponsor inter face in a second bro wser for re ference. Thi s
allows you to view how the configuration tabs map to the actual sponsor interface p ages. You can bring
up the sponsor in terfa ce by e nte ring the G uest Server IP addr ess w ithout the “/a dm in” as t he U RL , for
example, http://<guest_server_ip_address> or https://<guest_server_ip_address>.
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 10 Customizing the Applicat io n
Step 1From the administration interface select User Interface > Templates from the left hand me nu.
Figure 10 -3User Interface Templates
Step 2From the Current Templates list (Figure 10-3), select the template that you want to edit.
Step 3Click the Edit Template button. The Edit User Interface page for the template displays (Figure 10-4).
Editing a User Interface Template
Figure 10-4Edit Template
Step 4Click the menu at the t op of the page to select any of the sponsor pa ges that you want to edit .
Step 5Make any chan ges t o th e fields an d c lick th e Save Templat e butto n . So me exam pl e ed its ar e de scr ib ed
in the following sections:
OL-15986-01
• Editing the Print Template
• Editing the Email Template
• Editing the SMS Template
Cisco NAC Guest Server Installation and Configuration Guide
10-3
Editing a User Interface Tem plate
Editing the Print Template
The Print Template page contains the guest account details that the sponsor can bring up in a browser to
print out for handing to the guest afte r the account is crea ted. The page is configure d in HTML and can
be fully customized.
TipNavigating to Reporting > Act iv e Ac counts on the sponsor interface and clicking the Print button next
to the guest account entry brings up the output of the Print Template for printing.
Step 1Go to User Interface > Templates and click the Edit Template button for the te mplate yo u wan t to edi t
in the Current Templates list.
Step 2In the Edit User Interface page, click the Print Template tab at the top of the page to bring up the Print
Template configuration page (
Figure 10-5Print Template Page
Chapter 10 Customizing the Application
Figure 10-5).
10-4
Step 3Change the Page Title as desired (default is “Guest User Details”).
Step 4In the Page Bo dy text field, e dit t he d efau lt HTM L c ode for t he w eb p ag e. T he Page Bo dy co nta ins a ll
the HTML that sits between the BODY tags on a HTML page. All HTML outside these tags is used by
the application.
Step 5In the HTML code you can use the following special variables to replace th em wi th the details from the
created guest account.
• %USERNAME% = The Userna me cr eated for the gu est
• %PASSWORD% = The Password created for the guest
• %STARTTIME% = The time from w hich the gu est acc oun t wi ll be valid
• %ENDTIME% = The time the guest account will expire
• %FIRSTNAME% = The first name of the guest
• %LASTNAME% = The last name of the guest
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 10 Customizing the Applicat io n
Step 6Click the Save Templa t e button to save you r cha ng es.
Editing the Email Template
The Email Template page contains the guest account details that the sponsor can email to the guest after
creating the accou nt. The pa ge is co nfigured in HTM L and ca n be fully customi zed.
TipNavigating to Reporting > Activ e Accounts on the sponsor interface and clicking the Email button next
to the guest account entry brings up the output of the Email Template and also emails the guest.
Step 1Go to User Interface > Templates and click the Edit Template button for the te mplate yo u wan t to edi t
in the Current Templates list.
Step 2In the Edit User Interface page, click the Email Template tab at the top of the page to bring up the Email
Template configuration page (
Editing a User Interface Template
Figure 10-6).
Figure 10-6Email Template Page
Step 3Change the Page Title as desired (default is “Guest User Account Details”).
Step 4Change the Email Subject as desired.
Step 5In the Email Body text field, edit the default email text to be sent to the guest page.
Step 6In the Email Body you can use the following special variables to replace them with the details from the
created guest account.
OL-15986-01
• %USERNAME% = The Username created for the guest
• %PASSWORD% = The Password created for the guest
• %STARTTIME% = The time from w hich the gu est acc oun t wi ll be valid
• %ENDTIME% = The time the guest account will expire
• %FIRSTNAME% = The first name of the guest
• %LASTNAME% = The last name of the guest
Cisco NAC Guest Server Installation and Configuration Guide
10-5
Editing a User Interface Tem plate
Step 7Click the Save Templa t e button to save you r cha ng es.
Editing the SMS Template
The SMS Template page contains the guest account details that the sponsor can text message to the guest
after creating the acc ount. T he c on tents of the text messa ge c an b e fu lly c ustom ize d.
TipNavigating to Reporting > Active Acc ounts on the sp o nsor inter f a ce an d clic king the SMS button next
to the guest acco unt entr y b ring s u p the outpu t of the SMS Template and also text m essage s th e guest.
Step 1Go to User Interface > Templates and click the Edit Template button for the te mplate yo u wan t to edi t
in the Current Templates list.
Step 2In the Edit User Interface page, click the SMS Template tab at the top of the page to bring up the SMS
Template configuration page (
Chapter 10 Customizing the Application
Figure 10-7).
Figure 10-7SMS Template Page
Step 3Change the SMS Subject as desired.
Step 4Change the SMS Destination to be the email address of the SMS gateway that you use.
T o send the text message to mobile phone number of the guest, use the variable %MOBILENUMBER%.
The %MOBILENUMB ER% variable is repl aced by the mobil e phone num ber, including countr y code
of the guest as entered b y the spo nsor. For example, if the country co de s elected is the UK (+ 44) and the
guest’s phone number is 055 5 55-555 5, the n %MO BI LEN UMBE R% w ill c on tain 445 555 55555.
10-6
NoteThe initial plus symbol (“+”) is not inserted and the initial 0, any spaces, or hyphens (“-”) are
removed from the phone number. If you need “+” to be inserted, then enter
+%MOBILENUMBER%.
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 10 Customizing the Applicat io n
Step 5The SMS Body cont ains be the SMS t ext to be sent to the guest . In the SMS Body you can use the
following special variables to replace them with the details from the created guest account.
• %USERNAME% = The Username created for the guest
• %PASSWORD% = The Password created for the guest
• %STARTTIME% = The time from w hich the gu est acc oun t wi ll be valid
• %ENDTIME% = The time the guest account will expire
• %FIRSTNAME% = The first name of the guest
• %LASTNAME% = The last name of the guest
• %MOBILENUMBER% = The mobile number of the guest
Step 6Click the Save Templa t e button to save you r cha ng es.
Using Account Durations
Account durations are another way the sponsor can specify how long they want the guest account to
remain valid. By default, th e sp onsor m ust specif y star t and e nd d ate s and t ime s fr om a dr op d own box
and popup calendar. By defining preset account durations you provide the sponso r with the a bility to
simply select the length of time starting from when they click the button to create the account.
Editing a User Interface Template
Step 1Select User Interface > T emplates and click the Edit T emplate butto n for the template you want to edit
in the Current Templates list.
Step 2From the menu at the top of the page sele ct Accounts > Account Duration. The Account Durations
screen appears (
Figure 10-8Account Duration
Step 3Click the Add Duration button to add a new account duratio n (Figure 10-9).
Figure 10-8).
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
10-7
Deleting a Template
Step 4Enter a description that you want to appear in the sponsor interface, such as “1 Hour.”
Step 5Select the de sire d durat ion f rom t he dro p d own menu.
Step 6Click the Add Duration Option button. You are taken back to the account durations list (Figure 10-8).
Step 7If you want to edit or delete an account option, select the entry from the list and click the appropriate
NoteThe Account Duratio ns option s onl y appe ar on t he spon sor’s screen if the user gr oup for the spon sor is
Chapter 10 Customizing the Application
Figure 10-9Add Account Duration
button.
set to Create Account By: Template Options. See
only account duration options that appear are the durations within the maximum duration set on the
sponsors user group .
Adding User Groups, page 5-1 for more details. The
Deleting a Template
Step 1From the administration interface select User Interface > Templates from the left hand menu .
Step 2Select the template you want to delete from the Current Templates list and click the Delete Template
button.
Step 3Confirm deletion of the template.
Setting the Default Interface Mapping
Once you have created your template you need to make the template active. This is a global operation
for the Cisco NAC Guest Server.
Step 1From the administration interface select User Interface > Mapp ing fro m the lef t hand men u.
10-8
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
Chapter 10 Customizing the Applicat io n
Figure 10-10Default User Interface Mapping
Step 2Select the T emplate from the dropdo wn list. This wi ll become the template used for the sponsor and guest
user interface.
Step 3Click the Set Template button.
Setting User Default Redirection
There are a number of opti ons that ea ch spon sor may wan t to cu stomiz e for th eir environment so that
they don’t need to make changes every time they log in to the sponsor interface. The items you can
change are the tem plat e ( for an oth er la ngu age) , th e t ime z one, a nd t he t e leph one c ou nt ry c ode .
Setting User Default Redirection
Sponsors can change these settings from their Preferences page once they are logged in. However , to ease
the situation for first time users of the application you can choose to direct sponsors to their preference
page on their first login to the system.
Step 1From the administration interface select User Interface > User Defaults from t he l eft hand me nu.
Figure 10-11User Defaults
Step 2Check the ch eck box if you want the sponso rs to b e redi rec ted to t he pre fere nce s pa ges upon the ir first
login to the syste m. I f y ou don ’t then make su re i t i s unche cked.
Step 3Click the Save S ettin g s button.
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
10-9
Setting User Default Redirection
Chapter 10 Customizing the Application
10-10
Cisco NAC Guest Server Installation and Configuration Guide
OL-15986-01
CHA PTER
11
Backup and Restore
Yo u should bac kup the C isco NAC Guest Server on a regu lar basi s so that in the event of a har dware
failure you do not loose critical data. The Cisco NAC Guest Server backup process backs up the system
setup, account data base, an d all a ud it r ecor ds e nabl ing y ou to r ecover everything you ne ed in the event
of a failure. You can either create a “point in time” snapshot, or schedule system back-ups to be
automatically saved on the Cisco NAC Guest Server or a remote FTP server.
This chapter includes the following sections:
• Configuring Backup Settings
• Restoring Backups
OL-15986-01
Cisco NAC Guest Server Installation and Configuration Guide
11-1
Configuring Backup Set ti ngs
Configuring Backup Settings
Step 1From the admi nist rati on home pa ge se le ct Server > Backup from the left hand menu (Figure 11-1).
Figure 11-1Backup Settings
Chapter 11 Backup and Restore
Taking a snapshot
Yo u have the option of saving a point in time snap shot which w ill allow you to download a backup of
the Cisco NAC Guest Server at this exact moment.
Step 1To save a snapshot backup, clic k the Snapshot button at the bottom of the form (Figure 11-1).
Yo u are pro mpted by your web browser to save the backup file to disk.
Cisco NAC Guest Server Installation and Configuration Guide
11-2
OL-15986-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.