Cisco Catalyst
Compatibility
The below instruction pertains to Cisco Catalyst 9800-CL Wireless Controller
Social WiFi has been tested and is proven to work on the following configurations:
Cisco Catalyst 9800-CL set up on KVM
- versions up to 17.3.4c
Cisco AIR-CAP3702I-E-K9
- versions compatibile with the Controller (installs as the AP provisions)
Accessing the device’s administration panel
- Log in to the administration panel with root permissions and go to Network.
Configure the controller
Go to Configuration -> Security -> Web Auth.
Click in to the global profile and make sure that the “Virtual IPv4 Address” is set as 192.0.2.1.
Press Apply.
Now, Add a new profile by clicking the Add button.
Parameter-map name | sw_webauth |
---|---|
Maximum HTTP connections | 200 |
Init-State Timeout | 3600 |
Type | webauth |
Press Apply to Device.
After you’ve created the profile, click on it and configure as follows:
On the General tab:
Banner Type | None |
---|---|
Captive Bypass Portal | Leave unchecked |
Disable Success Window | Enabled |
Disable Logout Window | Enabled |
Sleeping Client Status | Enabled |
Sleeping Client Timeout | 720 |
On the Advanced tab:
Redirect for log-in | https://login.socialwifi.com/ |
---|---|
Redirect On-Success | https://login.socialwifi.com/redirect/ |
Redirect On-Failure | https://login.socialwifi.com/ |
Redirect Append for AP MAC Address | ap_mac |
Redirect Append for Client MAC Address | client_mac |
Redirect Append for WLAN SSID | wlan_ssid |
Portal IPV4 Address | 35.190.70.141 |
Click Update & Apply.
Go to Configuration -> Security -> AAA.
In the Servers / Groups and next Servers tab click +Add.
Name* | sw_radius |
---|---|
Server Address* | 35.205.62.147 |
PAC Key | Leave unchecked |
Key Type | Clear Text |
Key | *Radius Secret available in Access Points tab of the Social WiFi Panel* |
Confirm Key | as above |
Auth Port | 31812 |
Acct Port | 31813 |
Server Timeout | 10 |
Retry Count | 3 |
Support for CoA | Enabled |
Press Apply to Device.
Go the Server Groups tab and press +Add.
Name | guest_radius |
Group Type | RADIUS |
MAC-Delimiter | hyphen |
MAC-Filtering | none |
Dead-Time (mins) | Leave default (5) |
Assigned Servers | sw_radius |
Source Interface VLAN ID | none |
Press Apply to Device.
Next, go to the AAA Method List tab. Make sure that1 Authentication is selected and press +Add. On the General tab:
Method List Name | guest_auth |
---|---|
Type | login |
Group Type | group |
Assigned Server Groups | guest_radius |
Press Apply to Device.
Switch to the Accounting tab on the left and click +Add.
Method List Name | guest_acct |
---|---|
Type | identity |
Assigned Server Groups | guest_radius |
Press Apply to Device.
Now, go to the AAA Advanced tab. Make sure you’re in “Global Config” and press Show Advanced Settings >>>. You should see “Radius Attributes” drop down. Configure as follows:
Accounting
Call Station ID | ap-macaddress-ssid |
---|---|
Call Station ID Case | upper |
MAC-Delimiter | hyphen |
Username Case | lower |
Username Delimiter | none |
Authentication
Call Station ID | ap-macaddress-ssid |
---|---|
Call Station ID Case | upper |
MAC-Delimiter | hyphen |
Press Apply to Device.
Now, go to the Configuration -> Security -> URL Filters. Click +Add.
List Name | guest_url_filter |
---|---|
Type | PRE_AUTH |
Action | PERMIT |
URLs
*.fbcdn.net*.licdn.com*.twimg.com*.ytimg.comtwitter.comx.comfacebook.comlinkedin.comsw-login.com*.youtube.comyt3.ggpht.com*.facebook.com*.linkedin.comapi.twitter.comapi.x.com*.googlevideo.comconnect.facebook.netlogin.socialwifi.comwww.googleadservices.comwww.googletagmanager.comgoogleads.g.doubleclick.net
Press Apply to Device.
Go to the Configuration -> Tags & Policies -> WLANs. Click +Add or edit an existing WLAN.
On the General tab:
Profile Name | *your profile name* |
SSID | *your SSID name* |
Status | Enabled |
Radio Policy | All |
Broadcast SSID | Enabled |
Go to the Security - Layer2 tab and set the Layer 2 Security Mode as “None” and MAC Filtering as Disabled. Leave rest as default.
In the Security - Layer 3 tab, click Show Advanced Settings >>> and configure as follows:
Web Policy | Enabled |
Web Auth Parameter Map | sw_webauth |
Authentication List | guest_auth |
On Mac Filter Failure | Disabled |
Splash Web Redirect | Disabled |
Press Apply to Device or Update & Apply to Device.
Now, go to Configuration -> Tags & Profiles -> Policy and press +Add. Leave all settings at default apart from the following:
On the General tab:
Name* | guest_policy |
---|---|
Status | Enabled |
On the Access Policies tab:
URL Filters - “guest_url_filter”
On the Advanced tab:
Session Timeout | 43200 |
---|---|
Idle Timeout | 3600 |
Allow AAA Override | Enabled |
Accounting List | guest_acct |
Click Apply to Device to save.
Next, go to Configuration > Tags & Profiles > Tags. Click +Add.
Name | admi |
---|---|
WLAN Profile | *your WiFi name* |
Policy Profile | guest_policy |
Click Apply to Device to save.
Go to Administration > Management > HTTP/HTTPS/Netconf and make sure that HTTP and HTTPS Access are Enabled.
Now you need to disable secure webauth. You can do it from the controllers CLI. Please run these commands:
enableconfigure terminalparameter-map type webauth globalwebauth-http-enablesecure-webauth-disable
Adding the device to Social WiFi platform
- Go to Configuration -> Wireless → Access Points.
- Copy the MAC addresses of the Access Points you would like to add to Social WiFi platform. You will have to change the format (from “xxxx.xxxx.xxxx” to “xx:xx:xx:xx:xx:xx”)
- Go to the Social WiFi Panel.
- Choose the place to which you would like to add the device.
- In the “Access Points” tab, press “Add” (upper right corner), paste the MAC address you copied into the form (adding a name is optional) and click “Create”.