Przejdź do głównej zawartości

Cisco Catalyst

Ta treść nie jest jeszcze dostępna w Twoim języku.

Compatibility

The below instruction pertains to Cisco Catalyst 9800-CL Wireless Controller

Social WiFi has been tested and is proven to work on the following configurations:

Cisco Catalyst 9800-CL set up on KVM

  • versions up to 17.3.4c

Cisco AIR-CAP3702I-E-K9

  • versions compatibile with the Controller (installs as the AP provisions)

Accessing the device’s administration panel

  • Log in to the administration panel with root permissions and go to Network.

Configure the controller

Go to Configuration -> Security -> Web Auth.

Click in to the global profile and make sure that the “Virtual IPv4 Address” is set as 192.0.2.1.

Press Apply.

Now, Add a new profile by clicking the Add button.

Parameter-map namesw_webauth
Maximum HTTP connections200
Init-State Timeout3600
Typewebauth

2023-02-21_15-55.png

Press Apply to Device.

After you’ve created the profile, click on it and configure as follows:

On the General tab:

Banner TypeNone
Captive Bypass PortalLeave unchecked
Disable Success WindowEnabled
Disable Logout WindowEnabled
Sleeping Client StatusEnabled
Sleeping Client Timeout720

On the Advanced tab:

Redirect for log-inhttps://login.socialwifi.com/
Redirect On-Successhttps://login.socialwifi.com/redirect/
Redirect On-Failurehttps://login.socialwifi.com/
Redirect Append for AP MAC Addressap_mac
Redirect Append for Client MAC Addressclient_mac
Redirect Append for WLAN SSIDwlan_ssid
Portal IPV4 Address35.190.70.141

2023-02-21_16-02_1.png

2023-02-21_16-04.png

Click Update & Apply.

Go to Configuration -> Security -> AAA.

In the Servers / Groups and next Servers tab click +Add.

Name*sw_radius
Server Address*35.205.62.147
PAC KeyLeave unchecked
Key TypeClear Text
Key*Radius Secret available in Access Points tab of the Social WiFi Panel*
Confirm Keyas above
Auth Port31812
Acct Port31813
Server Timeout10
Retry Count3
Support for CoAEnabled

Press Apply to Device.

2023-02-21_16-26.png

Go the Server Groups tab and press +Add.

2023-02-21_16-29.png

Nameguest_radius
Group TypeRADIUS
MAC-Delimiterhyphen
MAC-Filteringnone
Dead-Time (mins)Leave default (5)
Assigned Serverssw_radius
Source Interface VLAN IDnone

2023-02-21_16-52.png

Press Apply to Device.

Next, go to the AAA Method List tab. Make sure that1 Authentication is selected and press +Add. On the General tab:

2023-02-21_16-55.png

Method List Nameguest_auth
Typelogin
Group Typegroup
Assigned Server Groupsguest_radius

Press Apply to Device.

2023-02-21_16-58.png

Switch to the Accounting tab on the left and click +Add.

2023-02-21_16-59.png

Method List Nameguest_acct
Typeidentity
Assigned Server Groupsguest_radius

2023-02-21_17-06.png

Press Apply to Device.

Now, go to the AAA Advanced tab. Make sure you’re in “Global Config” and press Show Advanced Settings >>>. You should see “Radius Attributes” drop down. Configure as follows:

Accounting

Call Station IDap-macaddress-ssid
Call Station ID Caseupper
MAC-Delimiterhyphen
Username Caselower
Username Delimiternone

Authentication

Call Station IDap-macaddress-ssid
Call Station ID Caseupper
MAC-Delimiterhyphen

Press Apply to Device.

Now, go to the Configuration -> Security -> URL Filters. Click +Add.

List Nameguest_url_filter
TypePRE_AUTH
ActionPERMIT

URLs

*.fbcdn.net
*.licdn.com
*.twimg.com
*.ytimg.com
twitter.com
x.com
facebook.com
linkedin.com
sw-login.com
*.youtube.com
yt3.ggpht.com
*.facebook.com
*.linkedin.com
api.twitter.com
api.x.com
*.googlevideo.com
connect.facebook.net
login.socialwifi.com
www.googleadservices.com
www.googletagmanager.com
googleads.g.doubleclick.net

2023-02-21_17-22.png

Press Apply to Device.

Go to the Configuration -> Tags & Policies -> WLANs. Click +Add or edit an existing WLAN.

On the General tab:

Profile Name*your profile name*
SSID*your SSID name*
StatusEnabled
Radio PolicyAll
Broadcast SSIDEnabled

2023-02-21_17-30.png

Go to the Security - Layer2 tab and set the Layer 2 Security Mode as “None” and MAC Filtering as Disabled. Leave rest as default.

2023-02-21_17-36.png

In the Security - Layer 3 tab, click Show Advanced Settings >>> and configure as follows:

Web PolicyEnabled
Web Auth Parameter Mapsw_webauth
Authentication Listguest_auth
On Mac Filter FailureDisabled
Splash Web RedirectDisabled

2023-02-21_17-39.png

Press Apply to Device or Update & Apply to Device.

Now, go to Configuration -> Tags & Profiles -> Policy and press +Add. Leave all settings at default apart from the following:

On the General tab:

Name*guest_policy
StatusEnabled

2023-02-21_17-52.png

On the Access Policies tab:

URL Filters - “guest_url_filter”

2023-02-21_17-53.png

On the Advanced tab:

Session Timeout43200
Idle Timeout3600
Allow AAA OverrideEnabled
Accounting Listguest_acct

2023-02-21_17-55.png

Click Apply to Device to save.

Next, go to Configuration > Tags & Profiles > Tags. Click +Add.

Nameadmi
WLAN Profile*your WiFi name*
Policy Profileguest_policy

Click Apply to Device to save.

2023-02-22_10-46.png

Go to Administration > Management > HTTP/HTTPS/Netconf and make sure that HTTP and HTTPS Access are Enabled.

2023-02-22_10-54.png

Now you need to disable secure webauth. You can do it from the controllers CLI. Please run these commands:

enable
configure terminal
parameter-map type webauth global
webauth-http-enable
secure-webauth-disable

2023-02-22_10-56.png

Adding the device to Social WiFi platform

  • Go to Configuration -> Wireless → Access Points.
  • Copy the MAC addresses of the Access Points you would like to add to Social WiFi platform. You will have to change the format (from “xxxx.xxxx.xxxx” to “xx:xx:xx:xx:xx:xx”)
  • Go to the Social WiFi Panel.
  • Choose the place to which you would like to add the device.
  • In the “Access Points” tab, press “Add” (upper right corner), paste the MAC address you copied into the form (adding a name is optional) and click “Create”.