Ruckus Icx Cisco Ise Cwa DP
Ruckus Icx Cisco Ise Cwa DP
Ruckus Icx Cisco Ise Cwa DP
Cisco ISE Integration with a Ruckus ICX Switch for Web Authentication
Guest Access NAC Solution
Export Restrictions
These products and associated technical data (in print or electronic form) may be subject to export control laws of the United
States of America. It is your responsibility to determine the applicable regulations and to comply with them. The following notice
is applicable for all products or technology subject to export control:
These items are controlled by the U.S. Government and authorized for export only to the country of ultimate destination for use by the
ultimate consignee or end-user(s) herein identified. They may not be resold, transferred, or otherwise disposed of, to any other country
or to any person other than the authorized ultimate consignee or end-user(s), either in their original form or after being incorporated
into other items, without first obtaining approval from the U.S. government or as otherwise authorized by U.S. law and regulations.
Disclaimer
THIS CONTENT AND ASSOCIATED PRODUCTS OR SERVICES ("MATERIALS"), ARE PROVIDED "AS IS" AND WITHOUT WARRANTIES OF
ANY KIND, WHETHER EXPRESS OR IMPLIED. TO THE FULLEST EXTENT PERMISSIBLE PURSUANT TO APPLICABLE LAW, ARRIS
DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INFRINGEMENT, FREEDOM FROM COMPUTER VIRUS,
AND WARRANTIES ARISING FROM COURSE OF DEALING OR COURSE OF PERFORMANCE. ARRIS does not represent or warrant
that the functions described or contained in the Materials will be uninterrupted or error-free, that defects will be corrected, or
are free of viruses or other harmful components. ARRIS does not make any warranties or representations regarding the use of
the Materials in terms of their completeness, correctness, accuracy, adequacy, usefulness, timeliness, reliability or otherwise. As
a condition of your use of the Materials, you warrant to ARRIS that you will not make use thereof for any purpose that is unlawful
or prohibited by their associated terms of use.
Limitation of Liability
IN NO EVENT SHALL ARRIS, ARRIS AFFILIATES, OR THEIR OFFICERS, DIRECTORS, EMPLOYEES, AGENTS, SUPPLIERS, LICENSORS
AND THIRD PARTY PARTNERS, BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL, EXEMPLARY OR
CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER, EVEN IF ARRIS HAS BEEN PREVIOUSLY ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES, WHETHER IN AN ACTION UNDER CONTRACT, TORT, OR ANY OTHER THEORY ARISING FROM
YOUR ACCESS TO, OR USE OF, THE MATERIALS. Because some jurisdictions do not allow limitations on how long an implied
warranty lasts, or the exclusion or limitation of liability for consequential or incidental damages, some of the above limitations
may not apply to you.
Trademarks
ARRIS, the ARRIS logo, Ruckus, Ruckus Wireless, Ruckus Networks, Ruckus logo, the Big Dog design, BeamFlex, ChannelFly,
EdgeIron, FastIron, HyperEdge, ICX, IronPoint, OPENG, SmartCell, Unleashed, Xclaim, ZoneFlex are trademarks of ARRIS
International plc and/or its affiliates. Wi-Fi Alliance, Wi-Fi, the Wi-Fi logo, the Wi-Fi CERTIFIED logo, Wi-Fi Protected Access (WPA),
the Wi-Fi Protected Setup logo, and WMM are registered trademarks of Wi-Fi Alliance. Wi-Fi Protected Setup™, Wi-Fi Multimedia™,
and WPA2™ are trademarks of Wi-Fi Alliance. All other trademarks are the property of their respective owners.
Overview............................................................................................................................................................................................... 5
Switch Configuration........................................................................................................................................................................... 5
ISE Configuration.................................................................................................................................................................................. 6
Summary............................................................................................................................................................................................. 25
The information in this document is based on the following software and hardware versions:
• Cisco Identity Services Engine (ISE), Release 2.1.0
• Ruckus ICX switch running FastIron 08.0.70
Audience
This document can be used by technical marketing engineers, system engineers, technical assistance center engineers, and
customers to deploy a Ruckus ICX switch with Cisco ISE.
Related Documents
• Ruckus FastIron Security Configuration Guide, 08.0.70
http://docs.ruckuswireless.com/fastiron/08.0.70/fastiron-08070-securityguide/GUID-15DD872A-E999-4D90-9CB4-
C89733A0493B-homepage.html
Document History
Date Part Number Description
Overview
Switch Configuration
The Ruckus ICX switch must be configured with MAC authentication, external web authentication, RADIUS, and CoA in order for
CWA to work.
authentication
auth-default-vlan <temporary_auth_vlan>
mac-authentication enable
mac-authentication enable ethe 1/1/47
captive-portal brocade
virtual-ip <CiscoISE_domain_name>
virtual-port 8443
login-page <CiscoISE_guest_portal>
............
vlan <temporary_auth_vlan> name <temporary_auth_vlan_name> by port
............
vlan <temporary_guest_vlan> name <temporary_guest_vlan_name> by port
webauth
captive-portal profile brocade
auth-mode captive-portal
trust-port ethernet 1/1/1 <-- uplink port
enable
............
vlan <final_guest_vlan> name <final_guest_vlan_name> by port
...........
web-management https
ISE Configuration
Cisco ISE configuration consists of creating an authorization profile, creating an authentication rule, and creating an
authorization rule with two policies.
1. Create an authorization profile. Cisco ISE generates a link to access its web portal. The web link must be copied to the
login page portion of the captive portal profile on the switch.
2. Create an authentication rule to allow the flow with an unknown MAC address to continue rather than being dropped.
3. Create an authorization rule with two policies. One policy is applied before web authentication so the user is moved to
the temporary guest VLAN to perform web authentication. The other policy is applied after web authentication succeeds
so the guest user is moved to the final guest VLAN.
and will be redirected to the Cisco ISE guest portal. After successful user login, the switch port connected to the client PC will be
bounced and the user will be successfully authenticated.
Once the link is connected, the PC will be authenticated by MAC authentication and the PC session will be placed in the
correct VLAN. The CLI output for the Ruckus ICX switch shows the device MAC address, VLAN assignment, and state.
3. The PC user opens a web browser and is redirected to the Cisco ISE web guest portal.
4. After web authentication, the switch port is disabled and then re-enabled.
May 21 19:28:41:I:MAC-AUTH: CoA disabled and enabled (flip) the Port 1/1/47
5. After the switch port is bounced, the PC is authorized by MAC authentication again and the PC session is moved to a new
VLAN.
The CLI output for the Ruckus ICX switch shows the device MAC address, VLAN assignment, and state.
6. The PC receives a new IP address after the PC session is moved to a new VLAN. The PC user can now access the Internet.
FIGURE 20 Templates
FIGURE 22 Permissions
FIGURE 24 Disconnect
FIGURE 25 Redirect
Summary
This document shows the configurations and steps necessary to configure CWA on Cisco ISE and a Ruckus ICX switch. It also gives
the details of the CWA flow for better understanding and easy deployment of CWA in the existing network infrastructure.