Gateway & AP – Set-Up Guide
Configuring Cisco vWLC

This guide applies to all WiFi Cisco controllers. The configuration procedure has been performed and tested for version 8.8.100.0 and shows only a basic configuration. A Cisco AIR-AP-1832I-E-K9 has been used to provide connection to clients.

To correctly integrate a Cisco controller with HSNM, the installer must have good networking skills, and the controller must:

  • be connected to the Internet
  • be reachable on the network
  • correctly assign IP addresses to access points
  • have all management, service-port and virtual interface correctly configured

For any further details about Cisco vWLC configuration, you can refer to Cisco documentation at https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-guide/b_cg80.html

Configuring the Radius Authentication

Step 1

Click the Security tab at the top, then click the RADIUS menu on the left and scroll down to Authentication.

Step 2

In the Auth Called Station ID Type field, select “System MAC Address”.

Step 3

In the MAC Delimiter field, select “Colon”.

Step 4

Click New in the top right corner to add the Radius Server for authentication.

Step 5

Now configure RADIUS Authentication Servers as follows:

  • Server Address ­­– Enter the Server address used to reach HSNM
  • Shared Secret Format – select “ASCII”
  • Shared Secret – Enter the radius secret that you have set in the System Settings of your HSNM
  • Tick the Apply Cisco ISE Default settings
  • Port Number – 1812
  • Server Status – select “Enabled”
  • Support for CoA – select “Enabled”

Step 6

Click Apply and Save configuration to save the entries.

Configuring the Radius Accounting

Step 1

In order to configure RADIUS server for accounting, select the Security menu at the top. Then, click AAA > RADIUS on the left and scroll down to Accounting.

Step 2

In the Auth Called Station ID Type field, select “System MAC Address”.

Step 3

 In the MAC Delimiter field, select “Colon”.

Step 4

 Click New in the top right corner to add RADIUS server for accounting.

Step 5

Now configure RADIUS Authentication Servers as follows:

  • Server Address ­­– Enter the Server address used to reach HSNM
  • Shared Secret Format – select “ASCII”
  • Shared Secret – Enter the radius secret that you have set in the System Settings of your HSNM
  • Port Number – 1813

Step 6

Click Apply and Save configuration to save the entries.

Configuring the Welcome Portal

Step 1

Click the Security menu at the top. Then click theWeb Authmenu on the left and scroll down to Web Login Page.

Step 2

In the Web Authentication Type field, select “External”.

Step 3

In the External Webauth URL field, enter http://YourHSNM_IP_OR_DOMAIN/portal/index.php?domainname=YourDomainName&hotspotname=YourHotspotName&ciscowlc=

Step 4

Click the Apply to save the entry.

Configuring the Access Control List

An Access Control List (ACL) is a set of rules used to limit the access to a particular interface.

Step 1

In order to configure the ACL, click the Security menu at the top. Then click the Access Control Lists menu on the left and scroll down to Access Control Lists.

Step 2

In this case, it is necessary to set two access lists, Outbound and Inbound, in order to reach HSNM.

Step 3

Click FlexConnect ACLs on the left and then scroll down to IPv4 ACL.

Step 4

On the top right corner, click the Add Rule button and then select IP Rule. Non you can enter the two network classes in order to send and receive data.

Adding the Walled Garden

Step 1

From the IPv4 ACL menu, you can also configure the walled garden. Just click the Add Rule button, in the top right corner, and then select URL Rule.

URL rules are limited to 20 entries. If you require more than 20, you need to configure IP rules in order to be able to reach the desired networks during the pre-authentication phase.

To know the accurate and relevant Walled Garden you need to add one by one, access your HSNM platform and click the contextual dropdown menu of your gateway. Select Download Walled Garden to get a .txt file with your accurate walled garden list as shown Figure Download Walled Garden.

Figure Download Walled Garden

Step 2

Once completed, click Save Configuration in the top right corner.

Authorizing an Access Point

You need to authorize an access point to perform traffic according to the policies just configured.

Step 1

To do that, click Security at the top. From the AAA menu on the left, select Disabled Clients > AP Policies.

Step 2

In the Policy Configuration section, tick “Accept Self Signed Certificate (SSC)” and “Accept Manufactured Installed Certificate (MIC)”.

Step 3

Click the Add button to access the Add AP to Authorization List section. In the MAC address field, enter your AP MAC address. In the Certificate Type field, select “MIC”.

Step 4

Once completed, click the Add button below.

Step 5

To save the entries, click the Apply button and then Save Configuration at the top.

Configuring the WLAN

You can view WLANs currently configured by clicking the WLANs menu at the top and then WLANs on the left.

Step 1

To configure WLANs, two options are available:

  • You can display or edit the details for an existing WLAN by clicking the corresponding WLAN ID.
  • You can create a new WLAN by selecting “Create New” and clicking the Go

Step 2

Under the General tab, select “management” as Interface/Interface Group(G).

Step 3

Then, move to the Securitytab and select the Layer 2 section. In the Layer 2 Security field, select “None”.

Step 4

Now move to theLayer 3section. In the Layer 3 Security field, select “Web Policy”. Below, tick “Authentication”.

Step 5

Set the WebAuth Flex IPV4 Acl field only after completing steps 9 and 10.

Step 6

From the Security tab, select the AAA Servers section. Enable the RADIUS Server Overwrite interface and select “WLAN” in the Interface Priority field.

Step 7

Under Authentication Servers and Accounting Servers, you can set the Radius Servers previously created in “Configuring the Radius Authentication” and “Configuring the Radius Accounting”.

Step 8

Scroll down to Authentication priority order for web-auth user section and make sure that “RADIUS” is set as the only item.

Step 9

From the Security tab, move to the Advanced tab. Enable Allow AAA Override.

Step 10

Scroll down to the FlexConnect section and enable FlexConnect Local Switching 2and Learn Client IP Address 5.

Step 11

Once completed, click the Apply button and then Save Configuration.

Configuring Wireless

Step 1

Click the Wireless menu and select Access Points > All APs on the left.

Step 2

Click the AP Name of each AP you need to apply ACLs to.

Step 3

Starting from the General tab, select FlexConnect in the AP Mode field.

Step 4

Click the Apply button to save the entry.

Step 5

Move to the FlexConnect tab. Tick WLAN Support, then enter “1” in the Native VLAN ID field.

Step 6

Scroll down to PreAuthentication Access Control Lists and click External WebAuthentication ACLs.

Step 7

Here you have to set ACLs you have previously created to both WLAN and Policies section. The image below shows all the steps.

Step 8

To save the entries, click the Apply button and then Save Configuration at the top.

Controller

Step 1

Click the Controller menu at the top and then General on the left. Then, select “PAP” in the Web Radius Authentication field and set an IP address in the DNS Server IP (IPv4/IPv6) field.

Step 2

Once completed, click the Apply button and then Save Configuration.

Appendix A

HTTPS

You need to add an SSL certificate if you have enabled HTTPS in the controller and in case:

  • HSNM is set with “HTTPS as default”.  
  • you want to redirect users to HTTPS Welcome Portal.

At the following URL, https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-guide/b_cg80.html, you can find Cisco documentations providing steps to correctly configure the controller with an SSL certificate.

Step 1

From the Security menu at the top, select Web Auth > Certificate.

Step 2

Now tick Download SSL Certificate as shown below.

Step 3

Once completed, click Save Configuration.

SSL certificate must be uploaded through a TFPT server.

Step 4

Select the Controller menu at the top and then click Interfaces on the left. Now find and click “virtual” below Interface Name in order to edit it.

Step 5

In the DNS Host Name field, set a third level domain name for your HSNM domain.

In this case you need to apply for a wildcard certificate (*.HSNMDOMAIN.com) from a CA (Certificate Authority). In this way, you can set, for example:

  • HSNM.HSNMcom in the Domain Name filed of your HSNM Web Server section in the System Settings
  • HSNMDOMAIN.com in the DNS Host Name field of your Cisco WLC virtual interface.

Step 6

Create an hostA record that points to your Cisco WLC virtual interface IP Address.

Please, read carefully Cisco documentation in order to set a right IP Address in the IP Address field of the virtual interface.

Step 7

Select the Management menu at the top and then click SNMP > HTTP-HTTPS on the left. 

Step 8

Now, enable WebAuth SecureWeb. If you want users to be redirected to the Welcome Portal even when trying to surf an https website, enable HTTPS Redirection.

Step 9

Once completed, click the Apply button and Save Configuration.

Step 10

Then, you need to reboot Cisco WLC from the Commands menu for the new certificate to take effect.

To correctly add an SSL certificate in your HSNM, you can refer to the HSNM Administration Manual available in the “Documentation” section of your HSNM.