Cisco Catalyst 9800 Wireless Controller (GUI) integration
Overview
The following guide covers Cisco Catalyst 9800 WLAN Controller configurations required to integrate the controller with NAC. Cisco Catalyst 9800 WLAN controllers running 17.3 or later are supported for centrally switched traffic. Radius Based Enforcement (RBE) is supported for Open networks and for Secure networks using WPA2E/802.1x. By configuring your NAC Enforcer as an Authentication and Accounting Server, creating Access-Lists and leveraging features available in the WLAN controller, NAC will be enabled to block, redirect or limit access based on NAC Policy Group definitions.
Network Preparation and Testing
Prior to integration with NAC, please confirm that the WLANs you will be integrating are fully functional. A simple test of successfully associating with the SSID and browsing to a non-cached website should suffice.
Static Route
The following steps ensure that any devices on your network using public DNS are still shown block pages on your NAC VM when redirected to portal.myweblogon.com
. To accomplish this, we need to create a static route so traffic destined for the "magic" 198.31.193.211
IP is instead forwarded to your NACs private IP. If this static route is already present on a Layer 3 routing device upstream of your wireless controller (e.g. if NAC was previously integrated with your core router for L3 enforcement), you can skip the rest of this section. If this static route is not present on the upstream router, follow the steps below to add the static route on the WLC.


NOTE: The NAC appliance must be no more than one L3 hop away from the WLC for this static route to work properly. If this is not the case in your environment, please contact OPSWAT Support if you require assistance with this task.
Config NAC Enforcer as a RADIUS server globally

Logical overview of steps 1-3
1. Create a new AAA Server
Click on Configuration then on Security → AAA. Create a new Radius Server.
Ensure that Support for CoA is set to Enabled . In the following examples, the NAC IP is 10.10.10.10
*. Make a note of the IP address and shared secret as this information will need to be provided to
your Impulse representative to complete the configuration on the appliance.
*If you have a separate RBE appliance, that IP should be used here instead of the Enforcer IP

2. Create a new Server Group
Go to Configuration > Security > AAA > Servers / Groups > Server Groups, and Click Add

3. Create Authorization/Authentication/Accounting List
3a. Create Authorization List
Go to Configuration > Security > AAA > AAA Method List > Authorization, Click Add

3b. Create Authentication List
Go to Configuration > Security > AAA > AAA Method List > Authentication, Click Add
Create Authentication list using following information that will be used for both OPEN SSID and SECURE SSID

3c. Create Accounting List
Go to Configuration > Security > AAA > AAA Method List > Accounting, Click Add

ACL Configuration
Configure "sc_initial_acl"
Go to Configuration > Security > ACL, Click Add
The sc ACL defines what access is permitted while an endpoint is being evaluated for policy. In the example below all access is permitted but restricted access may be configured as desired. NOTE – If the sc_initial acl ACL is restricted, ensure DNS, DHCP, traffic for your NAC Enforcer* and 198.31.193.211 are permitted. These are mandatory entries for restricted ACLs
*If you have a separate RBE appliance, allow access to your NAC enforcer AND the RBE appliance IPs

Configure "sc_compliant_acl"
Go to Configuration > Security > ACL, Click Add
The sc__compliant__acl ACL defines what access is allowed after successful authentication. In the example below full access is permitted but access may be configured as desired. NOTE - If additional different levels of access are to be defined for different roles, names must be unique. Example: “guest_compliant_acl”, “fac_compliant_acl”, “stu_compliant_acl”, etc.

Configure "sc_quarantine_acl" (redirect ACL)
Go to Configuration > Security > ACL, Click Add

Note: For the redirection ACL, think of the deny
action as a deny redirection (not deny traffic) and the permit
action as permit redirection. The WLC only looks into traffic that it can redirect (ports 80 and 443 by default).
Configure "sc_guest_acl"
Go to Configuration > Security > ACL, Click Add
The sc_guest_acl
ACL defines what access is allowed to compliant guest pass users.
NOTE - If different levels of access are to be defined for different roles, names must be unique. Example: VIP_guest_acl
, vendor_guest_acl
, etc.
NOTE – For custom guest ACLs, ensure DNS, DHCP, traffic for your NAC private IP, and the "magic" 198.31.193.211
IP are permitted.

Enable Redirection for HTTP or HTTPS
The web admin portal configuration is tied with the web authentication portal configuration and it needs to listen on port 80 in order to redirect. Therefore, HTTP has to be enabled for the redirection to work properly. You can either choose to enable it globally (with the use of the command ip http server
) or you can enable HTTP for the web authentication module only (with the use of the command webauth-http-enable
under the parameter map).
If you want to be redirected when you try to access an HTTPS URL, then add the command intercept-https-enable
under the parameter map but note this is not an optimal configuration, that it has an impact on the WLC CPU and generates certificate errors anyway
Captive Portal Bypass is enabled to improve the end user experience for mobile devices. More information on Cisco’s implementation of this feature can be found here
Secure WPA2E Wireless RBE Configuration
We use Wireless Setup => Advanced for create Secure WPA2E Wireless RBE
Go to Configuration > Wireless Setup > Advanced, click Start Now

WPA2E/802.1x Wireless RBE Configuration
1. Configure WLAN Profile
1a. Create new WLAN Profile
Choose on WLAN Profile, click Add

1b . Enter the WLAN general information

1c. Configure Secure WLAN Settings - Layer 2
Click on Security tab of the WLAN, click on the Layer 2 tab. Verify Layer 2 Security is set to ‘WPA+WPA2’ and Authentication Key Mgmt is set to 802.1x .

1d. Configure Secure WLAN Setting AAA
Under the Security tab of the WLAN, click on the AAA Servers tab. Add the NAC_Auth_List as an Authentication List

2. Create Policy Profile
2a Create Policy Profile
Choose on Policy Profile, click Add

2b Enter the WLAN general information

2c Assign VLAN for Policy Profile on Access Polices tab

2c Config Advanced Policy Profile

3. Create Policy Tag
3a Create a new Policy Tag
Choose on Policy Tag, click Add

3b Enter the Policy Tag name and WLAN profile + Policy profile

4. Create Tag APs
4a Create a new Tag APs
Choose Tag APs, click + Tag APs

4b Choose the Policy Tag

Open/PSK Wireless RBE Configuration
For Open or PSK WLANs, all steps are the same as for WPA2E/802.1x Wireless RBE Configuration, except you will skip section 1c and 1d, and follow the steps below instead:
On WLAN > Security > Layer 2, apply settings as below:

On WLAN > Settings > Layer 3, apply settings as below:

##