•
The login form must accept user entries for the username and password and must show them as
uname
and
pwd
.
•
The custom login page should follow best practices for a web form, such as page timeout, hidden
password, and prevention of redundant submissions.
Related Topics
Customizing the Authentication Proxy Web Pages, on page 378
Redirection URL for Successful Login Guidelines
When configuring a redirection URL for successful login, consider these guidelines:
•
If the custom authentication proxy web pages feature is enabled, the redirection URL feature is disabled
and is not available in the CLI. You can perform redirection in the custom-login success page.
•
If the redirection URL feature is enabled, a configured auth-proxy-banner is not used.
•
To remove the specification of a redirection URL, use the
no
form of the command.
•
If the redirection URL is required after the web-based authentication client is successfully authenticated,
then the URL string must start with a valid URL (for example, http://) followed by the URL information.
If only the URL is given without http://, then the redirection URL on successful authentication might
cause page not found or similar errors on a web browser.
Related Topics
Specifying a Redirection URL for Successful Login, on page 380
Web-based Authentication Interactions with Other Features
Port Security
You can configure web-based authentication and port security on the same port. Web-based authentication
authenticates the port, and port security manages network access for all MAC addresses, including that of the
client. You can then limit the number or group of clients that can access the network through the port.
Related Topics
Enabling and Configuring Port Security, on page 411
LAN Port IP
You can configure LAN port IP (LPIP) and Layer 2 web-based authentication on the same port. The host is
authenticated by using web-based authentication first, followed by LPIP posture validation. The LPIP host
policy overrides the web-based authentication host policy.
If the web-based authentication idle timer expires, the NAC policy is removed. The host is authenticated, and
posture is validated again.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
368
OL-29048-01
Configuring Web-Based Authentication
Web-based Authentication Interactions with Other Features