Web-Based Authentication Configuration Guidelines and Restrictions
•
Web-based authentication is an ingress-only feature.
•
You can configure web-based authentication only on access ports. Web-based authentication is not
supported on trunk ports, EtherChannel member ports, or dynamic trunk ports.
•
You cannot authenticate hosts on Layer 2 interfaces with static ARP cache assignment. These hosts are
not detected by the web-based authentication feature because they do not send ARP messages.
•
By default, the IP device tracking feature is disabled on a switch. You must enable the IP device tracking
feature to use web-based authentication.
•
You must configure at least one IP address to run the switch HTTP server. You must also configure
routes to reach each host IP address. The HTTP server sends the HTTP login page to the host.
•
Hosts that are more than one hop away might experience traffic disruption if an STP topology change
results in the host traffic arriving on a different port. This occurs because the ARP and DHCP updates
might not be sent after a Layer 2 (STP) topology change.
•
Web-based authentication does not support VLAN assignment as a downloadable-host policy.
•
Web-based authentication supports IPv6 in Session-aware policy mode. IPv6 Web-authentication requires
at least one IPv6 address configured on the switch and IPv6 Snooping configured on the switchport.
•
Web-based authentication and Network Edge Access Topology (NEAT) are mutually exclusive. You
cannot use web-based authentication when NEAT is enabled on an interface, and you cannot use NEAT
when web-based authentication is running on an interface.
Configuring the Authentication Rule and Interfaces
Examples in this section are legacy-style configurations. For new-style configurations, see the
Session Aware
Networking Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
This example shows how to verify the configuration:
Switch#
show ip admission status
IP admission status:
Enabled interfaces
0
Total sessions
0
Init sessions
0
Max init sessions allowed
100
Limit reached
0
Hi watermark
0
TCP half-open connections
0
Hi watermark
0
TCP new connections
0
Hi watermark
0
TCP half-open + new
0
Hi watermark
0
HTTPD1 Contexts
0
Hi watermark
0
Parameter Map: Global
Custom Pages
Custom pages not configured
Banner
Banner not configured
Beginning in privileged EXEC mode, follow these steps to configure the authentication rule and interfaces:
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01
311
Configuring Web-Based Authentication
Web-Based Authentication Configuration Guidelines and Restrictions