42-4
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
Chapter 42 Configuring Web-Based Proxy Authentication
Understanding How Web-Based Proxy Authentication Works
The initial login page is sent using HTTP and HTTPS and is used for submitting user credentials to the
Catalyst 6500 series switch. Until HTTPS functionality is fully operational, HTTP is used for credential
transfer.
The authentication initiation and message exchange sequence of events is shown in
Figure 42-2
.
Figure 42-2
Authentication Initiation and Message Exchange
Host Detection and HTTP Traffic Interception
Address Resolution Protocol (ARP) inspection is used to address hosts with static IP addresses assigned.
When ARP inspection receives any ARP request on a web-authenticated port, web-based proxy
authentication is triggered for a host IP address. If web-based proxy authentication is enabled on a port
that is operational, the web-based proxy authentication is initiated on all IP addresses in the Dynamic
Host Configuration Protocol (DHCP) snooping table. If a DHCP snooping entry does not exist,
web-based proxy authentication is not triggered until a DHCP snooping entry is created or an ARP
request is received.
Once the host is detected, the HTTP traffic from the host is intercepted and redirected to the supervisor
engine. This process is called URL redirection. To configure URL redirection, you must configure an
ACL to redirect all TCP port 80 ingress traffic to the supervisor engine by entering the
permit
url-redirect
command. The
permit url-redirect
command redirects all TCP port 80 traffic to the
supervisor engine.
Any ACL that is mapped to a port/port-VLAN with this access control entry (ACE) redirects all the
HTTP/HTTPS protocol packets that match the ACE criteria to the supervisor engine.
Host
NAD
RADIUS Server
http://www.yahoo.com
Intercept and establish
TCP Connection
Send Login page/
Login HTML Page
Extract user credentials
RADIUS ACCESS-REQUEST
HTTPS POST (credentials)
RADIUS ACCESS-ACCEPT
Send Credentials
to RADIUS server
Apply Policies
URL redirect to initial
RADIUS ACCESS-REJECT
Auth Failed
Start HOLD timer
Login-Fail Page
URL redirect to Login page
page(www.yahoo.com)
Send Login-fail page/
URL redirect to Login-fail
page
130921