[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Configuring Cisco WLC 5508 for one SSID with http and another SSID with https webauth

Posted on 2012-09-03
4
Medium Priority
?
865 Views
Last Modified: 2013-11-25
Hi Experts,

We have Cisco WLC 5508 running software version 7.2.103.
There are 2 guest SSIDs on it.
I want to configure one with HTTP webauth and another with HTTPS webauth.

Currently, I run management access using HTTPS/SSH and webauth for both SSIDs with HTTP only. So I believe there would be a way to configure for individual SSIDs too.

Kindly help, is it possible? If so, please help with config commands.

Many Thanks!
0
Comment
Question by:roger_rex
2 Comments
 
LVL 47

Accepted Solution

by:
Craig Beck earned 2000 total points
ID: 38374145
Have a read of this...

https://supportforums.cisco.com/docs/DOC-13954#Hey_I_dont_want_to_be_bothered_with_certificates_ie_doing_webauth_over_HTTP_and_not_HTTPS


From what I can tell it appears that you can differentiate HTTP and HTTPS management (so Web-Auth via HTTP, while allowing HTTPS management) but you can't actually specify HTTP or HTTPS per SSID for Web-Auth.

However, you should be able to use a custom or external web page for Web-Auth which might be able to redirect to HTTPS for a particular SSID.
0
 

Author Comment

by:roger_rex
ID: 38387089
Hi Craigbeck,

Thanks for response.
I have checked with Cisco TAC and been told that redirection to external https server also will not work. Really disappointed.

But I still am expecting something different from experts community, as Cisco TAC sometimes misses out some points.
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

MAC Filtering: MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this. This means that if someone menti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question