42-4
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
Chapter 42 Configuring Web-Based Authentication
About Web-Based Authentication
Customization of the Authentication Proxy Web Pages
During the web-based authentication process, the internal HTTP server of the switch hosts four HTML
pages for delivery to an authenticating client. The four pages allow the server to notify you of the
following four states of the authentication process:
Login—Your credentials are requested.
Success—The login was successful.
Fail—The login failed.
Expire—The login session has expired because of excessive login failures.
Note When your customized web-based authentication page is replaced with a new page (file) of the same
name in the switch system directory (i.e. flash), the new page will not be seen; you will see the older
page. Beginning with Release 15.0(2)SG, the new page will not display until you enter the ip admission
proxy http refresh-all command.
In Cisco IOS Release 12.2(50)SG, you can substitute your custom HTML pages for the four default
internal HTML pages, or you can specify a URL to which you are redirected upon successful
authentication, effectively replacing the internal Success page.
Web-Based Authentication Interactions with Other Features
These sections describe web-based authentication interactions with these features:
Port Security, page 42-4
LAN Port IP, page 42-5
Gateway IP, page 42-5
ACLs, page 42-5
Context-Based Access Control, page 42-5
802.1X Authentication, page 42-5
EtherChannel, page 42-5
Switchover, page 42-5

Port Security

You can configure web-based authentication and port security on the same port. (You configure port
security on the port with the switchport port-security interface configuration command.) When you
enable port security and web-based authentication on a port, web-based authentication authenticates the
port, and port security manages network access for all MAC addresses, including that of the client. You
can then limit the number or group of clients that can access the network using the port.
For more information about enabling port security, see Chapter 43, “Configuring Port Security.”