11-25
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-29225-01
Chapter11 Configuring Authentication Types
Guest Access Management
Guest access is allowed for a maximum of twent-four days and a minimum of five minutes.
Beginning in privileged EXEC mode, use this command to delete a guest user:
ap# clear dot11 guest-user Gues-1
Beginning in privileged EXEC mode, use this command to display guest users:
ap# show dot11 guest-users
Customized Guest Access page
The guest access page can be customized to display a custom logo or other images. The guest login page
can be edited and loaded into flash. It is mandatory to load the login page, success page, and expired and
failure pages when we choose Customized Webauth.
Perform these steps to customize the login page, success page, expired and failure page:
Step1 Browse to the Guest Management Services page on the access point in the GUI.
Step2 Select Webauth Login.
Step3 Browse and upload these pages from your local server:
Success Page
Failure Page
Expired page
Step4 Select the file transfer method : FTP or TFTP.
Step5 Enter the Username.
Step6 Enter the Password.
Step7 Enter the Allowed-In ACL Name and the Allowed-Out ACL Name.
Step8 Click Close Window to save your changes.
Beginning in privileged EXEC mode, use these commands to load all the edited files to flash:
ap(config)# ip auth-proxy proxy http login page file flash:web_login.html
ap(config)# ip auth-proxy proxy http success page file flash:web_success.html
ap(config)# ip auth-proxy proxy http failure page file flash:web_fail.html
ap(config)# ip auth-proxy proxy http login expired page file flash:web_logout.html
Some ACL commands are also required to complete customizing of the guest access page. Beginning in
privileged EXEC mode, use these ACL commands:
ap(config)# dot11 webauth allowed incoming webauth_acl_in outgoing webaut_acl_out
ap(config)# ip access-list extended webauth_acl_in
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq www
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq 443
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq 443
ap(config-ext-nacl)# exit
ap(config)# ip access-list extended webauth_acl_out
ap(config-ext-nacl)# permit tcp any host 40.40.5.10 eq www