Cisco Cisco NAC Appliance 4.9.4 Technisches Handbuch
Configuring Integrated URL Logging and
Reporting of Guest Traffic in a Cisco Network
Reporting of Guest Traffic in a Cisco Network
Document ID: 110304
Contents
Introduction
Prerequisites
Requirements
Components Used
Conventions
Background Information
Configure
Network Diagram
Integrated URL Logging from ASA to NGS
Configurations
ASA Configuration
WLC Configuration
NGS Configuration
Verify
Appendices
Appendix A Wired−Guest option
Appendix B Detailed Configurations for the WLCs
WLC Foreign Controller
Appendix C ASA Configuration
Related Information
Prerequisites
Requirements
Components Used
Conventions
Background Information
Configure
Network Diagram
Integrated URL Logging from ASA to NGS
Configurations
ASA Configuration
WLC Configuration
NGS Configuration
Verify
Appendices
Appendix A Wired−Guest option
Appendix B Detailed Configurations for the WLCs
WLC Foreign Controller
Appendix C ASA Configuration
Related Information
Introduction
This document describes how to integrate a NAC Guest Server (NGS) with Wireless LAN Controllers
(WLCs) and an Adaptive Security Appliance (ASA) to provide URL logging and reporting of guest traffic.
Many companies have a requirement to monitor guest traffic, and this paper provides information on how to
configure the Cisco components to meet that requirement.
(WLCs) and an Adaptive Security Appliance (ASA) to provide URL logging and reporting of guest traffic.
Many companies have a requirement to monitor guest traffic, and this paper provides information on how to
configure the Cisco components to meet that requirement.
Note that there are multiple Cisco solutions to configure Guest Access in a Cisco Network. This article
focuses on the method that uses the WLC as the enabling technology. The WLC has the unique ability to
tunnel traffic from the network edge to the Internet with EoIP. This feature eliminates the need to deploy
VPNs or ACLs within the network infrastructure to restrict guest traffic from leaking into the internal network
of the company.
focuses on the method that uses the WLC as the enabling technology. The WLC has the unique ability to
tunnel traffic from the network edge to the Internet with EoIP. This feature eliminates the need to deploy
VPNs or ACLs within the network infrastructure to restrict guest traffic from leaking into the internal network
of the company.
The bulk of this article covers Integrated URL Logging and Reporting in a wireless−guest network, but
this feature can be configured in a wired−guest network, as well. Appendix A provides details for a
wired−guest network.
this feature can be configured in a wired−guest network, as well. Appendix A provides details for a
wired−guest network.
Prerequisites
Requirements
Ensure that you meet these requirements before you attempt this configuration: