Skip to main contentSkip to search
Skip to main content

Cisco Catalyst 9800

Configure Cisco Catalyst 9800 Wireless LAN Controller with IronWiFi for enterprise-grade authentication. This guide provides CLI and GUI configuration for AAA RADIUS servers, web authentication parameter maps, pre-authentication ACLs, and Passpoint (Hotspot 2.0) profiles for guest and secure employee WiFi networks.

Prerequisites

In Cisco Catalyst 9800:

  • Cisco Catalyst 9800 WLC
  • Network connectivity between WLC and IronWiFi RADIUS servers
  • CLI access to the WLC

In IronWiFi Console (complete these first):

  1. Create a Network in IronWiFi Console
  2. Create a Captive Portal with vendor Cisco
  3. Note the following details:
    • Primary and Backup RADIUS server IP addresses
    • RADIUS ports (
      {AUTH_PORT}
      for authentication,
      {ACCT_PORT}
      for accounting)
    • Shared secret
    • Splash Page URL

WLC Configuration

Step 1: Configure AAA

Add RADIUS Server

Create Server Group

Configure AAA Methods

Step 2: Configure WLAN

Create WLAN Profile

Step 3: Configure Web Auth Parameter Map

Step 4: Configure ACL

Create pre-auth ACL:

Required Walled Garden Entries

In addition to the IronWiFi splash page IP (107.178.250.42) and DNS entries above, you may need to add entries for authentication providers and payment processors:

ProviderRequired Entries
Google
*.google.com
,
*.googleapis.com
,
*.gstatic.com
,
accounts.google.com
Facebook
*.facebook.com
,
*.fbcdn.net
,
connect.facebook.net
,
facebook.com
LinkedIn
*.linkedin.com
,
*.licdn.com
,
linkedin.com
Twitter/X
*.twitter.com
,
*.twimg.com
,
twitter.com
,
*.x.com
,
x.com
Apple
*.apple.com
,
*.icloud.com
,
appleid.apple.com
Microsoft Entra ID
*.microsoft.com
,
*.microsoftonline.com
,
*.msftauth.net
,
login.microsoftonline.com
Stripe
*.stripe.com
,
js.stripe.com
PayPal
*.paypal.com
,
*.paypalobjects.com
Twilio (SMS)
*.twilio.com

Step 5: Apply Configuration

Passpoint Configuration

The following configuration enables Hotspot 2.0 (Passpoint) for seamless authentication:

Configure Hotspot 2.0

Apply to WLAN

WPA-Enterprise Configuration

The following configuration is for 802.1X authentication without web authentication:

Verification Commands

After completing the configuration steps above, verify everything works correctly.

Check RADIUS server status:

show aaa servers

Check WLAN configuration:

Check client status:

Troubleshooting

If testing reveals issues, use this section to diagnose common problems:

SymptomCauseSolution
RADIUS not respondingNetwork connectivity issueVerify connectivity:
ping {RADIUS_IP}
RADIUS not respondingServer configuration errorCheck server status:
show aaa servers
RADIUS not respondingIncorrect shared secretVerify shared secret matches IronWiFi Console
RADIUS not respondingFirewall blocking RADIUSCheck firewall rules allow UDP
{AUTH_PORT}
-
{ACCT_PORT}
Web Auth not redirectingACL not appliedVerify ACL is applied to WLAN
Web Auth not redirectingParameter-map misconfiguredCheck parameter-map configuration
Web Auth not redirectingIncorrect redirect URLEnsure redirect URL is correct
Web Auth not redirectingCannot reach splash pageTest client can reach 107.178.250.42
Authentication failuresInvalid credentialsCheck RADIUS logs in IronWiFi Console
Authentication failuresWLC configuration issueReview WLC debugging:
debug aaa all
and
debug web-auth all
Authentication failuresUser account problemVerify user credentials in IronWiFi Console

For this vendor

Shared configuration

Was this page helpful?