How to integrate Proxyclick with Cisco ISE (Wi-Fi)
Requirements:
-
Proxyclick Enterprise Plan
-
Proxyclick Administrator Access
-
Cisco ISE Administrator Access
-
On-Premise Firewall Administrator Access
Getting started with Proxyclick Wi-Fi add-on
To get started with the Proxyclick Wi-Fi add-on go to proxyclick.app.axians-cloud.be and log in with your Proxyclick account. You will be prompted to configure a location.
General overview
The Proxyclick Guest Wi-Fi add-on has 2 major parts: the Wi-Fi add-on itself and the Wi-Fi Bridges.
The Wi-Fi add-on runs in the Cloud and is available over the web at https://proxyclick.app.axians-cloud.be/
The Wi-Fi Bridges run inside your own network and enable integration between the add-on and your Wi-Fi system. Several options are available.
This diagram shows a visual overview:
Location Configuration Guide
There are 2 steps to configuring a location in the Proxyclick Wi-Fi add-on:
Add the desired location in the add-on
Note: after the first login you are prompted to configure a location, so your desired location may have been added already.
-
Login to the Proxyclick Wi-Fi add-on at https://proxyclick.app.axians-cloud.be/login
-
Select “Locations” in the top menu
-
On the locations page select “Configure location”
-
Select your desired location from the drop-down list and enter a message to send to visitors (don’t worry, you can always change this afterwards)
-
Click “Create”
-
Your location has been added to the Wi-Fi add-on
Connecting the Proxyclick webhook
-
Login to the Proxyclick Wi-Fi add-on at https://proxyclick.app.axians-cloud.be/login
-
Select “Locations” in the top menu
-
Click the location. You can see the webhook configuration parameters that are used to configure a webhook in Proxyclick.
4. Open a new browser window/tab and login to Proxyclick at https://app.proxyclick.com/login.
5. Click the Settings icon
6. Select “Integrations” in the left menu.
7. Click "Settings" under API and Webhooks
8. Click Add Webhook
9. Name your Webhook (eg. Wi-Fi add-on) and enter the information you can find on the location details page in the Axians portal (Step 3 above).
10. Click “Save”
The Wi-Fi add-on is now connected. You are ready to configure the Wi-Fi Bridge that will integrate with your Cisco ISE system.
Cisco ISE Bridge Configuration Guide
The Cisco ISE Bridge uses a sponsor user to create guest accounts through Cisco ISE’s ERS API.
Log in to your Cisco ISE administration node to start the configuration.
Step 1: Prepare a sponsor group
-
Go to Work Centers → Guest Access → Portals & Components → Sponsor Groups
-
Click ALL_ACCOUNTS (this guide uses the ALL_ACCOUNTS Sponsor Group, but you can configure your own if you want)
-
Make sure that the checkbox “Access Cisco ISE guest accounts using the programmatic interface (Guest REST API)” is enabled for the Sponsor Group. It can be found at the very bottom of the page in the section “Sponsor Can”
-
Save the configuration
Step 2: Set up a sponsor user
-
Go to Administration → Identity Management → Identities → Users
-
Add a user with the following configuration:Status: EnabledPassword Type: Internal UsersUser Groups contains the Sponsor Group you want to use. This guide uses “ALL_ACCOUNTS”.
-
Remember the password of the sponsor user, it will be needed later.
-
Click Submit
Step 3: Create a guest type
-
Go to Work Centers → Guest Access → Portals & Components → Guest Types
-
Click “Create”
-
Give the guest type a clear name and description, for example:Guest type name: Proxyclick VisitorsDescription: Guest accounts for Proxyclick visitors
-
Add ALL_ACCOUNTS (or your own Sponsor Group) where it says “These sponsor groups can create this guest type:”
-
Remember the guest type name, it will be needed later.
-
Save the configuration
Step 4: Find the Sponsor Portal ID
-
Go to Work Centers → Guest Access → Portals & Components → Sponsor Portals
-
Click the Sponsor Portal you want to use
-
Right click on the Portal test URL link and copy the URL of the portal and paste it somewhere
-
The Sponsor Portal ID is the last part of the URL after ?portal=…
-
Remember this ID, it will be needed later
Step 5: Find the Location name
-
Go to Work Centers → Guest Access → Settings → Guest Locations and SSIDs
-
Choose a location and remember the Location Name, it will be needed later
Step 6: Enable Cisco ISE ERS APIs
-
Go to Administration → System → Settings → ERS Settings
-
Enable ERS for Read/Write
-
Save the configuration
To test if the sponsor user has access to Cisco ISE’s guest user API, make an HTTP request to https://<ise-admin-console-host>:9060/ers/config/guestuser/versioninfo
The response should look something like this: { “VersionInfo” : { “currentServerVersion” : “2.0”, “supportedVersions” : “2.0”, “link” : … } }
Windows user can user PowerShell:
$sponsoruser = Get-Credential
Invoke-WebRequest -Headers @{“accept”=”application/json”} -Credential $sponsoruser -Uri ‘https://<cisco-ise-host>:9060/ers/config/guestuser/versioninfo’
Linux users can use the curl command:
curl -k -H ‘ACCEPT: application/json’ –user ‘<sponsorusername>:<sponsorpassword>’ ‘https://<cisco-ise-host>:9060/ers/config/guestuser/versioninfo’
Or you can use a tool like Postman:
Step 7: Configure NAT
If you Cisco ISE administration node is behind a firewall you will need to configure NAT in your firewall so that the Axians cloud’s public IP address (82.146.118.60) can access the ISE Policy administration node on port 9060
Step 8: Configure a Cisco ISE Bridge in the Wi-Fi Add-on web application
-
Login to the Proxyclick Wi-Fi add-on at https://proxyclick.app.axians-cloud.be/login
-
Select “Wi-Fi Bridges” in the top menu
-
Click “Add first” (or “Add new” if you already have Bridges configured) and select the location you want to configure the Bridge for
-
In the next screen, select “Cisco ISE” as Bridge type. The Integration environment ID can be anything when configuring Cisco ISE. We suggest that you pick something clear containing your location name like “cisco-ise-merelbeke”. Click “Create new Wi-Fi Bridge” to continue
-
The next screen configures the integration itself:Host: this is the public ip address or domain name that will be mapped by the NAT configuration from step 7Port: port 9060 is usedSponsor user name: the name of the sponsor user from step 2Sponsor user password: the sponsor user’s passwordClick the test connection button. If it turns green the ERS API on the administration node can be reached and the sponsor user has access to the guest user API.Guest type: the Guest Type from step 3Sponsor Portal Id: the Sponsor Portal ID from step 4Location: the location name from step 5Save the configuration
You are now ready to test.
A check-in in Proxyclick should create a new guest user. You can see the users being created by logging into the sponsor portal with the sponsor user.
A check-out in Proxyclick will suspend that user.
If you have any questions or feedback, please contact support@proxyclick.com or send us a message on the live chat.