All Collections
Installation Manuals
Install Obifi on Cisco AP
Install Obifi on Cisco AP

Follow the steps below to manage visitor authentication on Cisco using Obifi Hotspot.

O
Written by OBIFI
Updated over a week ago

Log in to the Cisco WLC web interface.

Radius Server Configuration

Navigate to Security > AAA > Radius > Authentication section.

Click the Add New button to add a new Radius Server.

Enter the following values in their respective fields::

Server Ip Address :

138.197.180.226

Shared Secret:

YeT2dXVs6D

Confirm Shared Secret:

YeT2dXVs6D

Creating ACL Groups

Navigate to the Access Control Lists menu. (If you are using FlexConnect, navigate to the FlexConnect ACLs menu.)

Follow these steps:

  • Enter a name in the Access Control List Name.

  • Select Permit in Action.

  • Click on the ACL entry you created.

  • Click the Add-Remove URL button. Add the domains listed below one by one:

    • obifi.io

    • obifi.com

WLAN Settings

Click on the WLANs menu.

Create a new WLAN with 'Create New > Go' or select an existing WLAN.

  • Select Section as WLAN.

  • Enter a name in the Profile Name section.

  • Enter the desired WiFi SSID for your visitors in the SSID section.

  • Click the Apply button to apply the changes.


Make the following changes in the General tab of the added WLAN:

  • Select Enabled in the Status section.

Select the Layer 2 tab by choosing the Security tab.

  • Set Layer 2 Security to None.

Switch to the Layer 3 tab and make the following changes:


Choose Web Policy for Layer 3 Security.

  • Check the Authentication option.

  • Select your WLAN Name as the Pre-authentication ACL.

  • Choose Override Global Config Enable.

  • Select External as the Web Auth type

  • Enter http://portal-app.obifi.com as the Redirect URL.

Navigate to the AAA Servers tab and make the following changes:

  • Enable Authentication Servers.

  • Select Radius Server you created before in Server 1.

  • Accounting Servers Enabled olarak işaretleyiniz.

  • Select Interim Update Enabled and set the value to 600

  • For Authentication priority order for web-auth user (Not Used), choose LOCAL and LDAP.

  • For Authentication priority order for web-auth user (Order Used For Authentication), choose RADIUS.

Go to the Advanced tab and make the following changes:

Enable Allow AAA Override.

  • Enable Session Timeout.

  • Enter the session timeout time in seconds (e.g., 50400 for 24 hours).

  • After completing the steps, click the Apply button to save the changes.

In the Management section, select the HTTP/HTTPS menu on the left-hand side of the page and make the following changes:

  • Choose Disabled for WebAuth SecureWeb.

  • Choose Disabled for HTTPS Redirection.

You have successfully completed the setup and can now test it.

Feel free to contact us for support with the setup.


Did this answer your question?