Configuring custom messages for failed logins
This feature allows administrators to configure custom messages that are displayed when authentication with the RADIUS server fails. The messages are appended to existing internal web pages that display during the authentication process. Messages can be configured using the CLI, or centrally using the RADIUS server, and can provide a description of the reason for a failure as well as possible steps to take to resolve the authentication issue. There is no change to the current web-based authentication functionality.
Syntax:
aaa port-access web-based access-denied-message <<access-denied-str>|radius-response>
no aaa port-access web-based access-denied-message <<access-denied-str>|radius-response>
Specifies the text message (ASCII string) shown on the web page after an unsuccessful login attempt. The message must be enclosed in quotes.
The
no
form of the command means that no message is displayed upon failure to authenticate.
Default: The internal web page is used. No message will be displayed upon authentication failure.
access-denied-str
: The text message that is appended to the end of the web page when there is an unsuccessful authentication request. The string can be up to 250 ASCII characters.
radius-response
: Use the text message provided in the RADIUS server response to the authentication request.
Configuring an access denied message on the switch
switch(config)#aaa port-access web-based access-denied-message “Please contact your system administrator to obtain authentication privileges.”
Output showing the custom access denied message
switch(config)#show port-access web-based config Port Access Web-based Configuration DHCP Base Address : 192.168.0.0 DHCP Subnet Mask : 255.255.248.0 DHCP Lease Length : 10 seconds Allow RADIUS-assigned dynamic (GVRP) VLANs[No]: Yes Access Denied Message : Custom: Please contact your system administrator to obtain authentication privileges. | Client Client Logoff Re-auth Unauth Auth Ctrl Port | Enabled Limit Moves Period Period VLAN ID VLAN ID Dir ---- + ------- ------- ------- --------- --------- ------- ------- ----- 1 | Yes 1 No 300 60 1 2 both 2 | Yes 18 No 999999999 999999999 0 0 both 3 | Yes 22 No 999999999 999999999 4096 4096 both
Access denied message when radius-response is configured
switch(config)#show port-access web-based config Port Access Web-based Configuration DHCP Base Address : 192.168.0.0 DHCP Subnet Mask : 255.255.248.0 DHCP Lease Length : 10 seconds Allow RADIUS-assigned dynamic (GVRP) VLANs[No]: Yes Access Denied Message : Retrieved from Radius | Client Client Logoff Re-auth Unauth Auth Ctrl Port | Enabled Limit Moves Period Period VLAN ID VLAN ID Dir ---- + ------- ------- ------- --------- --------- ------- ------- ----- 1 | Yes 1 No 300 60 1 2 both 2 | Yes 18 No 300 999999999 0 0 both 3 | Yes 22 No 300 999999999 4096 4096 both
Unauthenticated clients can be assigned to a specific static, untagged VLAN (unauth-vid
), to provide access to specific (guest) network resources. If no VLAN is assigned to unauthenticated clients, the port is blocked and no network access is available.