ISE’s guest access system is one of its most visible features — visitors, contractors, and BYOD users all need network access, and ISE gives you complete control over how that access is granted, monitored, and expired. But the configuration has a lot of moving pieces: portal types, sponsor workflows, CWA redirects, guest types, and VLAN assignments all need to work together.

This guide walks through the full setup for all three portal types, the CWA flow that ties it to the network, and the sponsor portal configuration for enterprise deployments.

Cisco ISE Guest Portal Setup — Self-Registration, Sponsored, Hotspot, CWA


How ISE Guest Access Works

Before touching configuration, understand the flow:

  1. An unregistered device connects to the guest SSID or VLAN
  2. The network device (switch/WLC/Meraki) runs MAC Authentication Bypass (MAB) — it sends the device MAC to ISE
  3. ISE doesn’t recognize the MAC and returns an authorization result that redirects the browser to the guest portal
  4. The device’s browser opens any HTTP page and gets redirected to the ISE portal URL
  5. The guest registers, logs in, or accepts the AUP depending on portal type
  6. ISE sends a Change of Authorization (CoA) back to the network device
  7. The network device re-authenticates the session and grants guest network access

This is Central Web Authentication (CWA) — the portal lives on ISE, not on the network device.


Portal Type 1 — Self-Registered Guest Portal

Best for: public events, open coworking spaces, visitor lobbies — anywhere guests can self-serve without needing a sponsor.

Create the Portal

  1. Go to Work Centers > Guest Access > Portals & Components > Guest Portals
  2. Click Create and select Self-Registered Guest Portal
  3. Set a name (e.g. Self-Reg-Guest-Portal)
  4. Configure Portal Settings:
    • HTTPS Port: leave at 8443 (or your chosen port)
    • Allowed Interfaces: select the ISE PSN interface guests will hit
    • Certificate: select a certificate trusted by guest browsers (or a public CA cert)

Portal Behavior Settings

Under the Self-Registration tab:

  • Fields to collect: at minimum, First Name, Last Name, and Email Address
  • Require email verification: sends a confirmation link — good for accountability, adds friction
  • Require admin approval: holds the account pending sponsor approval before access is granted
  • Guest Type: assign the guest type that controls account duration and access level (configure guest types first — see below)
  • AUP: enable and paste your acceptable use policy text

Guest Types

Guest Types control how long accounts last and what kind of access guests receive.

  1. Go to Work Centers > Guest Access > Portals & Components > Guest Types
  2. Edit or create a Guest Type:
    • Maximum Account Duration: e.g. 1 Day
    • Allow guests to extend their access: optional
    • Login options: simultaneous logins, maximum failed login attempts
  3. Assign this Guest Type to the portal

Portal Type 2 — Sponsored Guest Portal

Best for: enterprise visitors, contractors, auditors — anyone who needs access granted by an internal employee.

The sponsor (employee) creates the guest account via the Sponsor Portal. The guest receives credentials by email or SMS and logs in through the guest portal.

Create the Guest Portal

Same as above but choose Sponsored Guest Portal. The login page will ask for username/password — credentials the sponsor provides.

Configure the Sponsor Portal

  1. Go to Work Centers > Guest Access > Portals & Components > Sponsor Portals

  2. Edit the default Sponsor Portal or create a new one

  3. Under Sponsor Groups tab, configure which internal users can be sponsors:

    • Map an AD group (e.g. corp.example.com/Groups/Guest-Sponsors) to the ALL_ACCOUNTS sponsor group
    • Or use ISE internal groups if not using AD
  4. Under the sponsor group permissions, configure:

    • What guest types can sponsors create: restrict sponsors to specific guest types (e.g. 1-day visitor accounts only)
    • Can sponsors approve accounts: set if sponsor-approved accounts need manual activation
    • Can sponsors delete guests: yes for self-serve management
    • Can sponsors extend accounts: optional

Once configured, sponsors log in to https://<ise-psn>:8443/sponsorportal using their AD credentials. They can:

  • Create a guest account (enter name, email, duration)
  • Print or email the credentials to the guest
  • View all active guest sessions they’ve created
  • Extend or revoke access

Portal Type 3 — Hotspot Portal

Best for: cafeterias, waiting rooms, hotel lobbies — maximum convenience, minimum friction.

Guests connect, open a browser, see an AUP page, click Accept, and get access. No credentials. ISE registers the MAC address and grants access automatically.

  1. Go to Work Centers > Guest Access > Portals & Components > Guest Portals
  2. Create a Hotspot Guest Portal
  3. Configure the AUP text and optional redirect URL after acceptance
  4. Optionally enable Require guest device compliance if you want to redirect non-compliant devices

Hotspot portals use a pre-auth access code (optional) — if enabled, you post a code in the room and guests enter it to proceed past the AUP. Useful for filtering unauthorized access in physical spaces.


Configuring the CWA Redirect Flow

This is the ISE policy configuration that ties the portal to your network.

Step 1 — Create a Redirect ACL

On your network device, create an ACL that:

  • Permits DNS (UDP 53) and DHCP (UDP 67/68) — needed before the guest can reach the portal
  • Permits traffic to ISE PSN IP (so the portal redirect works)
  • Denies everything else

For Cisco Catalyst switches:

ip access-list extended GUEST_REDIRECT
 permit udp any any eq 53
 permit udp any any eq 67
 permit udp any any eq 68
 permit tcp any host <ISE-PSN-IP> eq 8443
 deny   ip any any

For Meraki: create a Group Policy with a firewall rule. Meraki handles the redirect internally without a named ACL.

Step 2 — Create the Guest Authorization Profile

  1. Policy > Policy Elements > Results > Authorization > Authorization Profiles
  2. Create profile: Guest_CWA_Redirect
  3. Set Web Redirection type to Centralized Web Auth
  4. Select the guest portal you created
  5. Set ACL to the redirect ACL name above
  6. Leave VLAN blank — the guest VLAN assignment happens after CoA

Step 3 — Create a Post-Authentication Authorization Profile

After the guest authenticates through the portal:

  1. Create profile: Guest_Access
  2. Set VLAN to your guest VLAN ID (e.g. VLAN 100)
  3. Set a downloadable ACL (dACL) limiting guest access — typically allow internet, deny RFC1918 (internal networks)

Step 4 — Build the Authorization Policy Rules

In your policy set, add two rules in this order:

PriorityConditionResult
1Network Access:UseCase EQUALS Guest Flow AND Session:PortalName EQUALS Self-Reg-Guest-PortalGuest_Access
2Radius:Called-Station-ID ENDS_WITH :Guest-SSID OR Network Access:AuthenticationMethod EQUALS MABGuest_CWA_Redirect

Rule 2 catches the initial unauthenticated MAB and serves the redirect. Rule 1 (evaluated first) catches the post-portal-authentication CoA and grants access.


Email and SMS Notifications

Email Setup

  1. Administration > System > Settings > SMTP Server
  2. Enter your SMTP server hostname, port, and credentials
  3. Test the connection

Once configured, guest portal email notifications will work automatically for self-registered and sponsored accounts.

SMS Setup

  1. Work Centers > Guest Access > Settings > SMS Gateway
  2. Select your SMS gateway provider (Clickatell, Syniverse, or custom HTTP)
  3. Enter API credentials
  4. Map the provider format to ISE’s notification template

Verifying Guest Sessions

After a guest authenticates:

  1. Operations > RADIUS > Live Logs — confirm the MAB authentication and CoA re-authentication appear
  2. Work Centers > Guest Access > Reports > Guest Activity — shows all active guest sessions, account status, and login history
  3. Operations > Reports > Guest > Master Guest Report — audit trail of all guest accounts created, activated, and expired

Common Issues

Guest is redirected but portal page won’t load

  • Check firewall between client and ISE PSN on port 8443
  • Verify the ISE portal certificate is trusted by the guest browser (use a public CA cert for public-facing portals)
  • Confirm the redirect ACL permits traffic to the ISE PSN IP

CoA after portal login doesn’t work — guest stays on redirect ACL

  • Confirm CoA is enabled on the NAD: aaa server radius dynamic-author on Catalyst, or CoA enabled in Meraki RADIUS settings
  • Verify CoA port 1700 is open from ISE to the NAD
  • Check that the NAD is using the real PSN IP for CoA, not the load balancer VIP

Sponsor can’t create guest accounts

  • Verify the sponsor’s AD group is mapped to a Sponsor Group in ISE
  • Confirm the sponsor is authenticating with AD credentials (not local ISE account)
  • Check that the Sponsor Portal is reachable at https://<ise-psn>:8443/sponsorportal

🎯 Studying for CCIE Security?

Practice with free flashcards, quizzes, and hands-on lab scenarios at cciesec.it-learn.io — built specifically for the CCIE Security v6.1 written (350-701 SCOR) and lab exam.