Sec BRWSR Auth Bypass
Sec BRWSR Auth Bypass
The Browser-Based Authentication Bypass feature enables web browsers to bypass authentication methods
such as HTTP Basic, Web Authorization Proxy, and Windows NT LAN Manager (NTLM) (passive or
explicit). Specific web browsers can be configured for authentication, and other browsers can be configured
to bypass authentication.
This module provides information about the feature and how to configure it.
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
1
Browser-Based Authentication Bypass
Information About Browser-Based Authentication Bypass
A network administrator configures a list of regular expression (regex) patterns in the IP admission module.
When the IP admission module receives the HTTP Get request, the module compares the user-agent string
in the HTTP header to the regex pattern that the administrator has configured for the bypass method.
The following rules apply to the Browser-Based Authentication Bypass feature:
• If a configured regex pattern does not match the user-agent field, a web browser is authenticated on the
basis of the configured web authentication method.
• If a configured regex pattern matches the user-agent field, authentication is bypassed for the web browser
and the HTTP traffic goes through to the Cisco Web Security cloud.
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
2
Browser-Based Authentication Bypass
How to Configure Browser-Based Authentication Bypass
1. enable
2. configure terminal
3. parameter-map type regex regex-map
4. pattern expression
5. exit
6. ip admission name admission-name bypass regex regex-map [absolute-timer minutes]
7. Perform one of the following tasks:
• ip admission name admission-name ntlm
• ip admission name admission-name http-basic
• ip admission name admission-name proxy http
DETAILED STEPS
Example:
Device# configure terminal
Step 3 parameter-map type regex regex-map Configures a parameter-map type with a regular expression
(regex) to match a specific traffic pattern and enters
Example: parameter-map type inspect configuration mode.
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
3
Browser-Based Authentication Bypass
Configuring Browser-Based Authentication Bypass
Step 6 ip admission name admission-name bypass regex Creates an IP Network Admission Control (NAC) rule to
regex-map [absolute-timer minutes] enable browser-based authentication bypass.
Example:
Device(config)# ip admission name rule1 bypass
regex regex-map1 absolute-timer 10
Step 7 Perform one of the following tasks: Configures one of the following authentication methods:
• ip admission name admission-name ntlm • Windows NT LAN Manager (NTLM)
• ip admission name admission-name http-basic • HTTP Basic
• ip admission name admission-name proxy http • Web Authorization Proxy
Example:
Device(config)# ip admission name rule1 ntlm
Step 8 interface type number Configures an interface and enters interface configuration
mode.
Example:
Device(config)# interface gigabitethernet0/1/0
Step 9 ip admission admission-name Creates a Layer 3 Network Admission Control (NAC) rule
to be applied to the interface.
Example:
Device(config-if)# ip admission rule1
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
4
Browser-Based Authentication Bypass
Verifying Browser-Based Authentication Bypass
What to Do Next
For any parameter-map change to be reflected, remove and configure the ip admission name admission-name
bypass regex regex-map [absolute-timer minutes] command in global configuration mode.
1. enable
2. show ip admission cache
3. show ip admission configuration
DETAILED STEPS
Step 1 enable
Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Device> enable
Example:
Device# show ip admission cache
Client Name N/A, Client IP 172.31.108.123, Port 63142, timeout 60, Time Remaining 60, state ESTAB
(Browser Auth Bypass)
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
5
Browser-Based Authentication Bypass
Configuration Examples for Browser-Based Authentication Bypass
Example:
Device# show ip admission configuration
Device> enable
Device# configure terminal
Device(config)# parameter-map type regex regex-map1
Device(config-profile)# pattern Chrome
Device(config-profile)# exit
Device(config)# ip admission name rule1 bypass regex regex-map1 absolute-timer 10
Device(config)# ip admission name rule1 ntlm
Device(config)# interface gigabitethernet0/1/0
Device(config-if)# ip admission rule1
Device(config-if)# end
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
6
Browser-Based Authentication Bypass
Feature Information for Browser-Based Authentication Bypass
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/support
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
7
Browser-Based Authentication Bypass
Feature Information for Browser-Based Authentication Bypass
Security Configuration Guide: Cloud Web Security, Cisco IOS Release 15M&T
8