<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EndPoint Whitelist in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331248#M107950</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I mean to say whether it is possible to enable MAB for Wireless endpoints?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks&lt;/P&gt;&lt;P&gt;Sankung &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Aug 2013 17:18:50 GMT</pubDate>
    <dc:creator>sawosankung</dc:creator>
    <dc:date>2013-08-28T17:18:50Z</dc:date>
    <item>
      <title>EndPoint Whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331247#M107944</link>
      <description>&lt;P&gt;In ISE v1.1.1, is it possible to create a whitelist of endpoints just for a specific WLAN SSID - i.e. a whitelist that can be associated wih only one SSID?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;P&gt;Sankung&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331247#M107944</guid>
      <dc:creator>sawosankung</dc:creator>
      <dc:date>2019-03-11T03:49:55Z</dc:date>
    </item>
    <item>
      <title>EndPoint Whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331248#M107950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I mean to say whether it is possible to enable MAB for Wireless endpoints?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks&lt;/P&gt;&lt;P&gt;Sankung &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Aug 2013 17:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331248#M107950</guid>
      <dc:creator>sawosankung</dc:creator>
      <dc:date>2013-08-28T17:18:50Z</dc:date>
    </item>
    <item>
      <title>EndPoint Whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331249#M107955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it possible to enable MAB for wireless endpoint. For configuration help you can see the below link.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_sw_cnfg.html"&gt;http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_sw_cnfg.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 02:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331249#M107955</guid>
      <dc:creator>Ravi Singh</dc:creator>
      <dc:date>2013-08-29T02:54:47Z</dc:date>
    </item>
    <item>
      <title>EndPoint Whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331250#M107959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sankung&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;1. &lt;/STRONG&gt;A guest user connects to the network using a wireless connection and has a MAC address that is not in the&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;endpoint identity store or is not marked with an AUP accepted attribute set to true, and receives a URL redirection authorization profile. The URL redirection presents the user with an AUP acceptance page when the guest user attempts to go to any URL.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;2.&amp;nbsp; &lt;/STRONG&gt;If the guest user accepts the AUP, their MAC address is registered as a new endpoint in the endpoint identity store (assuming the endpoint does not already exist). The new endpoint is marked with an AUP accepted attribute set to true, to track the user’s acceptance of the AUP. An administrator can then assign an endpoint identity group to the endpoint, making a selection from the Guest Management Multi-Portal Configurations page.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;3.&amp;nbsp; &lt;/STRONG&gt;If the guest’s endpoint already exists in the endpoint identity store, the AUP accepted attribute is set to true on the existing endpoint. The endpoint’s identity group is then automatically changed to the value selected in the Guest Management Multi-Portal Configurations page.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;4.&amp;nbsp; &lt;/STRONG&gt;If the user does not accept the AUP or an error occurs in the creation of the endpoint, an error page appears.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;5.&amp;nbsp; &lt;/STRONG&gt;After the endpoint is created or updated, a success page appears, followed by a CoA termination being sent to the NAD/WLC.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;6. &lt;/STRONG&gt;After the CoA, the NAD/WLC reauthenticates the user’s connection with a new MAB request. The new authentication finds the endpoint with its associated endpoint identity group, and returns the configured access to the NAD/WLC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify; line-height: normal;"&gt;Enter the following commands to enable the various AAA functions between the switch and Cisco ISE, including 802.1X and MAB authentication functions: &lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;aaa new-model&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;Creates an 802.1X port-based authentication method list&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;aaa authentication dot1x default group radius&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;Required for VLAN/ACL assignment&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;aaa authorization network default group radius&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;Authentication &amp;amp; authorization for webauth transactions&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;aaa authorization auth-proxy default group radius&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;Enables accounting for 802.1X and MAB authentications&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;aaa accounting dot1x default start-stop group radius&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;aaa session-id common&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;aaa accounting update periodic&lt;/STRONG&gt; &lt;EM&gt;5&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;Update AAA accounting information periodically every 5 minutes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more detail configuration and commands, please see the below link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_ug.pdf"&gt;http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_ug.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at page no.807&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Best Regards:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Muhammad Munir&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;PLEASE rate="" the="" helpful="" posts=""&gt;&lt;/PLEASE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 04:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331250#M107959</guid>
      <dc:creator>Muhammad Munir</dc:creator>
      <dc:date>2013-08-30T04:27:21Z</dc:date>
    </item>
    <item>
      <title>EndPoint Whitelist</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331251#M107965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG style="text-decoration: underline; "&gt;WIRELESS:&lt;/STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;Simply means brining a new device onto the network for the first time. On-boarding can be designed many ways however for this post we will use two SSIDs called Provisioning_Wireless for new devices and Employee_Wireless for existing approved devices.&amp;nbsp; An accesslist limiting access to ISE, DHCP and DNS will be enabled to prevent devices from staying on the provisioning SSID.&amp;nbsp; &lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG style="text-decoration: underline; "&gt;Go to&lt;/STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt; &lt;STRONG&gt;WLANs &amp;gt; Create New &amp;gt; Go&lt;/STRONG&gt;&lt;/SPAN&gt; and fill out the profile details. Use NONE for the layer 2 settings so it’s OPEN. For AAA, set the Radius server for ISE. Under advanced, enabled Allow AAA Override and change the NAC state to Radius NAC. Go to &lt;STRONG&gt;Controller &amp;gt; General &amp;gt; Fast SSID&lt;/STRONG&gt; change and enabled Fast SSID to help speed up the SSID changing.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG&gt; i- &lt;/STRONG&gt;&lt;STRONG&gt;Join the&lt;/STRONG&gt; ISE to an AD system. &lt;STRONG&gt;ii-&lt;/STRONG&gt; Define the certificate authentication profile &lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG&gt;iii&lt;/STRONG&gt;- Define an Identity Source Sequence iv- Configure ISE to act as a Simple Certificate Enrollment proxy server&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG style="text-decoration: underline; "&gt;For this scenario, Configure ISE authentication to use MAB for on-boarding new devices.&lt;/STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;In many cases, ISE will not know the MAC addresses in advance so it must be configured to continue the authentication process via redirection regardless.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;This is done in ISE:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Policy &amp;gt; Authentication&lt;/STRONG&gt;, choose your MAB wireless policy, click the carrot after allow protocols to show the user options and click the + sign for use.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Select IF USERS NOT FOUND&lt;/STRONG&gt;, &lt;STRONG&gt;CONTINUE&lt;/STRONG&gt;. As a reminder, ISE Authentication policies are verified top down so make sure your MAB policy used for BYOD is at the top and open for all identity stores. You should lock down the 802.1x wireless to only wireless certificates.&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;Client provisioning is based on how ISE classifies the client machine. There are customized packages in ISE available that include a software-provisioning wizard, which configures 802.1x settings and ability to obtain digital certificates on the endpoint.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG&gt;To download wizard packages in ISE&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;&lt;STRONG&gt;Policy Elements &amp;gt; Results &amp;gt; Client Provisioning &amp;gt; Resources &amp;gt; Add&lt;/STRONG&gt;. Common mobile devices such as iOS typically have these settings enabled natively so a wizard is not needed.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; text-align: justify;"&gt;To configure client provisioning in ISE:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Policy Elements &amp;gt; Results &amp;gt; Client Provisioning &amp;gt; Resources &amp;gt; Add&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Create a native suppliant profile&lt;/STRONG&gt; by giving it a name, selecting the Wireless Checkbox, your on-boarding SSID, WPA2 for security, TLS for allow protocols and key size 2048.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Policy &amp;gt; Client &amp;gt; Provisioning&lt;/STRONG&gt; to build your provisioning resources. Create one for native devices and select the mobile profile you just created for the results (example RULE = IOS, Identiy Group = Any, Operating systems MAC IOS ALL and your new mobile profile for results).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Create another that is similar however use Android for the operating systems&lt;/STRONG&gt;. Create a third for generic MacOsX devices and use the downloaded wizard. You may also want to create a separate one for Wired and Wireless. The same goes for two more to cover wireless and wired Windows devices. Here is an example of my Client Polices&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;The final steps are verifying profiling for wireless&lt;/STRONG&gt; is working as well as your authorization profiles are setup for redirection, employee and guest access (see previous postings for these configs). These can vary depending on how you want to restrict devices that pass and fail your polices.&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG style="text-decoration: underline; "&gt;For Complete Guide Please visit&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;A href="http://www.thesecurityblogger.com/?tag=ise-advance-license"&gt;&lt;STRONG&gt;http://www.thesecurityblogger.com/?tag=ise-advance-license&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;Video Link for Configuration of BYOD &lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"&gt;&lt;A href="http://www.labminutes.com/sec0054_ise_1_1_byod_wireless_onboarding_dual_ssid_testing"&gt;&lt;STRONG&gt;http://www.labminutes.com/sec0054_ise_1_1_byod_wireless_onboarding_dual_ssid_testing&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 16:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-whitelist/m-p/2331251#M107965</guid>
      <dc:creator>aqjaved</dc:creator>
      <dc:date>2013-08-30T16:48:36Z</dc:date>
    </item>
  </channel>
</rss>

