<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE issue and re-direct to a portal in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-issue-and-re-direct-to-a-portal/m-p/2157645#M132803</link>
    <description>&lt;P&gt;I have an issue that I need help on.&amp;nbsp; This has to do with wired 802.1x NOT wireless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a network Windows 2008R2 Active Directory Servers and ISE version 1.1.2 patch-5.&amp;nbsp; The ISE is &lt;/P&gt;&lt;P&gt;integrated with Active Directory without any issues.&amp;nbsp; The supplicant is native Windows 7 Enterprise 64bits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured Windows 7 suplicant for "User or Machine authentication".&amp;nbsp; on the ISE Authentication rule, I&lt;/P&gt;&lt;P&gt;configure the ISE for 802.1x with ACtive Directory called CCIESEC.&amp;nbsp; On the authorization rule, I've &lt;/P&gt;&lt;P&gt;configured 802.1x and was machine authticated equals true.&amp;nbsp; I also have another rule that states "machine&lt;/P&gt;&lt;P&gt;auththenticated begins with "/host".&amp;nbsp; That will permit access.&amp;nbsp; Default rule is "deny access". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also set the Machine Access Restrictions (MAR) to 1 hour for testing purpose.&amp;nbsp; After one hour, the &lt;/P&gt;&lt;P&gt;machine must be rebooted or they will not have access to the network.&amp;nbsp; I've setup "close" mode (aka high&lt;/P&gt;&lt;P&gt;impact mode).&amp;nbsp; Everything is working almost as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I would like to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- user connects Windows 7 machine to the network.&amp;nbsp; When the CTL-ALT-DELETE appears, the machine will be&lt;/P&gt;&lt;P&gt;machine authenticated.&amp;nbsp; When the user type in the Active Directory password, it will be "user authenticated".&lt;/P&gt;&lt;P&gt;it is working now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- After 1 hour, the MAR expires, meaning that the machine will no longer has network access.&amp;nbsp; when the user types in the user/password, I want the browser to popup and re-direct the user to a html portal saying something like "this machine will need to be rebooted in order to have network connectivity restore".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would go about doing this in step 2?&amp;nbsp; please help with detail steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 03:17:13 GMT</pubDate>
    <dc:creator>david.tran</dc:creator>
    <dc:date>2019-03-11T03:17:13Z</dc:date>
    <item>
      <title>ISE issue and re-direct to a portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-issue-and-re-direct-to-a-portal/m-p/2157645#M132803</link>
      <description>&lt;P&gt;I have an issue that I need help on.&amp;nbsp; This has to do with wired 802.1x NOT wireless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a network Windows 2008R2 Active Directory Servers and ISE version 1.1.2 patch-5.&amp;nbsp; The ISE is &lt;/P&gt;&lt;P&gt;integrated with Active Directory without any issues.&amp;nbsp; The supplicant is native Windows 7 Enterprise 64bits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured Windows 7 suplicant for "User or Machine authentication".&amp;nbsp; on the ISE Authentication rule, I&lt;/P&gt;&lt;P&gt;configure the ISE for 802.1x with ACtive Directory called CCIESEC.&amp;nbsp; On the authorization rule, I've &lt;/P&gt;&lt;P&gt;configured 802.1x and was machine authticated equals true.&amp;nbsp; I also have another rule that states "machine&lt;/P&gt;&lt;P&gt;auththenticated begins with "/host".&amp;nbsp; That will permit access.&amp;nbsp; Default rule is "deny access". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also set the Machine Access Restrictions (MAR) to 1 hour for testing purpose.&amp;nbsp; After one hour, the &lt;/P&gt;&lt;P&gt;machine must be rebooted or they will not have access to the network.&amp;nbsp; I've setup "close" mode (aka high&lt;/P&gt;&lt;P&gt;impact mode).&amp;nbsp; Everything is working almost as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I would like to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- user connects Windows 7 machine to the network.&amp;nbsp; When the CTL-ALT-DELETE appears, the machine will be&lt;/P&gt;&lt;P&gt;machine authenticated.&amp;nbsp; When the user type in the Active Directory password, it will be "user authenticated".&lt;/P&gt;&lt;P&gt;it is working now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- After 1 hour, the MAR expires, meaning that the machine will no longer has network access.&amp;nbsp; when the user types in the user/password, I want the browser to popup and re-direct the user to a html portal saying something like "this machine will need to be rebooted in order to have network connectivity restore".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would go about doing this in step 2?&amp;nbsp; please help with detail steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-issue-and-re-direct-to-a-portal/m-p/2157645#M132803</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2019-03-11T03:17:13Z</dc:date>
    </item>
    <item>
      <title>ISE issue and re-direct to a portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-issue-and-re-direct-to-a-portal/m-p/2157646#M132835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please check this......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) Please check that the two Cisco av-pairs, configured on the&amp;nbsp; authorization profile should exactly match the example below. (Note: Do&amp;nbsp; not replace the “IP” with the actual Cisco ISE IP address.) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;–&amp;nbsp; url-redirect=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ip:8443/guestportal/gateway?...lue&amp;amp;action=cpp"&gt;https://ip:8443/guestportal/gateway?...lue&amp;amp;action=cpp&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;– url-redirect-acl=ACL-WEBAUTH-REDIRECT (please ensure that this ACL&amp;nbsp; is also defined on the access switch) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.)Ensure that the URL redirection portion of the ACL have been&amp;nbsp; applied to the session by entering the show epm session ip &lt;SESSION&gt; command on the switch. (Where the session IP is the IP address&amp;nbsp; that is passed to the client&lt;/SESSION&gt;&lt;/P&gt;&lt;P&gt; machine by the DHCP server.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; i.e. &lt;/P&gt;&lt;P&gt;Admission feature : DOT1X &lt;/P&gt;&lt;P&gt;AAA Policies : #ACSACL#-IP-Limitedaccess-4cb2976e &lt;/P&gt;&lt;P&gt;URL Redirect ACL : ACL-WEBAUTH-REDIRECT &lt;/P&gt;&lt;P&gt;URL Redirect : &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://node250.cisco.com:8443/guestportal/gateway?sessionId=0A000A720000A45A2444BFC2&amp;amp;action=cpp"&gt;https://node250.cisco.com:8443/guestportal/gateway?sessionId=0A000A720000A45A2444BFC2&amp;amp;action=cpp&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.) Also make sure that the preposture assessment DACL that is&amp;nbsp; enforced from the Cisco ISE authorization profile contains the following&amp;nbsp; command lines: &lt;/P&gt;&lt;P&gt;remark Allow DHCP &lt;/P&gt;&lt;P&gt;permit udp any eq bootpc any eq bootps &lt;/P&gt;&lt;P&gt;remark Allow DNS &lt;/P&gt;&lt;P&gt;permit udp any any eq domain &lt;/P&gt;&lt;P&gt;remark ping &lt;/P&gt;&lt;P&gt;permit icmp any any&lt;/P&gt;&lt;P&gt;permit tcp any host 80.0.80.2 eq 443 --&amp;gt;for URL redirect &lt;/P&gt;&lt;P&gt;permit tcp any host 80.0.80.2 eq www --&amp;gt; to provides access to&amp;nbsp; internet &lt;/P&gt;&lt;P&gt;permit tcp any host 80.0.80.2 eq 8443 --&amp;gt; for guest portalport &lt;/P&gt;&lt;P&gt;permit tcp any host 80.0.80.2 eq 8905 --&amp;gt; for posture&amp;nbsp; communication between NAC agent and ISE (Swiss ports) &lt;/P&gt;&lt;P&gt;permit udp any host 80.0.80.2 eq 8905 --&amp;gt;for posture communication&amp;nbsp; between NAC agent and ISE (Swiss ports) &lt;/P&gt;&lt;P&gt;permit udp any host 80.0.80.2 eq 8906 --&amp;gt;for posture communication&amp;nbsp; between NAC agent and ISE (Swiss ports) &lt;/P&gt;&lt;P&gt;deny ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.) Please also ensure that the above URL Redirect has the proper&amp;nbsp; Cisco ISE FQDN.&lt;BR /&gt; &lt;BR /&gt; As per your confirmation, I am going to close the case for this specific&amp;nbsp; inquiry. We strive to provide you with excellent service. Please feel&amp;nbsp; free to reach out to me or any member of the SAC team if we can be of&amp;nbsp; any further assistance or if you have any other related questions in the&amp;nbsp; future. We value your input and look forward to serving you moving&amp;nbsp; forward.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 17:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-issue-and-re-direct-to-a-portal/m-p/2157646#M132835</guid>
      <dc:creator>bhthapa</dc:creator>
      <dc:date>2013-04-10T17:44:48Z</dc:date>
    </item>
  </channel>
</rss>

