<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic question and help about about ISE deployment in low-impact mode in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/question-and-help-about-about-ise-deployment-in-low-impact-mode/m-p/2181612#M132906</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hello David-&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is right, as far as the switch is concerned the pre-authentication ACL is the only difference. The pre-auth ACL just provides initial access to devices/users before then authenticate. Once the device/user authenticates, the pre-auth ACL will get replaced with the dACL that you defined in the authorization profile. For example, let's say that you use Ghost to remote wipe and re-image machines. You will need a method to let those machines back on the network so they can join AD, get their GPOs pushed, enrolled with certificates, etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Apr 2013 02:43:12 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2013-04-04T02:43:12Z</dc:date>
    <item>
      <title>question and help about about ISE deployment in low-impact mode</title>
      <link>https://community.cisco.com/t5/network-access-control/question-and-help-about-about-ise-deployment-in-low-impact-mode/m-p/2181611#M132842</link>
      <description>&lt;P&gt;I have an environment like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Active Directory of Windows 2008R2 with the domain CCIESEC that also serves DNS and DHCP for clients in&lt;/P&gt;&lt;P&gt;the CCIESEC domain.&amp;nbsp; Clients are consisting of Windows 7 64bits Enterprise.&amp;nbsp; These AD servers are residing &lt;/P&gt;&lt;P&gt;on network 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- An ISE appliance 3395 called ISE1 that serves as Primary Admin/Monitoring and Policy service.&amp;nbsp; ISE1 is&lt;/P&gt;&lt;P&gt;residing on network 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- An ISE appliance 3395 called ISE2 that servers as Secondary Admin/Monitoring and Policy service.&amp;nbsp; ISE2 is &lt;/P&gt;&lt;P&gt;resding on network 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Lot of Windows 7 clients on network 192.168.2.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- ISE is successfully integrated with Active Directory CCIESEC domain,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently deploying ISE in "monitor" mode and on the switch, this is my configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet3/14&lt;/P&gt;&lt;P&gt; description test_machine&lt;/P&gt;&lt;P&gt; switchport&lt;/P&gt;&lt;P&gt; switchport access vlan 71&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; load-interval 30&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order dot1x&lt;/P&gt;&lt;P&gt; authentication priority mab dot1x&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication periodic&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication timer inactivity 300&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt; spanning-tree portfast edge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything is working fine.&amp;nbsp; However, I would like to go to "low impact" mode.&amp;nbsp; Here is what I have on the switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;ip device tracking&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet3/14&lt;/P&gt;&lt;P&gt; description test_machine&lt;/P&gt;&lt;P&gt; switchport&lt;/P&gt;&lt;P&gt; switchport access vlan 71&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;EM&gt;&lt;STRONG&gt; ip access-group allow in&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; load-interval 30&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order dot1x&lt;/P&gt;&lt;P&gt; authentication priority mab dot1x&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication periodic&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication timer inactivity 300&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt; spanning-tree portfast edge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended allow&lt;/P&gt;&lt;P&gt; remark DHCP, DNS, ICMP&lt;/P&gt;&lt;P&gt; permit udp any eq bootpc any eq bootps log&lt;/P&gt;&lt;P&gt; permit udp any any eq domain log&lt;/P&gt;&lt;P&gt; permit icmp any any log&lt;/P&gt;&lt;P&gt; remark Allow Microsoft Ports (used for better login performance)&lt;/P&gt;&lt;P&gt; permit tcp any any eq 88 log&lt;/P&gt;&lt;P&gt; permit udp any any eq 88 log&lt;/P&gt;&lt;P&gt; permit udp any any eq ntp log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 135 log&lt;/P&gt;&lt;P&gt; permit udp any any eq netbios-ns log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 139 log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 389 log&lt;/P&gt;&lt;P&gt; permit udp any any eq 389 log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 445 log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 636 log&lt;/P&gt;&lt;P&gt; permit udp any any eq 636 log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 1025 log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 1026 log&lt;/P&gt;&lt;P&gt; remark PXE / TFTP&lt;/P&gt;&lt;P&gt; permit udp any any eq tftp log&lt;/P&gt;&lt;P&gt; permit tcp any any eq 3389 log&lt;/P&gt;&lt;P&gt; remark deny all the rest&lt;/P&gt;&lt;P&gt; deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does it mean that the only difference between "monitor" and "low impact" mode is the ACL on the switchport interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; thank you in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:16:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-and-help-about-about-ise-deployment-in-low-impact-mode/m-p/2181611#M132842</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2019-03-11T03:16:08Z</dc:date>
    </item>
    <item>
      <title>question and help about about ISE deployment in low-impact mode</title>
      <link>https://community.cisco.com/t5/network-access-control/question-and-help-about-about-ise-deployment-in-low-impact-mode/m-p/2181612#M132906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hello David-&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is right, as far as the switch is concerned the pre-authentication ACL is the only difference. The pre-auth ACL just provides initial access to devices/users before then authenticate. Once the device/user authenticates, the pre-auth ACL will get replaced with the dACL that you defined in the authorization profile. For example, let's say that you use Ghost to remote wipe and re-image machines. You will need a method to let those machines back on the network so they can join AD, get their GPOs pushed, enrolled with certificates, etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 02:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-and-help-about-about-ise-deployment-in-low-impact-mode/m-p/2181612#M132906</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2013-04-04T02:43:12Z</dc:date>
    </item>
  </channel>
</rss>

