<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authentication Policy ISE with External RADIUS Server in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083406#M146557</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please post a screenshot of the authentication policy and the attributes from the monitoring report?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Dec 2012 04:49:25 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2012-12-14T04:49:25Z</dc:date>
    <item>
      <title>Authentication Policy ISE with External RADIUS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083405#M146556</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;I would like to authenticate client by using External RADIUS. Once I create authentication policy using the new compound condition (wireless dot1x + Radius Username Matches "domainB\") I would like to forward the user authentication who make an authen using domainB\username to the External RADIUS Server Sequence. But when I check on the authentication dashboard, it still authenticate using the default authentication rule.&lt;BR /&gt;&lt;BR /&gt;Please suggest about this scenario.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083405#M146556</guid>
      <dc:creator>Pongsatorn Maneesud</dc:creator>
      <dc:date>2019-03-11T02:53:13Z</dc:date>
    </item>
    <item>
      <title>Authentication Policy ISE with External RADIUS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083406#M146557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please post a screenshot of the authentication policy and the attributes from the monitoring report?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 04:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083406#M146557</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-12-14T04:49:25Z</dc:date>
    </item>
    <item>
      <title>Authentication Policy ISE with External RADIUS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083407#M146558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see screenshots of the authentication policy I have created.&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/5/7/118758-Screen%20Shot%202555-12-17%20at%2012.09.34%20PM.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/7/7/118772-Screen%20Shot%202555-12-17%20at%2012.13.38%20PM.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Pongsatorn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 05:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083407#M146558</guid>
      <dc:creator>Pongsatorn Maneesud</dc:creator>
      <dc:date>2012-12-17T05:22:22Z</dc:date>
    </item>
    <item>
      <title>Authentication Policy ISE with External RADIUS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083408#M146559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please also share a copy of the authentication details for requests that do not match as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should also giev soem additional information&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 12:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083408#M146559</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2012-12-17T12:59:06Z</dc:date>
    </item>
    <item>
      <title>Authentication Policy ISE with External RADIUS Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083409#M146560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jrabinow,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which details you would like to see ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some infos.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISEs are deployed in 2 domains such as "acme.com" and "sub.acme.com"&lt;/P&gt;&lt;P&gt;Each domain does not make a trusted relationship so these 2 domains cannot communicate between them.&lt;/P&gt;&lt;P&gt;Each domain has owned Enterprise Root CA (Microsoft)&lt;/P&gt;&lt;P&gt;Client who need to access the network need to authenticate with EAP-TLS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My environment&lt;/P&gt;&lt;P&gt;My ISE node joined into domain "acme.com"&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;User will be "&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:name1@acme.com"&gt;name1@acme.com&lt;/A&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Once the user from "&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:name2@sub.acme.com"&gt;name2@sub.acme.com&lt;/A&gt;&lt;SPAN&gt;" try to authenticate, I would like to forward the RADIUS request from ISEs (acme.com) to other ISEs (sub.acme.com)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;After ISEs in "sub.acme.com" return RADIUS-ACCEPT then ISEs in "acme.com" will process an authorization policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pongsatorn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 04:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-policy-ise-with-external-radius-server/m-p/2083409#M146560</guid>
      <dc:creator>Pongsatorn Maneesud</dc:creator>
      <dc:date>2012-12-18T04:28:13Z</dc:date>
    </item>
  </channel>
</rss>

