<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Matt, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007556#M22641</link>
    <description>&lt;P&gt;Hi Matt,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Can you please share te snippet of authentication and authorization policies?&lt;BR /&gt;&lt;G class="gr_ gr_81 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep" id="81" data-gr-id="81"&gt;Also&lt;/G&gt; share port configuration for f0/25&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Jun 2017 00:23:24 GMT</pubDate>
    <dc:creator>Dinesh Moudgil</dc:creator>
    <dc:date>2017-06-02T00:23:24Z</dc:date>
    <item>
      <title>ISE is Profiling an IP Phone Incorrectly?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007555#M22640</link>
      <description>&lt;P&gt;Hello All,&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Cisco ISE:&lt;/STRONG&gt; v2.0.0.306&lt;BR /&gt;&lt;STRONG&gt;Switch:&lt;/STRONG&gt; 3560&lt;BR /&gt; &lt;STRONG&gt;IP Phone:&lt;/STRONG&gt; 7941G&lt;BR /&gt; &lt;BR /&gt; I have had many other 7941G IP Phones connected to this switch, which have all profiled/authenticated correctly.&lt;BR /&gt; &lt;BR /&gt; The only difference between those phones and this one, is that this phone has not been powered on in probably a few years &lt;EM&gt;(*long before ISE was setup)&lt;/EM&gt;.&lt;BR /&gt; &lt;BR /&gt; So I plugged the phone into the switch and after the phone powers-up its stuck on&lt;EM&gt; "Configuring IP"&lt;/EM&gt;. The &lt;EM&gt;"show auth session"&amp;nbsp;&lt;/EM&gt;command shows it attempting to auth with dot1x, which would fail as expected. However, it should pass the MAB auth, since its an IP Phone. But, the phone fails MAB authentication as well. And looking on the ISE Server's Radius LiveLog I can see the IP Phone is getting Profiled as &lt;EM&gt;&lt;STRONG&gt;"Cisco-Device"&lt;/STRONG&gt;&lt;/EM&gt; instead of &lt;EM&gt;&lt;STRONG&gt;"Cisco-IP-Phone-7941"&lt;/STRONG&gt;&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;Also, I'm seeing something I've never seen before, as far as I can remember. Looking at the mac address-table, the phone is showing "Drop" under where the port should be. Does that have to do with it failing authentication?&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;Vlan&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ports&lt;BR /&gt;----&amp;nbsp;&amp;nbsp;&amp;nbsp; -----------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&lt;BR /&gt;&amp;nbsp;114&amp;nbsp;&amp;nbsp;&amp;nbsp; fcfb.fbcb.5eca&amp;nbsp;&amp;nbsp;&amp;nbsp; DYNAMIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;/PRE&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;EM&gt;*Also, Vlan 114 shown above is the DATA Vlan. Voice Vlan is 124...&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt; If I check the CDP on that port &lt;EM&gt;(*last device listed below)&lt;/EM&gt;, it is showing the device correctly, so I'm not sure what the problem is.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;JWP-3560sw1-SP#show cdp nei
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, 
                  D - Remote, C - CVTA, M - Two-port Mac Relay 

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID
ISR4321          Fas 0/2           135             R S I  ISR4321/K Gig 0/0/0
4510R-HQ         Fas 0/1           164             R S I  WS-C4510R Gig 9/22
VG202XM-MRM      Fas 0/3           152              R B   VG202XM   Fas 0/0
SEPFCFBFBCB5ECA  Fas 0/25          125             H P M  IP Phone  Port 1
&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt; The IP Phone is plugged into Fa0/25, which you can see in the CDP above... &lt;BR /&gt;&lt;BR /&gt;Any idea what could be the problem here? &lt;BR /&gt;&lt;BR /&gt;Thanks in Advance, &lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007555#M22640</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2019-03-11T07:45:40Z</dc:date>
    </item>
    <item>
      <title>Hi Matt,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007556#M22641</link>
      <description>&lt;P&gt;Hi Matt,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Can you please share te snippet of authentication and authorization policies?&lt;BR /&gt;&lt;G class="gr_ gr_81 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep" id="81" data-gr-id="81"&gt;Also&lt;/G&gt; share port configuration for f0/25&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 00:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007556#M22641</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2017-06-02T00:23:24Z</dc:date>
    </item>
    <item>
      <title>Hey Dinesh, thanks for the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007557#M22642</link>
      <description>&lt;P&gt;Hey Dinesh, thanks for the reply!&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt; &lt;STRONG&gt;Here is the Port Configuration:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;3560sw1-SP#show run int Fa0/25
Building configuration...

Current configuration : 671 bytes
!
interface FastEthernet0/25
 switchport access vlan 114
 switchport mode access
 switchport voice vlan 124
 authentication event fail action next-method
 authentication event server dead action authorize vlan 114
 authentication event server dead action authorize voice
 authentication event server alive action reinitialize 
 authentication host-mode multi-auth
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 authentication violation restrict
 mab
 snmp trap mac-notification change added
 snmp trap mac-notification change removed
 dot1x pae authenticator
 dot1x timeout tx-period 10
 spanning-tree portfast
end
&lt;/PRE&gt;
&lt;P&gt;Sorry, I wasn't 100% sure what you wanted to see from the ISE Server. Did you want to see the Policies configured in &lt;EM&gt;&lt;STRONG&gt;Policy &amp;gt; Policy Sets&lt;/STRONG&gt;&lt;/EM&gt;. Or the Authorization and Authentication profiles under &lt;EM&gt;&lt;STRONG&gt;Policy &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authorization/Authentication&lt;/STRONG&gt;&lt;/EM&gt;..?&lt;BR /&gt;&lt;BR /&gt;I also attached a screenshot from &lt;EM&gt;Radius LiveLog&lt;/EM&gt; that shows a good IP Phone that I plugged into Fa0/25 today, and then right below it, it's showing the IP Phone that's not getting profiled correctly from yesterday.&lt;BR /&gt;&lt;BR /&gt;Thanks again for the reply, much appreciated!&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 16:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007557#M22642</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-02T16:12:43Z</dc:date>
    </item>
    <item>
      <title>Hello</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007558#M22643</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;looks like the phone isn't being profiled beyond being a cisco-device&lt;/P&gt;
&lt;P&gt;cisco-device -&amp;gt; cisco-ip-phone -&amp;gt; cisco-ip-phone-7941&lt;/P&gt;
&lt;P&gt;For the phone to be profiled as a cisco-ip-phone, ISE must receive CDP/LLDP and/or DHCP attributes. What probes are enabled on ISE and is your switch configured to send the required information?&lt;/P&gt;
&lt;P&gt;e,g,&lt;/P&gt;
&lt;P&gt;ISE RADIUS probe - is your switch configured to send logs (udp 20514) to your ISE MnT nodes(s)&lt;BR /&gt;ISE SNMP probe - is your switch/ISE configured ok for traps/queries&lt;BR /&gt;ISE DHCP probe - is ISE configured as a helper-address&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;
&lt;P&gt;ps if you delete an already profiled 7941 phone from ISE, is it successfully re-profiled when connected to your switch?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jun 2017 13:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007558#M22643</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-03T13:07:18Z</dc:date>
    </item>
    <item>
      <title>Hi Andrew, thanks for the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007559#M22644</link>
      <description>&lt;P&gt;Hi Andrew, thanks for the reply.&lt;BR /&gt; &lt;BR /&gt; I just plugged in another, new IP Phone&amp;nbsp;&lt;EM&gt;(*this phone has never been plugged into our network)&lt;/EM&gt; into this same switch and got the same result. I then took that same phone and plugged it into our core switch&lt;EM&gt; (*4510R+E)&lt;/EM&gt; where ISE is directly connected to, and at first, it failed to authenticate. But, after I went back to check it out a little while later, it was registered to the CallManager, so it did authenticate.&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;/STRONG&gt;&lt;STRONG&gt;3560 Switch - Relevant Configuration:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;!
aaa authentication dot1x default group radius
aaa authorization network default group radius 
aaa authorization auth-proxy default group radius 
aaa accounting update periodic 5
aaa accounting dot1x default start-stop group radius
aaa accounting system default start-stop group radius
!
!
aaa server radius dynamic-author
 client 192.168.2.49 server-key 7 xxxxxxxxxxxxxx
 client 10.50.10.49 server-key 7 xxxxxxxxxxxxxx
!
aaa session-id common
clock timezone EST -5
clock summer-time EDT recurring
system mtu routing 1500
authentication mac-move permit
ip routing
!
!........CUT........
ip dhcp smart-relay
!
!
ip dhcp snooping vlan 114,124
no ip dhcp snooping information option
ip dhcp snooping
ip device tracking
!
epm logging
!
!
dot1x system-auth-control
!
!........CUT........
!
interface FastEthernet0/25
 switchport access vlan 114
 switchport mode access
 switchport voice vlan 124
 authentication event fail action next-method
 authentication event server dead action authorize vlan 114
 authentication event server dead action authorize voice
 authentication event server alive action reinitialize 
 authentication host-mode multi-auth
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 authentication violation restrict
 mab
 snmp trap mac-notification change added
 snmp trap mac-notification change removed
 dot1x pae authenticator
 dot1x timeout tx-period 10
 spanning-tree portfast
!
!........CUT........
!
snmp-server group admins v3 priv 
snmp-server group admins v3 priv context vlan-114 
snmp-server group admins v3 priv context vlan-124 
snmp-server community &lt;EM&gt;&amp;lt;community&amp;gt;&lt;/EM&gt; RO
snmp-server trap-source Vlan1
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server dead-criteria time 30 tries 3
radius-server host 192.168.2.49 auth-port 1645 acct-port 1646 key 7 xxxxxxxxxxxxx
radius-server host 10.50.10.49 auth-port 1645 acct-port 1646 key 7 xxxxxxxxxxxxx
radius-server vsa send accounting
radius-server vsa send authentication
!
!........CUT........
!
mac address-table notification change
mac address-table notification mac-move
!&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt; The DHCP Pool for the Voice network is located on the Core switch that this 3560 is connected to. But, I just checked out that Pool and I don't see any helper-addresses configured in there. Should I add the 2 ISE Servers in that DHCP Pool?&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Here is the DHCP Pool from 4510R+E for Voice VLAN:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;!
ip dhcp pool USEPHONES124
 network 10.60.124.0 255.255.255.0
 default-router 10.60.124.1 				--&amp;gt; int Vlan124
 option 150 ip 192.168.11.9 192.168.11.8 10.50.2.9 	--&amp;gt; CallManagers
 dns-server 192.168.5.35 10.50.1.3 			--&amp;gt; DNS Servers
!&lt;/PRE&gt;
&lt;P&gt;The only place on the 4510 where I see the ISE Server as a &lt;EM&gt;helper-address&lt;/EM&gt; is on the interface Vlan for the user workstation Vlan &lt;EM&gt;(*i.e. vlan114)&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;I'm also attaching a screenshot from the ISE server for the 3560 switch's SNMP settings under &lt;EM&gt;Network Devices,&lt;/EM&gt; for that switch. Also, I have the snmp trap commands configured under each interface that's configured for authentication.&lt;BR /&gt;&lt;BR /&gt;The show cdp commands seem to be working fine on the switch. Where can I check on ISE for what Probes are configured?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2017 21:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007559#M22644</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-05T21:44:09Z</dc:date>
    </item>
    <item>
      <title>Hi Matt</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007560#M22646</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;To check what probes you have enabled - go to Administration &lt;STRONG&gt;&amp;gt; System &amp;gt; Deployment&lt;/STRONG&gt; and select your PSN and click the &lt;STRONG&gt;Profiling Configuration&lt;/STRONG&gt; tab (check both of your PSNs)&lt;/P&gt;
&lt;P&gt;Switch configuration for the RADIUS probe (I assume you have the ISE MnT persona seperate from the PSNs):&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;logging monitor informational&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;logging origin-id ip&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;logging host &amp;lt;ISE-MnT-NODE-IP&amp;gt; transport udp port 20514&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Switch configuration for the SNMP TRAP probe:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;snmp-server enable traps snmp linkdown linkup&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;snmp-server host 10.50.10.49 version 3 priv netAdmin mac-notification snmp&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;snmp-server host 192.168.2.49 version 3 priv netAdmin mac-notification snmp&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2017 22:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007560#M22646</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-05T22:22:49Z</dc:date>
    </item>
    <item>
      <title>Hey Andy, thanks again for</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007561#M22647</link>
      <description>&lt;P&gt;Hey Andy, thanks again for the reply.&lt;BR /&gt;&lt;BR /&gt;I attached a screenshot of all the Profiling probes configured on that &lt;EM&gt;Profiling Configuration &lt;/EM&gt;page.&lt;BR /&gt;&lt;BR /&gt;Sorry, does &lt;STRONG&gt;MnT&lt;/STRONG&gt; stand for &lt;EM&gt;Monitoring Node&lt;/EM&gt; and &lt;STRONG&gt;PSN&lt;/STRONG&gt; stand for &lt;EM&gt;Primary Service Node&lt;/EM&gt;? If so, I wasn't really sure what you meant by:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;EM&gt;"(I assume you have the ISE MnT persona seperate from the PSNs)"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;As for the switch configuration commands. Would I put those commands on any switch configured to authenticate connected clients through the ISE server?&lt;BR /&gt;If so, after those commands are added to each switch, does anything need to be tweaked under that &lt;EM&gt;Network Device's &lt;/EM&gt;configuration page &lt;EM&gt;(*i.e. Administration &amp;gt; Network Resources &amp;gt; Network Devices)&lt;/EM&gt;..?&lt;BR /&gt;&lt;BR /&gt;Thanks Again,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 16:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007561#M22647</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-06T16:38:44Z</dc:date>
    </item>
    <item>
      <title>Hi Matt</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007562#M22648</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;ISE has 3 personas - PAN (Policy Administration Node), PSN (Policy Services Node) and MnT (Monitoring and Troubleshooting). An ISE node can be all 3 but these personas are usually "split" between different nodes depending on the deployment. All the nodes in the deployment (and their persona(s)) can be be viewed from &lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Deployment.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, put these commands on switches where you wish to profile/authenticate devices - check that you have the correct snmp credentials (the sames snmp credentials used on your switch) configured under &lt;STRONG&gt;Administration &amp;gt; Network Resources &amp;gt; Network Devices&lt;/STRONG&gt;. Your switch snmp may have an ACL applied - run the command "show snmp user" on the switch to see if this is the case. If so, ensure your PSNs are permitted on the ACL.&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 17:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007562#M22648</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-06T17:48:24Z</dc:date>
    </item>
    <item>
      <title>Oh ok, thanks for the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007563#M22649</link>
      <description>&lt;P&gt;Oh ok, thanks for the explanation. Much appreciated!&lt;BR /&gt;&lt;BR /&gt;We only have the 2 ISE Servers. One in our HQ &lt;EM&gt;(*primary) &lt;/EM&gt;and the failover node is in our DR location &lt;EM&gt;(*secondary)&lt;/EM&gt;. I attached screenshot of the Node's deployment configuration.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Switch Config Commands:&lt;/STRONG&gt;&lt;BR /&gt;I came across the following switch configuration commands at the link below, from the ISE Admin Guide, and was wondering which of these commands SHOULD be added to the switches?&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_010100.html?bookSearch=true#ID713"&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_010100.html?bookSearch=true#ID713&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In the section from the URL above, it lists the following commands, some of which are already configured/enabled on our switches:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;# cdp enable                                            --&amp;gt; *ENABLED*
# lldp run

# aaa new-model                                         --&amp;gt; *ENABLED*
# aaa accounting dot1x default start-stop group radius  --&amp;gt; *ENABLED*&lt;BR /&gt;
# radius-server host &amp;lt;ip&amp;gt; auth-port &amp;lt;port&amp;gt; acct-port &amp;lt;port&amp;gt; key &amp;lt;shared-secret&amp;gt;                              --&amp;gt; *SEE BELOW*
# radius-server vsa send accounting   --&amp;gt; *SEE BELOW*
&lt;BR /&gt;# device-sensor accounting&lt;BR /&gt;# no device-sensor accounting&lt;BR /&gt;&lt;BR /&gt;# device-sensor notify all-changes&lt;BR /&gt;# no macro auto monitor
&lt;/PRE&gt;
&lt;P&gt;I marked the commands already enabled on the Switch with &lt;EM&gt;"--&amp;gt; *ENABLED*". &lt;/EM&gt;Also, I had questions specifically about the one's labeled with &lt;EM&gt;"--&amp;gt; *SEE BELOW*"&lt;/EM&gt;...&lt;EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;Question about the &lt;EM&gt;&lt;STRONG&gt;"radius-server host ..."&lt;/STRONG&gt;&lt;/EM&gt; command above:&lt;/P&gt;
&lt;P&gt;On the 4510R+E &lt;EM&gt;(*core switch&lt;/EM&gt;&lt;EM&gt;)&lt;/EM&gt;, which was configured with help from a contractor, I was instructed to add the commands below. However, it does not include the &lt;EM&gt;ports&lt;/EM&gt; portion of the command like the guide(s) do. Should I edit that command to include the &lt;EM&gt;"auth-port" &lt;/EM&gt;and &lt;EM&gt;"acct-port"&lt;/EM&gt; options?&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;radius-server host 192.168.2.49 key 7 xxxxxxxxxxxxxxxxxx
radius-server host 10.50.10.49 key 7 yyyyyyyyyyyyyyyyyy&lt;/PRE&gt;
&lt;P&gt;I was wondering why he wouldn't have included the ports in there, and if I should add them myself? And, if I should use the ports, how do I know which ports to use, since some of the guides seem to use different ports? Also, you may have noticed I included the &lt;EM&gt;auth-p&lt;EM&gt;orts&lt;/EM&gt;&lt;/EM&gt; and &lt;EM&gt;acct-&lt;/EM&gt;p&lt;EM&gt;orts&lt;/EM&gt; on the commands I configured in the 3560. But, looking at them again, I'm not sure where I got those ports I used..?&lt;BR /&gt;&lt;BR /&gt;I configured the 3560 using the&amp;nbsp;&lt;EM&gt;&lt;A href="http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_10_universal_switch_config.pdf"&gt;Cisco TrustSec How-To Guide: Global Switch Configuration&lt;/A&gt; &lt;/EM&gt;guide. As well as Chapter 33 from the ISE v2.0 Admin Guide &lt;A target="_blank" href="http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_0100000.html"&gt;&lt;EM&gt;(*Ch 33. Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions)&lt;/EM&gt;&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The contractor who helped us configure ISE and the 4510 switch, also did not include either of the &lt;EM&gt;"radius-server vsa send [accounting/authentication]"&lt;/EM&gt; commands.&lt;BR /&gt;&lt;BR /&gt;Should all these commands be enabled? I wasn't sure if adding too many of these commands could cause issues, like overloading the 4510 switch?&lt;BR /&gt;&lt;BR /&gt;If it would make it easier, I can add another post and include in it all the commands that are found in those guides, which ARE NOT in my 4510 switch... Would that make this a bit easier? And then you could confirm if I need them or not?&lt;BR /&gt;&lt;BR /&gt;Thanks AGAIN, much appreciated!&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 18:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007563#M22649</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-06T18:41:25Z</dc:date>
    </item>
    <item>
      <title>Hi Matt</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007564#M22650</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;ISE nodes will listen on udp 1812/1813 and 1645/1646 for RADIUS auth/acct. As your switch RADIUS configuration is working I'd leave that for now - different ios versions will have different commands as well.&lt;/P&gt;
&lt;P&gt;As for "radius-server vsa send " commands - yes enable these (see below blogs/guides for more details).&lt;/P&gt;
&lt;P&gt;I wouldn't over complicate your configuration at this stage - RADIUS authentication is working ok so get profiling working and build from there&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Demystifying RADIUS&lt;BR /&gt;http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/whitepaper_C11-731907.html&lt;/P&gt;
&lt;P&gt;Switch configuration for ISE&lt;BR /&gt;https://communities.cisco.com/docs/DOC-68171&lt;/P&gt;
&lt;P&gt;Switch configuration for ISE&lt;BR /&gt;http://www.network-node.com/blog/2015/12/30/switch-configuration-for-dot1x&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 19:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007564#M22650</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-06T19:33:01Z</dc:date>
    </item>
    <item>
      <title>Hey, thanks again Andy!Ok, I</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007565#M22651</link>
      <description>&lt;P&gt;Hey, thanks again Andy!&lt;BR /&gt;&lt;BR /&gt;Ok, I'm just wanting to make sure I have all of the necessary commands enabled on the switches that should be enabled.&lt;BR /&gt;&lt;BR /&gt;It seems like the 4510 was configured with the minimum to get ISE authentication working. I just want to be sure we have all those profiling commands enabled, that need to be enabled. We do experience some weird issues fairly frequently while we were in production mode for ISE authentication, so maybe some of these missing commands would help...&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Couple of things I noticed in my config compared to the guides.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;1. &lt;/STRONG&gt;&lt;STRONG&gt;The "radius-server host" Command on 4510:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;### I HAVE:&lt;BR /&gt;radius-server host 192.168.2.49 key 7 xxxxxxxxxxxxxxxx&lt;BR /&gt;radius-server host 10.50.10.49 key 7 yyyyyyyyyyyyyyyy&lt;BR /&gt;&lt;BR /&gt;### Some Guides Include auth-port/acct-port/a username/key, like:&lt;BR /&gt;radius-server host 192.168.2.49 auth-port 1812 acct-port 1813 test username &amp;lt;username&amp;gt; key 7 xxxxxxxxxxxxxxxx&lt;/PRE&gt;
&lt;P&gt;So with that &lt;EM&gt;"radius-server host ..." &lt;/EM&gt;command, how does my command differ? What does including those other options do, that the one I have won't do &lt;EM&gt;(*i.e. including the auth/acct-ports, a username and a key)&lt;/EM&gt;? Is there any benefit to including those extra options?&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;2. Helper-Address Question:&lt;/STRONG&gt; When this post first started I was asked if I had the ISE Servers as helper-addresses in the dhcp pools. But, in all those guides, the only time I see ISE as the helper-address is in the Interface Vlan configuration. And, even with that, it's only used in Access Vlan and not the Voice Vlan. So should ISE be added to as a &lt;EM&gt;helper-address&lt;/EM&gt; in the Voice Vlan, and/or in the DHCP Pools as well?&lt;BR /&gt;&lt;BR /&gt;I also have a couple of other questions. But, I'll wait for your reply on this one first.&lt;BR /&gt;&lt;BR /&gt;Thanks Again,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 16:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007565#M22651</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-07T16:43:42Z</dc:date>
    </item>
    <item>
      <title>Hi Matt</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007566#M22652</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;1&lt;BR /&gt;If you don't sepcify auth-port and acct-port the default values are 1645/1646. The key is the RADIUS secret shared with ISE - username is for periodic testing of RADIUS from the switch (i think the default username is test - you may see this in your ISE logs). It doesn't matter if this test username fails - as long as the switch receives a reply (reject or accept) from RADIUS it know the server is up. If the switch doesn't receive a reply it will mark the RADIUS server as down.&lt;/P&gt;
&lt;P&gt;Configuring RADIUS has changed with later versions of IOS - see the link I posted earlier about demystiying RADIUS.&lt;/P&gt;
&lt;P&gt;2&lt;BR /&gt;You should use the ISE probes you require to successfully profile. Your phone can be profiled successfully by ISE without it (using cdp/lldp attributes from an snmp query). Some devices may require profile using dhcp attributes like class-identifier - in that case the DHCP probe is required. You don't want to overload ISE by using probes that aren't required for particular devices.&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 18:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007566#M22652</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-07T18:13:46Z</dc:date>
    </item>
    <item>
      <title>*Question #1 Follow-up:So</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007567#M22653</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;EM&gt;*Question #1 Follow-up:&lt;/EM&gt;&lt;BR /&gt;So basically, with the command I have on the 4510. It's going to automatically use the auth and acct ports as 1645/1646 as default values &lt;EM&gt;(*unless specified otherwise)&lt;/EM&gt;. And the &lt;EM&gt;"key"&lt;/EM&gt; in that command just has to match the &lt;EM&gt;Shared Secret&lt;/EM&gt; configured under the &lt;EM&gt;"RADIUS Authentication Settings"&lt;/EM&gt; section of the Network Access Device's config on the ISE Server...&lt;BR /&gt;&lt;BR /&gt;I will check out that link you had posted... Thanks!&lt;BR /&gt;&lt;BR /&gt;2 other questions.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;1. SNMP Question: &lt;/STRONG&gt;On the 3560 switch, I have these commands below in each of the Interfaces where a client will auth through ISE&lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;(config-if)# snmp trap mac-notification change added&lt;BR /&gt;(config-if)#&amp;nbsp;snmp trap mac-notification change removed&lt;/PRE&gt;
&lt;P&gt;I then came across the following &lt;EM&gt;Global Config&lt;/EM&gt; commands in the &lt;EM&gt;TrustSec: Switch Config Guide&lt;/EM&gt; I mentioned in an earlier post&lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;### Enable SNMP Traps for mac-notification for change/move/threshold:&lt;BR /&gt;(config)# snmp-server enable traps mac-notification change move threshold&lt;BR /&gt;### Configure ISE as Hosts to receive the snmp mac-notification traps:
(config)# snmp-server host &amp;lt;ise-ip-1&amp;gt; &lt;ISE_IP-ADDR_1&gt;version 3 priv&lt;USERNAME&gt; mac-notification snmp
(config)# snmp-server host &amp;lt;ise-ip-2&amp;gt; &lt;ISE_IP-ADDR_2&gt;version 3 priv&lt;USERNAME&gt; mac-notification snmp&lt;/USERNAME&gt;&lt;/ISE_IP-ADDR_2&gt;&lt;/USERNAME&gt;&lt;/ISE_IP-ADDR_1&gt;&lt;/PRE&gt;
&lt;P&gt;If I use these 3 commands&amp;nbsp;&lt;EM&gt;(*above)&lt;/EM&gt; under Global configuration mode on the switch, would that mean I don't need to include those 2 lines at the top in each of the interfaces?&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;2. Interface Access-List:&lt;/STRONG&gt;&lt;BR /&gt;In the Switch Configuration section found in the &lt;EM&gt;Cisco ISE v2.0 Administrator Guide (*Chapter 33)&lt;/EM&gt;. It states:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;EM&gt;"An ACL must be configured to prepend dACLs from AAA server."&lt;/EM&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;(config-if)# ip access-group ACL-ALLOW in&lt;/PRE&gt;
&lt;P&gt;I attached the full snippet from this document, and it does mention that prior to IOS 12.2(55)SE this ACL was required to allow dACLs to be pushed to the client from the ISE Server, without it, dACLs would be ignored. And, after that version a default ACL is applied. So in this case, on versions after that IOS version, does the ACL &lt;EM&gt;"ACL-DEFAULT"&lt;/EM&gt; get applied to the interfaces automatically, if it exists..?&lt;BR /&gt;Sorry, this section was a little confusing since it just says a default ACL will be automatically created and applied, &lt;EM&gt;so what is the default ACL...&lt;/EM&gt;?&lt;BR /&gt;&lt;BR /&gt;Thanks again for the explanations, much appreciated!&lt;BR /&gt;&lt;BR /&gt;Thanks Again,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 20:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007567#M22653</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-07T20:03:08Z</dc:date>
    </item>
    <item>
      <title>Hi Matt</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007568#M22654</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;1&lt;BR /&gt;You will need the "snmp trap mac-notification change" commands under the interfaces as well as the global commands&lt;/P&gt;
&lt;P&gt;2&lt;BR /&gt;See link below - from your interface configuration you are using open mode without a static acl:&lt;/P&gt;
&lt;P&gt;If there is no static ACL on a port in&amp;nbsp; open authentication mode: &lt;BR /&gt;• An auth-default-ACL-OPEN is created and allows all traffic. &lt;BR /&gt;• Policies are enforced with IP address insertion to prevent security breaches. &lt;BR /&gt;• Web authentication is subject to the auth-default-ACL-OPEN.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-2_55_se/configuration/guide/scg3750/sw8021x.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 22:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007568#M22654</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-07T22:21:03Z</dc:date>
    </item>
    <item>
      <title>Wow really... That seems</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007569#M22655</link>
      <description>&lt;P&gt;Wow really... That seems silly to need that on every interface, instead of just being able to enable it globally.. But oh well, thanks for the info!&lt;BR /&gt;&lt;BR /&gt;As for #2... My &lt;EM&gt;User-Workstation/Client&lt;/EM&gt; interface configurations don't currently have &lt;EM&gt;"authentication open"&lt;/EM&gt; enabled on them. We did in the beginning when we first put this in place for testing, so we would have full visibility of the devices on each interface. But, we don't have that on the interfaces anymore. Sorry if that's not the command you were referring to...&lt;BR /&gt;If &lt;EM&gt;"authentication open" &lt;/EM&gt;was the command you were referring to &lt;EM&gt;(*for open authentication&lt;/EM&gt; &lt;EM&gt;mode),&lt;/EM&gt; then it sounds like the default ACL that gets created &lt;EM&gt;(*when "auth open" is on the interface)&lt;/EM&gt; is just a permit all. Otherwise, without that &lt;EM&gt;auth open&lt;/EM&gt; command, its a deny all?&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Sorry if I'm misunderstanding that one...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Below are the last 2 question that I have for now...&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;#1. Enabling DHCP Snooping?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Should I be enabling &lt;EM&gt;"ip dhcp snooping"&lt;/EM&gt; on the 4510 core-switch, does it help with profiling? I enabled &lt;EM&gt;snooping&lt;/EM&gt; on the 3560 switch because that is a switch that only we use in the IT department, so I'm not worried about testing stuff on that switch. But, wasn't sure if I should enable it on the 4510..?&lt;BR /&gt;Since we have the &lt;EM&gt;DHCP probe&lt;/EM&gt; enabled under Administration &lt;STRONG&gt;&amp;gt; &lt;/STRONG&gt;System &lt;STRONG&gt;&amp;gt;&lt;/STRONG&gt; Deployment &lt;STRONG&gt;&amp;gt;&lt;/STRONG&gt; &lt;EM&gt;ISE Server&lt;/EM&gt; &lt;STRONG&gt;&amp;gt;&lt;/STRONG&gt; Profiling Configuration. Is that Probe not necessarily doing anything unless dhcp snooping is enabled on the switch?&lt;BR /&gt;If this is something that I should enable &lt;EM&gt;(*i.e. the Commands "ip dhcp snooping" and "ip dhcp snooping &amp;lt;vlanX&amp;gt;-,&amp;lt;vlanY&amp;gt;&lt;/EM&gt;)&lt;EM&gt;, &lt;/EM&gt;I read that&lt;EM&gt; &lt;/EM&gt;you should also be using the interface command &lt;EM&gt;"ip dhcp snooping trust&lt;/EM&gt;" on the interface facing the ISE server. Is this true? I ask because in the Switch config guides, they all seem to use the 2 &lt;EM&gt;snooping&lt;/EM&gt; commands, but not the &lt;EM&gt;"... trust"&lt;/EM&gt; command. &lt;EM&gt;&lt;/EM&gt;So I wasn't sure the purpose of this command if the guides aren't showing being used. &lt;BR /&gt;And also, it looks like &lt;EM&gt;"ip device tracking",&lt;/EM&gt; which is shown in the same section of the guide as the snooping cmds, is a default command. So it won't actually be shown in the config unless you disable it with the &lt;EM&gt;no ip device tracking&lt;/EM&gt; command... From what I can tell.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;#2. Deprecated &lt;EM&gt;"radius-server host ..."&lt;/EM&gt; Command: &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;According to the &lt;A href="http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/whitepaper_C11-731907.html"&gt;Demystifying Radius Server Configurations&lt;/A&gt; link in your post, the command below is now deprecated&lt;EM&gt;:&lt;/EM&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;radius-server host &amp;lt;ise-server-ip&amp;gt; auth-port &amp;lt;port&amp;gt; acct-port &amp;lt;port&amp;gt; key ......etc......&lt;/PRE&gt;
&lt;P&gt;And instead, you should now use the command:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;radius server &amp;lt;NAME&amp;gt;&lt;NAME&gt;
 address &amp;lt;ipv4-address&amp;gt; auth-port &amp;lt;port&amp;gt; acct-port &amp;lt;port&amp;gt; ...etc...&lt;BR /&gt; key 7 xxxxxxxxxxxxxxxxxxx&lt;BR /&gt;&lt;/NAME&gt;&lt;/PRE&gt;
&lt;P&gt;So if I want to change the 4500 Switch to the newer, non-deprecated version of that command&amp;nbsp;&lt;EM&gt;(*because we plan on upgrading the IOS soon anyway)&lt;/EM&gt; do I need to remove the existing &lt;EM&gt;"radius-server host ..."&lt;/EM&gt; commands before I can add the new version of that cmd, or will it automatically remove it for me when the new one is added? Also, should that be done after-hours? I wasn't sure if I remove the old one and add the new command, if all the connected clients would need to re-authenticate, or something along those lines.?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Sorry for all the questions.... But, this is really helping me, so thanks!&lt;/P&gt;
&lt;P&gt;Thanks AGAIN,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 23:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007569#M22655</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-07T23:42:12Z</dc:date>
    </item>
    <item>
      <title>Hi Mattapologies - misread</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007570#M22656</link>
      <description>&lt;P&gt;Hi Matt&lt;BR /&gt;apologies - misread your config - link in last post explains ACL scenario with closed mode as well.&lt;/P&gt;
&lt;P&gt;1 - enable dhcp snooping on switches with clients - in short "DHCP snooping acts like a firewall between untrusted hosts and trusted DHCP servers" - configure the uplinks from your access switches as trusted. Check the following links for details&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/security/configuration/guide/sec_nx-os-cfg/sec_dhcpsnoop.html&lt;BR /&gt;https://supportforums.cisco.com/discussion/12145716/ise-and-dhcp-snooping&lt;/P&gt;
&lt;P&gt;2 - not sure if an ios upgrade "converts" the radius host command to the new syntax - like any upgrade it would be wise to test this before upgrading your production network.&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 20:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007570#M22656</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-08T20:29:13Z</dc:date>
    </item>
    <item>
      <title>Hey Andy, thanks again for</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007571#M22657</link>
      <description>&lt;P&gt;Hey Andy, thanks again for the reply.&lt;BR /&gt;&lt;BR /&gt;I get which ports I should set as "trusted" on most of our switches, using the uplink ports &lt;EM&gt;(*any port that links to the 4500 where the ISE/dhcp servers are directly connected)&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;But, what about the 4500 switch, which is our main/core-switch.? Which port(s) should be set as &lt;EM&gt;trusted&lt;/EM&gt; on there?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;As for the &lt;EM&gt;"&lt;/EM&gt;&lt;EM&gt;radius-server host"&lt;/EM&gt; command... I was more referring to converting the command now, before the switch is upgraded. Because the 4500 seems to accept both forms of the command. So if I were to remove the current &lt;EM&gt;"radius-server host ..."&lt;/EM&gt; command, and replace it with &lt;EM&gt;"radius server &amp;lt;&lt;SPAN style="text-decoration: underline;"&gt;name&lt;/SPAN&gt;&amp;gt;"&lt;/EM&gt; command. Would that be something that should be done after-hours?&lt;/P&gt;
&lt;P&gt;I wasn't sure if I removed that current command and replaced it with the non-deprecated version, if that would unauth the clients connected to the switch and force everyone to have to re-authenticate, or something along those lines...&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks Again,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 16:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007571#M22657</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-09T16:32:03Z</dc:date>
    </item>
    <item>
      <title>Hi Matt</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007572#M22658</link>
      <description>&lt;P&gt;Hi Matt&lt;/P&gt;
&lt;P&gt;dhcp snooping is a L2 security measure. From your previous posts it looks like your dhcp pools are located on your 4500 - in that case configure "trust" on access switch links connecting to the 4500. If you require dhcp messages to reach ISE (which will be on a differnet subnet from your clients) - you have to configre a helper address on the client vlan svi - see links below:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;A href="https://mrncciew.com/2012/12/27/understanding-dhcp-snooping/" target="_blank"&gt;https://mrncciew.com/2012/12/27/understanding-dhcp-snooping/&lt;/A&gt;&lt;BR /&gt;http://packetpushers.net/five-things-to-know-about-dhcp-snooping/&lt;/P&gt;
&lt;P&gt;If you rely on RADIUS for authorising/authenticating clients it would be best to make RADIUS changes during a maintenance window&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 20:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007572#M22658</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-09T20:52:53Z</dc:date>
    </item>
    <item>
      <title>Ok, that makes sense. So you</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007573#M22659</link>
      <description>&lt;P&gt;Ok, that makes sense. So you want any port where a switch connects to &lt;EM&gt;(*where that switch would have DHCP clients connected to it)&lt;/EM&gt;, to be a &lt;EM&gt;trust'ed &lt;/EM&gt;port. So if my 3560 switch is on Gi3/25 I would set Gi3/25 as trusted... So, can you think of it as: any port where DHCP messages would need to be "relayed" through, should be a trusted port, if that makes sense...?&lt;BR /&gt;&lt;BR /&gt;Also, you are correct that our Voice Vlan's DHCP Pool is on the 4500, but mostly all of our other pools are located on a Linux VM inside a UCS server, which is part of a Port-Channel. So would I want to &lt;EM&gt;"trust"&lt;/EM&gt; that whole port-channel that the UCS server's port is a part-of on the 4500? It looks like the &lt;EM&gt;"ip dhcp snooping trust"&lt;/EM&gt; command is available on Port-Channels.&lt;BR /&gt;&lt;BR /&gt;One last thing... The 3560 switch is connected to the 4500 on port Fa0/1 &lt;EM&gt;(*3560's port)&lt;/EM&gt;, which I had set as a trusted port for dhcp snooping, which from you explanation sounds correct. I also have a Access Point connected to a port on the 3560 as well. So would an Access Point fall under that same category and would need to be set as trusted as well? I wasn't sure about this since wireless clients connecting through this access point would require dhcp to get an address... But, maybe in the case of wireless, only the Wireless Controller would need to be trusted?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks Again,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 21:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007573#M22659</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-06-09T21:41:14Z</dc:date>
    </item>
    <item>
      <title>Yes - set any L2 uplink as</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007574#M22660</link>
      <description>&lt;P&gt;Yes - set any L2 uplink as trsuted. Your dhcp server will be on a differnet subnet so you'll already be using a helper address on your client vlan SVI to forward dhcp messgaes to it. Your lightweight AP tunnels all traffic back to WLC so need to trust AP interface.&lt;/P&gt;
&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 22:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-is-profiling-an-ip-phone-incorrectly/m-p/3007574#M22660</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2017-06-09T22:01:43Z</dc:date>
    </item>
  </channel>
</rss>

