<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Mile, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070548#M23490</link>
    <description>&lt;P&gt;Hi Mile,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;As I checked, it will be needed to have a CWA.&lt;/P&gt;
&lt;P&gt;For my requirements,&lt;/P&gt;
&lt;P&gt;- the PSK &amp;nbsp;and MAC Filtering should be handled by the WLC - Currently working and I can connect to the SSID.&lt;/P&gt;
&lt;P&gt;- ISE will be the one who will authorize and provide the dynamic vlan assignment.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the problem is, whenever I connect to the SSID, I cannot see logs on ISE.&lt;/P&gt;
&lt;P&gt;how do you guys configure a Authc policy on ISE for the SSID that has PSK security and handled by the WLC?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Mon, 20 Mar 2017 06:28:10 GMT</pubDate>
    <dc:creator>CODNetadmin</dc:creator>
    <dc:date>2017-03-20T06:28:10Z</dc:date>
    <item>
      <title>SSID+PSK with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070545#M23481</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;I do have to migrate some of our SSID into 1 single SSID. To give you brief background about the setup:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. We currently have 5 ssid(ex ss1,ss2,ss3,ss4,ss5) different vlans for each. all clients that are connecting to the said ssid cannot support dot1.x and they are currently using PSK for security.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;2. We will need to migrate those 5 ssid into 1 single ssid ( ex.newssid), use dynamic vlans and integrate it with cisco ISE.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;3. since those devices doesn't support the 802.1x, is it possible to use PSK for the authc and integrate it with ISE with dynamic filtering and MAC Add filtering?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070545#M23481</guid>
      <dc:creator>CODNetadmin</dc:creator>
      <dc:date>2019-03-11T07:33:16Z</dc:date>
    </item>
    <item>
      <title>You can use MAB with Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070546#M23483</link>
      <description>&lt;P&gt;You can use MAB with Endpoint Groups, for example: the devices that connected to SSID1 input in Endpoint Group 01 and you can configure a policy authorization with this group on the condition and the dynamic VLAN in result&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 09:12:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070546#M23483</guid>
      <dc:creator>Angel Castillo</dc:creator>
      <dc:date>2017-03-17T09:12:12Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070547#M23487</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;you can use one PSK for newssid (on 8.3+ code only), have it configured on all wireless endpoints&amp;nbsp;and then use ISE authorization profile to override WLC interface (VLAN) based on ISE endpoint info (endpoint group, MAC address, profiling, etc.).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is document about WPA-PSK and RADIUS (NAC):&lt;BR /&gt;&lt;BR /&gt;http://www.cisco.com/c/en/us/td/docs/wireless/controller/release/notes/crn83.html#31794&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-3/config-guide/b_cg83/b_cg83_chapter_0100111.html#d49566e8409a1635&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if you need more info.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 16:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070547#M23487</guid>
      <dc:creator>mile.ljepojevic</dc:creator>
      <dc:date>2017-03-17T16:55:34Z</dc:date>
    </item>
    <item>
      <title>Hi Mile,</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070548#M23490</link>
      <description>&lt;P&gt;Hi Mile,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;As I checked, it will be needed to have a CWA.&lt;/P&gt;
&lt;P&gt;For my requirements,&lt;/P&gt;
&lt;P&gt;- the PSK &amp;nbsp;and MAC Filtering should be handled by the WLC - Currently working and I can connect to the SSID.&lt;/P&gt;
&lt;P&gt;- ISE will be the one who will authorize and provide the dynamic vlan assignment.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the problem is, whenever I connect to the SSID, I cannot see logs on ISE.&lt;/P&gt;
&lt;P&gt;how do you guys configure a Authc policy on ISE for the SSID that has PSK security and handled by the WLC?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2017 06:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070548#M23490</guid>
      <dc:creator>CODNetadmin</dc:creator>
      <dc:date>2017-03-20T06:28:10Z</dc:date>
    </item>
    <item>
      <title>Hi, it's very simple:</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070549#M23492</link>
      <description>&lt;P&gt;Hi, it's very simple:&lt;/P&gt;
&lt;P&gt;In your scenario, you will not see anything on the ISE because all authentication is done locally via WLC. Of course ISE will not be aware of that&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;CWA is using MAC filtering to provide authentication via Web Portal for unknow MACs. You can still use ISE to do mac-filtering, but you create policies to be matched based on known MAC address instead of CWA result.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;CWA is used to identify unknown PCs, guest access, etc, but even on wireless, you can "whitelist" all devices that do not have web-browsers, like Printers, Roku and Chrome players, projectors, etc. It's same concept for you.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;So, you should use PSK on the WLC, then RADIUS NAC and ISE as RADIUS server for MAC address filtering, configure policies for Wireless MAB&amp;nbsp;do not use CWA in your policies, just create policies that will assign specific&amp;nbsp;Endpoint group&amp;nbsp;(pre-filled with known MACs)&amp;nbsp;to specific VLANs.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2017 15:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070549#M23492</guid>
      <dc:creator>mile.ljepojevic</dc:creator>
      <dc:date>2017-03-20T15:11:14Z</dc:date>
    </item>
    <item>
      <title>As I read on cisco docs and I</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070550#M23493</link>
      <description>&lt;P&gt;As I read on cisco docs and I also want it to confirm, CWA is more likely needs to have a splash page/portal right?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 06:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070550#M23493</guid>
      <dc:creator>CODNetadmin</dc:creator>
      <dc:date>2017-03-21T06:14:30Z</dc:date>
    </item>
    <item>
      <title>Again, you are not using CWA.</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070551#M23494</link>
      <description>&lt;P&gt;Again, you are not using CWA. CWA is portal for authentication based on username/password and requires splash-page and user intervention.&lt;/P&gt;
&lt;P&gt;You can use Wireless MAB to do MAC filtering and VLAN assignment, no need to use CWA at all.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 12:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070551#M23494</guid>
      <dc:creator>mile.ljepojevic</dc:creator>
      <dc:date>2017-03-21T12:14:25Z</dc:date>
    </item>
    <item>
      <title>Oh very sorry, missed it.</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070552#M23495</link>
      <description>&lt;P&gt;Oh very sorry, missed it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Since the PSK is on WLC, the policy that I should create is on the authorization?&lt;/P&gt;
&lt;P&gt;Here's the steps that I made.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- Since there is a upper policy for Wired and Wireless MAB and will use Internal Endpoints, when I do connect to the SSID, It should hit that policy right?&lt;/P&gt;
&lt;P&gt;- I created a Endpoint group with the specific MAC Address Inside.&lt;/P&gt;
&lt;P&gt;- I created a Authz policy for that Endpoint group &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When I connect to the SSID, Since it will hit the first Authentication Policy which is MAB, it should reflect on the Authentications right? but so far I cannot see my MAC address on the Authentications.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 01:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070552#M23495</guid>
      <dc:creator>CODNetadmin</dc:creator>
      <dc:date>2017-03-22T01:53:47Z</dc:date>
    </item>
    <item>
      <title>You need to configure SSID to</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070553#M23496</link>
      <description>&lt;P&gt;You need to configure SSID to use RADIUS NAC.&lt;/P&gt;
&lt;P&gt;Also, on L2 security it should be MAC filtering&lt;/P&gt;
&lt;P&gt;On L3 security, make sure you add your ISE servers.&lt;/P&gt;
&lt;P&gt;Make sure ISE servers have WLC as AAA Client&lt;/P&gt;
&lt;P&gt;Make sure pre-shared key is the same.&lt;/P&gt;
&lt;P&gt;There could be multiple reasons why you don't see your MAC address in ISE logs, but it should't be related with your policy configuration.&lt;/P&gt;
&lt;P&gt;If policy is wrong, you still should see MAC address, but it would be denied or wrong authorization profile would be applied, but 99% chance is that MAC address will be in the logs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you do not see MAC address in the ISE Logs, it's either there is no good communication between WLC and ISE, or WLC is not sending RADIUS requests to ISE...&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 11:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070553#M23496</guid>
      <dc:creator>mile.ljepojevic</dc:creator>
      <dc:date>2017-03-22T11:38:44Z</dc:date>
    </item>
    <item>
      <title>For radius nac, It's on the</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070554#M23497</link>
      <description>&lt;P&gt;For radius nac, It's on the NAC State then select RADIUS NAC right?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Got some problem enabling it since when I enable it, it says&lt;/P&gt;
&lt;P&gt;"Radius NAC is available only for WLANs that are configured for 802.1x/wpa/wpa2 layer 2 security or open Auth + MAC Filtering&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When I use 802.1x it goes fine. but the requirement is it should be PSK not 802.1x&lt;/P&gt;
&lt;P&gt;For the L2 Security, its alrady WPA+WPA2 but still cant use RADIUS NAC as the NAC State&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2017 06:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070554#M23497</guid>
      <dc:creator>CODNetadmin</dc:creator>
      <dc:date>2017-03-23T06:45:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070555#M23498</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;as I mentioned WLC 8.3 or newer train (if exists) is required for this. Previous releases of WLC code do not support RADIUS NAC and PSK.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2017 11:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3070555#M23498</guid>
      <dc:creator>mile.ljepojevic</dc:creator>
      <dc:date>2017-03-23T11:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3376267#M23499</link>
      <description>&lt;P&gt;Hi Mile, we have the same issue with trying to use Radius and PSK with WLC prior version to 8.3. I understand that this is a bug.&amp;nbsp; My question is, if we decide to use Radius NAC without PSK (Open Auth), does that mean our traffic is unencrypted?&lt;/P&gt;</description>
      <pubDate>Wed, 02 May 2018 00:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssid-psk-with-ise/m-p/3376267#M23499</guid>
      <dc:creator>MDUONG@presidio.com</dc:creator>
      <dc:date>2018-05-02T00:20:18Z</dc:date>
    </item>
  </channel>
</rss>

