<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE profiling need answer in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824959#M241649</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;quick one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. is ISE only design to support 802.1x? can it support on WPA2+PSK normal wireless authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Nov 2011 05:09:39 GMT</pubDate>
    <dc:creator>yong khang NG</dc:creator>
    <dc:date>2011-11-28T05:09:39Z</dc:date>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824957#M241612</link>
      <description>&lt;P&gt;Hi Forumers'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looking some answer regarding ISE profiling. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I able to use ISE to test 802.1x wireless connection to Active Directory External indentity store. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Somehow for ISE, after enable the profiling configuration on deployment&amp;nbsp; nodes, as long as the device with proper authentication and get into the&amp;nbsp; network will then shown all the MAC address that can be found on&amp;nbsp; Identity Management &amp;gt; identities&amp;gt; endpoints&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; My question is:&lt;/P&gt;&lt;P&gt; 01. Can i done 802.1x authentication without using external identity&amp;nbsp; stores? So far i only test on using Active Directory but not with ISE&amp;nbsp; identities&amp;gt;users. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 02. If in a environment that not using external identity stores for&amp;nbsp; authentication, how do i able to know the MAC address is belonging to&amp;nbsp; WHOM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824957#M241612</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2019-03-11T01:34:54Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824958#M241623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Please see my answers inline:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looking some answer regarding ISE profiling. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I able to use ISE to test 802.1x wireless connection to Active Directory External indentity store. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Somehow&amp;nbsp; for ISE, after enable the profiling configuration on deployment&amp;nbsp; nodes,&amp;nbsp; as long as the device with proper authentication and get into the&amp;nbsp;&amp;nbsp; network will then shown all the MAC address that can be found on&amp;nbsp;&amp;nbsp; Identity Management &amp;gt; identities&amp;gt; endpoints&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; My question is:&lt;/P&gt;&lt;P&gt; 01. Can i done 802.1x authentication without using external identity&amp;nbsp;&amp;nbsp; stores? So far i only test on using Active Directory but not with ISE&amp;nbsp;&amp;nbsp; identities&amp;gt;users. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here is a guide that has the protocols that are supported by the ISE internal user database:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.0.4/user_guide/ise10_man_id_stores.html#wpxref86403"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0.4/user_guide/ise10_man_id_stores.html#wpxref86403&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 02. If in a environment that not using external identity stores for&amp;nbsp;&amp;nbsp; authentication, how do i able to know the MAC address is belonging to&amp;nbsp;&amp;nbsp; WHOM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;You will not know which mac address belongs to which user, you will have to place your users in a specific group and have your authorization profile the devices based on the endpoint group and user group condition before they are granted access to the network. Endpoints only appear as the device type after they meet the certaintity that you have specified.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Nov 2011 16:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824958#M241623</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2011-11-26T16:46:16Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824959#M241649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;quick one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. is ISE only design to support 802.1x? can it support on WPA2+PSK normal wireless authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 05:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824959#M241649</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2011-11-28T05:09:39Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824960#M241680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WPA-PSK terminates at the controller, there is no radius since the key has to match on the client and the controller. There isnt a yes or a no to this questions since the design of WPA-PSK doesnt utiilize a backend service.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 07:18:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824960#M241680</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2011-11-28T07:18:16Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824961#M241700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply, your statement make me clear now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Nov 2011 04:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824961#M241700</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2011-11-30T04:38:25Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824962#M241715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to resurrect this thread &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we have Use Cases that require WPA-PSK, will we be forced to point this traffic through the legacy NAC in-band appliances for proper authorization?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The devices that use WPA-PSK are legacy devices that don't support 802.1x, but we'll need a way to ensure that the devices connecting to the WPA-PSK enabled SSID are approved devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, in a nutshell, the devices for this Use Case will have to be profiled and authorized based on device type or MAC address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other ideas out there besides NAC?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2012 21:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824962#M241715</guid>
      <dc:creator>JHILL2</dc:creator>
      <dc:date>2012-08-01T21:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824963#M241728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use ISE. It allows control using a web portal so users can log in, authenticate, and you can distribute the agent for device posture. In this case you don't have to worry about Psk, you can use l3 web authentication and radius. You no longer have to place a device inline like you did in the Nac days. When a user is not compliant, ISE will send redirect acls to controller, where all traffic is redirected, then it uses coa to lift the redirection policy once the endpoint is compliant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2012 00:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824963#M241728</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-02T00:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824964#M241747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This means that I would have to use port 80.&amp;nbsp; I will not have that option with these endpoints.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2012 05:05:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824964#M241747</guid>
      <dc:creator>JHILL2</dc:creator>
      <dc:date>2012-08-02T05:05:26Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824965#M241769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lets take a step back, do you have a mix of dot1x capable and not dot1x machines?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that layer 3 authentication goes through the controller, so essentially the controller is what allows the web authentication go through and hit the ise node. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont understand why you would need port 80, the authentication is done through port 8443 so it should bypass any wccp or web related access-lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2012 05:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824965#M241769</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-02T05:11:16Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824966#M241779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So even if the port is 8443, these endpoints cannot open a browser.&amp;nbsp;&amp;nbsp; Think of the endpoints being more like a wireless barcode scanner or a wireless printer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2012 14:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824966#M241779</guid>
      <dc:creator>JHILL2</dc:creator>
      <dc:date>2012-08-02T14:05:06Z</dc:date>
    </item>
    <item>
      <title>ISE profiling need answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824967#M241794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the clarification James. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then use mac filtering in order to authenticate the devices. You can use dhcp options, and the MAC vendor in order to build a policy and dynamically assign these devices to a vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2012 14:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-profiling-need-answer/m-p/1824967#M241794</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-02T14:42:29Z</dc:date>
    </item>
  </channel>
</rss>

