<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021730#M25927</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yup i enabled Policy Sets on the ISE already.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;TrustSec we may do later down :).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will find the best way to make the global ACL work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks so much for all your help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a problem with the iPhones getting to the HotSpot Captive Portal. Going to create a new post concerning that now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jun 2017 18:48:59 GMT</pubDate>
    <dc:creator>Davion Stewart</dc:creator>
    <dc:date>2017-06-28T18:48:59Z</dc:date>
    <item>
      <title>CIsco ISE wireless 802.1X with windows, android and IOS clients</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021724#M25920</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I need to configure Cisco ISE version 2.2 for 802.1X authentication. We are using WLC 5520 with version 8.2.150.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We want to use PEAP authentication and at the moment trying to use a single SSID.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aside from the certificate on the server side, what is required to configure this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021724#M25920</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2019-03-11T07:48:43Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021725#M25922</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;802.1x and PEAP means you gonna allow only user/password authentication.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the WLC:&lt;/P&gt;
&lt;P&gt;- you'll need to setup your ISE server as radius on the authentication and accounting menu located under security wlc page.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- on your SSID, you need to setup dot1x authentication and under security tab, select your radius server as username database.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On ISE:&lt;/P&gt;
&lt;P&gt;- you'll need to create your wlc as network device.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- join your ISE to your ad server.&lt;/P&gt;
&lt;P&gt;- create an authentication policy allowing only PEAP as this is what you want right now.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- create an authorization policy saying that if the user is coming from a particular ssid (wlan id) and coming from a particular ad group (or ask users default AD group), they'll get s permit.&lt;/P&gt;
&lt;P&gt;This is the simple authentication method.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that's clear.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 06:45:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021725#M25922</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-27T06:45:38Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021726#M25923</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I believe i configured it as you said. But im getting the following error on ISE when trying to connect to the SSID:&lt;/P&gt;
&lt;P&gt;ISE has not been able to confirm previous successful machine authentication.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did some research and saw that this could be because of machine access restriction enabled on the AD settings. I disabled but still unable to connect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am hitting the Default policy which is to Deny Access&lt;/P&gt;
&lt;P&gt;For my authorization policy, i am matching based on the Called-Station-ID Equaling the SSID and the AD Group that the user is in.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 16:20:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021726#M25923</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2017-06-27T16:20:00Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021727#M25924</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you paste some screenshots of your authorization policies please?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We see that you're hitting the deny access.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 17:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021727#M25924</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-27T17:00:28Z</dc:date>
    </item>
    <item>
      <title>Hi Francesco, </title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021728#M25925</link>
      <description>&lt;P&gt;Hi Francesco,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was able to resolve it. Instead of using Radius:Called-Station-Id to specify the SSID name, im using the Airespace-Wlan-Id to match. Im now able to connect to the SSID fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now that this hurdle has been passed &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; i have another question.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This SSID will be used by both Corporate users and Contractors.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The Authorization rules will be setup to match the users based on the AD group that they are in.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Corporate users will get full access while the Corporate users will only get access based on what services they require.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When the contractor users connect, i am pushing them to a different VLAN using the Authorization Profile.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is, in terms &amp;nbsp;of controlling what the contractors have access to, what would be the best way to do it?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can apply an Airspace ACL in the Authorization Profile as well but then if a different contractor comes in then i &amp;nbsp;will have to continuously adjust the ACL.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was thinking about controlling it from AD using different AD groups but the Microsoft Admin indicated that they can control access to the servers but not to the network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 19:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021728#M25925</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2017-06-27T19:13:19Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021729#M25926</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's why i asked screenshot to see the real method you were using.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't know if you already did it but I recommend you setting ISE with policy-set. That allows you to have different authentication and authorization rules based on per ssid basis or whatever (it's a filter you apply).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't know how many contractors type you have but you can define a global acl and apply it through ISE authorization profile ( just a reminder the acl must be created on wlc before and the name setup on ISE must be the exact name).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is another way that's called Trustsec SGT. You will assign a specific tag to each frame and will allow you to build rules based on that tag. To explain it as simply as I can, based on a AD group, you assign a tag and all your acls address based on this tag.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 20:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021729#M25926</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-27T20:57:32Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021730#M25927</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yup i enabled Policy Sets on the ISE already.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;TrustSec we may do later down :).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will find the best way to make the global ACL work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks so much for all your help.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a problem with the iPhones getting to the HotSpot Captive Portal. Going to create a new post concerning that now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2017 18:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-wireless-802-1x-with-windows-android-and-ios-clients/m-p/3021730#M25927</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2017-06-28T18:48:59Z</dc:date>
    </item>
  </channel>
</rss>

