<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Indeed, just want to add two in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914446#M36485</link>
    <description>&lt;P&gt;Indeed, just want to add two remarks:&lt;/P&gt;
&lt;P&gt;The switch communicate to ISE using RADIUS via its management?? interface, that is the only hard requirement to fulfill this requirement&lt;/P&gt;
&lt;P&gt;Second: if you want to use a ISE guest &lt;B&gt;&lt;I&gt;portal&lt;/I&gt;&lt;/B&gt; to facilitate this requirement you have to make up your mind again because both the management interface of the switch and cisco ISE might need connectivity to the guest vlan.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Apr 2016 20:43:38 GMT</pubDate>
    <dc:creator>jwmolenaar</dc:creator>
    <dc:date>2016-04-27T20:43:38Z</dc:date>
    <item>
      <title>ISE Server - multiple networks query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914443#M36482</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are planning to deploy a Cisco ISE server to manage NAC for 300 users (Windows, WYSE, Avaya phones and HP printers). DHCP is running on the DC and the ISE interface has Layer 2 visibility of the whole network segment its managing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We have just received an additional requirement for a dedicated/completely segregated switch VLAN which provides unrestricted Internet access. It would be connected to a third party Internet-facing router allowing connections directly on to the internet. Effectively, its a completely segregated network of a single VLAN and Internet access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would it be possible to manage port-security for this VLAN from the ISE server? If so, would the ISE server need an additional NIC configured in the subnet of the Internet VLAN?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Basically, i'm wondering if a single ISE server can be used to manage 2 completely independent networks. The internet network would not use AD authentication and access would have to be granted manually on a case by case basis.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;M&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914443#M36482</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2019-03-11T06:42:39Z</dc:date>
    </item>
    <item>
      <title>Just to clarify - the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914444#M36483</link>
      <description>&lt;P&gt;Just to clarify - the Internet VLAN will be defined on teh same switches as the main network.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 09:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914444#M36483</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2016-04-27T09:09:57Z</dc:date>
    </item>
    <item>
      <title>Just to clarify, ISE does NOT</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914445#M36484</link>
      <description>&lt;P&gt;Just to clarify, ISE does NOT need to be Layer2 adjacent to the clients to work. Only when using specific profiling probes is this ever usefull. Has no use when doing mac address validation or 802.1x.&lt;/P&gt;
&lt;P&gt;As for your question, yes ISE can manage validating say ex. mac addresses that need access to your "Internet" VLAN, and your internal VLAN at the same time. However it's not done with the switch "port-security" feature, but rather by entering the mac addresses that need access in your ISE server and then using the "group" you put them in ISE in, ads a condition when authorizing access in ISE.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 20:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914445#M36484</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2016-04-27T20:23:31Z</dc:date>
    </item>
    <item>
      <title>Indeed, just want to add two</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914446#M36485</link>
      <description>&lt;P&gt;Indeed, just want to add two remarks:&lt;/P&gt;
&lt;P&gt;The switch communicate to ISE using RADIUS via its management?? interface, that is the only hard requirement to fulfill this requirement&lt;/P&gt;
&lt;P&gt;Second: if you want to use a ISE guest &lt;B&gt;&lt;I&gt;portal&lt;/I&gt;&lt;/B&gt; to facilitate this requirement you have to make up your mind again because both the management interface of the switch and cisco ISE might need connectivity to the guest vlan.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 20:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-multiple-networks-query/m-p/2914446#M36485</guid>
      <dc:creator>jwmolenaar</dc:creator>
      <dc:date>2016-04-27T20:43:38Z</dc:date>
    </item>
  </channel>
</rss>

