<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi supportlan in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904657#M39502</link>
    <description>&lt;P&gt;Hi supportlan&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks for your response and the example configs.&lt;/P&gt;
&lt;P&gt;I am configuring a pair of physical Cisco SNS3415 servers running ISE. So far, i have applied the basic configs on both servers and we are now configuring the switches (non-ISE related) and upgrading the firmware to the level that supports 802.1x.&lt;/P&gt;
&lt;P&gt;None of the team have done this before so i am essentially looking for a bit of guidance in relation to the scenario described in my original post. Do you know where i could find some specific procedures for configuring the ISE server policies? (i've been looking at numerous YouTube videos so far) such as&amp;nbsp;https://www.youtube.com/watch?v=kWJYDsqkEas&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; Would the commands you have provided cover Windows authentication as well as Avaya phone, WYSE terminal and printer profiling (i.e. identification by MAC address using a PLUS licence)?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If i understood you correctly, the following commands (adjusted for our own objects) would need to be applied to all core and access switches:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;################ - please see questions next to the config lines&lt;/STRONG&gt;&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;BR /&gt;!&lt;BR /&gt;radius server ISE &lt;STRONG&gt;####how would this be configured for a pair of ISE servers?&lt;/STRONG&gt;&lt;BR /&gt;address ipv4 192.168.0.1 auth-port 1812 acct-port 1813 ####how would this be configured for a pair of ISE servers?&lt;BR /&gt;key cisco123&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface g0/0&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;....Then to activate aaa and dot1x features:&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;aaa new-model &lt;STRONG&gt;#### is this a variable?&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius &lt;BR /&gt;aaa authorization auth-proxy default group radius &lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;!&lt;BR /&gt;##############&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;After that, each client facing access port on EACH ACCESS SWITCH (!? - we have a lot of client facing ports - would they need to be configured individually) would need to be configured with the following commands:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;interface Gigabitethernet0/0&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action authorize vlan xxx&lt;BR /&gt;authentication event server alive action reinitialize &lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate 600&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout quiet-period 5&lt;BR /&gt;dot1x timeout tx-period 5&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;
&lt;P&gt;m&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jun 2016 08:30:37 GMT</pubDate>
    <dc:creator>kuzminsk1</dc:creator>
    <dc:date>2016-06-22T08:30:37Z</dc:date>
    <item>
      <title>Cisco ISE Small Network Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904655#M39496</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Guys&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I am working on a "Small Network Deployment" of two Cisco ISE servers (SNS-3415-K9) in the Active/Passive config. &amp;nbsp;In this deployment, one Cisco ISE node is functioning as the primary appliance. The secondary node supports the primary node and maintains a functioning network whenever connectivity is lost between the primary node and network appliances, network resources, or RADIUS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Our scenario:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Around 250-300 users are migrating to a new office, which is “shared” with another company. Each user has an Avaya IP phone (9650), a Windows 7 laptop/PC or a WYSE Terminal (Citrix). Around 600 devices in total. a pair of ISE servers is going to be used to control NAC and profile non-windows devices (Plus licenses purchased).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Please refer to the LLD/HLD attached (please note 2 pages in the pdf&amp;nbsp;doc).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The network diagram is oversimplified as it only describes the ISE server architecture in relation to the rest of the local network. &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;The core switches pass all VLANs&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;The access switches intentionally only have some VLANs configured and not others, while the core switches are passing all VLANs&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;A01 is a two module stack&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Redundant links are configured as port channels on both sides (our standard config)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;SPT is defined per VLAN.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;My questions relate specifically to the ISE server installation and configuration as we have never installed one before.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Could someone please clarify if the same 802.1x switch config should be applied to all of our core and access switches? If not, how should it differ between the core and the access switches?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Do you have any reliable config examples for a comparable scenario?&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;m&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904655#M39496</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2019-03-11T06:51:13Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904656#M39499</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm not sure if I understood correctly your concern.&lt;/P&gt;
&lt;P&gt;To activate ISE radius config on all switches you need:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;radius-server attribute 6 on-for-login-auth&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;radius-server attribute 8 include-in-access-req&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;radius-server attribute 25 access-request include&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;radius-server dead-criteria time 10 tries 3&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;radius server ISE&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; address ipv4 192.168.0.1 auth-port 1812 acct-port 1813&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; key cisco123&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;ip radius source-interface g0/0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Then to activate aaa and dot1x features:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;aaa new-model&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;aaa authentication dot1x default group radius&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;aaa authorization network default group radius &lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;aaa authorization auth-proxy default group radius &lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;aaa accounting dot1x default start-stop group radius&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;aaa session-id common&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;dot1x system-auth-control&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Afterwards, you need to configure below commands on ports on which you want dot1x authentication. If ports don't have this configuration, then no dot1x configuration will done.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;interface Gigabitethernet0/0&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; dot1x pae authenticator&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication event fail action next-method&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication event server dead action authorize vlan xxx&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication event server alive action reinitialize &lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication host-mode multi-domain&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication open&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication order dot1x mab&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication priority dot1x mab&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication port-control auto&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication periodic&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication timer reauthenticate 600&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; authentication violation restrict&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; dot1x pae authenticator&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; dot1x timeout quiet-period 5&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; dot1x timeout tx-period 5&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You need to adapt vlan, timers if needed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For ISE configuration point of view, you need:&lt;/P&gt;
&lt;P&gt;- authorization profile&lt;/P&gt;
&lt;P&gt;- authentication profile&lt;/P&gt;
&lt;P&gt;- under the policy tab, you need to define your authentication rules and authorization rules&lt;/P&gt;
&lt;P&gt;You can found some documentation on Cisco website or I can help but I don't have any ISE server right now for lab purpose.&lt;/P&gt;
&lt;P&gt;Is it what you were looking for?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2016 23:58:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904656#M39499</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-10T23:58:00Z</dc:date>
    </item>
    <item>
      <title>Hi supportlan</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904657#M39502</link>
      <description>&lt;P&gt;Hi supportlan&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks for your response and the example configs.&lt;/P&gt;
&lt;P&gt;I am configuring a pair of physical Cisco SNS3415 servers running ISE. So far, i have applied the basic configs on both servers and we are now configuring the switches (non-ISE related) and upgrading the firmware to the level that supports 802.1x.&lt;/P&gt;
&lt;P&gt;None of the team have done this before so i am essentially looking for a bit of guidance in relation to the scenario described in my original post. Do you know where i could find some specific procedures for configuring the ISE server policies? (i've been looking at numerous YouTube videos so far) such as&amp;nbsp;https://www.youtube.com/watch?v=kWJYDsqkEas&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; Would the commands you have provided cover Windows authentication as well as Avaya phone, WYSE terminal and printer profiling (i.e. identification by MAC address using a PLUS licence)?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If i understood you correctly, the following commands (adjusted for our own objects) would need to be applied to all core and access switches:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;################ - please see questions next to the config lines&lt;/STRONG&gt;&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;BR /&gt;!&lt;BR /&gt;radius server ISE &lt;STRONG&gt;####how would this be configured for a pair of ISE servers?&lt;/STRONG&gt;&lt;BR /&gt;address ipv4 192.168.0.1 auth-port 1812 acct-port 1813 ####how would this be configured for a pair of ISE servers?&lt;BR /&gt;key cisco123&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface g0/0&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;....Then to activate aaa and dot1x features:&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;aaa new-model &lt;STRONG&gt;#### is this a variable?&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius &lt;BR /&gt;aaa authorization auth-proxy default group radius &lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;!&lt;BR /&gt;##############&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;After that, each client facing access port on EACH ACCESS SWITCH (!? - we have a lot of client facing ports - would they need to be configured individually) would need to be configured with the following commands:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;interface Gigabitethernet0/0&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action authorize vlan xxx&lt;BR /&gt;authentication event server alive action reinitialize &lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate 600&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout quiet-period 5&lt;BR /&gt;dot1x timeout tx-period 5&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;
&lt;P&gt;m&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 08:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904657#M39502</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2016-06-22T08:30:37Z</dc:date>
    </item>
    <item>
      <title>p.s. i meant posturing, not</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904658#M39504</link>
      <description>&lt;P&gt;p.s. i meant posturing, not profiling&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 09:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904658#M39504</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2016-06-22T09:29:20Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904659#M39508</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, for documentation, you can search Cisco Trustsec and you will find some example. After there are administration guide like this one :&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_010110.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All commands are standard except the command authentication open based on what you want to manage your ise environment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For adding a 2 radius, just add the ip with key under the radius group. &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you want to follow step by step video you can also take a look at labminutes video&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this is clear&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 12:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904659#M39508</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-22T12:09:11Z</dc:date>
    </item>
    <item>
      <title>thanks - i'll definitely rate</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904660#M39512</link>
      <description>&lt;P&gt;thanks - i'll definitely rate this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If the ISE servers are patched into the core switches, but the radius configs need to be defined on core and access switches, in the following config, :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;radius-server attribute 6 on-for-login-auth&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;radius-server attribute 8 include-in-access-req&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;radius-server attribute 25 access-request include&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;radius-server dead-criteria time 10 tries 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;radius server ISE&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;address ipv4 192.168.0.1 auth-port 1812 acct-port 1813&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;key cisco123&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip radius source-interface g0/0 --&lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt; IS THIS THE UPLINK&amp;nbsp;TRUNK PORT ON THE ACCESS SWITCH???&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;thanks&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;m&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 14:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904660#M39512</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2016-06-22T14:22:00Z</dc:date>
    </item>
    <item>
      <title>i.e the trunk port connecting</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904661#M39516</link>
      <description>&lt;P&gt;i.e the trunk port connecting the access switch to the core switch?&lt;/P&gt;
&lt;P&gt;please note we are using 2 physical port Port Chanel to uplink the switches&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 14:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904661#M39516</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2016-06-22T14:23:17Z</dc:date>
    </item>
    <item>
      <title>im not able to authenticate</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904662#M39520</link>
      <description>&lt;P&gt;im not able to authenticate with radius, having configured the the network device in ISE and created a test user:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ISE log:&lt;/P&gt;
&lt;P&gt;Source Timestamp2016-06-22 14:58:26.82Received Timestamp2016-06-22 14:58:26.828Policy ServerGLS-ISE-01Event5413 RADIUS Accounting-Request droppedFailure Reason11007 Could not locate Network Device or AAA ClientResolutionVerify whether the Network Device or AAA client is configured in: Administration &amp;gt; Network Resources &amp;gt; Network DevicesRoot causeCould not find the network device or the AAA Client while accessing NAS by IP during authentication.Service TypeFramedNAS IPv4 Address10.18.4.38&lt;/P&gt;
&lt;P&gt;Switch output:&lt;/P&gt;
&lt;P&gt;test aaa group radius server 10.18.4.33 auth-port 1812 acct-port 1813 radius-user PASSWORD new-code&lt;BR /&gt;User rejected&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Radius Switch Config:&lt;/P&gt;
&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 5 tries 3&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-01&lt;BR /&gt; address ipv4 10.18.4.33 auth-port 1812 acct-port 1813&lt;BR /&gt; key 7 0337530E145C256F1A19481116434A&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-02&lt;BR /&gt; address ipv4 10.18.4.35 auth-port 1812 acct-port 1813&lt;BR /&gt; key 7 073C29495C5A1D2643025A18057B6A&lt;/P&gt;
&lt;P&gt;ip radius source-interface GigabitEthernet1/0/1 (i only add one port here - this command overrides itself if i enter it with the second port. Gi1/0/1 is the switchport that ISE-01 is connected to. i tried to add Gi2/0/1, but it did&amp;nbsp;overwrote it - ??? im only configuring it on the core switch at the moment, how would this look on the access switch??)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The shared secret is the same on both sides.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;AAA witch Config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication attempts login 5&lt;BR /&gt;aaa authentication login default group tacacs+ enable&lt;BR /&gt;aaa authentication login no_tacacs enable&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authentication ppp default group tacacs+&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa authorization auth-proxy default group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting network default start-stop group tacacs+&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;aaa session-id common&lt;BR /&gt;switch 1 provision ws-c3850-24t&lt;BR /&gt;switch 2 provision ws-c3850-24t&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;user caller radius-user is created in identities on ISE-01, but im not able to test the link:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;test aaa group radius server 10.18.4.33 auth-port 1812 acct-port 1813 radius-user Capita123! new-code&lt;BR /&gt;User rejected&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you see what im doing wrong?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;many thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;m&lt;/P&gt;
&lt;P&gt;Can you see&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 15:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904662#M39520</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2016-06-22T15:10:17Z</dc:date>
    </item>
    <item>
      <title>Also, 10.18.4.38 is the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904663#M39521</link>
      <description>&lt;P&gt;Also,&amp;nbsp;&lt;SPAN&gt;10.18.4.38 is the gateway IP address of the VLAN that hosts the ISE servers, i dont understand why its listed in th eerror logs as device IP!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE class="auth_detail_container" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;TABLE border="0" class="content_table"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;ource Timestamp&lt;/TD&gt;
&lt;TD width="69%"&gt;2016-06-22 16:38:02.826&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Received Timestamp&lt;/TD&gt;
&lt;TD width="69%"&gt;2016-06-22 16:38:02.841&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Policy Server&lt;/TD&gt;
&lt;TD width="69%"&gt;GLS-ISE-01&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Event&lt;/TD&gt;
&lt;TD width="69%"&gt;5413 RADIUS Accounting-Request dropped&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Failure Reason&lt;/TD&gt;
&lt;TD width="69%"&gt;11007 Could not locate Network Device or AAA Client&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Resolution&lt;/TD&gt;
&lt;TD width="69%"&gt;Verify whether the Network Device or AAA client is configured in: Administration &amp;gt; Network Resources &amp;gt; Network Devices&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Root cause&lt;/TD&gt;
&lt;TD width="69%"&gt;Could not find the network device or the AAA Client while accessing NAS by IP during authentication.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Service Type&lt;/TD&gt;
&lt;TD width="69%"&gt;Framed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;NAS IPv4 Address&lt;/TD&gt;
&lt;TD width="69%"&gt;10.18.4.38&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Other Attributes&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;ConfigVersionId&lt;/TD&gt;
&lt;TD width="67%"&gt;118&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device Port&lt;/TD&gt;
&lt;TD width="67%"&gt;1646&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;DestinationPort&lt;/TD&gt;
&lt;TD width="67%"&gt;1813&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Protocol&lt;/TD&gt;
&lt;TD width="67%"&gt;Radius&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Acct-Status-Type&lt;/TD&gt;
&lt;TD width="67%"&gt;Interim-Update&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Acct-Delay-Time&lt;/TD&gt;
&lt;TD width="67%"&gt;15&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Acct-Session-Id&lt;/TD&gt;
&lt;TD width="67%"&gt;00000000&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Acct-Authentic&lt;/TD&gt;
&lt;TD width="67%"&gt;RADIUS&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;AcsSessionID&lt;/TD&gt;
&lt;TD width="67%"&gt;GLS-ISE-01/255868885/32&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device IP Address&lt;/TD&gt;
&lt;TD width="67%"&gt;10.18.4.38&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 22 Jun 2016 16:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904663#M39521</guid>
      <dc:creator>kuzminsk1</dc:creator>
      <dc:date>2016-06-22T16:41:05Z</dc:date>
    </item>
    <item>
      <title>Those commands needs to be</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904664#M39522</link>
      <description>&lt;P&gt;Those commands needs to be setup on all authenticator devices (all devices that will request authentication on behalf of user devices).&lt;/P&gt;
&lt;P&gt;The interface is usually the management that the switch use to communicate with your radius (layer 3 interface)&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 17:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-network-deployment/m-p/2904664#M39522</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-22T17:05:52Z</dc:date>
    </item>
  </channel>
</rss>

