<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Use Cases for various RADIUS Attributes in Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847935#M441576</link>
    <description>&lt;P&gt;I have been trying to study Cisco ISE for quite sometime.I have come to a observation that only specific RADIUS attributes are being used in authentication and authorization policies in multiple use cases.They are&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Normalised Radius·RadiusFlowType&lt;/LI&gt;&lt;LI&gt;Normalised Radius·SSID&lt;/LI&gt;&lt;LI&gt;Radius·Called-Station-ID&lt;/LI&gt;&lt;LI&gt;Radius·Called-Station-ID&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Can I get to know about any use cases where attributes like&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Callback-number&lt;/LI&gt;&lt;LI&gt;Connect-Info&lt;/LI&gt;&lt;LI&gt;Error Cause&lt;/LI&gt;&lt;LI&gt;Digest Response&lt;/LI&gt;&lt;LI&gt;Login&lt;/LI&gt;&lt;LI&gt;LAT&lt;/LI&gt;&lt;LI&gt;NAS(Port,ID.Type.Limit)&lt;/LI&gt;&lt;LI&gt;Service-type&lt;/LI&gt;&lt;LI&gt;Tunnel....&lt;/LI&gt;&lt;LI&gt;Vendor specific&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;are being used.&lt;/P&gt;&lt;P&gt;I have come across a RFC explaining attributes but it is not much helpful. I would be grateful if someone points out how to use those attributes with Cisco ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 19:05:05 GMT</pubDate>
    <dc:creator>Rajkeen Chamanshaikh</dc:creator>
    <dc:date>2020-02-21T19:05:05Z</dc:date>
    <item>
      <title>Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847935#M441576</link>
      <description>&lt;P&gt;I have been trying to study Cisco ISE for quite sometime.I have come to a observation that only specific RADIUS attributes are being used in authentication and authorization policies in multiple use cases.They are&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Normalised Radius·RadiusFlowType&lt;/LI&gt;&lt;LI&gt;Normalised Radius·SSID&lt;/LI&gt;&lt;LI&gt;Radius·Called-Station-ID&lt;/LI&gt;&lt;LI&gt;Radius·Called-Station-ID&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Can I get to know about any use cases where attributes like&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Callback-number&lt;/LI&gt;&lt;LI&gt;Connect-Info&lt;/LI&gt;&lt;LI&gt;Error Cause&lt;/LI&gt;&lt;LI&gt;Digest Response&lt;/LI&gt;&lt;LI&gt;Login&lt;/LI&gt;&lt;LI&gt;LAT&lt;/LI&gt;&lt;LI&gt;NAS(Port,ID.Type.Limit)&lt;/LI&gt;&lt;LI&gt;Service-type&lt;/LI&gt;&lt;LI&gt;Tunnel....&lt;/LI&gt;&lt;LI&gt;Vendor specific&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;are being used.&lt;/P&gt;&lt;P&gt;I have come across a RFC explaining attributes but it is not much helpful. I would be grateful if someone points out how to use those attributes with Cisco ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847935#M441576</guid>
      <dc:creator>Rajkeen Chamanshaikh</dc:creator>
      <dc:date>2020-02-21T19:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847973#M441577</link>
      <description>&lt;P&gt;Hi Raj,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you checked this&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;&lt;A title="RADIUS Attributes Overview and RADIUS IETF Attributes" href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html" target="_blank" rel="noopener"&gt;RADIUS Attributes Overview and RADIUS IETF Attributes&lt;/A&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 14:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847973#M441577</guid>
      <dc:creator>Sathiyanarayanan Ravindran</dc:creator>
      <dc:date>2019-04-30T14:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847982#M441578</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-network-access-attributes/ta-p/3616253" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-network-access-attributes/ta-p/3616253&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Tried to fill in information for well used attributes here.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 14:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847982#M441578</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-04-30T14:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847996#M441579</link>
      <description>&lt;P&gt;Yes I have but I don't find it helpful.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 14:23:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3847996#M441579</guid>
      <dc:creator>Rajkeen Chamanshaikh</dc:creator>
      <dc:date>2019-04-30T14:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3848218#M441580</link>
      <description>&lt;P&gt;When it comes to RADIUS attributes, the common ones that you listed are used in most policies for processing the incoming request.&amp;nbsp; For example, a policy set that is specific to the "Guest" SSID would look at the "called-station-id" attribute and match on the SSID name.&lt;/P&gt;&lt;P&gt;You will use more RADIUS attributes in your authorization profiles to push down specific settings after authentication is complete.&amp;nbsp; For example, setting the ASA VPN group policy by using the Cisco "Class" attribute.&amp;nbsp; Or assigning the specific interface you want a wireless client to be dumped onto ("airespace-interface-name").&amp;nbsp; Most of the common ones are already defined as selectable fields in the authorization profiles.&amp;nbsp; For example, "ASA VPN" is actually using the "Class" attribute.&amp;nbsp; And dynamic VLAN assignment uses a couple of attributes.&amp;nbsp; You can see the details at the bottom of your authorization profile when you are creating it.&amp;nbsp; It is very rare to need to use anything else beyond what ISE provides.&lt;/P&gt;&lt;P&gt;If you are curious as to what attributes you can use in your policies for your specific environment, just go to RADIUS Live Logs and pick an entry.&amp;nbsp; Click on the details icon.&amp;nbsp; You will see the authentication details and it basically shows you everything that was presented by the endpoint.&amp;nbsp; If you see a specific attribute there that you want to use in your policies, try it out.&amp;nbsp; If you test and are not hitting your rule, check the details of the endpoint again and make sure the attribute is there.&lt;/P&gt;&lt;P&gt;Also, keep in mind that RADIUS has a lot of attributes defined in the RFC's; however, that doesn't mean vendors will use them all or even stick to what the RFC says.&amp;nbsp; Vendors will use what they want/need and that's it.&amp;nbsp; When working with ISE policies, think of your use cases first, without diving into the technical details of attributes.&amp;nbsp; Then make your policy as simple as possible to achieve your desired use cases.&amp;nbsp; The more complex your policy is, the harder it is to troubleshoot and the more room for error or differences across vendors.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 21:17:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3848218#M441580</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-04-30T21:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3848993#M441581</link>
      <description>&lt;P&gt;Great reply from&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/624773"&gt;@Colby LeMaire&lt;/a&gt;&amp;nbsp; - I would add to this that tcpdump is your friend here.&amp;nbsp; Enable it and perform some authentications with various types of NAS's and you'll get an idea of what is going on.&amp;nbsp; For Cisco routers/switches there are many additional radius attributes that need to be manually specified in the IOS config - that means there is no "default IOS" behaviour.&amp;nbsp; It all depends on what that NAS is configured to send.&lt;/P&gt;
&lt;P&gt;There should be some &lt;A href="https://tools.ietf.org/html/rfc2865" target="_self"&gt;RFC2865&lt;/A&gt; conformance in terms of minimum attributes that constitute a valid request (e.g. sending an Access-Request requires at least a User-Name etc.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Example snippet From RFC2865 ...&lt;BR /&gt;&lt;BR /&gt;      An Access-Request SHOULD contain a User-Name attribute.  It MUST
      contain either a NAS-IP-Address attribute or a NAS-Identifier
      attribute (or both).

      An Access-Request MUST contain either a User-Password or a CHAP-
      Password or a State.  An Access-Request MUST NOT contain both a
      User-Password and a CHAP-Password.  If future extensions allow
      other kinds of authentication information to be conveyed, the
      attribute for that can be used in an Access-Request instead of
      User-Password or CHAP-Password.

      An Access-Request SHOULD contain a NAS-Port or NAS-Port-Type
      attribute or both unless the type of access being requested does
      not involve a port or the NAS does not distinguish among its
      ports.&lt;/PRE&gt;
&lt;P&gt;And then other representations like this&lt;/P&gt;
&lt;PRE&gt;5.44.  Table of Attributes

   The following table provides a guide to which attributes may be found
   in which kinds of packets, and in what quantity.

   Request   Accept   Reject   Challenge   #    Attribute
   0-1       0-1      0        0            1   User-Name
   0-1       0        0        0            2   User-Password [Note 1]
   0-1       0        0        0            3   CHAP-Password [Note 1]
   0-1       0        0        0            4   NAS-IP-Address [Note 2]
   0-1       0        0        0            5   NAS-Port
   0-1       0-1      0        0            6   Service-Type
   0-1       0-1      0        0            7   Framed-Protocol
   0-1       0-1      0        0            8   Framed-IP-Address
   0-1       0-1      0        0            9   Framed-IP-Netmask
   0         0-1      0        0           10   Framed-Routing
   0         0+       0        0           11   Filter-Id
   0-1       0-1      0        0           12   Framed-MTU
   0+        0+       0        0           13   Framed-Compression
   0+        0+       0        0           14   Login-IP-Host&lt;/PRE&gt;</description>
      <pubDate>Thu, 02 May 2019 11:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/3848993#M441581</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-05-02T11:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/4057478#M559354</link>
      <description>&lt;P&gt;What is the difference between an ISE normalized radius attribute vs an ISE radius attribute?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 09:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/4057478#M559354</guid>
      <dc:creator>Maurice Ball</dc:creator>
      <dc:date>2020-04-02T09:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/4058011#M559372</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317927"&gt;@Maurice Ball&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A Normalised RADIUS attribute in ISE is a convenient abstraction that allows us to use a common attribute in our Policy Set Logic in a multi-vendor environment. E.g. if you have a mix of Cisco and Aruba WLC's, then you can either do it the hard way, by checking for the vendor specific attributes used, e.g. Cisco uses attribute Called-Station-ID for the SSID, and Aruba uses&amp;nbsp;&lt;SPAN&gt;Aruba-Essid-Name.&amp;nbsp; Perhaps a bad example, because I am no Aruba guru &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; - but you get the point. There are other instances where vendor A signals a MAB Auth request with Service-Type = "Call-Check" and another vendor uses Service-Type = "Blah".&amp;nbsp; Cisco ISE has multi-vendor support, and as long as you set the NAS with the correct Device Vendor Type ("Device Profile") then ISE does the internal mapping for you. Then you can use abstractions&amp;nbsp;like Normalised Radius SSID which is vendor agnostic. You no longer need to care how it works under the hood.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Other abstractions are things like the Compound Conditions like Wireless_8021X and Wired_802.1X - have a look at those in detail and you can see that each vendor does it slightly differently.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE-conditions.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70547i47F6B3AB5AF1E19D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE-conditions.PNG" alt="ISE-conditions.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 23:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/4058011#M559372</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-04-02T23:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Use Cases for various RADIUS Attributes in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/4058135#M559379</link>
      <description>Great answer. Thanks for the help.&lt;BR /&gt;</description>
      <pubDate>Fri, 03 Apr 2020 06:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-cases-for-various-radius-attributes-in-cisco-ise/m-p/4058135#M559379</guid>
      <dc:creator>Maurice Ball</dc:creator>
      <dc:date>2020-04-03T06:19:48Z</dc:date>
    </item>
  </channel>
</rss>

