<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE GUEST AUTHORIZATION ISSUE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guest-authorization-issue/m-p/3904505#M470693</link>
    <description>&lt;P&gt;My opinion is that you should assign vlan via authz policies built in ISE. Your best bet for what your desire is to make like a restricted (parking lot) network for your guests that get redirected to a guest portal to either self-register or become registered via sponsor. Essentially in either scenario you would create your portal and create a specific authz profile that dumps the endpoint in your "parking lot", assigns a redirect acl, and redirects them to your guest portal. Without diving deeper into the details of what exactly you want to accomplish I think you have several avenues for options. If you are new to utilizing the portals you can check out Cisco documentation or follow along here: &lt;A href="http://labminutes.com/video/sec" target="_blank" rel="noopener"&gt;http://labminutes.com/video/sec&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&amp;nbsp;usually has good info for the portals.&amp;nbsp; Good luck &amp;amp; HTH!&lt;/P&gt;</description>
    <pubDate>Wed, 07 Aug 2019 11:49:45 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2019-08-07T11:49:45Z</dc:date>
    <item>
      <title>ISE GUEST AUTHORIZATION ISSUE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-authorization-issue/m-p/3904368#M470692</link>
      <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This concept escapes me. When a guest user connects to a wired network, what is ISE supposed to do? Is it to shutdown the port instantly or do a change of authorization where the guest user is placed into a new network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In any case, the interface can only have one data vlan for the existing network which we are trying to prevent the guest from having any visibility. Currently the authorization profile that i have has the following downloadable ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;permit udp any any eq 53&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;permit tcp any any eq 443&lt;BR /&gt;permit tcp any any eq 8443&lt;BR /&gt;permit ip any host 192.168.x.x(ise)&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue when a guest users connect to the network they are issued an IP address, this gives them an opportunity to scan the network and do any kind of attacks with this issued internal IP! Ideally i would think a regular guest would be redirected to a guest portal where they would issue their credentials and ISE would do a change of authorization and put then into a new vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;whats the best practise here? kindly share downloadable ACL which would would protect internal network or a way to prevent guests from having any kind of interaction with internal network but be directed to guest portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 07:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-authorization-issue/m-p/3904368#M470692</guid>
      <dc:creator>isaaco001</dc:creator>
      <dc:date>2019-08-07T07:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE GUEST AUTHORIZATION ISSUE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-authorization-issue/m-p/3904505#M470693</link>
      <description>&lt;P&gt;My opinion is that you should assign vlan via authz policies built in ISE. Your best bet for what your desire is to make like a restricted (parking lot) network for your guests that get redirected to a guest portal to either self-register or become registered via sponsor. Essentially in either scenario you would create your portal and create a specific authz profile that dumps the endpoint in your "parking lot", assigns a redirect acl, and redirects them to your guest portal. Without diving deeper into the details of what exactly you want to accomplish I think you have several avenues for options. If you are new to utilizing the portals you can check out Cisco documentation or follow along here: &lt;A href="http://labminutes.com/video/sec" target="_blank" rel="noopener"&gt;http://labminutes.com/video/sec&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&amp;nbsp;usually has good info for the portals.&amp;nbsp; Good luck &amp;amp; HTH!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 11:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-authorization-issue/m-p/3904505#M470693</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-08-07T11:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE GUEST AUTHORIZATION ISSUE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-authorization-issue/m-p/3904660#M470694</link>
      <description>&lt;P&gt;Please check out the guest guide with details about wired connectivity under &lt;A href="http://cs.co/ise-guest&amp;nbsp;&amp;nbsp;" target="_blank" rel="noopener"&gt;http://cs.co/ise-guest&amp;nbsp;&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-guest-access-prescriptive-deployment-guide/ta-p/3640475" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-documents/ise-guest-access-prescriptive-deployment-guide/ta-p/3640475&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Quick points. There is information about VLAN changes and port scripting under there. If you're really concerned about sharing IP space then don't use wired for guest. Force them to use wireless and do closed mode on your ports. otherwise they will have access. You can of course secure your wired ports in different ways (separate VRF)? Conference rooms? There are too many things to discuss here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please accept as solution and mark helpful&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 14:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-authorization-issue/m-p/3904660#M470694</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-08-07T14:58:05Z</dc:date>
    </item>
  </channel>
</rss>

