<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using IP address/subnet as an authorization rule in an ISE policy set? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3847272#M484433</link>
    <description>&lt;P&gt;i see you posted to our internal PM community. Why can't you just assign an SGT to utilize? Or if guest flow or guest endpoint give a different authorization profile?&lt;/P&gt;</description>
    <pubDate>Mon, 29 Apr 2019 15:51:36 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2019-04-29T15:51:36Z</dc:date>
    <item>
      <title>Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3815820#M484431</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Scenario:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I have a MAB policy set where I permit various endpoints with some different profiler policies/logical profiles I’ve defined. Then the last rule is a default deny access.&lt;/P&gt;
&lt;P&gt;We have a subnet which we allow guests to connect on, and we want them to get permitted regardless of what device they bring. So I want to add a rule just before the last rule which would permit any device coming from that subnet – I don’t care what profiler policy it matched. The problem is I can’t figure out a way to get this to work.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What I’ve tried/considered:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create an “Endstation Network Condition” matching my subnet and use this in the policy rule. This unfortunately doesn’t work when I use a subnet but I noticed that it works if I use MAC addresses, presumably because the Radius Caller Station ID is a MAC address.&lt;/LI&gt;
&lt;LI&gt;Create a condition to match on Radius Framed-IP-Address. This would almost work but the only options ISE gives you are Equals and Not Equals. I’m trying to match a /14 so listing every single IP address out isn’t possible.&lt;/LI&gt;
&lt;LI&gt;Creating a profiler policy with a single check (IP address starts with) and giving it a really high certainty factor to outweigh all other profiler policies. This technically would work but then I’d lose the easy visibility of whether something is a Macbook/Windows Workstation/etc. because the endpoint profile would be getting overridden with this new one. That won’t work for us.&lt;/LI&gt;
&lt;LI&gt;Give those guest ports an interface description like “Guest” and then in ISE use the SNMP probe to see this description and make that into a condition? I haven’t been able to get ISE to pull the interface description though, it just says ifDescr is for example “GigabitEthernet0/1”.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Any ideas on how to accomplish this are appreciated.&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;Shaan&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3815820#M484431</guid>
      <dc:creator>Shaan</dc:creator>
      <dc:date>2020-02-21T19:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3815851#M484432</link>
      <description>&lt;P&gt;Hello, We can have the domain base policy. Thing your organization i using the certain domain, apart from domain falls under different rule ( Guest will we in different domain or work group ). Create a /20 segment restricted VN and you can have the specific access allowed for the created segment. Create a rule with non domain laptops falls to this rule and the non domain laptops falls under non-compliant as well. Access restriction for posture non-compliant machines – we need to create an SGT (say Posture_NC) and define the policy in DNA to restrict the access to ISE. Posture NC machines also we will use the VN which is configured in a different VN with restricted access.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Sep 2020 16:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3815851#M484432</guid>
      <dc:creator>vickyviveku</dc:creator>
      <dc:date>2020-09-15T16:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3847272#M484433</link>
      <description>&lt;P&gt;i see you posted to our internal PM community. Why can't you just assign an SGT to utilize? Or if guest flow or guest endpoint give a different authorization profile?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 15:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3847272#M484433</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-04-29T15:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3847285#M484434</link>
      <description>I think you are on the right track with idea #3. You can accomplish what you would like using the AD probe 'AD-Host-Exists' equals false. Since these guests hosts are not a member of AD you can profile the endpoints that way and reference that profiled endpoint group in your authz condition. I personally do not think you will lose the visibility of whether the guests hosts are mac or windows etc. You will still have other attributes collected. If you really wanted you can create a child policy using your new AD host exists profile as the parent. What this will do is ensure the host is not a member of the domain and then match a child policy let's pretend for a mac host. For example:&lt;BR /&gt;&lt;BR /&gt;Parent policy: Domain Host Check -- AD-Host-Exists&lt;BR /&gt;Child policy: Macbook Check -- whatever attribute you decide to match&lt;BR /&gt;&lt;BR /&gt;Then you will know if a host is profiled as Macbook Check that it is a) not a member of the domain b)a guest workstation identified as a MAC&lt;BR /&gt;&lt;BR /&gt;HTH!</description>
      <pubDate>Mon, 29 Apr 2019 16:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3847285#M484434</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-04-29T16:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3847961#M484436</link>
      <description>&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interesting idea.&amp;nbsp; In this case it wouldn't work for me though because we also have a bunch of other devices (security cameras, printers, etc.) that are allowed onto the network using profiling and they aren't joined to the domain.&amp;nbsp; Cisco TAC and AS also looked into this and they said this specific flow can't be done today.&amp;nbsp; I think a feature request is in the works though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 13:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3847961#M484436</guid>
      <dc:creator>Shaan</dc:creator>
      <dc:date>2019-04-30T13:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850190#M484437</link>
      <description>&lt;P&gt;Option 4 would be the best. Currently the IOS cannot send interface description, but can send data VLAN ID/Name that the interface is configured with 'switchport access vlan XXX' command. The other option is to use 'mab eap' on the specific guest interfaces where ISE can differentiate based on MAB request protocol. I have documented few options here: &lt;A href="https://community.cisco.com/t5/security-documents/advanced-ise-tips-to-make-your-deployment-easier/ta-p/3850189#toc-hId--1934452079" target="_blank"&gt;https://community.cisco.com/t5/security-documents/advanced-ise-tips-to-make-your-deployment-easier/ta-p/3850189#toc-hId--1934452079&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 May 2019 01:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850190#M484437</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-05-04T01:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850826#M484438</link>
      <description>&lt;P&gt;Thanks so much for this info.&amp;nbsp; It would be great if IOS could send the interface description.&amp;nbsp; And VLAN ID/Name is useful too, although unfortunately most of our switches are on 16.x but before 16.12 where this was fixed.&amp;nbsp; I will try out the "mab eap" idea and report back.&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 14:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850826#M484438</guid>
      <dc:creator>Shaan</dc:creator>
      <dc:date>2019-05-06T14:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850829#M484439</link>
      <description>&lt;P&gt;I suggest 'VLAN ID in NAS-ID attribute' option instead of 'mab eap'. Both are limited to MAB, but first option doesn't alter identity and simpler to implement.&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 14:42:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850829#M484439</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-05-06T14:42:26Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850876#M484440</link>
      <description>&lt;P&gt;I tried the 'mab eap' method but am running into an issue.&amp;nbsp; I configured 'mab eap' on the switchport, and in ISE I configured the policy condition to simply match the switch the request is coming from, and then an authorization rule for eap authentication = eam-md5.&amp;nbsp; However on the switch, when the endpoint connects, it looks like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch#&lt;BR /&gt;May 6 10:24:19.540: %DOT1X-5-FAIL: Authentication failed for client (949a.a927.9cb2) on Interface Gi0/10 AuditSessionID 0A909A4800003EC8EA4D4CC9&lt;BR /&gt;May 6 10:24:19.558: %MAB-5-FAIL: Authentication failed for client (949a.a927.9cb2) on Interface Gi0/10 AuditSessionID 0A909A4800003EC8EA4D4CC9&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Switch#sh auth sess&lt;/P&gt;&lt;P&gt;Interface MAC Address Method Domain Status Fg Session ID&lt;BR /&gt;Gi0/10 949a.a927.9cb2 N/A UNKNOWN Unauth 0A909A4800003EC8EA4D4CC9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's what I have in ISE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise-eap.png" style="width: 758px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/36216i306A3BA58B40E563/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise-eap.png" alt="ise-eap.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Can you tell me what I might be doing wrong?&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 15:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850876#M484440</guid>
      <dc:creator>Shaan</dc:creator>
      <dc:date>2019-05-06T15:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850907#M484441</link>
      <description>&lt;P&gt;I've been testing this out and I am able to get it working.&amp;nbsp; One caveat I have noticed is that if the MAC address is already in ISE, I have to delete the endpoint first for the new NAS-Identifier attribute to show up in ISE (and thus hit the correct authorization rule).&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 15:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3850907#M484441</guid>
      <dc:creator>Shaan</dc:creator>
      <dc:date>2019-05-06T15:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3854528#M484442</link>
      <description>&lt;P&gt;The caveat seems due to how the rules are ordered in the authorization policy of your policy set. If you would like such to pre-exempt all others, we could move it to Local/Global Exceptions.&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2019 04:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3854528#M484442</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-12T04:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Using IP address/subnet as an authorization rule in an ISE policy set?</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3854531#M484443</link>
      <description>&lt;P&gt;As you have a working solution, I would suggest you not to continue with this other idea of using EAP MAB.&lt;/P&gt;
&lt;P&gt;Otherwise, please involve TAC and AS to troubleshoot. It's hard for us to tell what the issue might be without looking at the full policy sets and the auth reports.&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2019 04:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ip-address-subnet-as-an-authorization-rule-in-an-ise/m-p/3854531#M484443</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-12T04:18:42Z</dc:date>
    </item>
  </channel>
</rss>

