<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Dynamic VLAN Assignment Based on Auth Type in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3798652#M485294</link>
    <description>&lt;P&gt;You can configure machine authentication.&amp;nbsp; BYOD device will not be part to domain computers so with machine authentication you can differentiate between personal and corporate devices.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Feb 2019 12:32:33 GMT</pubDate>
    <dc:creator>pan</dc:creator>
    <dc:date>2019-02-10T12:32:33Z</dc:date>
    <item>
      <title>ISE Dynamic VLAN Assignment Based on Auth Type</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3798580#M485290</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying&amp;nbsp;configure a single SSID where both Corporate Laptops and BYOD Laptops can connect, BYOD devices will be non-domain joined, but users will have an AD account. Corporate Laptops will use PEAP-MSCHAPv2 and BYOD Laptops will use PEAP to authenticate. I wanted to dynamically place BYOD devices on separate VLAN to have restricted access compared to Corporate Laptop. What would be the best way to achieve this using ISE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 05:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3798580#M485290</guid>
      <dc:creator>wick54namal</dc:creator>
      <dc:date>2019-02-10T05:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Dynamic VLAN Assignment Based on Auth Type</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3798652#M485294</link>
      <description>&lt;P&gt;You can configure machine authentication.&amp;nbsp; BYOD device will not be part to domain computers so with machine authentication you can differentiate between personal and corporate devices.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 12:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3798652#M485294</guid>
      <dc:creator>pan</dc:creator>
      <dc:date>2019-02-10T12:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Dynamic VLAN Assignment Based on Auth Type</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3798691#M485298</link>
      <description>&lt;P&gt;This is a common setup and using PEAP computer for corporate devices and PEAP user for the BYOD mobile devices with a VLAN move will work.&amp;nbsp; The only thing to watch out for is account lockout issues.&amp;nbsp; When AD account passwords change the users forget they have it programmed into their BYOD mobile devices and their accounts will get locked.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 15:45:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3798691#M485298</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-02-10T15:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Dynamic VLAN Assignment Based on Auth Type</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3802087#M485300</link>
      <description>&lt;P&gt;You have several options to accomplish your requirement.&amp;nbsp; Here are a few ideas that&amp;nbsp;will assist you:&lt;/P&gt;&lt;P&gt;Setup separate global policies with different allowed protocol profiles and build policies separately this way;&lt;/P&gt;&lt;P&gt;Use the same global policy that allows both desired protocols, but configure several authorization policies.&amp;nbsp; For example, for domain joined members you could setup conditions that match specific identity groups in AD that your objects are a part of.&amp;nbsp; Then based on the condition match you assign your result that assigns them to their respective vlan.&amp;nbsp; Then at the bottom you have your default rule for BYOD that are non-domain members that assigns them to a different vlan and possibly even throws a dacl out;&lt;/P&gt;&lt;P&gt;Another option you could look into is potentially using client provisioning for the BYOD devices. However, this introduces quite a few things from a configuration standpoint.&amp;nbsp; You could even potentially use ISE posture assessment to perform some sort of security check requirements prior to giving these BYOD devices access even to your restricted vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Feb 2019 17:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dynamic-vlan-assignment-based-on-auth-type/m-p/3802087#M485300</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-02-14T17:46:37Z</dc:date>
    </item>
  </channel>
</rss>

