<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BYOD Build in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3759653#M487404</link>
    <description>Regarding "no manual setup of wlan on the device" Without manual setup of WLAN on client, how would the client know which SSID to connect to ? ISE will have to provision the certificates for the endpoints in your scenario and letting the device know which SSID to connect is something that cannot be avoided. &lt;BR /&gt;&lt;BR /&gt;I did not understand the second part where you said you did not want to have unlimited access to the internet . If i understand correct, you are talking about the access after the BYOD authentication (based on your statement "We've setup 2 wlans, 1 for on boarding and 1 for BYOD Connectivity., this will give them full access to the internet with the same safeguards using the corporate web filtering.") which you can limit using Airspace ACLs.</description>
    <pubDate>Fri, 07 Dec 2018 15:40:17 GMT</pubDate>
    <dc:creator>Surendra</dc:creator>
    <dc:date>2018-12-07T15:40:17Z</dc:date>
    <item>
      <title>BYOD Build</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3759434#M487400</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our customer wants BYOD.&amp;nbsp; We've setup 2 wlans, 1 for on boarding and 1 for&amp;nbsp;BYOD Connectivity., this will give them full access to the internet with the same safeguards using the corporate web filtering.&lt;/P&gt;
&lt;P&gt;The user has to be in a AD Secure Group to get access, using the BYOD portal page they log on and redirect takes them to the MDM solution.&amp;nbsp; This detects if Android or Apple, if Android tells you to go off to Play and download Mobiliron Client.&lt;/P&gt;
&lt;P&gt;If Apple automatically pushes out BYOD labels to it.&lt;/P&gt;
&lt;P&gt;Then when all the labels downloaded to the client, the end user has to force a connection to the BYOD Portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The customer doesn't want that, they want a 1 WLAN and simple to use solution, no manual setup of wlan&amp;nbsp;on the device.&amp;nbsp; Issue is we don't want to have unlimited access to the internet to do this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have ISE 2.2 patch 9 and WLC currently on 8.0.152&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How are other people doing this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers in advance&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Dec 2018 08:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3759434#M487400</guid>
      <dc:creator>craiglebutt</dc:creator>
      <dc:date>2018-12-07T08:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD Build</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3759653#M487404</link>
      <description>Regarding "no manual setup of wlan on the device" Without manual setup of WLAN on client, how would the client know which SSID to connect to ? ISE will have to provision the certificates for the endpoints in your scenario and letting the device know which SSID to connect is something that cannot be avoided. &lt;BR /&gt;&lt;BR /&gt;I did not understand the second part where you said you did not want to have unlimited access to the internet . If i understand correct, you are talking about the access after the BYOD authentication (based on your statement "We've setup 2 wlans, 1 for on boarding and 1 for BYOD Connectivity., this will give them full access to the internet with the same safeguards using the corporate web filtering.") which you can limit using Airspace ACLs.</description>
      <pubDate>Fri, 07 Dec 2018 15:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3759653#M487404</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-07T15:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD Build</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3759654#M487407</link>
      <description>You need to use DNS based ACLS to open up the appropriate sites to download the needed apps.&lt;BR /&gt;&lt;BR /&gt;You can have them connect to open SSID and then onboarded to EAP TLS secure SSID (DUAL SSID) or do single SSID PEAP&amp;gt;TLS&lt;BR /&gt;&lt;BR /&gt;Please refer to the BYOD guide for more information.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Dec 2018 15:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3759654#M487407</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-12-07T15:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD Build</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3760449#M487408</link>
      <description>&lt;P&gt;Cheers for replays.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are using Mobileiron for the MDM, this managing the client side, the ISE is passing the authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are using the BYOD Portal for&amp;nbsp;on-boarding&amp;nbsp;using MAB, so no manual configuration to the Androids for network settings, the use just clicks on the SSID.&lt;/P&gt;
&lt;P&gt;This point to our internal &lt;SPAN&gt;Mobileiron&lt;/SPAN&gt; server which for apple uses the Over the Air install and for Android have to download the &lt;SPAN&gt;Mobileiron&lt;/SPAN&gt; client same as have to for the NSA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Polices then are pushed out from&amp;nbsp;&lt;SPAN&gt;Mobileiron to the client.&amp;nbsp; But then requires a manual selection of the 2nd SSID&amp;nbsp;&amp;nbsp;which is using EAP-TLS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;All DNS are done via our Firewalls, the google side no issue, but for Apple, this is a forever moving target to lock down to only access their Content Delivery.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The customer wants a simple solution, with out the users to have to manually configure the Wireless&amp;nbsp;Client on their device.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cheers&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Dec 2018 10:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3760449#M487408</guid>
      <dc:creator>craiglebutt</dc:creator>
      <dc:date>2018-12-10T10:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD Build</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3760551#M487410</link>
      <description>Ok it’s still not clear what the optimal flow is that the customer would like&lt;BR /&gt;&lt;BR /&gt;If they want to do mdm but don’t want to deal with firewall rules etc then have them onboard via MDM on an open network before coming to the ise network &lt;BR /&gt;&lt;BR /&gt;Or you can do a single ssid network where they enter credentials. Once connected you instruct them to onboard via enroll.cisco.com which requires them to go through byod and/or mdm. This redirection can also occur when they try to get to any internal resources. They must onboard to get further access. Now they don’t have to deal with any acl issues just allow them full internet &lt;BR /&gt;&lt;BR /&gt;This is all in the byod guide I believe &lt;BR /&gt;</description>
      <pubDate>Mon, 10 Dec 2018 13:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-build/m-p/3760551#M487410</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-12-10T13:41:52Z</dc:date>
    </item>
  </channel>
</rss>

