<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Guest DNS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3734066#M489021</link>
    <description>&lt;P&gt;If domain.com is your domain and if you may add an address (A) record to the public DNS publishing domain.com to resolve it to the private IP address, I do not see any issue. The private IP address will not be routable outside your guest network so should be &amp;nbsp;pretty safe. Besides, this way you may bind the portal to a system certificate signed by a well-known and trusted CA so that your guests would not be getting certificate errors due to hostname mismatch or untrusted otherwise.&lt;/P&gt;</description>
    <pubDate>Sat, 27 Oct 2018 02:17:26 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-10-27T02:17:26Z</dc:date>
    <item>
      <title>ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3734037#M489020</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a question regarding DNS for ISE portal redirect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am setting up a guest hot spot portal in ISE for a customer that will use an FQDN such as guest.domain.com. ISE has been configured with a dedicated interface that sits in the customer's DMZ with a private IP address. Guest users will receive an IP address by DHCP but with google DNS instead of the customers internal DNS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the preferred method to ensure that guest.domain.com resolves to the ISE IP address?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One option that I have seen is to configure an A record in public DNS that resolves to the private IP address of the ISE DMZ interface, however, I have seen that some people dont like this due to security reasons. Is this a valid security concern? Are there any other better ways to achieve this?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Oct 2018 23:00:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3734037#M489020</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2018-10-26T23:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3734066#M489021</link>
      <description>&lt;P&gt;If domain.com is your domain and if you may add an address (A) record to the public DNS publishing domain.com to resolve it to the private IP address, I do not see any issue. The private IP address will not be routable outside your guest network so should be &amp;nbsp;pretty safe. Besides, this way you may bind the portal to a system certificate signed by a well-known and trusted CA so that your guests would not be getting certificate errors due to hostname mismatch or untrusted otherwise.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Oct 2018 02:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3734066#M489021</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-27T02:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3734105#M489022</link>
      <description>&lt;P&gt;Ok that does make sense and seems to be the simplest way to achieve what I need. Thank you for the quick response&lt;/P&gt;</description>
      <pubDate>Sat, 27 Oct 2018 08:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3734105#M489022</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2018-10-27T08:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3735008#M489023</link>
      <description>&lt;P&gt;Technically speaking, if you want to be a good netizen, it is against the IETF standards to put private IP space in publicly resolvable DNS.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recommendations to do it another way are using split DNS architecture, or using a publicly routable IP in your DNS response and performing a NAT as it enters the DMZ.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 15:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3735008#M489023</guid>
      <dc:creator>packetplumber9</dc:creator>
      <dc:date>2018-10-29T15:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3735237#M489024</link>
      <description>&lt;P&gt;As someone stated, putting private IP into a public DNS record is not good practice.&lt;/P&gt;
&lt;P&gt;In a guest scenario where the clients perform DHCP and get a public IP, then the DNS resolution can be done as follows.&lt;/P&gt;
&lt;P&gt;Offer the guests a DNS server (or servers) that performs conditional forwarding (all DNS servers can do this).&lt;/P&gt;
&lt;P&gt;The logic is as follows&lt;/P&gt;
&lt;P&gt;Requests for guest.mycompany.com resolves to your internal IP for PSN (static IP or VIP if load balancing)&lt;/P&gt;
&lt;P&gt;All other requests get forwarded to the public DNS provider(s) (your ISP, or 8.8.8.8 etc.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Simple and clean.&amp;nbsp; Even Microsoft DNS can do this.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 22:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3735237#M489024</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-29T22:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3854275#M489025</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;&lt;P&gt;I see your solution will work fine for one PSN/geographical location as ours is doing the same however;&lt;/P&gt;&lt;P&gt;We have 5 PSNs at different geographical locations. all locations have their own DHCP servers, however not sure how shall we achieve DNS. How can we make our 5 PSN resolve&amp;nbsp;&lt;SPAN&gt;guest.mycompany.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We are using Bond 0 for sponsor and Bond 1 for Guest.&lt;/P&gt;&lt;P&gt;We do not have Load balancer.&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;VM&lt;/P&gt;</description>
      <pubDate>Sat, 11 May 2019 03:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3854275#M489025</guid>
      <dc:creator>mendiratta_vimal</dc:creator>
      <dc:date>2019-05-11T03:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3854718#M489026</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/19829"&gt;@mendiratta_vimal&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if the PSN's are spread over different physical locations then it makes no sense to use as load balancer.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In that case each location would specify its own local PSN node as the Primary Radius server.&amp;nbsp; This means that you can create Policy Set AuthZ rules to catch the sender of the MAB request and to return the correct PSN redirection URL.&amp;nbsp; But that then brings us to the question of how to resolve the common FQDN ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If each location has its own DHCP server, do you also have the facility to return a different IP address for guest.myportal.com at those locations?&amp;nbsp; e.g. does each location have its own DNS server?&amp;nbsp; if so then your local DNS server could serve up the relevant PSN IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry I am not a DNS guru &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; - someone smart enough might have an answer for you.&amp;nbsp; Perhaps AnyCast is an option too but I might be wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are happy to have each location present a different FQDN in the Guest portal then you could make a cert that contains all five ISE FQDNs in the cert's SAN (or use a wildcard cert).&amp;nbsp; That would be another (simpler) workaround.&lt;/P&gt;
&lt;P&gt;guest1.myportal.com -&amp;gt; PSN1&lt;/P&gt;
&lt;P&gt;guest2.myportal.com -&amp;gt; PSN2&lt;/P&gt;
&lt;P&gt;etc.&lt;/P&gt;
&lt;P&gt;If the PSN nodes' hostnames are not created with those exact FQDNs, then you can use DNS again to override that.&amp;nbsp; But in some cases customers use a public DNS domain for their ISE node hostnames - if you're one of those then you're in luck.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 02:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/3854718#M489026</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-05-13T02:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest DNS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/4132719#M562224</link>
      <description>&lt;P&gt;Multiple PSN's in different my approach would be two use AWS Route 53 with a geo policy to return the closest one (if it is up), then if required use destination nat to translate the destination from a public IP to a private&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 14:27:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-dns/m-p/4132719#M562224</guid>
      <dc:creator>benkelly`8</dc:creator>
      <dc:date>2020-08-09T14:27:23Z</dc:date>
    </item>
  </channel>
</rss>

