<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy Set for web admin gui in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719901#M491742</link>
    <description>&lt;P&gt;Use device type and build a policy set for each device type.&amp;nbsp;&amp;nbsp;Or are you trying to distinguish between CLI and Web access.&amp;nbsp; I don't usually do that for WLCs.&lt;/P&gt;</description>
    <pubDate>Fri, 05 Oct 2018 12:32:42 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2018-10-05T12:32:42Z</dc:date>
    <item>
      <title>Policy Set for web admin gui</title>
      <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719881#M491741</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have several web admin gui, like WLC and DNAC, that I would like to have RADIUS-login to. I am running ISE 2.3.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem I am having is to write a Policy Set that will get matched when a web-login-request comes to ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the RADIUS-log I can see that the attempts has these two attributes:&lt;/P&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Authentication Method&lt;/TD&gt;
&lt;TD width="69%"&gt;PAP_ASCII&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Authentication Protocol&lt;/TD&gt;
&lt;TD width="69%"&gt;PAP_ASCII&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;I do not see NAS Port type or any other attribute that is different from other RADIUS packets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However I am not able to choose Auth Method or Protocol as conditions in the Policy Set. I tried making my own condition in the Library, but that one I can only choose in the Authorization Policy not the Policy Set.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you know any way I can do a Policy Set that will match on web-login?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Philip&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 12:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719881#M491741</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2018-10-05T12:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Set for web admin gui</title>
      <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719901#M491742</link>
      <description>&lt;P&gt;Use device type and build a policy set for each device type.&amp;nbsp;&amp;nbsp;Or are you trying to distinguish between CLI and Web access.&amp;nbsp; I don't usually do that for WLCs.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 12:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719901#M491742</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-05T12:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Set for web admin gui</title>
      <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719909#M491743</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If I use only device type then all traffic from the WLC will hit that Policy Set, including dot1x and MAB traffic. It would be ideal to have one Set for Admin login (CLI and GUI), on for Dot1x, one for MAB and one for Guest.&lt;BR /&gt;I can put a general Policy Set at the bottom that will catch all auth requests that aren't dot1x,mab,guest, but I would rather have something that catches web auth traffic.&lt;BR /&gt;Regards&lt;BR /&gt;Philip&lt;BR /&gt;</description>
      <pubDate>Fri, 05 Oct 2018 12:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719909#M491743</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2018-10-05T12:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Set for web admin gui</title>
      <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719912#M491744</link>
      <description>WLC authentication is TACACS not RADIUS.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 05 Oct 2018 12:52:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719912#M491744</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-05T12:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Set for web admin gui</title>
      <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719916#M491745</link>
      <description>&lt;P&gt;No you can have RADIUS also. I have done this on earlier versions of ISE.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://rscciew.wordpress.com/tag/wireless-lan-controller/" target="_blank"&gt;https://rscciew.wordpress.com/tag/wireless-lan-controller/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 12:58:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719916#M491745</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2018-10-05T12:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Set for web admin gui</title>
      <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719920#M491746</link>
      <description>I know you can but why would you?  Or don't you have the TACACS license?  Otherwise just put the WLC device type rules below your wireless SSID rules.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 05 Oct 2018 13:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719920#M491746</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-05T13:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Set for web admin gui</title>
      <link>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719925#M491747</link>
      <description>Yep, that is exactly the reason. Don't have TACACS lic &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;Well if there isn't a way to have Authentication Method or Protocol as a condition then I have to have a rule at the bottom that catches all traffic that isn't dot1x or mab.&lt;BR /&gt;Thank you for your answer.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Philip&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 05 Oct 2018 13:04:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/policy-set-for-web-admin-gui/m-p/3719925#M491747</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2018-10-05T13:04:43Z</dc:date>
    </item>
  </channel>
</rss>

