<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS and ISE authentication. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714072#M492339</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My customer has AAA using ACS for all network devices and guest wifi access configured through ISE. Now they are planning use profiling for endpoints, posturing with 802.1x authentication,authorization on wired users through ISE. They have renewed ACS support till 2019 and they dont want to remove ACS from their network.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can i configure ISE in a way that it can get endpoint details for profiling and posturing for wired users without removing ACS from their network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I configured SNMP traps network devices and no endpoint details showing in ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help me on this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sijoy&lt;/P&gt;</description>
    <pubDate>Thu, 27 Sep 2018 09:42:55 GMT</pubDate>
    <dc:creator>johnywalker</dc:creator>
    <dc:date>2018-09-27T09:42:55Z</dc:date>
    <item>
      <title>ACS and ISE authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714072#M492339</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My customer has AAA using ACS for all network devices and guest wifi access configured through ISE. Now they are planning use profiling for endpoints, posturing with 802.1x authentication,authorization on wired users through ISE. They have renewed ACS support till 2019 and they dont want to remove ACS from their network.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can i configure ISE in a way that it can get endpoint details for profiling and posturing for wired users without removing ACS from their network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I configured SNMP traps network devices and no endpoint details showing in ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help me on this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sijoy&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 09:42:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714072#M492339</guid>
      <dc:creator>johnywalker</dc:creator>
      <dc:date>2018-09-27T09:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACS and ISE authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714089#M492340</link>
      <description>You wouldn’t have acs and ise managing the same networks. It’s one or the other. Doesn’t make sense operationally and they can’t coexist&lt;BR /&gt;&lt;BR /&gt;Ise need radius session details to populate any endpoint information in its system&lt;BR /&gt;&lt;BR /&gt;Would recommend slowly moving over to use and understanding its roles because acs is outdated and doesn’t provide any value compared to use powerful features &lt;BR /&gt;</description>
      <pubDate>Thu, 27 Sep 2018 10:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714089#M492340</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-27T10:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACS and ISE authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714114#M492341</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Thanks for your reply.&lt;BR /&gt;&lt;BR /&gt;They already had ACS for WLC login and ISE for guest wireless solution. WLC configuration is added below for your reference.&lt;BR /&gt;&lt;BR /&gt;aaa group server radius GBHISE&lt;BR /&gt; server name GBHISE01&lt;BR /&gt; server name GBHISE02&lt;BR /&gt; deadtime 10&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ ACS&lt;BR /&gt; server name ACS&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;aaa authentication login wlc group ACS local&lt;BR /&gt;aaa authentication dot1x ISEAUTHC group GBHISE local&lt;BR /&gt;aaa authorization exec wlc group ACS local&lt;BR /&gt;aaa authorization network ISEMACFilter group GBHISE&lt;BR /&gt;aaa authorization network ISE802.1x group GBHISE&lt;BR /&gt;aaa accounting identity ISEACC start-stop group GBHISE&lt;BR /&gt;aaa local authentication ISEAUTHC authorization ISE802.1x&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt; client &amp;lt;IP&amp;gt; server-key 7 &amp;lt;key&amp;gt;&lt;BR /&gt; client &amp;lt;IP&amp;gt; server-key 7 &amp;lt;key&amp;gt;&lt;BR /&gt; auth-type any&lt;BR /&gt;&lt;BR /&gt;aaa session-id common&lt;BR /&gt;&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;&lt;BR /&gt;tacacs server ACS&lt;BR /&gt; address ipv4 &amp;lt;IP&amp;gt;&lt;BR /&gt; key 7 &amp;lt;key&amp;gt;&lt;BR /&gt; timeout 80&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 5 tries 2&lt;BR /&gt;radius-server deadtime 10&lt;BR /&gt;!&lt;BR /&gt;radius server GBHISE01&lt;BR /&gt; address ipv4 &amp;lt;IP&amp;gt; auth-port 1645 acct-port 1646&lt;BR /&gt; timeout 10&lt;BR /&gt; retransmit 3&lt;BR /&gt; key 7 &amp;lt;key&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;radius server GBHISE02&lt;BR /&gt; address ipv4 &amp;lt;IP&amp;gt; auth-port 1645 acct-port 1646&lt;BR /&gt; timeout 10&lt;BR /&gt; retransmit 3&lt;BR /&gt; key 7 &amp;lt;key&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sijoy</description>
      <pubDate>Thu, 27 Sep 2018 10:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714114#M492341</guid>
      <dc:creator>johnywalker</dc:creator>
      <dc:date>2018-09-27T10:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: ACS and ISE authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714150#M492342</link>
      <description>Not sure why you’re sharing&lt;BR /&gt;&lt;BR /&gt;A wlan is only served by one aaa type of deployment so ise as guest and acs for wireless is fine but they don’t work together. It’s one or the other on any given network segment &lt;BR /&gt;&lt;BR /&gt;Regardless of having support for acs until 2019 it doesn’t make sense to keep both&lt;BR /&gt;&lt;BR /&gt;Migrate everything to ise and shutdown acs&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Sep 2018 11:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714150#M492342</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-27T11:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACS and ISE authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714779#M492343</link>
      <description>&lt;P&gt;You can use ACS as your TACACS server for device administration purposes while introducing additional ISE-based services for 802.1x clients via RADIUS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The TACACS and RADIUS services are completely distinct. While either product can do both (and indeed ACS is past end-of-sales), you can have both as long as you distinguish a role for each.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is that what you're wondering?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 05:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-and-ise-authentication/m-p/3714779#M492343</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-28T05:25:08Z</dc:date>
    </item>
  </channel>
</rss>

