<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius proxy for guest in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674585#M495944</link>
    <description>You can point the guest portal on one system to the other using RADIUS token server as an external identity source&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01110.html#task_D0680D3739BF4663858342896759A10A" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01110.html#task_D0680D3739BF4663858342896759A10A&lt;/A&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 25 Jul 2018 17:23:16 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2018-07-25T17:23:16Z</dc:date>
    <item>
      <title>Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674579#M495943</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My customer has two ISE clusters. The first one is dedicated to wifi guest access while the second one is handling wired 802.1x for corporate users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They would like to provide guest access to their wired users. They are thinking of using RADIUS proxy for that. The web portal would still be hosted on their "guest cluster" and "corporate wired users" would simply be redirected to that cluster.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've done some research but I haven't seen any clear statement if that was supported or even supposed to work. Could someone confirm if this is supposed to work and provide some pointers?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An alternative would be to host the guest portal on the corporate cluster and use the "guest cluster" as an external database. This would avoid managing guest account at two different location but would require to duplicate the web portal, not ideal...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 17:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674579#M495943</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2018-07-25T17:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674585#M495944</link>
      <description>You can point the guest portal on one system to the other using RADIUS token server as an external identity source&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01110.html#task_D0680D3739BF4663858342896759A10A" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01110.html#task_D0680D3739BF4663858342896759A10A&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Jul 2018 17:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674585#M495944</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-07-25T17:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674590#M495945</link>
      <description>Why wouldn't you just setup the wired deployment to use its on portal and database? It sounds like wired users would be logging into the CWA portal with their internal credentials?</description>
      <pubDate>Wed, 25 Jul 2018 17:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674590#M495945</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-07-25T17:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674599#M495946</link>
      <description>They are planning on heavily customising the portal. What you propose means duplicated work (and duplicated guest database). &lt;BR /&gt;In this case, they also want to provide wired access to genuine guest (contractors).&lt;BR /&gt;A contractor should be able to use both the wifi and wired infra with the same credential...</description>
      <pubDate>Wed, 25 Jul 2018 17:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674599#M495946</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2018-07-25T17:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674603#M495947</link>
      <description>Yes, this was the alternative I was mentioning. Should I deduce we wouldn't support RADIUS proxy in this case?</description>
      <pubDate>Wed, 25 Jul 2018 17:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674603#M495947</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2018-07-25T17:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674619#M495948</link>
      <description>Seems like complicating things having 2 separate deployments then? Or maybe its for security? &lt;BR /&gt;&lt;BR /&gt;The proper way to point is using RADIUS token. What does RADIUS proxy give you, not sure why i understand the difference as a problem?</description>
      <pubDate>Wed, 25 Jul 2018 17:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3674619#M495948</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-07-25T17:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3675188#M495949</link>
      <description>&lt;P&gt;The two different deployments is simply due to administrative reason. They have one team managing wifi and another one for wired... There is no way we will manage to push a single deployment in their case!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I was hoping to achieve with RADIUS proxy is to redirect wired guest users to the web portal hosted on the wifi cluster. That way, they would only have to maintain the portal in a single cluster. Since that doesn't seem to be possible, I'll propose the alternative.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thx&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 09:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3675188#M495949</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2018-07-26T09:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3675238#M495950</link>
      <description>Ok right. You can’t have one radius server hosting wired dot1x and another handling MAB for guest CWA. The ISE server servicing the wired side would also need to host the portal since we rely on radius session for the control plane. &lt;BR /&gt;&lt;BR /&gt;So the solutions are &lt;BR /&gt;Option 1 you are going with:&lt;BR /&gt;wired deployment CWA would have to call the guest database in other deployment via RADIUS token&lt;BR /&gt;1 database of guest&lt;BR /&gt;Portal for wired&lt;BR /&gt;Portal for wireless &lt;BR /&gt;Enhancement request (reach out to the ISE product managers) requirement to export guest portal settings and customization from one deployment to import on another &lt;BR /&gt;&lt;BR /&gt;Option 2:&lt;BR /&gt;Or have 1 deployment servicing it all&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Jul 2018 11:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3675238#M495950</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-07-26T11:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: Radius proxy for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3675261#M495951</link>
      <description>&lt;P&gt;Thanks for confirming, that's what I've already communicated to the customer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I knew the sessionId could be the issue but I was not sure where it would be generated. I thought we could simply proxy the MAB request from the wired cluster to the guest cluster that would then generate a sessionId as well and return the corresponding redirect URL.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 11:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-proxy-for-guest/m-p/3675261#M495951</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2018-07-26T11:28:41Z</dc:date>
    </item>
  </channel>
</rss>

