<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE to block mobile devices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702581#M507784</link>
    <description>That sounds simple enough. I test this in a lab and let you know. Thanks&lt;BR /&gt;guys!!!&lt;BR /&gt;</description>
    <pubDate>Fri, 07 Sep 2018 00:18:30 GMT</pubDate>
    <dc:creator>nacbloud</dc:creator>
    <dc:date>2018-09-07T00:18:30Z</dc:date>
    <item>
      <title>ISE to block mobile devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702437#M507771</link>
      <description>&lt;P&gt;I am new to ISE and have been reading up on profiling and posturing. I am wanting to come up with a configuration where ISE blocks certain mobile devices from getting network access. IE Apple or android. Would it be best to use profiling to identify the endpoint and apply a policy or use some sort of posturing configuration? Thoughts...&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 20:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702437#M507771</guid>
      <dc:creator>nacbloud</dc:creator>
      <dc:date>2018-09-06T20:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE to block mobile devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702467#M507772</link>
      <description>&lt;P&gt;What are they trying to access the corporate SSID?&amp;nbsp; If so, I am guessing you are allowing PEAP Domain User authentication to your corporate SSID.&amp;nbsp; While you can block devices from connecting based on profiling the correct solution is to stop allowing PEAP Domain User authentication.&amp;nbsp; Typically, we only want to allow corporate devices onto the secure SSID and look to PEAP Computer or EAP-TLS to solve this challenge.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 21:07:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702467#M507772</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-06T21:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE to block mobile devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702531#M507774</link>
      <description>I am trying to block access to the guest Network. I do not want guests with&lt;BR /&gt;certain device OS to join.&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Sep 2018 22:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702531#M507774</guid>
      <dc:creator>nacbloud</dc:creator>
      <dc:date>2018-09-06T22:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE to block mobile devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702543#M507777</link>
      <description>So I’m assuming you don’t want your corporate users to connect with their corporate machine?&lt;BR /&gt;&lt;BR /&gt;Profiling is not the best way to do that since you don’t know what the devices profile is Until they hit the portal and just no way to stop them from using the portal.&lt;BR /&gt;&lt;BR /&gt;The way control this is to not use a hotspot or a registration portal that allows employees to crate their own accounts. For example shelf registration with sponsor approval or sponsor created accounts would be a way to lock down the guest portal. Or you could provide an access code on the portal page that would be giving out by the lobby ambassador. This way only the guest could use it.&lt;BR /&gt;&lt;BR /&gt;Another way to control this is to deploy any connect network access manager. A more powerful supplicant replacement for windows native. There is a feature of this module that only Ale A more powerful supplicant replacement for windows native. There is a feature of this module that only Allows connection to a corporate SS ID. When it’s in range it won’t allow connectivity to other wireless lans&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Sep 2018 22:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702543#M507777</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-06T22:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE to block mobile devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702556#M507781</link>
      <description>Actually Jason this is a perfect use case for profiling if you are trying to deny by type of device.  It is a simple 3 rule setup for your guest SSID:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;1)     If profiled as Android or iDevice then Access Reject.&lt;BR /&gt;&lt;BR /&gt;2)     If member of GuestEndpoints then grant Internet Access&lt;BR /&gt;&lt;BR /&gt;3)     Redirect to Guest Portal.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;There are two flows you have to think of here.  What does it look like the very first time a device connects:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;1)     Device connects and gets redirected to the guest portal.&lt;BR /&gt;&lt;BR /&gt;2)     Within the span of a few seconds ISE has collected the User Agent fields from the device and determined the device is an iDevice or Android.  At this point, a CoA is sent because of a profile change and the device is then rejected from connected to the SSID.  The CoA on reprofile has been broken since 2.3 (I feel like a broken record), but I have a feeling will be finally fixed pretty soon.  So the user would continue through the portal process.&lt;BR /&gt;&lt;BR /&gt;3)     The user accepts the AUP policy.  At that point a CoA is sent to the WLC.  Thankfully this CoA works.&lt;BR /&gt;&lt;BR /&gt;4)     The device is run through the policy again and dropped because it is an Android or iDevice.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;On subsequent connection attempts the device would get rejected right away.  So worst case the user may see the portal the first time, but will never get connected to the Internet.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Sep 2018 23:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702556#M507781</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-06T23:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE to block mobile devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702569#M507783</link>
      <description>Great one thanks!&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Sep 2018 00:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702569#M507783</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-07T00:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE to block mobile devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702581#M507784</link>
      <description>That sounds simple enough. I test this in a lab and let you know. Thanks&lt;BR /&gt;guys!!!&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Sep 2018 00:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-to-block-mobile-devices/m-p/3702581#M507784</guid>
      <dc:creator>nacbloud</dc:creator>
      <dc:date>2018-09-07T00:18:30Z</dc:date>
    </item>
  </channel>
</rss>

