<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE CWA portal mapping AD group to Endpoint Group in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3709567#M511051</link>
    <description>Yes that’s correct behavior. Perhaps with a system like splunk you might be able to stitch together some information. Please reach out through your sales team to the use product managers for an enhancement request. &lt;BR /&gt;</description>
    <pubDate>Wed, 19 Sep 2018 12:56:46 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2018-09-19T12:56:46Z</dc:date>
    <item>
      <title>ISE CWA portal mapping AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554386#M511043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Is it possible to automatically register devices to specific endpoint groups based on AD security group membership of the user authenticating via a guest portal?&amp;nbsp; Ideally the user's group membership drops their MAC into the specified endpoint group during login and without manual intervention.&lt;/P&gt;&lt;P&gt;My customer is using a typical MAB/guest portal for BYOD and would like to apply different device purge policies based on user role in the organization: group A never expires, group B purges every X days, etc.&lt;/P&gt;&lt;P&gt;Appreciate any help.&lt;/P&gt;&lt;P&gt;Anthony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2018 17:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554386#M511043</guid>
      <dc:creator>Anthony Poli</dc:creator>
      <dc:date>2018-04-04T17:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE endpoint groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554387#M511044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Moved this to ISE public for maximum exposure.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under the guest portal settings there is a selection - Employees using this portal as guests inherit login options from&lt;/P&gt;&lt;P&gt;you choose this pulldown to select a guest type, under this guest type is where you choose the associated endpoint group. This means all employees are handled the same. So you can't do it with native portal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However you might be able to do what you need using the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Setup HotspotX portal settings for employeeEndpointgroupX and HotspotY for employeEndpointgroupY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authz rules&lt;/P&gt;&lt;P&gt;If wireless_mab and employeeEndpointgroupX or Y permit access&lt;/P&gt;&lt;P&gt;If wireless_mab and employeeADloginX then redirect to hotspotX&lt;/P&gt;&lt;P&gt;If wireless_mab and employeeADLoginY then redirect to hotspotY&lt;/P&gt;&lt;P&gt;If wireless_mab then redirect to guest portal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users will come into the portal login as employee and then be redirected respective portal to be put into the correct endpoint group and accept the AUP on the hotspot. Then users will be permitted access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2018 17:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554387#M511044</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-04-04T17:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE map AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554388#M511045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;Good thinking, and I appreciate the innovative workaround.&amp;nbsp; This does appear to work however it comes at the price of logging in twice, at least as I have worked it out interpretting your suggestions. &lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 16:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554388#M511045</guid>
      <dc:creator>Anthony Poli</dc:creator>
      <dc:date>2018-04-05T16:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE map AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554389#M511046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should only have to login once.&amp;nbsp; The first portal is a typical sponsor portal with AD logins allowed.&amp;nbsp; The first portal has no AUP page and basically just goes to the success condition.&amp;nbsp; The key is the CoA is kicked off that would then set the next URL redirect to the correct hotspot portal.&amp;nbsp; The hotspot portal would display AUP and do the success condition after accepting AUP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the flow would look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Employee connects to SSID and get redirected to portal.&lt;/LI&gt;&lt;LI&gt;Enters their AD credentials.&lt;/LI&gt;&lt;LI&gt;The success condition says direct them to "www.cisco.com".&lt;/LI&gt;&lt;LI&gt;CoA is sent to the WLC.&lt;/LI&gt;&lt;LI&gt;Employee hits the desired hotspot rule.&lt;/LI&gt;&lt;LI&gt;As the browser is trying to go to www.cisco.com the second hotspot redirect would kick in and send the user to the AUP page.&amp;nbsp;&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;Employee accepts the AUP.&lt;/LI&gt;&lt;LI&gt;MAC address moved into the endpoint identity group specified by the hotspot portal&lt;/LI&gt;&lt;LI&gt;Success condition says direct them to "www.cisco.com".&lt;/LI&gt;&lt;LI&gt;CoA is sent to the WLC.&lt;/LI&gt;&lt;LI&gt;Session hits the rule that allows the endpoint identity group.&lt;/LI&gt;&lt;LI&gt;Employee sees Cisco's homepage.&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 22:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554389#M511046</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-04-05T22:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE map AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554390#M511047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul,&lt;/P&gt;&lt;P&gt;Thanks for the additional clarification.&amp;nbsp; I just reconfigured this in the lab and it works perfectly, and is what Jason meant all along but I simply overlooked.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Thanks again to you both!&lt;/P&gt;&lt;P&gt;Anthony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2018 00:45:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554390#M511047</guid>
      <dc:creator>Anthony Poli</dc:creator>
      <dc:date>2018-04-06T00:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CWA portal mapping AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554391#M511048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great! Please if you have an authorization policy screenshot to share that will finish this masterpiece!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2018 01:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554391#M511048</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-04-06T01:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE map AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554392#M511049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Image below.&lt;/P&gt;&lt;P&gt;I had no idea that the CoA process could work in this way, where an if/then condition could leverage something that occurred in the past, as in the user presenting credentials and that being captured/leveraged as they go through the CoA a second time.&amp;nbsp;&amp;nbsp; I would have (incorrectly) thought that once that lookup had transpired and the CoA re-initiated, that it wouldnt be possible to "hang on" to that info for use in the second attempt.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Now I am wondering what the limits are and what else is possible. &lt;/P&gt;&lt;P&gt;Thanks again, guys.&amp;nbsp; Really enjoyed sorting though this one with y'all.&lt;/P&gt;&lt;P&gt;Anthony&lt;IMG alt="Screen Shot 2018-04-06 at 7.57.55 AM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/116383_Screen Shot 2018-04-06 at 7.57.55 AM.png" style="height: 357px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2018 15:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554392#M511049</guid>
      <dc:creator>Anthony Poli</dc:creator>
      <dc:date>2018-04-06T15:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CWA portal mapping AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3709546#M511050</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my&amp;nbsp;post was unfortunately deleted by Cisco, so I'll post it here again.&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/cisco-ise-cwa-guest-portal-broken-by-design/m-p/3709455#M18080" target="_blank"&gt;&lt;FONT color="#0563c1" face="Calibri"&gt;https://community.cisco.com/t5/identity-services-engine-ise/cisco-ise-cwa-guest-portal-broken-by-design/m-p/3709455#M18080&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the last days I have been working with the guest portals of the Cisco ISE (v2.1.0). My result:&amp;nbsp;"Broken By Design".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are currently using Local Web Authentication (Layer 3 Auth) on the Cisco WLC. The WLC forwards the username/password by radius to the ISE. In the "Policy Set" I can then process this request as "WLC_Web_Authentication". Currently we use several Windows AD groups and different GuestType groups per tenant.&lt;/P&gt;
&lt;P&gt;The disadvantage of Local Web Authentication is that guests are thrown out of the WLAN at undefined intervals (broadcast key refresh), so guests have to enter their username and password again.&lt;/P&gt;
&lt;P&gt;With Central Web Authentication, this is bypassed by storing the MAC address of the guest&amp;nbsp;device in an Identity Group, so with broadcast key refresh only Layer 2 authentication (PSK + MAC address) is required and no Layer&amp;nbsp;3 (PSK + WebAuth) authentication.&lt;/P&gt;
&lt;P&gt;We would also like to have Web Authentication in a larger Internet switch environment (about 80 switches) so that guests have to authenticate themselves before they can use the Internet. In this scenario, however, Local Web Authentication is hardly feasible since SSL/TLS certificates and the Captive Portal would have to be installed on every switch.&lt;/P&gt;
&lt;P&gt;That's why I tested the CWA of the ISE. The main problem is that the guest portals are designed in a way that you can't define rules for the allowed guests (Windows AD groups, GuestTypes), but only "Identy Source Seuences". Using separate LDAP "Ex ID Sources", you could define individual Windows AD groups, but not individual GuestTypes for Guest Portal and each tenant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After some searching I found the following workaround.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-only-allow-certain-ad-group-to-register-their-devices/td-p/3461321" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-only-allow-certain-ad-group-to-register-their-devices/td-p/3461321&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554392" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3554392&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By linking "SponsoredGuestPortal - CoA -&amp;gt; Rules with AD-Groups/GuestTypes -&amp;gt; HotspotGuestPortal - CoA" it is possible to assign single AD-Groups/GuestTypes, but with the following disadvantages: - the initial WLAN connection is disconnected twice (because of CoA) - Since the MAC address of the guest is moved by the HotspotGuestPortal into the final Identiy Group, no reference to the registered guest ( AD-ID or guest ID) is stored in the properties of the MAC address (under Identies).&lt;/P&gt;
&lt;P&gt;which means that in the Identity Group many MAC addresses of the guests are available by the successful registration, but you cannot see however which MAC address belongs to which AD identification.???&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 12:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3709546#M511050</guid>
      <dc:creator>ChristianBur</dc:creator>
      <dc:date>2018-09-19T12:19:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CWA portal mapping AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3709567#M511051</link>
      <description>Yes that’s correct behavior. Perhaps with a system like splunk you might be able to stitch together some information. Please reach out through your sales team to the use product managers for an enhancement request. &lt;BR /&gt;</description>
      <pubDate>Wed, 19 Sep 2018 12:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3709567#M511051</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-19T12:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE map AD group to Endpoint Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3727596#M511052</link>
      <description>You explained exactly what I was thinking before as well.&lt;BR /&gt;Nice to know this is possible, so you can play with this and hopefully do new things.</description>
      <pubDate>Thu, 18 Oct 2018 05:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-portal-mapping-ad-group-to-endpoint-group/m-p/3727596#M511052</guid>
      <dc:creator>shamax_1983</dc:creator>
      <dc:date>2018-10-18T05:25:52Z</dc:date>
    </item>
  </channel>
</rss>

