<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472859#M516896</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I believe you’re correct. UserIdentityGroup would be if you manually created an internal user on ISE and then added that user to the IdentityGroup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have working screenshot?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 06 Jun 2018 19:45:40 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2018-06-06T19:45:40Z</dc:date>
    <item>
      <title>How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472856#M516893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have set up linked guest portals that works fine. Now we can authenticate hotspot guest as well as credentialed guest users.&lt;/P&gt;&lt;P&gt;However, I need to authorise guest depending on the guest type in order to give different rate limiting rules for each guest type.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have followed "How-To_93_ISE_20_Wireless_Guest_Setup_Guide.pdf" but since it is based on ISE2.0 I cannot recreate the same policy content.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="117382" alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/117382_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;ISE 2.4 has no endpoint rules that matches above rules. Instead I have used "IdentityGroup Name EQUALS UserIdentityGroup:GuestType_Contractor(default)/_Weekly/_Daily"&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="117383" alt="" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/117383_pastedImage_1.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;When enabled and applied and the rule above "Guest Portal Auth" is disabled already authenticated clients doesn't hit.&lt;/P&gt;&lt;P&gt;I cannot find any condition that would really trigger on guest devices with GuestType = daily/weekly/contractor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the first rule is enabled I notice that the client has the following identity mapping:&lt;/P&gt;&lt;TABLE height="51.2" style="height: 52.2px; width: 292.2px;" width="291.2"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.GuestStatus&lt;/TD&gt;&lt;TD&gt;Active&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.GuestType&lt;/TD&gt;&lt;TD&gt;Contractor (default)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;If I examine User Identity Groups = GuestType_Contractor (default) I find no entries.&lt;/P&gt;&lt;P&gt;Maybe this is the reason why my authz rukes doesn't hit?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone who got this working in ISE 2.4?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards/&lt;/P&gt;&lt;P&gt;M&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2018 08:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472856#M516893</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2018-06-04T08:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472857#M516894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, but I will try it in my lab. Didn't occur to me I had the option. &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt;&lt;/P&gt;&lt;P&gt;How come the logics and dictionary seems all different with lots of blanks compared with previous versions?&lt;/P&gt;&lt;P&gt;When I check the dictionary elements, I find matching entries, but they are not found when making policy rules...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;I will respond asap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mats&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2018 20:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472857#M516894</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2018-06-04T20:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472858#M516895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No luck.&lt;/P&gt;&lt;P&gt;I changed to "starts with" and also "contains" but I believe we are looking on the wrong attribute.&lt;/P&gt;&lt;P&gt;(User Identity Groups = GuestType_Contractor (default))&lt;/P&gt;&lt;P&gt;This is the reauthentication or the CoA of authenticated guest clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking into a an authorised client (using Identity store Endpoint Identity Groups:GuestEndpoints) I fing nosuch attibute when I open the Endpoint listing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the attibutes matching a Client making the reconnect after already logging in to the web portal.&lt;/P&gt;&lt;P&gt;(linked or daisy chained portals (hotspot--&amp;gt;sponsored)&lt;/P&gt;&lt;P&gt;The only attibute that matches is PortalUser.GuestType = Contractor (default)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using User Identity Groups = GuestType_Contractor (default) doesn't seem to work.&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P class="tabHeader"&gt;Other Attributes&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;AAA-Server&lt;/TD&gt;&lt;TD&gt;ise-lab&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;AUPAccepted&lt;/TD&gt;&lt;TD&gt;true&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Acct-Input-Gigawords&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Acct-Output-Gigawords&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Airespace-Wlan-Id&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;AuthenticationIdentityStore&lt;/TD&gt;&lt;TD&gt;Internal Endpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;AuthenticationMethod&lt;/TD&gt;&lt;TD&gt;Lookup&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;AuthenticationStatus&lt;/TD&gt;&lt;TD&gt;AuthenticationPassed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;AuthorizationPolicyMatchedRule&lt;/TD&gt;&lt;TD&gt;WS_R19-Guest_All-Types_GuestAccessPolicy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;BYODRegistration&lt;/TD&gt;&lt;TD&gt;No&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Called-Station-ID&lt;/TD&gt;&lt;TD&gt;f0-9e-63-0b-f7-00:R19-Guest&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Calling-Station-ID&lt;/TD&gt;&lt;TD&gt;58-48-22-56-3b-92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;DTLSSupport&lt;/TD&gt;&lt;TD&gt;Unknown&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;DestinationIPAddress&lt;/TD&gt;&lt;TD&gt;172.17.109.250&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;DestinationPort&lt;/TD&gt;&lt;TD&gt;1812&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Device IP Address&lt;/TD&gt;&lt;TD&gt;172.17.109.203&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Device Name&lt;/TD&gt;&lt;TD&gt;58:48:22:56:3B:92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Device Type&lt;/TD&gt;&lt;TD&gt;Device Type#All Device Types&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;DeviceRegistrationStatus&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;ElapsedDays&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;EndPointMACAddress&lt;/TD&gt;&lt;TD&gt;58-48-22-56-3B-92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;EndPointPolicy&lt;/TD&gt;&lt;TD&gt;Android-Sony-Ericsson&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;EndPointProfilerServer&lt;/TD&gt;&lt;TD&gt;ise-lab.home.local&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;EndPointSource&lt;/TD&gt;&lt;TD&gt;RADIUS Probe&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;FailureReason&lt;/TD&gt;&lt;TD&gt;-&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Framed-IP-Address&lt;/TD&gt;&lt;TD&gt;192.168.0.15&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Framed-IPv6-Prefix&lt;/TD&gt;&lt;TD&gt;fe80::/64&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IPSEC&lt;/TD&gt;&lt;TD&gt;IPSEC#Is IPSEC Device&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IdentityGroup&lt;/TD&gt;&lt;TD&gt;GuestEndpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IdentityPolicyMatchedRule&lt;/TD&gt;&lt;TD&gt;MAB&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Ignored-User-Agent&lt;/TD&gt;&lt;TD&gt;Facebook&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;InactiveDays&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IsRegistered&lt;/TD&gt;&lt;TD&gt;true&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IsThirdPartyDeviceFlow&lt;/TD&gt;&lt;TD&gt;false&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;LastAUPAccepted&lt;/TD&gt;&lt;TD&gt;2018-Jun-06 21:08:25 CEST&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Location&lt;/TD&gt;&lt;TD&gt;Location#All Locations&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;LogicalProfile&lt;/TD&gt;&lt;TD&gt;Mobile Devices&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;MACAddress&lt;/TD&gt;&lt;TD&gt;58:48:22:56:3B:92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;MatchedPolicy&lt;/TD&gt;&lt;TD&gt;Android-Sony-Ericsson&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;MessageCode&lt;/TD&gt;&lt;TD&gt;3002&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NAS-IP-Address&lt;/TD&gt;&lt;TD&gt;172.17.109.203&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NAS-Identifier&lt;/TD&gt;&lt;TD&gt;FMCL-test-WLC01&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NAS-Port&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NAS-Port-Type&lt;/TD&gt;&lt;TD&gt;Wireless - IEEE 802.11&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Name&lt;/TD&gt;&lt;TD&gt;Endpoint Identity Groups:GuestEndpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Device Profile&lt;/TD&gt;&lt;TD&gt;Cisco&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NetworkDeviceGroups&lt;/TD&gt;&lt;TD&gt;Location#All Locations, Device Type#All Device Types, IPSEC#Is IPSEC Device&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NetworkDeviceName&lt;/TD&gt;&lt;TD&gt;NAD_172.17.109.203&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NetworkDeviceProfileId&lt;/TD&gt;&lt;TD&gt;b0699505-3150-4215-a80e-6753d45bf56c&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;NetworkDeviceProfileName&lt;/TD&gt;&lt;TD&gt;Cisco&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;OUI&lt;/TD&gt;&lt;TD&gt;Sony Mobile Communications AB&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;OriginalUserName&lt;/TD&gt;&lt;TD&gt;584822563b92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PolicyVersion&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Portal.Name&lt;/TD&gt;&lt;TD&gt;WS_R19-Guest_Hotspot Portal&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.CreationType&lt;/TD&gt;&lt;TD&gt;Hot Spot&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.EmailAddress&lt;/TD&gt;&lt;TD&gt;&lt;A class="jive-link-email-small" href="mailto:mats.nilson@telia.com"&gt;mats.nilson@telia.com&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.FirstName&lt;/TD&gt;&lt;TD&gt;Mats&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.GuestSponsor&lt;/TD&gt;&lt;TD&gt;sd_admin&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.GuestStatus&lt;/TD&gt;&lt;TD&gt;Active&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.GuestType&lt;/TD&gt;&lt;TD&gt;Contractor (default)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.LastName&lt;/TD&gt;&lt;TD&gt;Nilson&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PortalUser.Location&lt;/TD&gt;&lt;TD&gt;San Jose&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PostureApplicable&lt;/TD&gt;&lt;TD&gt;Yes&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PostureAssessmentStatus&lt;/TD&gt;&lt;TD&gt;NotApplicable&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PreviousDeviceRegistrationStatus&lt;/TD&gt;&lt;TD&gt;NotRegistered&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;RadiusFlowType&lt;/TD&gt;&lt;TD&gt;WirelessMAB&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;RegistrationTimeStamp&lt;/TD&gt;&lt;TD&gt;2018-Jun-06 21:08:25 CEST&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;SSID&lt;/TD&gt;&lt;TD&gt;f0-9e-63-0b-f7-00:R19-Guest&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;SelectedAccessService&lt;/TD&gt;&lt;TD&gt;Default Network Access&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;SelectedAuthenticationIdentityStores&lt;/TD&gt;&lt;TD&gt;Internal Endpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;SelectedAuthorizationProfiles&lt;/TD&gt;&lt;TD&gt;Guests, PermitAccess&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Service-Type&lt;/TD&gt;&lt;TD&gt;Call Check&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;StaticAssignment&lt;/TD&gt;&lt;TD&gt;false&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;StaticGroupAssignment&lt;/TD&gt;&lt;TD&gt;true&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;StepData&lt;/TD&gt;&lt;TD&gt;6=Internal Endpoints, 12= Radius.NAS-Port-Type, 13= Radius.Called-Station-ID&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Total Certainty Factor&lt;/TD&gt;&lt;TD&gt;100&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;UniqueSubjectID&lt;/TD&gt;&lt;TD&gt;9db69b6b2620307007ae97d0d0a7e4910f22583f&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;UseCase&lt;/TD&gt;&lt;TD&gt;Host Lookup&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;User-AD-Last-Fetch-Time&lt;/TD&gt;&lt;TD&gt;1528312255924&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;User-Agent&lt;/TD&gt;&lt;TD&gt;Dalvik/2.1.0 (Linux\; U\; Android 6.0.1\; D5803 Build/23.5.A.1.291)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;User-Fetch-User-Name&lt;/TD&gt;&lt;TD&gt;58-48-22-56-3B-92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;User-Name&lt;/TD&gt;&lt;TD&gt;58-48-22-56-3B-92&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;UserType&lt;/TD&gt;&lt;TD&gt;Host&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;allowEasyWiredSession&lt;/TD&gt;&lt;TD&gt;false&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;dhcp-class-identifier&lt;/TD&gt;&lt;TD&gt;android-dhcp-6.0.1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;host-name&lt;/TD&gt;&lt;TD&gt;android-7e91460aba997cce&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;ip&lt;/TD&gt;&lt;TD&gt;192.168.0.15&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;operating-system-result&lt;/TD&gt;&lt;TD&gt;Android&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2018 19:38:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472858#M516895</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2018-06-06T19:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472859#M516896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I believe you’re correct. UserIdentityGroup would be if you manually created an internal user on ISE and then added that user to the IdentityGroup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have working screenshot?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2018 19:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472859#M516896</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-06-06T19:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472860#M516897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure what you mean by working screenshot.&lt;/P&gt;&lt;P&gt;Above is just the attrubutes from the actice client summary you access from the home screen and the client detail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attach the authz Policy from my lab:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/117461_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the radius live session detail for the same client:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/117462_pastedImage_1.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;Still I can't figure out why there's no obvious way of invoking a ruleset that would match the clients sorrect state and GuestType. Is it the 2.4 version or have I missed something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;/Mats&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2018 20:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472860#M516897</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2018-06-07T20:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472861#M516898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i am still investigating for now recommend opening tac case and a defect as well. I will try to reproduce here&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2018 22:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472861#M516898</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-06-07T22:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472862#M516899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please message me direct with your cell&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 13:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472862#M516899</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-06-08T13:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472863#M516900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How?&lt;/P&gt;&lt;P&gt;I don't have your cell; or do you mean the Cisco Support App?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 13:15:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472863#M516900</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2018-06-08T13:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472864#M516901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jakunst@cisco.com&amp;lt;mailto:Jakunst@cisco.com&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 13:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472864#M516901</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-06-08T13:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472865#M516902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mail bounce: "&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman',serif;"&gt;I am out for PTO and Cisco Live..." &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 13:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472865#M516902</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2018-06-08T13:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: How can I authorize guest clients bandwidth restrictions based on guest type in ISE 2.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472866#M516903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I verified on ISE 2.3 and ISE 2.4 and behavior is working as expected whereby the condition match is to the USER Identity Group which is mapped to the Guest Role Type.&amp;nbsp; I could not decipher what was in later screenshot, but your first screenshot was not of a guest flow, but straight MAB.&amp;nbsp; Under this scenario, only the endpoint identity is known and we currently do not expose the extended PortalUser attributes to perform a lookup based on MAB identity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is working scenario for straight web auth and matching against the Guest-Contractor user identity group:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/117496_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;Note that although Guest Role is mapped to a User Identity Group, you will not see a list of Guest Users mapped to this group from the Identity Management page.&amp;nbsp; You would need to view that from Sponsor Portal or Context Visibility.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 15:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-can-i-authorize-guest-clients-bandwidth-restrictions-based/m-p/3472866#M516903</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-06-08T15:46:31Z</dc:date>
    </item>
  </channel>
</rss>

