<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authorization policy of External Radius Server in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551396#M518885</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It used default because there is no match of other rule . U must create it in policy sets. And if match it will used it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Dec 2017 12:30:41 GMT</pubDate>
    <dc:creator>ognyan.totev</dc:creator>
    <dc:date>2017-12-29T12:30:41Z</dc:date>
    <item>
      <title>Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551393#M518882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;There is " On access-accept, continue to Authorization Policy" in advanced attribute of external radius server. &lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp; But where we can define authorization policy of external radius server? &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2017-06-20 at 4.28.38 PM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/114342_Screen Shot 2017-06-20 at 4.28.38 PM.png" style="height: 269px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; There is no authorization policy in policy set.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="屏幕快照 2017-12-29 下午6.26.01.png" class="jive-image image-2" src="/legacyfs/online/fusion/114345_屏幕快照 2017-12-29 下午6.26.01.png" style="height: 110px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Dec 2017 10:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551393#M518882</guid>
      <dc:creator>etzhou</dc:creator>
      <dc:date>2017-12-29T10:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551394#M518883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,this is what i found :&lt;/P&gt;&lt;P&gt;The Cisco Cisco ISE can function both as a RADIUS server and as a RADIUS proxy server. When it acts as a proxy server, the Cisco Cisco ISE receives authentication and accounting requests from the network access server (NAS) and forwards them to the external RADIUS server. The Cisco Cisco ISE accepts the results of the requests and returns them to the NAS. You must configure the external RADIUS servers in the Cisco Cisco ISE to enable it to forward requests to the external RADIUS servers. You can define the timeout period and the number of connection attempts.&lt;/P&gt;&lt;P&gt;The Cisco Cisco ISE can simultaneously act as a proxy server to multiple external RADIUS servers. You can use the external RADIUS servers that you configure here in RADIUS server sequences. This External RADIUS Server page lists all the external RADIUS servers that you have defined in Cisco Cisco ISE. You can use the filter option to search for specific RADIUS servers based on the name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rule1-authen&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; wired 802.1x / wifi 802.1x - external radius sequence. &lt;/P&gt;&lt;P&gt;authorization policy&lt;/P&gt;&lt;P&gt;rule1-author -&amp;nbsp; human_resources_Group / and profilling (windows)&amp;nbsp; /&amp;nbsp;&amp;nbsp; posture&amp;nbsp; /&amp;nbsp;&amp;nbsp; acl permit all &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Dec 2017 11:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551394#M518883</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-12-29T11:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551395#M518884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using ISE2.3. Where to define this authorization policy of this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use radius proxy as the allowed protocols/server sequences, there is no authorization policy I can choose in the policy set. As I see in the Radius live log, the default of authorization policy of this rule is used. But I can not see where to configure this default authz policy of this rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(If I use default network access as the allowed protocols/server sequences of the authentication policy rule, I can configure &lt;SPAN style="font-size: 13.3333px;"&gt;authorization policy I can choose in the policy set).&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Dec 2017 12:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551395#M518884</guid>
      <dc:creator>etzhou</dc:creator>
      <dc:date>2017-12-29T12:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551396#M518885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It used default because there is no match of other rule . U must create it in policy sets. And if match it will used it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Dec 2017 12:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551396#M518885</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-12-29T12:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551397#M518886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE only proxies Authentications to external servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization has to be done on ISE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Dec 2017 22:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551397#M518886</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-12-29T22:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551398#M518887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where to define in the authorization policy when the allowed protocol and server seqence is external radius? &lt;/P&gt;&lt;P&gt;In ISE2.3, You can not go in to this rule and define the authorization rule. &lt;/P&gt;&lt;P&gt;&lt;IMG alt="屏幕快照 2017-12-29 下午6.26.01.png" class="image-1 jive-image" src="/legacyfs/online/fusion/114346_屏幕快照 2017-12-29 下午6.26.01.png" style="height: 110px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Dec 2017 00:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551398#M518887</guid>
      <dc:creator>etzhou</dc:creator>
      <dc:date>2017-12-30T00:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551399#M518888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Only authentication can be proxied&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_0100101.html#ID839&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Dec 2017 00:48:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551399#M518888</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-12-30T00:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551400#M518889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not the Authentication. I need the authorization based on the attribute external radius returns.&lt;/P&gt;&lt;P&gt;There is no authorization configuration in the link.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Dec 2017 05:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551400#M518889</guid>
      <dc:creator>etzhou</dc:creator>
      <dc:date>2017-12-30T05:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551401#M518890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The two common types of integration with external RADIUS servers include:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;RADIUS Proxy&lt;/LI&gt;&lt;LI&gt;RADIUS Token Server&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case of Proxy, the RADIUS request is relayed to external RADIUS server where authentication is terminated and authorization returned, just as if communication was between NAD and external RADIUS server.&amp;nbsp; Any authorization returned by external server can be relayed back to the NAD.&amp;nbsp; Cisco ISE offers an enhancement to the flow to modify ingress or egress attributes, as well as process return request by ISE local policy.&amp;nbsp; This is the "Continue to Authorization on Accept" checkbox.&amp;nbsp; The selected policy rule set is that which matches the flow.&amp;nbsp; So you have a choice to simply relay external RADIUS server attributes or augment them before sent to NAD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case of Token, the external RADIUS server only serves as an external Identity store and can optionally return a SINGLE RADIUS attribute back to ISE, by default the CiscoSecure group attribute.&amp;nbsp; Here ISE is the termination point for authentication and can leverage the external server for Token/OTP lookups, or even authorization (single attribute), but all authorization is processed by ISE local policy per the matching rule set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If matching the wrong rule set, then need to modify Policy Set or auth policy conditions to ensure match to desired rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Dec 2017 15:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551401#M518890</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-12-30T15:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551402#M518891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks like you hit CSCvg03448, which is currently being addressed in ISE 2.3 Patch 2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jan 2018 10:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551402#M518891</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-01-01T10:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551403#M518892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot.&amp;nbsp; Your help is great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jan 2018 04:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/3551403#M518892</guid>
      <dc:creator>etzhou</dc:creator>
      <dc:date>2018-01-02T04:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/4609900#M574778</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/77628"&gt;@Craig Hyps&lt;/a&gt; , you clearly described the feature. Meanwhile, I would like to understand how ISE can select the correct Authorization Policy when the "Continue to Authorization on Accept" is used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's say we have 2 different endpoints that need to be authenticated with 802.1x with an external radius.&lt;/P&gt;
&lt;P&gt;Eaxh endpint should get a different Authz profile from ISE when accepted.&lt;/P&gt;
&lt;P&gt;What would be the conditions in the Authz Policy since ISE has not authenticated them (not in the Internal endpoint db, or in any identity store)?&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 15:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/4609900#M574778</guid>
      <dc:creator>REJR77</dc:creator>
      <dc:date>2022-05-13T15:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policy of External Radius Server</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/4610120#M574783</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/309358"&gt;@REJR77&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;some examples ... you are able to use &lt;STRONG&gt;AD.ExternalGroups&lt;/STRONG&gt; or &lt;STRONG&gt;Cisco.cisco-av-pair&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Sat, 14 May 2022 04:16:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policy-of-external-radius-server/m-p/4610120#M574783</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-05-14T04:16:24Z</dc:date>
    </item>
  </channel>
</rss>

