<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using ISE 2.3 for 802.1x on wireless - domain joined computers only in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567392#M519127</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey everyone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am trying to create a SSID that authenticates towards the ISE server, the only condition that should allow anyone to join is that their machine is domain joined. &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I am having issues using domain groups to match in my policies? i tried retrieving external groups via administration - External identity Sources - Active directory - and groups, i have &lt;/SPAN&gt;retrieved&lt;SPAN style="font-size: 10pt;"&gt; domain admins, domain computers, and domain users. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but i can't find them anywhere when i want to define policy sets. am i understanding this the wrong way? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyone that could clarify?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Dec 2017 12:11:26 GMT</pubDate>
    <dc:creator>RasmusAndersen1989</dc:creator>
    <dc:date>2017-12-14T12:11:26Z</dc:date>
    <item>
      <title>Using ISE 2.3 for 802.1x on wireless - domain joined computers only</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567392#M519127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey everyone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am trying to create a SSID that authenticates towards the ISE server, the only condition that should allow anyone to join is that their machine is domain joined. &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I am having issues using domain groups to match in my policies? i tried retrieving external groups via administration - External identity Sources - Active directory - and groups, i have &lt;/SPAN&gt;retrieved&lt;SPAN style="font-size: 10pt;"&gt; domain admins, domain computers, and domain users. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but i can't find them anywhere when i want to define policy sets. am i understanding this the wrong way? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyone that could clarify?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Dec 2017 12:11:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567392#M519127</guid>
      <dc:creator>RasmusAndersen1989</dc:creator>
      <dc:date>2017-12-14T12:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE 2.3 for 802.1x on wireless - domain joined computers only</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567393#M519128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as you can see my ise servers are joined with the AD&lt;/P&gt;&lt;P&gt;&lt;IMG alt="domain join.PNG" class="jive-image image-3" src="/legacyfs/online/fusion/114108_domain join.PNG" style="font-size: 13.3333px; height: 236px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;i found these groups, that i wanted to use. &lt;/P&gt;&lt;P&gt;&lt;IMG alt="domain groups.PNG" class="jive-image image-2" src="/legacyfs/online/fusion/114107_domain groups.PNG" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;i tried finding any of the domain groups in admin groups as well, since i also want to use domain users to access the ISE server for management. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="admin-group.PNG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/114106_admin-group.PNG" style="height: 208px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Dec 2017 12:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567393#M519128</guid>
      <dc:creator>RasmusAndersen1989</dc:creator>
      <dc:date>2017-12-14T12:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE 2.3 for 802.1x on wireless - domain joined computers only</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567394#M519129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;researching&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Dec 2017 22:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567394#M519129</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-12-14T22:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE 2.3 for 802.1x on wireless - domain joined computers only</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567395#M519130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We need &lt;STRONG style="color: #ff00ff;"&gt;save&lt;/STRONG&gt; the groups after select the groups from directory in the groups tab of Active Directory. After that, we should be able to use them as conditions in ISE authorization policies of any policy sets and to use them to authorize AD users to manage ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow domain-joined computers on wireless, we need either using computer-only authentication or EAP-Chaining with AnyConnect NAM or the endpoints profiled and classified/grouped as domain-joined.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Dec 2017 00:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567395#M519130</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-15T00:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE 2.3 for 802.1x on wireless - domain joined computers only</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567396#M519131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the issue that you are not sure where to go in Policy Sets to add condition?&amp;nbsp;&amp;nbsp; Or that the list of retrieved groups not displaying when you choose the AD ExternalGroups attribute under the Conditions Studio? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If former, then navigate to Policy Sets &amp;gt; (Policy_Set_To_Be_Configured) and click the right arrow at then end of the selected Policy Set.&amp;nbsp; This will show the list of Authentication and Authorization Rules.&amp;nbsp; Click on Authorization Policy line to show the rules. Similar to previous releases, click gear icon at end of a row to insert a rule, or else click the Conditions section to modify existing rule.&amp;nbsp; Once in Condition Studio, select the specific AD dictionary.&amp;nbsp; You can also click the group icon (4th in list) which include the AD:ExternalGroup attribute. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, you should see option to select group from list.&amp;nbsp; However, when I first tried this, the field was empty.&amp;nbsp; I navigated to the Default Policy set and retried, but this time I was presented the list as shown below.&amp;nbsp; Returning to new Policy Set, I again saw list.&amp;nbsp; Not sure if timing issue, browser or defect.&amp;nbsp; If able to replicate, then we should file bug with TAC.&amp;nbsp; Here is what it should look like when working:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="285" src="https://community.cisco.com/legacyfs/online/fusion/114133_pastedImage_0.png" style="width: 764px; height: 285.227px;" width="764" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Getting back to your original goal of matching AD joined computers...If you are not performing 802.1X Machine Auth, then you cannot rely on matching the Domain Computers group in AD since the identity is not the machine, but the user, and the user is not a member of Domain Computers.&amp;nbsp; Another simple way to achieve this with user auth is to use the AD Probe.&amp;nbsp; Based on DHCP (or DNS reverse lookup), we fetch the hostname of endpoint and perform lookup to AD to determine if host exists in AD.&amp;nbsp; You can then create a child profile to the Windows 7, 10 or other relevant profiles to match on this condition and set profile to "Corporate_WIndows7_Workstation".&amp;nbsp; This works with MAB or 802.1X.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Dec 2017 01:00:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-2-3-for-802-1x-on-wireless-domain-joined-computers/m-p/3567396#M519131</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-12-15T01:00:48Z</dc:date>
    </item>
  </channel>
</rss>

