<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Wireless - Multiple ISE Instances - RADIUS Proxy Query in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-wireless-multiple-ise-instances-radius-proxy-query/m-p/3551161#M528593</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;we have a Health Trust that is split into 7 organisations, who each plan to deploy their own ISE Instances, as well as their own WLCs. Additionally, they each have their own AD domains, separately managed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They would, however, like doctors/staff members to be able to roam among buildings, and authenticate to a common SSID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We could approach this from the perspective of defining each ISE instance in each WLC, and that would probably work. I am looking into whether we could define just the local ISE instance on each WLC, and use ISE RADIUS Proxy to proxy authentications back to a staff member's home ISE instance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this worth exploring as a design option? The customer has already dismissed the idea of a central Admin node and PSNs in each Trust.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a follow-on question, they would like a guest that initially authenticates in one Hospital to be able to roam to any other hospital in the trust w/o having to re-authenticate for a certain duration (days/weeks)...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Jul 2017 18:22:39 GMT</pubDate>
    <dc:creator>bodonogh</dc:creator>
    <dc:date>2017-07-10T18:22:39Z</dc:date>
    <item>
      <title>Cisco Wireless - Multiple ISE Instances - RADIUS Proxy Query</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-wireless-multiple-ise-instances-radius-proxy-query/m-p/3551161#M528593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;we have a Health Trust that is split into 7 organisations, who each plan to deploy their own ISE Instances, as well as their own WLCs. Additionally, they each have their own AD domains, separately managed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They would, however, like doctors/staff members to be able to roam among buildings, and authenticate to a common SSID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We could approach this from the perspective of defining each ISE instance in each WLC, and that would probably work. I am looking into whether we could define just the local ISE instance on each WLC, and use ISE RADIUS Proxy to proxy authentications back to a staff member's home ISE instance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this worth exploring as a design option? The customer has already dismissed the idea of a central Admin node and PSNs in each Trust.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a follow-on question, they would like a guest that initially authenticates in one Hospital to be able to roam to any other hospital in the trust w/o having to re-authenticate for a certain duration (days/weeks)...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jul 2017 18:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-wireless-multiple-ise-instances-radius-proxy-query/m-p/3551161#M528593</guid>
      <dc:creator>bodonogh</dc:creator>
      <dc:date>2017-07-10T18:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Wireless - Multiple ISE Instances - RADIUS Proxy Query</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-wireless-multiple-ise-instances-radius-proxy-query/m-p/3551162#M528594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If possible, I would suggest to have ISE instances to join to all these separate domains. More info, see &lt;A href="https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=89275&amp;amp;tclass=popup"&gt;What's new in ISE Active Directory connector (2016 Berlin)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise, we need to rely on RADIUS:user-name patterns to parse out the requests to different external RADIUS servers. This might not work well, especially for tunneled protocols.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for ISE guests, I believe we could have the remote ISE instance to return a group id if the endpoint already registered and authorized based on that group ID.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jul 2017 20:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-wireless-multiple-ise-instances-radius-proxy-query/m-p/3551162#M528594</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-07-10T20:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Wireless - Multiple ISE Instances - RADIUS Proxy Query</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-wireless-multiple-ise-instances-radius-proxy-query/m-p/3551163#M528595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don’t see why your radius proxy approach wouldn’t work.  It’s not common though.  Are you going to create a full mesh of radius proxies between all of the 7 organizations?  I think another option may be to create a hub deployment that is co-managed and serves as the border radius instance which serves as a proxy gateway between all of your organizations.  Just a thought.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for persistent authentication across hospitals…if you are using WPA2 Enterprise, then the endpoint should reauthenticate without any user intervention.  Is there another use case you are trying to address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jul 2017 20:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-wireless-multiple-ise-instances-radius-proxy-query/m-p/3551163#M528595</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-07-10T20:56:16Z</dc:date>
    </item>
  </channel>
</rss>

