<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can we use different interface(non-management interface) on ISE for web-logon portal in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/can-we-use-different-interface-non-management-interface-on-ise/m-p/3427222#M530472</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under portal settings for guest (web auth) portal you simply change the port/interface that its running on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this out&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01110.html#ID1496&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Update the default values for ports, Ethernet interfaces, certificate group tags, endpoint identity groups, and so on in Portal Settings, and define behavior that applies to the overall portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This maybe an interface sitting in your DMZ, the interface needs to be accessible to your guest or employees using web auth, it doesn’t need to be in the same network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don’t need to manually configure the redirect, its automatic, you can check the wireless guest setup guide for the basics on how it works&lt;/P&gt;&lt;P&gt;https://communities.cisco.com/docs/DOC-68169&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless you have special configuration, you need static mapping&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/117620-configure-ISE-00.html&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Mar 2017 17:39:13 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2017-03-29T17:39:13Z</dc:date>
    <item>
      <title>Can we use different interface(non-management interface) on ISE for web-logon portal</title>
      <link>https://community.cisco.com/t5/network-access-control/can-we-use-different-interface-non-management-interface-on-ise/m-p/3427221#M530471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Can we use different interface(non-management interface) on ISE for web-logon portal? &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Customer &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;is now setting up ISE2.2 for their environment (for dot1x / Webauth with switches)… .. They are using single IP-address ( management VLAN) -which is not accessible from user vlan.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;They would like to set up web-auth in their environment and wants to know if they could use a different interface in ISE (in User VLAN subnet) to terminate web-auth portal requests instead of using management IP for web-auth.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;I believe they could do following steps.. Can you please let me know if this will work?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;1)&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Configure different interface in USER VLAN Subnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;a.&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s1"&gt;If Gig0 Management VLAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;b.&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Gig1 USER VLAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;2)&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Configure Redirect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;If MAB fails ISE will send access-accept with following information to NAD. Use the Gig1 IP / Port number in this response&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s3"&gt;&lt;A href="https://ipport/"&gt;https://ip:port/guestportal/gateway?sessionId=NetworkSessionId&amp;amp;portal=&amp;lt;PortalID&amp;gt;&amp;amp;action=cwa&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class="s4"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s4"&gt;Page 539/1236- admin guide &lt;A href="http://www1.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22.pdf"&gt;&lt;SPAN class="s3"&gt;http://www1.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22.pdf&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;EM&gt;This MAB failure resolves to the restricted network profile and returns the url-redirect value in the profile to the NAD in an access-accept. To support this function, ensure that an authorization policy exists and features the appropriate wired or wireless MAB (under compound conditions) and, optionally, “Session:Posture Status=Unknown” conditions. The NAD uses this value to redirect all guest HTTPS traffic on the default port 8443 to the url-redirect value. The standard URL value in this case is: &lt;/EM&gt;&lt;A href="https://ipport/"&gt;&lt;SPAN class="s5"&gt;&lt;EM&gt;https://ip:port/guestportal/gateway?sessionId=NetworkSessionId&amp;amp;portal=&amp;lt;PortalID&amp;gt;&amp;amp;action=cwa&lt;/EM&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;EM&gt;.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;3)&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Configure the “allowed interfaces” in “Portal settings” page to “Gig1”&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;From the admin guide it appears like we can set up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p5"&gt;&lt;SPAN class="s3"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_011100.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_011100.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Mar 2017 17:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-we-use-different-interface-non-management-interface-on-ise/m-p/3427221#M530471</guid>
      <dc:creator>lnorman</dc:creator>
      <dc:date>2017-03-29T17:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Can we use different interface(non-management interface) on ISE for web-logon portal</title>
      <link>https://community.cisco.com/t5/network-access-control/can-we-use-different-interface-non-management-interface-on-ise/m-p/3427222#M530472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under portal settings for guest (web auth) portal you simply change the port/interface that its running on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this out&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01110.html#ID1496&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Update the default values for ports, Ethernet interfaces, certificate group tags, endpoint identity groups, and so on in Portal Settings, and define behavior that applies to the overall portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This maybe an interface sitting in your DMZ, the interface needs to be accessible to your guest or employees using web auth, it doesn’t need to be in the same network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don’t need to manually configure the redirect, its automatic, you can check the wireless guest setup guide for the basics on how it works&lt;/P&gt;&lt;P&gt;https://communities.cisco.com/docs/DOC-68169&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless you have special configuration, you need static mapping&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/117620-configure-ISE-00.html&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Mar 2017 17:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-we-use-different-interface-non-management-interface-on-ise/m-p/3427222#M530472</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-03-29T17:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: Can we use different interface(non-management interface) on ISE for web-logon portal</title>
      <link>https://community.cisco.com/t5/network-access-control/can-we-use-different-interface-non-management-interface-on-ise/m-p/3427223#M530473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will also need to setup an alias (ip host) on the CLI so that the returned redirect sends FQDN specific to secondary interface.&amp;nbsp; Certs will need to have the FQDN assigned to interface in its SAN, else use wildcard, if sharing certs across PSNs.&amp;nbsp; Also need to config default routing to ensure symmetric traffic flows. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cover use of secondary interfaces in Cisco Live BRKSEC-3699 session (the reference presentation).&amp;nbsp; May want to look at version from 2016 as I started to clean out some content in 2017.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Mar 2017 23:16:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-we-use-different-interface-non-management-interface-on-ise/m-p/3427223#M530473</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-03-29T23:16:13Z</dc:date>
    </item>
  </channel>
</rss>

