<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE as RADIUS proxy to another ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507439#M537656</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Craig,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the RAIDUS proxy, I have double checked multiple times.&lt;/P&gt;&lt;P&gt;I have ISE 1 with ISE2 defined ad RADIUS proxy, and ISE2 with ISE1 defined as NAD. In order to make sure that I have the right key in both, (which is the same for NAD, ISE1 and ISE2), I did write it in notepad and then copied it in all the places in the GUI as key.&lt;/P&gt;&lt;P&gt;On ISE 1 I get no response from ISE2 (so I get the message that no RADIUS is available)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;, and on ISE2 I get the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks wrong to me, as I do not think I made a configuration error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead if I use the RADIUS Token, I see an authentication sucees on ISE1, but no message at all on ISE2.&lt;/P&gt;&lt;P&gt;But I hit the right AuthC policy going to ISE2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if I am doing anything wrong here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========================================================&lt;/P&gt;&lt;P&gt;Francesca Martucci – CISSP # 481718&lt;/P&gt;&lt;P&gt;CONSULTING SYSTEMS ENGINEER.SECURITY SALES&lt;/P&gt;&lt;P&gt;UKI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========================================================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Sep 2016 12:46:38 GMT</pubDate>
    <dc:creator>martucci</dc:creator>
    <dc:date>2016-09-08T12:46:38Z</dc:date>
    <item>
      <title>ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507433#M537632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to setup for a PoC an ISE server proxying to an external RADIUS (in my case another ISE instance)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client -&amp;gt; NAD -&amp;gt; ISE1 -&amp;gt; ISE2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE1 is proxying the requests for the NAD and I have added ISE2 as external RADIUS server with its RADIUS sequence&lt;/P&gt;&lt;P&gt;ISE2, has ISE1 added as a NAD (but also the original NAD), and a list of MAC addresses imported statically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The shared secret is the same for ISE1, ISE2 and NAD.&lt;/P&gt;&lt;P&gt;I keep having errors on ISE2 when receiving the proxied messages from ISE1 sayig that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" class="content_table" style="font-size: 12px; font-family: Arial; border: 1px solid #ffffff; color: #333333; background-color: #fafafa;"&gt;&lt;TBODY&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Event&lt;/TD&gt;&lt;TD style="padding: 5px; color: red;" width="69%"&gt;5405 RADIUS Request dropped&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Failure Reason&lt;/TD&gt;&lt;TD style="padding: 5px; color: red;" width="69%"&gt;11036 The Message-Authenticator RADIUS attribute is invalid&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background: #f5f5f5;"&gt;&lt;TD style="padding: 5px; border-left: none; font-weight: bold; color: #666666;" width="31%"&gt;Resolution&lt;/TD&gt;&lt;TD style="padding: 5px; color: #666666;" width="69%"&gt;&lt;P&gt;Check whether the Shared Secrets on the AAA Client and ISE Server, match. Ensure that the AAA Client and the network device, have no hardware problems or problems with RADIUS compatibility. Also ensure that the network that connects the device to the ISE, has no hardware problems.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;I have checked and the Shared secret is the correct one, and I do not believe I have any other problem.&lt;/P&gt;&lt;P&gt;I am not sure what could be the issue.&lt;/P&gt;&lt;P&gt;The 2 ISEs are having full communication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hint?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Francesca&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2016 12:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507433#M537632</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2016-09-07T12:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507434#M537638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This document has an example of ISE pointing to itself. Could you check this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-64526"&gt;ISE 1.3-2.0 Sponsor Authorization on Secondary Attributes_v5.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2016 14:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507434#M537638</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-09-07T14:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507435#M537642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen it now and I have configured the second ISE as an external RADIUS, not as a RADIUs token.&lt;/P&gt;&lt;P&gt;Should I try to make it RAIDUs token?&lt;/P&gt;&lt;P&gt;I thought that for proxy need to use external radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========================================================&lt;/P&gt;&lt;P&gt;Francesca Martucci – CISSP # 481718&lt;/P&gt;&lt;P&gt;CONSULTING SYSTEMS ENGINEER.SECURITY SALES&lt;/P&gt;&lt;P&gt;UKI&lt;/P&gt;&lt;P&gt;martucci@cisco.com&amp;lt;mailto:martucci@cisco.com&amp;gt;&lt;/P&gt;&lt;P&gt;Phone: +44 20 8824 6984&lt;/P&gt;&lt;P&gt;Mobile: +44 77 47476000&lt;/P&gt;&lt;P&gt;==========================================================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2016 14:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507435#M537642</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2016-09-07T14:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507436#M537644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct RADIUS Token from what i remember&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2016 14:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507436#M537644</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-09-07T14:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507437#M537647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That made the trick and I can now authenticate successfully, but I have another question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that I will get a success as long as the MAC that I am requesting to ISE2 is in the internal DB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some MAC inone enpoint group (phones), and some in enother (printr or oher). Can I distinguish?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to sue the below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But does not seem to work as I get a success even if the MAC is not in the Avaya Endpoint group, so the Secure-Group-ID must be something else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2016 16:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507437#M537647</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2016-09-07T16:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507438#M537653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe you are hitting a default policy on external server which returns simple Access-Accept.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If need to match the RADIUS Token condition provided, make sure the RADIUS Token Server (ISE2) matches a policy where following is returned in authorization profile:&amp;nbsp;&amp;nbsp; cisco-av-pair = ACS:CiscoSecure-Group-Id=avaya&lt;/P&gt;&lt;P&gt;When using RADIUS Token, the ISE server is specifically looking for cisco av-pair where attribute has ACS: prefix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RADIUS Proxy should also work. RADIUS secrets must match between originating NAD and Proxy and separately between Proxy and External RADIUS server.&amp;nbsp; In other words, ISE1 must have NAD defined and ISE2 nus have ISE1 defined, but not required for ISE2 to have info on NAD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2016 04:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507438#M537653</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2016-09-08T04:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507439#M537656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Craig,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the RAIDUS proxy, I have double checked multiple times.&lt;/P&gt;&lt;P&gt;I have ISE 1 with ISE2 defined ad RADIUS proxy, and ISE2 with ISE1 defined as NAD. In order to make sure that I have the right key in both, (which is the same for NAD, ISE1 and ISE2), I did write it in notepad and then copied it in all the places in the GUI as key.&lt;/P&gt;&lt;P&gt;On ISE 1 I get no response from ISE2 (so I get the message that no RADIUS is available)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;, and on ISE2 I get the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks wrong to me, as I do not think I made a configuration error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead if I use the RADIUS Token, I see an authentication sucees on ISE1, but no message at all on ISE2.&lt;/P&gt;&lt;P&gt;But I hit the right AuthC policy going to ISE2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if I am doing anything wrong here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========================================================&lt;/P&gt;&lt;P&gt;Francesca Martucci – CISSP # 481718&lt;/P&gt;&lt;P&gt;CONSULTING SYSTEMS ENGINEER.SECURITY SALES&lt;/P&gt;&lt;P&gt;UKI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========================================================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2016 12:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507439#M537656</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2016-09-08T12:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507440#M537658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RADIUS Proxy config replaces "Allowed Protocols" selection.&amp;nbsp; RADIUS Token is configured like other external ID stores.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/100065_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2016 13:36:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507440#M537658</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2016-09-08T13:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507441#M537664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Craig,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, this is what I have done, but still I get the issues that I mentioned.&lt;/P&gt;&lt;P&gt;Do you have some tie to quickly take a look at it by any chance?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have also a couple of question son profiling if you do not mind&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francesca&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2016 17:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507441#M537664</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2016-09-08T17:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507442#M537665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran into the same issue today on my ISE 2.2 lab.&amp;nbsp; I am migrating an ACS 5.4 deployment to ISE 2.2 and the way that ISE processes the Radius Token server's Access-Accept is quite different&amp;nbsp; &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/shocked.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ACS it was possible to specify a reply attribute like Filter-Id (11) and then ACS binds its value to an internal attribute that was then used in an AuthZ rule&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline;"&gt;ACS 5.4:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Access-Accept&lt;/P&gt;&lt;P&gt;Filter-Id = 'somestring'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;ISE:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Access-Accept&lt;/P&gt;&lt;P&gt;Cisco-AVPair = '&lt;SPAN style="color: #e84c22;"&gt;ACS&lt;/SPAN&gt;:Filter-Id=somestring'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that I cannot control the external radius token server to send this new fancy value that ISE expects (with the added twisted irony that it must contain the prefix 'ACS').&amp;nbsp; The mind boggles.&amp;nbsp; I couldn't even find this in the official documentation. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to get the ACS type behaviour in ISE?&amp;nbsp; Or do some attribute manipulation on the radius reply to convert the Filter-Id into a CiscoAVPair to make ISE happy?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 May 2017 04:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507442#M537665</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-05-08T04:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507443#M537669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It’s not totally clear what problem you are experiencing Arne.  Are you saying the authz rule isn’t matching the ACS:Filter-Id or that the other radius server doesn’t populate that attribute?  Maybe screenshots from 5.4 or pcap version of the radius conversation to help clarify what functionality you are looking for?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are simply trying to match “somestring” in the Filter-Id, maybe you can do something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 May 2017 17:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507443#M537669</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-05-08T17:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507444#M537674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If external RADIUS Server is able to return the desired value for Filter-Id, then make sure it is populating value in attribute ACS:CiscoSecure-Group-Id (or whichever attribute you select under the Token Server definition).&amp;nbsp; Then you can apply directly in ISE in authorization profile as Radius:Filter-Id=RadToken:CiscoSecure-Group-Id&amp;nbsp; (where RadToken is name assigned to the RADIUS Token Server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 May 2017 19:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507444#M537674</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-05-08T19:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507445#M537677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi George&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig Hyps hit the nail on the head - the difference between ACS and ISE is that ISE has a hard coded expectation of what Radius attribute shall be used to pass into the Policy Condition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An example from ACS 5.4 below - my customer uses an external radius server to authenticate third party TACACS users, and in the Access-Accept they fish out the TACACS authorization policy conditions using the values found in an IETF Filter-Id.&amp;nbsp; There is no significance in the reason why Filter-Id was used - it's been running like that for years.&lt;/P&gt;&lt;P&gt;And this is where ACS differs from ISE - ISE does not seem to allow us to do the same thing as below.&amp;nbsp; ISE has a hard coded expectation of the Radius attribute that can be used to map the Policy Condition.&amp;nbsp; As &lt;A href="https://community.cisco.com//u1/28477"&gt;chyps&lt;/A&gt; pointed out, it MUST be a CiscoAVPair, containing ACS:&amp;lt;somevar&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Filterid-1.PNG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/107043_Filterid-1.PNG" style="width: 620px; height: 371px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this is where ACS differs from ISE - ISE does not seem to allow us to do the same thing as below.&amp;nbsp; ISE has a hard coded expectation of the Radius attribute that can be used to map the Policy Condition.&amp;nbsp; As &lt;A href="https://community.cisco.com//u1/28477"&gt;&lt;/A&gt; pointed out, it MUST be a CiscoAVPair, containing ACS:&amp;lt;somevar&amp;gt; - expressed in ACS, this is what it looks like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Filterid-2.PNG" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/107044_Filterid-2.PNG" style="width: 659px; height: 459px;" width="96" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless I am mistaken, there is no way to get this flexibility in ISE.&amp;nbsp; In ISE 2.2 You can customise the Attribute Name or leave it blank (then ISE defaults to expecting to receive CiscoAVPair ACS:Cisco-Secure-Group-Id)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my lab I successfully tested as such (I am looking for a value of "Network" in the CiscoAVPair):&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ISE1.PNG" class="jive-image image-3" src="https://community.cisco.com/legacyfs/online/fusion/107045_ISE1.PNG" style="width: 620px; height: 182px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ISE2.PNG" class="jive-image image-4" src="https://community.cisco.com/legacyfs/online/fusion/107046_ISE2.PNG" style="width: 620px; height: 98px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The external Radius reply looks something like this:&lt;/P&gt;&lt;P&gt;(0) Sending Access-Accept packet to host 192.168.21.101 port 62525, id=71, length=0&lt;/P&gt;&lt;P&gt;(0)&amp;nbsp; Cisco-AVPair = 'ACS:Filter-Id=Network'&lt;/P&gt;&lt;P&gt;0) Finished request&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 May 2017 23:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507445#M537677</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-05-08T23:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507446#M537679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can define the attribute to map, but what ISE does is create a new dictionary attribute under the external ID store (similar to what you would expect for the definition of significant attributes for AD/LDAP attribute mapping). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By returning the attribute from Token server in the form cisco-av-pair = ACS:Filter-Id=&amp;lt;value&amp;gt;, you can pass the value to local server as shown in a condition, or as a RADIUS authorization such as Radius:Filter-Id=EXTRADIUS:Filter-Id.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 00:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/3507446#M537679</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-05-09T00:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4055981#M559291</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;&lt;DIV class="text-wrap tlid-copy-target"&gt;&lt;DIV class="result-shield-container tlid-copy-target"&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;Unfortunately, for several days I have been struggling with a similar topic.&lt;/SPAN&gt; &lt;SPAN&gt;I have configured ISE as a proxy.&lt;/SPAN&gt; &lt;SPAN&gt;Inquiries are sent to the FreeRadius server, which works as a tokenSMS.&lt;/SPAN&gt; &lt;SPAN&gt;The scenario is this:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Client&amp;gt; ASA&amp;gt; ISE&amp;gt; FreeRadius (TokenSMS)&lt;/SPAN&gt;&lt;BR /&gt;FreeRADIS id configured as External Radius Server, not as a RadiusToken&lt;BR /&gt;&lt;SPAN&gt;Communication looks like this:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;1. acces-request (password)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2. &amp;lt;- access-challenge (session)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;3. access-request (pin + session)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;4. &amp;lt;- access-accept (session + class)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;and then&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;5.access-request (authorize-only)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;6. acces-reject&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;in ISE logs it looks like this:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="tlid-result-transliteration-container result-transliteration-container transliteration-container"&gt;&lt;DIV class="tlid-transliteration-content transliteration-content full"&gt;(first request .ACCEPT, second is DROPPED) finally, on anyconnect user received Login Failed error&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bez&amp;nbsp;tytułu.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70321i2374028834071951/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bez&amp;nbsp;tytułu.png" alt="Bez&amp;nbsp;tytułu.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;TCPDUMP on ISE:&lt;/P&gt;&lt;P&gt;126.16.36.100 -ASA&lt;/P&gt;&lt;P&gt;126.16.36.200 -ISE&lt;/P&gt;&lt;P&gt;126.16.18.137 -&amp;nbsp; FreeRADIUS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bez&amp;nbsp;tytułu2.png" style="width: 758px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70324iA1679875CCFC62CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bez&amp;nbsp;tytułu2.png" alt="Bez&amp;nbsp;tytułu2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt;Can anyone help?&lt;/SPAN&gt; &lt;SPAN class=""&gt;maybe some tips?&amp;nbsp; can I attach some additional info?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 14:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4055981#M559291</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2020-03-31T14:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056007#M559292</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;You would have to look in the FreeRADIUS logs and policies and understand why you get an "Access-Reject" on the authorisation Access-Request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 15:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056007#M559292</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-31T15:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056028#M559294</link>
      <description>&lt;P class="lia-align-left"&gt;Hi Cristian;&lt;/P&gt;&lt;P class="lia-align-left"&gt;I enclose all&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt; communication in six steps ( six attachments)&lt;/SPAN&gt; &lt;SPAN&gt;Step 5 is to send access-request from ISE to FreeRadius with the Authorize-Only option.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Then I received Reject in response. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 15:30:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056028#M559294</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2020-03-31T15:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056029#M559295</link>
      <description />
      <pubDate>Tue, 31 Mar 2020 15:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056029#M559295</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2020-03-31T15:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056034#M559297</link>
      <description>&lt;P class="lia-align-left"&gt;Hi Cristian;&lt;/P&gt;&lt;P class="lia-align-left"&gt;I enclose all&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt; communication in six steps .&lt;/SPAN&gt;&lt;SPAN&gt;Step 5 is to send access-request from ISE to FreeRadius with the Authorize-Only option.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Then I received Reject in response. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 15:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056034#M559297</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2020-03-31T15:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as RADIUS proxy to another ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056063#M559299</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;There is something missconfigured on FreeRADIUS and you get Access-Reject, look in those logs and see what you find out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 16:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-to-another-ise/m-p/4056063#M559299</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-31T16:04:13Z</dc:date>
    </item>
  </channel>
</rss>

