<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE - Restricting Employee assets from accessing Guest SSID in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523988#M538250</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customer wants to know the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They currently have a Guest Wifi with an SSID in their environment for their guest users and access is separately anchored off at the DMZ.Guest access is purely WLC based and no NAC solution is in place for it.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Now we are in the process of setting up ISE Wireless /Wired 802.1x solution for the employee assets. The question is that with ISE deployed will we be able to restrict the employees from hoping on to the Guest &lt;/SPAN&gt;network&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; SSID from &lt;/SPAN&gt;their&lt;SPAN style="font-size: 10pt;"&gt; laptops? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;They dont want employees to be able to get on the Guest Wifi period.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thy have no plans to have Guest Access a part of the ISE design.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Jul 2016 02:31:03 GMT</pubDate>
    <dc:creator>nadeekha</dc:creator>
    <dc:date>2016-07-18T02:31:03Z</dc:date>
    <item>
      <title>ISE - Restricting Employee assets from accessing Guest SSID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523988#M538250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customer wants to know the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They currently have a Guest Wifi with an SSID in their environment for their guest users and access is separately anchored off at the DMZ.Guest access is purely WLC based and no NAC solution is in place for it.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Now we are in the process of setting up ISE Wireless /Wired 802.1x solution for the employee assets. The question is that with ISE deployed will we be able to restrict the employees from hoping on to the Guest &lt;/SPAN&gt;network&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; SSID from &lt;/SPAN&gt;their&lt;SPAN style="font-size: 10pt;"&gt; laptops? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;They dont want employees to be able to get on the Guest Wifi period.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thy have no plans to have Guest Access a part of the ISE design.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2016 02:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523988#M538250</guid>
      <dc:creator>nadeekha</dc:creator>
      <dc:date>2016-07-18T02:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Restricting Employee assets from accessing Guest SSID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523989#M538251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-family: -webkit-standard;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;ISE has no visbility into the wireless guest network as its not managing it. That limits the options available. Might be best to reach out to wireless/prime team to validate some of these options.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: -webkit-standard;"&gt;&lt;BR /&gt;&lt;SPAN style="font-family: Arial; font-size: 12px; color: #575757;"&gt;Also see a similar thread &lt;/SPAN&gt;&lt;A href="https://community.cisco.com/message/37762"&gt;Block Employee MAC's on guest SSID?&lt;/A&gt;&lt;/P&gt;&lt;P style="font-family: -webkit-standard;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;if you have a simple guest splash page from the controller then maybe the controller can query prime for mac addresses seen on internal network?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;if they are requiring them to do LWA to the WLC guest portal then don't allow employees to create &lt;/SPAN&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;accounts &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 10.75pt; padding-left: 17.1px; font-family: -webkit-standard; text-indent: -0.19in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Anyconnect&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt; Network Access Module (windows only&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;), restrict their window machines from connecting to unsanctioned WLANs?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="O1" style="margin-top: 6pt; margin-left: 0.39in; font-family: -webkit-standard; text-indent: -0.24in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Enterprise &lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Connection &lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Enforcement &lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;&lt;A href="http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/acs.pdf"&gt;How-to guide&lt;/A&gt;&lt;/SPAN&gt; &lt;SPAN style="color: #595959;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/configure-nam.html"&gt;Admin Guide&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: -webkit-standard;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;STRONG&gt;If integrating with ISE&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: -webkit-standard; margin-top: 10.75pt; padding-left: 17.1px; text-indent: -0.19in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Only allow sponsors to create accounts for visitors&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="O1" style="font-family: -webkit-standard; margin-top: 6pt; margin-left: 0.39in; text-indent: -0.24in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;restrict access to 1 device per credential&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: -webkit-standard; margin-top: 10.75pt; padding-left: 17.1px; text-indent: -0.19in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Register Corp machines into special endpoint group&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="O1" style="font-family: -webkit-standard; margin-top: 6pt; margin-left: 0.39in; text-indent: -0.24in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;If MAB and Corp ID Group then deny access or redirect to restricted message portal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: -webkit-standard; margin-top: 10.75pt; padding-left: 17.1px; text-indent: -0.19in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Profiling to differentiate access (requires plus license)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="O1" style="font-family: -webkit-standard; margin-top: 6pt; margin-left: 0.39in; text-indent: -0.24in;"&gt;&lt;SPAN style="color: #222222; font-size: 14px; font-family: Verdana, sans-serif;"&gt;Use profiling to differentiate corp devices. You can use Windows GPO to write identifiable string in to the browser user agent or DHCP client ID field that ISE can use to differentiate the corp devices. (Need Plus License) once you have the endpoint group created and populated, you simply need to redirect to a different portal to notify the user is not allowed on the guest network. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: -webkit-standard; margin-top: 10.75pt; padding-left: 17.1px; text-indent: -0.19in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;WPA2 Guest network (no open network, no portal)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="O1" style="font-family: -webkit-standard; margin-top: 6pt; margin-left: 0.39in; text-indent: -0.24in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Corporate Devices using cert &lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;auth&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="O1" style="font-family: -webkit-standard; margin-top: 6pt; margin-left: 0.39in; text-indent: -0.24in;"&gt;&lt;SPAN style="font-size: 12px; font-family: Arial;"&gt;&lt;SPAN style="color: #676767;"&gt;•&lt;/SPAN&gt;&lt;SPAN style="color: #595959;"&gt;Guests use sponsored credentials with allow guest type to bypass portal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2016 16:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523989#M538251</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-07-18T16:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Restricting Employee assets from accessing Guest SSID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523990#M538255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There were a couple of other options discussed here: &lt;A href="https://community.cisco.com/message/221839"&gt;Re: Limiting corporate users from guest wireless SSID's - specific use case&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2016 01:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523990#M538255</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2016-07-21T01:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Restricting Employee assets from accessing Guest SSID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523991#M538257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For Active Directory managed Clients you can enroll a GPO to deny Wireless Access to specific SSIDs.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.grouppolicy.biz/2010/03/how-to-use-group-policy-to-blackwhite-list-wireless-networks-in-vista-windows-7/" title="http://www.grouppolicy.biz/2010/03/how-to-use-group-policy-to-blackwhite-list-wireless-networks-in-vista-windows-7/"&gt;How to use Group Policy to black/white list wireless networks in Vista &amp;amp; Windows 7&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2016 09:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-restricting-employee-assets-from-accessing-guest-ssid/m-p/3523991#M538257</guid>
      <dc:creator>Oliver Laue</dc:creator>
      <dc:date>2016-07-21T09:54:30Z</dc:date>
    </item>
  </channel>
</rss>

