<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE - Closed mode - PXE use case in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902104#M540414</link>
    <description>&lt;P&gt;What is the best practice for the authentication order and priority for PXE boot? Shall we configure mab for the first order and dot1x as the first priority.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;authentication order mab dot1x&lt;/P&gt;&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;</description>
    <pubDate>Fri, 02 Aug 2019 14:40:57 GMT</pubDate>
    <dc:creator>Mo Pourmirza</dc:creator>
    <dc:date>2019-08-02T14:40:57Z</dc:date>
    <item>
      <title>Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528335#M540278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;In my ISE customer network, there is a scenario for PXE boot users who need access to the imaging servers much before their Dot1x supplicant kicks in. In their current dot1x infrastructure using NPS, they have "Pre-Auth ACL" with "authentication open" command configured to provide access to the PXE boot users to the required servers. In close mode with Cisco ISE, how do we address this?&lt;/P&gt;&lt;P&gt;If we retain the Pre-Auth ACL, in the situation of all PSNs go down, the Critical VLAN will not be effective because of the existing Pre-Auth ACL. Correct?&lt;/P&gt;&lt;P&gt;To move towards Critical ACL feature (IBNS 2.0), many of the customer network devices are not supported. It requires a massive upgrade.&lt;/P&gt;&lt;P&gt;Is it a good strategy to use EEM scripts in the switches to append the ACL with full access when all RADIUS servers go down, till the time they move to Critical ACL feature?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Please suggest a solution.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance, Regards&lt;/P&gt;&lt;P&gt;V Vinodh.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Feb 2016 16:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528335#M540278</guid>
      <dc:creator>junk1</dc:creator>
      <dc:date>2016-02-29T16:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528336#M540283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest to reach out to the IBNS team as this is a switching team question&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Feb 2016 20:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528336#M540283</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-02-29T20:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528337#M540297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If using closed mode, the EAP timeout and retries should be trimmed down to very low value to accommodate PXE boot. Currently we recommend 10 seconds for tx-period and leave everything to default for general operations, but you can start out by setting tx-period to 2 seconds, and max-reauth-req value to 1. As you test this I suggest gradually increasing the tx-period value while testing that the PXE booting still works. Sample config to start here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description ACCESS (Multi-Domain w/ Closed Mode)&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport voice vlan 11&lt;/P&gt;&lt;P&gt; authentication control-direction in&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize &lt;/P&gt;&lt;P&gt; authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication periodic&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication timer inactivity server dynamic&lt;/P&gt;&lt;P&gt; authentication violation restrict&lt;/P&gt;&lt;P&gt; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; dot1x timeout tx-period 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; dot1x max-reauth-req 1&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2016 17:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528337#M540297</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-03-02T17:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528338#M540330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Howon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question about your reply here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How PXE will work while the interface is under closed mode? after dot1x failover and mab failover, the port will be unauthorized and will not allow any inbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How the PXE request packets and the TFTP request packets will go through?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for your feedback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Nov 2016 10:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528338#M540330</guid>
      <dc:creator>Melghafri</dc:creator>
      <dc:date>2016-11-13T10:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528339#M540362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With closed mode the default policy (When none of the specific policy matches) on the ISE should be configured to send down dACL/VLAN to support PXE. This may include access to DHCP, DNS, TFTP, and other ip/ports needed to accomplish the O/S image to be setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2016 14:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528339#M540362</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-11-14T14:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528340#M540392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you accomplish this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jan 2017 14:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528340#M540392</guid>
      <dc:creator>Charlyn3266</dc:creator>
      <dc:date>2017-01-28T14:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528341#M540403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With closed mode no traffic can pass through aside from 802.1x/CDP/STP. You will need to allow traffic via MAB when the port falls back from 802.1X. So on the ISE, create a policy that allows access to DHCP/DNS/TFTP for unknown MAB devices.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jan 2017 14:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3528341#M540403</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2017-01-30T14:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3876210#M540408</link>
      <description>&lt;P&gt;So we tried this, but realized not only do we need DHCP, DNS, and PXE boot (TFTP and 4011), we also need to allow the windows device to have access to Active Directory to Enroll (I'm guessing this would be a ton of ports), as well as access to our PKI server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts on that level of access given to "unknown" devices?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 17:04:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3876210#M540408</guid>
      <dc:creator>Ralphy006</dc:creator>
      <dc:date>2019-06-19T17:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902104#M540414</link>
      <description>&lt;P&gt;What is the best practice for the authentication order and priority for PXE boot? Shall we configure mab for the first order and dot1x as the first priority.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;authentication order mab dot1x&lt;/P&gt;&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 14:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902104#M540414</guid>
      <dc:creator>Mo Pourmirza</dc:creator>
      <dc:date>2019-08-02T14:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902115#M540418</link>
      <description>&lt;P&gt;You can try to profile your way through the PXE boot/image process but that can be a challenge as there are multiple phases and each have their unique challenges.&amp;nbsp; Here is how I usually handle this with most of my customers:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Most of the reimaging should be happening in build rooms that have secure access controls and dedicated switches.&amp;nbsp; In this case we will only deploy ISE in monitor mode on those switches.&lt;/LI&gt;
&lt;LI&gt;If the customer has a small amount of in place reimaging needs we have the desktop team use the ISE temp bypass portal we setup to put the MAC address of the device they are reimaging.&amp;nbsp; This allows the device onto the network for that day.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;If the customer has a large amount of in place reimaging needs they can use a program I wrote in their reimaging process that will automatically take the MAC address of the machine and put it into the temp bypass list via REST API calls.&amp;nbsp; You still need to profile your way through the first two phases of a PXE boot reimage process but that is pretty straight forward (DHCP client identifier contains PXEClient for phase 1 and DHCP hostname contains minint for phase 2)&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Fri, 02 Aug 2019 14:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902115#M540418</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-08-02T14:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902737#M540424</link>
      <description>&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My customer has over 10000 PCs across their network. So, my approach would be the option 3. However, my implementation is a bit different. I have created an Endpoint Identity group lets say PXE_Devices which is used in the authorization policy. So, if a PC's MAC address is in the group, a dACL allowing PXE access(SCCM,...) will be pushed to the switch port that the PC is connected to. Also, I have created an admin policy for the desktop team to be able to add the MAC addresses into the PXE_Devices. Before they re-image a PC, they need to login into ISE where they only see the PXE_Devices group. They can start imaging once the MAC address is added. I have also created a purge policy which deletes the PXE MAC address after&amp;nbsp; a day. Here is the main port configuration for PXE (&lt;SPAN&gt;IBNS 1.0):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;dot1x timeout tx-period 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you please explain how you use the REST API call to put the MAC addresses in a temp list? Do you ask the desktop team to execute the API using Postman?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 21:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902737#M540424</guid>
      <dc:creator>Mo Pourmirza</dc:creator>
      <dc:date>2019-08-05T21:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902795#M540428</link>
      <description>I created a C++ executable program that customers have incorporated into their WinPE image.  So everything is automated.  One of my customers took my source code and coded it into Python and then made it into a executable.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 05 Aug 2019 00:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3902795#M540428</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-08-05T00:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3903395#M540431</link>
      <description>&lt;P&gt;Sounds Great! Do you have this code on GitHub by any chance?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 21:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3903395#M540431</guid>
      <dc:creator>Mo Pourmirza</dc:creator>
      <dc:date>2019-08-05T21:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Closed mode - PXE use case</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3916922#M540435</link>
      <description>&lt;P&gt;Interesting topic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another way would be to add users already authed into a endpoint group, and if these clients tries to auth via mab they will have access to SCCM AD etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 18:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-closed-mode-pxe-use-case/m-p/3916922#M540435</guid>
      <dc:creator>Ciscouserz</dc:creator>
      <dc:date>2019-08-30T18:46:12Z</dc:date>
    </item>
  </channel>
</rss>

