<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE separate interface for guest in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3388062#M548830</link>
    <description>Yes I meant DMZ interface. When clients (either wifi and wired) are redirected to guest portal, they'll be pushed to a specific vlans that needs to be able to reach ISE guest/dmz interface.</description>
    <pubDate>Thu, 24 May 2018 00:22:32 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-05-24T00:22:32Z</dc:date>
    <item>
      <title>ISE separate interface for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386035#M548722</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm currently designing a ISE solution to provide gust access with web authentication and I want to assign separate interfaces on the ISE appliances so we dont need to punch holes through our main firewall. I have seen that this is possible in various support community conversations/design guides, however, I'm looking to place the ISE guest interfaces directly on the same VLAN that guest users will be placed on but I cant see if this is recommended or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason I want to do this is for simplicity so no need to even create a separate DMZ etc. Has anyone does this before? Does the ISE interface for guest listen on any other ports than what has been set for the CWA portal?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386035#M548722</guid>
      <dc:creator>de1denta</dc:creator>
      <dc:date>2020-02-21T18:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE separate interface for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386212#M548723</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes sure this is something that’s often done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Your switch or WLC will talk to radius using the default interface (or radius specific interface if you have any). The radius will reply with guest interface as URL redirect if you configured so on the portal itself. This is where you define which interface listen for portal ports.&lt;/P&gt;
&lt;P&gt;As soon as URL redirect is pushed, guest users will be pushed a guest vlan within dmz zone where they can reach &amp;nbsp;ISE 2nd interface and avoid opening ports on your FW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can extended your DMZ vlan to this 2nd ISE interface to make sure guests won’t sit in your lan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Usually, what I do is keeping default interface for management, then add a dedicated interface for radius/tacacs and 3rd one for guests.&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 04:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386212#M548723</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-21T04:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE separate interface for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386266#M548826</link>
      <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the response. That make sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this particular environment we are looking to included a wired guest network as well which will be in a separate VLAN. In this instance should we use 3 interfaces on ISE? Default interface for management/Radius etc, one interface for Wireless Guest and one interface for Wired Guest?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your environments, would you normally have wireless and wired guest in the same VLAN or split them out? I'm just conscious that I'm making this more complex then it needs to be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 07:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386266#M548826</guid>
      <dc:creator>de1denta</dc:creator>
      <dc:date>2018-05-21T07:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE separate interface for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386651#M548828</link>
      <description>&lt;P&gt;For my point of view wired guest and wireless guest should be in separated vlans but in the same zone. This means that only 1 interface on ISE can handle both.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 May 2018 00:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386651#M548828</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-22T00:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE separate interface for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386752#M548829</link>
      <description>&lt;P&gt;Thanks Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you say 'Zone' do you mean a common DMZ interface that is accessible from both the Wired and Wireless guest networks?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 May 2018 06:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3386752#M548829</guid>
      <dc:creator>de1denta</dc:creator>
      <dc:date>2018-05-22T06:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE separate interface for guest</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3388062#M548830</link>
      <description>Yes I meant DMZ interface. When clients (either wifi and wired) are redirected to guest portal, they'll be pushed to a specific vlans that needs to be able to reach ISE guest/dmz interface.</description>
      <pubDate>Thu, 24 May 2018 00:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-separate-interface-for-guest/m-p/3388062#M548830</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-05-24T00:22:32Z</dc:date>
    </item>
  </channel>
</rss>

