<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Authorization Rule in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336933#M550063</link>
    <description>&lt;P&gt;Using the vlan as part of a condition is only supported in IBNS2.0 configuration on the switches, if you are using that you could specify "Tunnel-Type" or "Tunnel-Private-Group-ID".&lt;BR /&gt;&lt;BR /&gt;If you are using IBNS 1.0 configuration on the switches, perhaps you could use the "NAS-IP-Address" - assuming that the machines are re-imaged from a certain switch?&lt;/P&gt;</description>
    <pubDate>Fri, 23 Feb 2018 21:17:23 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-02-23T21:17:23Z</dc:date>
    <item>
      <title>ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336872#M550055</link>
      <description>&lt;P&gt;Hello, what would be a good authorization rule to authorize PCs to be imaged. They’re not on the domain and they will be applied a dacl that gives access to the imaging server and internet only. I’m trying to distinguish it from the default authorization policy which matches anything and gives Internet access only.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336872#M550055</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2020-02-21T18:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336879#M550056</link>
      <description>Hi, You could create an Endpoint group, add the MAC addresses of the machines to be imaged to that group and then create an AuthZ rule allowing only that Endpoint group access to the Imaging server and the internet via the DACL.&lt;BR /&gt;&lt;BR /&gt;You could create a MyDevices portal to allow staff only the ability to add mac addresses to the group.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 23 Feb 2018 20:00:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336879#M550056</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-23T20:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336883#M550057</link>
      <description>Thanks RJI, now this fine but would require us to manually enter the mac addresses everytime a PC needs to be re-imaged. Do you recommend any other way?</description>
      <pubDate>Fri, 23 Feb 2018 20:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336883#M550057</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-02-23T20:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336889#M550059</link>
      <description>Well you need the machine to not match your existing AuthZ rules, most ideas I come up with require you to have some manual intervention.&lt;BR /&gt;&lt;BR /&gt;- You could add the computer to an AD group for re-imaging purposes, if AuthZ rule matches then allow access to the Imaging server.  You'd place that rule above the normal AuthZ rule though. &lt;BR /&gt;&lt;BR /&gt;- If you are re-imaging a current machine, if you disabled the machine in AD you could create a rule to match on account disabled and apply an AuthZ rule allowing access to the imaging server. I can think of reasons why you wouldn't want to do that.&lt;BR /&gt;&lt;BR /&gt;- If your desktop team image machines from a specific vlan you could match on the vlan the machine is connecting from and allow access to the imaging server.</description>
      <pubDate>Fri, 23 Feb 2018 20:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336889#M550059</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-23T20:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336899#M550061</link>
      <description>The vlan option is actually what I’m looking for but I didn’t know that’s possible. I thought ISE could drop them into a vlan but not authorize based on a vlan. What radius attribute should I use yo get that accomplished?</description>
      <pubDate>Fri, 23 Feb 2018 20:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336899#M550061</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-02-23T20:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336933#M550063</link>
      <description>&lt;P&gt;Using the vlan as part of a condition is only supported in IBNS2.0 configuration on the switches, if you are using that you could specify "Tunnel-Type" or "Tunnel-Private-Group-ID".&lt;BR /&gt;&lt;BR /&gt;If you are using IBNS 1.0 configuration on the switches, perhaps you could use the "NAS-IP-Address" - assuming that the machines are re-imaged from a certain switch?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336933#M550063</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-23T21:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336944#M550064</link>
      <description>&lt;P&gt;How can I tell which IBNS version I'm running?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336944#M550064</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-02-23T21:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336949#M550065</link>
      <description>&lt;P&gt;If the interfaces on your switches have the following commands similar to below, then you are using IBNS 1.0&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt; authentication host-mode multi-auth&lt;BR /&gt; authentication open&lt;BR /&gt; authentication order dot1x mab&lt;BR /&gt; authentication priority dot1x mab&lt;BR /&gt; authentication port-control auto &lt;BR /&gt;&lt;BR /&gt;If you are using IBNS 2.0 you would have class and policy maps defined globally and not the interface level commands above.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336949#M550065</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-23T21:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336952#M550066</link>
      <description>hmm ok yea then IBNS 1.0. Thanks for your help on this. I will try NAS-IP-Address and hope that they will image from just one switch. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Feb 2018 21:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3336952#M550066</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-02-23T21:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Rule</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3337016#M550067</link>
      <description>&lt;P&gt;Hey RJI, can I bother you with one more thing? I'm trying to get dot1x working in my lab but I'm struggling a little. I have a win7 machine joined to a domain with a GPO enforcing dot1x PEAP with MSCHAPv2 and the dot1x service is started but the authentication request keeps missing the dot1x authentication policy for some reason and decides to do MAB instead. I attached my configs and debugs. Can you take a look and let me know if I'm missing something or something is missconfigured somewhere.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AUTHE-POL.PNG" style="width: 906px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/7945i28C126D0B5E0298D/image-size/large?v=v2&amp;amp;px=999" role="button" title="AUTHE-POL.PNG" alt="AUTHE-POL.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AUTHOR-POLICY.PNG" style="width: 904px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/7944i50429FB47DA50705/image-size/large?v=v2&amp;amp;px=999" role="button" title="AUTHOR-POLICY.PNG" alt="AUTHOR-POLICY.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS-LOG-AUTH.PNG" style="width: 698px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/7946i3E53DF98A3962C76/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS-LOG-AUTH.PNG" alt="RADIUS-LOG-AUTH.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Feb 2018 00:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-rule/m-p/3337016#M550067</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-02-24T00:43:21Z</dc:date>
    </item>
  </channel>
</rss>

