<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE and eduroam IdP network access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221420#M552081</link>
    <description>&lt;P&gt;We started implementing Cisco ISE as central NAC for all networks and I'm looking for the best idea to implement the eduroam IdP service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The eduroam IdP service must be reachable through the Internet by other Radius servers. So how to implement by&amp;nbsp;minimizing the security risk?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using ISE in DMZ? Configuring multiple ISE network interface? NAT/PAT only on Radius port?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks for the help.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:40:04 GMT</pubDate>
    <dc:creator>FTBZ</dc:creator>
    <dc:date>2020-02-21T18:40:04Z</dc:date>
    <item>
      <title>Cisco ISE and eduroam IdP network access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221420#M552081</link>
      <description>&lt;P&gt;We started implementing Cisco ISE as central NAC for all networks and I'm looking for the best idea to implement the eduroam IdP service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The eduroam IdP service must be reachable through the Internet by other Radius servers. So how to implement by&amp;nbsp;minimizing the security risk?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using ISE in DMZ? Configuring multiple ISE network interface? NAT/PAT only on Radius port?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221420#M552081</guid>
      <dc:creator>FTBZ</dc:creator>
      <dc:date>2020-02-21T18:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and eduroam IdP network access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221437#M552084</link>
      <description>&lt;P&gt;For eduroam to work, your RADIUS servers (i.e. at least one of your ISE PSNs) must be accessible from the eduroam top-level RADIUS servers (e.g., in the USA they are tlrs1.eduroam.us and tlrs2.eduroam.us).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The easiest solution is to have a static NAT (if you are using private addressing internally) plus an outside-in ACL allowing the tlrs servers to initiate traffic on the RADIUS well-known ports (udp/1812 and udp/1813).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you wanted higher security, you could deploy one of your PSNs in a DMZ (requires a distributed ISE deployment of course) and have two sets of ACLs - one (outside-dmz) for incoming traffic from eduroam to the PSN and another (dmz-inside) for the PSN inbound to the rest of your ISE servers.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 07:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221437#M552084</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-11-23T07:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and eduroam IdP network access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221441#M552086</link>
      <description>Thank you for your opinion.&lt;BR /&gt;&lt;BR /&gt;The optimal choice will be to have 2 PSNs in a DMZ, but only for eduroam IdP it's too much in my case (license cost).</description>
      <pubDate>Thu, 23 Nov 2017 06:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221441#M552086</guid>
      <dc:creator>FTBZ</dc:creator>
      <dc:date>2017-11-23T06:52:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and eduroam IdP network access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221451#M552091</link>
      <description>&lt;P&gt;ISE licensing is for the entire deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you wanted to deploy two dedicated PSNs you would need only purchase the VMs (with associated support contract).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have also seen customers put an Application Delivery Controller (like Citrix Netscaler or F5 Big-IP LTM) in the DMZ with a VIP for the public-facing service and then balancing traffic to the real server addresses on the inside of the network. That’s usually not dedicated for ISE but leveraging existing investment in that sort of infrastructure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 07:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-eduroam-idp-network-access/m-p/3221451#M552091</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-11-23T07:09:10Z</dc:date>
    </item>
  </channel>
</rss>

