<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco switch send interface description to ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4061439#M559469</link>
    <description>&lt;P&gt;Hey Thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are implementing Cisco ISE dot1x solution for all our (+80) Cisco Campus switches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would like to have two default container vlans, if nothing could be matched on the previous conditions:&lt;/P&gt;&lt;P&gt;Option 1=&amp;gt; Engineering (can be any device with eth port)&lt;/P&gt;&lt;P&gt;Option 2=&amp;gt; No-access (block access device on the network)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To make a decision between option 1 or 2, should be the interface description and&amp;nbsp;for (1) Engeering is the interface description always " Engineering port 1GE UTP INTERFACE"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main problem about Engineering port &amp;amp; all switches, are the ports are not the same:&lt;/P&gt;&lt;P&gt;Switch 1 = Engineering ports 1,2,5,10,30,48&lt;/P&gt;&lt;P&gt;Switch 2 = Engineering port 1,2,3,4,12,15,18&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it would be easier if we could match in ISE on the interface description, instead of making a library and configure for each switch all the nas-port-id that is configured as Engineering..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this is possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;grtz,&lt;/P&gt;&lt;P&gt;Arash&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2020 07:16:18 GMT</pubDate>
    <dc:creator>Arash-BE</dc:creator>
    <dc:date>2020-04-08T07:16:18Z</dc:date>
    <item>
      <title>Cisco switch send interface description to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4060743#M559457</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possilbe to send the interface description, which the client is connected on wired, to ISE?&lt;/P&gt;&lt;P&gt;If so, how can you set this up?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet6/0/37&lt;BR /&gt;description Video port 1GE UTP INTERFACE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I want to send "Video port 1GE UTP INTERFACE" in any of the radius attributes&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot find it in the documentation..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 11:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4060743#M559457</guid>
      <dc:creator>Arash-BE</dc:creator>
      <dc:date>2020-04-07T11:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch send interface description to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4061227#M559461</link>
      <description>&lt;P&gt;The command for the network device (IOS-based switch in this case) to send additional specific RADIUS attributes to ISE (or any AAA Server) is typically :&lt;/P&gt;
&lt;PRE&gt;c3560cx(config)#&lt;STRONG&gt;radius-server attribute ?&lt;/STRONG&gt;&lt;BR /&gt;11 Filter-Id attribute configuration&lt;BR /&gt;188 Num-In-Multilink attribute configuration&lt;BR /&gt;218 Address-Pool attribute&lt;BR /&gt;25 Class attribute&lt;BR /&gt;30 DNIS attribute&lt;BR /&gt;31 Calling Station ID&lt;BR /&gt;32 NAS-Identifier attribute&lt;BR /&gt;4 NAS IP address attribute&lt;BR /&gt;44 Acct-Session-Id attribute&lt;BR /&gt;55 Event-Timestamp attribute&lt;BR /&gt;6 Service-Type attribute&lt;BR /&gt;60 CHAP-Challenge attribute&lt;BR /&gt;61 NAS-Port-Type attribute configuration&lt;BR /&gt;66 Tunnel-Client-Endpoint attribute&lt;BR /&gt;67 Tunnel-Server-Endpoint attribute&lt;BR /&gt;69 Tunnel-Password attribute&lt;BR /&gt;77 Connect-Info attribute&lt;BR /&gt;8 Framed IP address attribute&lt;BR /&gt;95 NAS IPv6 address attribute&lt;BR /&gt;list List of Attribute Types&lt;BR /&gt;nas-port NAS-Port attribute configuration&lt;BR /&gt;nas-port-id Nas-Port-Id attribute configuration&lt;/PRE&gt;
&lt;P&gt;You can try playing with those and see if any of them might send the description but I'm not seeing it with a few attempts:&lt;/P&gt;
&lt;PRE&gt;c3560cx(config)#&lt;STRONG&gt;radius-server attribute nas-port format ?&lt;/STRONG&gt;&lt;BR /&gt;a Format is type, channel, port&lt;BR /&gt;b Either interface(16) or isdn(16), async(16)&lt;BR /&gt;c Data format(bits): shelf(2), slot(4), port(5), channel(5)&lt;BR /&gt;d Data format(bits): slot(4), module(1), port(3), vpi(8), vci(16)&lt;BR /&gt;e Configurable data format&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;c3560cx(config)#&lt;STRONG&gt;radius-server attribute nas-port-id include ?&lt;/STRONG&gt;&lt;BR /&gt;circuit-id Circuit ID&lt;BR /&gt;remote-id Remote ID&lt;BR /&gt;vendor-class-id Vendor Class ID&lt;/PRE&gt;
&lt;P&gt;No luck with vendor specific attributes (VSAs), either:&lt;/P&gt;
&lt;PRE&gt;c3560cx(config)#radius-server vsa send authentication ?&lt;BR /&gt;3gpp2 Send 3GPP2 VSAs in accounting requests&lt;BR /&gt;&lt;BR /&gt;c3560cx(config)#radius-server vsa send cisco-nas-port ?&lt;BR /&gt;3gpp2 Send 3GPP2 VSAs in accounting requests&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the real issue you are trying to deal with or workaround?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can't help thinking you want to use interface descriptions for ISE authorization rules on certain ports or to flag a debug/override mechanism when troubleshooting. Generally, all ports should have a universal configuration for access control for consistent handling of whatever gets plugged in and the decision should be based on the endpoint's identity/context, not a static port description.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 20:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4061227#M559461</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-04-07T20:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch send interface description to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4061439#M559469</link>
      <description>&lt;P&gt;Hey Thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are implementing Cisco ISE dot1x solution for all our (+80) Cisco Campus switches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would like to have two default container vlans, if nothing could be matched on the previous conditions:&lt;/P&gt;&lt;P&gt;Option 1=&amp;gt; Engineering (can be any device with eth port)&lt;/P&gt;&lt;P&gt;Option 2=&amp;gt; No-access (block access device on the network)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To make a decision between option 1 or 2, should be the interface description and&amp;nbsp;for (1) Engeering is the interface description always " Engineering port 1GE UTP INTERFACE"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main problem about Engineering port &amp;amp; all switches, are the ports are not the same:&lt;/P&gt;&lt;P&gt;Switch 1 = Engineering ports 1,2,5,10,30,48&lt;/P&gt;&lt;P&gt;Switch 2 = Engineering port 1,2,3,4,12,15,18&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it would be easier if we could match in ISE on the interface description, instead of making a library and configure for each switch all the nas-port-id that is configured as Engineering..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this is possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;grtz,&lt;/P&gt;&lt;P&gt;Arash&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 07:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4061439#M559469</guid>
      <dc:creator>Arash-BE</dc:creator>
      <dc:date>2020-04-08T07:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch send interface description to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062161#M559480</link>
      <description>&lt;P&gt;Defining your access based on a static port description totally defeats the purpose of 802.1X authentication with dynamic authorization for different VLANs, ACLs, and/or SGTs. In general, you should not care which physical port a user or device plugs into.&lt;/P&gt;
&lt;P&gt;Please consider using 802.1X authentication against AD or LDAP groups to determine whether a user is allowed access. For devices, you can use 802.1X or for non-authenticating devices, use MAC Authentication Bypass (MAB) with static identity groups of MAC addresses. Yes, you will have to manage lists of MAC addresses unless you are willing to consider endpoint profiling.&lt;/P&gt;
&lt;P&gt;Please see our &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt; for best practice configurations.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 21:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062161#M559480</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-04-08T21:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch send interface description to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062231#M559487</link>
      <description>&lt;P&gt;Aside from what Thomas shared, there are few workarounds described here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/advanced-ise-tips-to-make-your-deployment-easier/ta-p/3850189#toc-hId--574335339" target="_blank"&gt;https://community.cisco.com/t5/security-documents/advanced-ise-tips-to-make-your-deployment-easier/ta-p/3850189#toc-hId--574335339&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, if you happen to have a TAC SR open, have them reference: &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp20205" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp20205&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 23:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062231#M559487</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2020-04-08T23:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch send interface description to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062474#M559499</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for responding first of all!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know, but maybe I did not explain my purpose &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we want to reach is:&lt;/P&gt;&lt;P&gt;For every device that is managed by R&amp;amp;D department (We as IT departement do not care for them at all), we would like to match them on the very last condition in ISE (match via port description).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The last condition that we have is 'blockacces' in ISE, but we don't want that for those typical R&amp;amp;D devices. Plus it is very impossible to maintain them all the time via mab, because the department use every time several vendors for testing so several mac's...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It does not mean that those ports are dedicated for R&amp;amp;D testing devices, but it can also be used for other conditions like voip phone, person from sales/IT/lab AD group connect his laptop on the network,...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The flow that we would like to reach:&lt;/P&gt;&lt;P&gt;1) Netwerk device authenticating via AD certificate &amp;amp; person is member of sales group = access -&amp;gt; vlan 10 (sales)&lt;/P&gt;&lt;P&gt;2)&amp;nbsp;Netwerk device authenticating via AD certificate &amp;amp; person is member of IT group = access -&amp;gt; vlan 20 (IT)&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;30) Unknown device but interface port = Engineering = access -&amp;gt; Vlan 2200 (Engineering)&lt;/P&gt;&lt;P&gt;31 Unknown device and nothing matches else = block -&amp;gt; vlan 999 (blockvlan)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm pretty sure that what we want to reach is possible.&lt;/P&gt;&lt;P&gt;I found out in the radius attribute of Alcatel that is possible, so I may thought that Cisco could do the same.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 07:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062474#M559499</guid>
      <dc:creator>Arash-BE</dc:creator>
      <dc:date>2020-04-09T07:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch send interface description to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062498#M559501</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This could work as well!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;12.2(43)SE2 and above (MAB only), VLAN ID can be added to NAS-ID attribute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Switch(config)#mab request format attribute 32 vlan access-vlan&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;15.2(2)E/3.6.0E/15.2(1)SY and above (Using IBNS 2.0 syntax), VLAN ID and Name can be included as Tunnel-Private-Group-ID attribute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Switch(config)#access-session attributes filter-list list custom-name&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Switch(config-com-filter-list)#vlan-id&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Switch(config-com-filter-list)#exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Switch(config)#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Switch(config)#access-session authentication attributes filter-spec include list custom-name&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for sharing this!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 08:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-switch-send-interface-description-to-ise/m-p/4062498#M559501</guid>
      <dc:creator>Arash-BE</dc:creator>
      <dc:date>2020-04-09T08:11:32Z</dc:date>
    </item>
  </channel>
</rss>

