<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AAA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086034#M560432</link>
    <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I m looking for an option&amp;nbsp; enable AAA Radius in ISE for NAD both switches and wireless controller.&lt;/P&gt;&lt;P&gt;Currently, Wireless clients authenticating in ISE Radius Server, calling station id is AP MAC address SSID&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i added network device ( wireless controller ) in ISE NAD Group and created a Authentication policy login via AD user ID and Authorization policy but no Radius request hitting at ISE end.&lt;/P&gt;&lt;P&gt;Question here, should i make change in called station ID from AP MAC address SSID in Wireless controller ?&amp;nbsp; does it affect for wireless client users if i made change in Auth called station ID type ?&lt;/P&gt;&lt;P&gt;what Auth called station ID should i use to authenticate and Authorization for both wireless client and Wireless NAD via ISE Radius..&lt;/P&gt;&lt;P&gt;Thanks in advance .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2020 18:01:33 GMT</pubDate>
    <dc:creator>Shivu b</dc:creator>
    <dc:date>2020-05-14T18:01:33Z</dc:date>
    <item>
      <title>AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086034#M560432</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I m looking for an option&amp;nbsp; enable AAA Radius in ISE for NAD both switches and wireless controller.&lt;/P&gt;&lt;P&gt;Currently, Wireless clients authenticating in ISE Radius Server, calling station id is AP MAC address SSID&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i added network device ( wireless controller ) in ISE NAD Group and created a Authentication policy login via AD user ID and Authorization policy but no Radius request hitting at ISE end.&lt;/P&gt;&lt;P&gt;Question here, should i make change in called station ID from AP MAC address SSID in Wireless controller ?&amp;nbsp; does it affect for wireless client users if i made change in Auth called station ID type ?&lt;/P&gt;&lt;P&gt;what Auth called station ID should i use to authenticate and Authorization for both wireless client and Wireless NAD via ISE Radius..&lt;/P&gt;&lt;P&gt;Thanks in advance .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 18:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086034#M560432</guid>
      <dc:creator>Shivu b</dc:creator>
      <dc:date>2020-05-14T18:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086191#M560438</link>
      <description>&lt;P&gt;If you're not seeing any RADIUS traffic in ISE from the Wireless controller, then the problem could also be elsewhere. E.g. if you're WLAN is configured for 802.1X (or MAB or iPSK) then of course you have to specify your RADIUS servers.&lt;/P&gt;
&lt;P&gt;1) Are the IP addresses of the RADIUS server correct? Can you ping ISE from the WLC CLI?&lt;/P&gt;
&lt;P&gt;2) Are the RADIUS shared secrets matching on WLC and ISE?&lt;/P&gt;
&lt;P&gt;3) What does your ISE LiveLog look like? No activity at all? Then I would run a tcpdump on that ISE node to see if anything is coming in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Called-Station ID is correct for your needs. The SSID is very useful in Authorization Policies if you need to go down to that granular level.&lt;/P&gt;
&lt;P&gt;Clients are not affected by this change made at the RADIUS level (of course as long as the RADIUS flow still works as expected and completes as expected - but the format of individual attributes is not visible to the clients.)&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 21:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086191#M560438</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-05-14T21:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086773#M560450</link>
      <description>&lt;P&gt;Hello Arne,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you're WLAN is configured for 802.1X (or MAB or iPSK) then of course you have to specify your RADIUS servers. - &lt;STRONG&gt;WLAN is configured for 802.1X and wireless client able to authenticate sucessfully&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Are the IP addresses of the RADIUS server correct? Can you ping ISE from the WLC CLI? - &lt;STRONG&gt;Yes&amp;nbsp; ISE Radius IP rechable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2) Are the RADIUS shared secrets matching on WLC and ISE? &lt;STRONG&gt;yes its matching&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question here, what calling station id should i set on Authentication and Authorization under Security to login into wireless controller via Radius ISE using AD credential,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;already 802.1X client using AP MAC SSID Attriubuite. How do i achieve login into Wireless controller via AD account,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 07:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086773#M560450</guid>
      <dc:creator>Shivu b</dc:creator>
      <dc:date>2022-03-10T07:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086984#M560453</link>
      <description>&lt;P&gt;Since you are not seeing the Login authentication request from WLC on ISE, I believe that you have not checked the &lt;STRONG&gt;Management&lt;/STRONG&gt; checkbox under the Radius authentication server.&lt;/P&gt;
&lt;P&gt;Regarding the attribute that you can use as a condition in the authorization policy, use Radius·Service-Type EQUALS Outbound along with WLC IP address and login user AD group membership instead of using the calling station ID attribute.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now you can create 3 different “Authorization Profiles” under “Policy-&amp;gt;Policy Elements -&amp;gt; Results” section with different RADIUS attribute values:&lt;/P&gt;
&lt;P&gt;For full administrative access you have to choose”Service-Type” Radius Attribute setting to “Administrative“.&lt;/P&gt;
&lt;P&gt;For the Read-Only user, this setting should be set to “NAS-prompt”&lt;/P&gt;
&lt;P&gt;For Lobby Ambassador it should be set to “Callback Administrative&amp;nbsp;”&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2020 02:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa/m-p/4086984#M560453</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2020-05-16T02:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: AAA</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa/m-p/4087205#M560460</link>
      <description>&lt;P&gt;Sounds like you have a RADIUS configuration problem. See these guides for AAA configuration:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ISE+9800: &lt;A title="ISE and Catalyst 9800 Series Integration Guide" href="https://community.cisco.com/t5/security-documents/ise-and-catalyst-9800-series-integration-guide/ta-p/3753060" target="_blank" rel="noopener"&gt;ISE and Catalyst 9800 Series Integration Guide&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;ISE+AireOS: &lt;A title="AireOS WLC configuration for ISE" href="https://community.cisco.com/t5/security-documents/aireos-wlc-configuration-for-ise/ta-p/3918970" target="_blank" rel="noopener"&gt;AireOS WLC configuration for ISE&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Wireless controllers offer many options for the RADIUS Called-Station-ID:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 697px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/74712iC491EFB67E3F331D/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You said you are using &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;AP MAC address:SSID&lt;/STRONG&gt;&lt;/FONT&gt; which is a perfectly fine. It is your choice depending on how you might want to use this information in your ISE Authentication and Authorization policies. This allows you to match the SSID in your Authorization Policy to provide the appropriate level of access for that wireless service (Guest vs Corporate vs BYOD, etc.) with a rule like:&lt;/P&gt;
&lt;TABLE style="border-collapse: collapse; font-size: .8em;" cellspacing="0" cellpadding="1" border="1"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Status&lt;/TH&gt;
&lt;TH&gt;Rule Name&lt;/TH&gt;
&lt;TH&gt;Conditions&lt;/TH&gt;
&lt;TH&gt;Profiles&lt;/TH&gt;
&lt;TH&gt;Security Groups&lt;/TH&gt;
&lt;TH&gt;Hits&lt;/TH&gt;
&lt;TH&gt;Actions&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="text-align: center;"&gt;&lt;SPAN style="font-size: 1.5em; color: #6cc04a;"&gt;✔&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;Guest_Wireless&lt;/TD&gt;
&lt;TD&gt;
&lt;TABLE style="border-style: hidden; margin: 0.2em;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;AND&lt;/TD&gt;
&lt;TD&gt;⌸ RADIUS:Called-Station-ID ENDS_WITH Guest&lt;BR /&gt;⌸ Guest_Flow&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;TD&gt;Internet_Only&lt;/TD&gt;
&lt;TD&gt;Guest&lt;/TD&gt;
&lt;TD style="text-align: right;"&gt;&lt;SPAN style="color: #00ccff;"&gt;0&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="font-size: 1.5em; text-align: center;"&gt;⚙&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you then change your WLC's &lt;FONT face="courier new,courier"&gt;Called-Station-ID&lt;/FONT&gt; to something that did not end with &lt;FONT face="courier new,courier"&gt;:SSID&lt;/FONT&gt; then you affect your authorization policy matching with potentially bad affects.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2020 21:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa/m-p/4087205#M560460</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-05-16T21:22:13Z</dc:date>
    </item>
  </channel>
</rss>

