<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius Token vs External radius server differences? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/4131332#M562149</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;, just to have a follow up question.&lt;/P&gt;&lt;P&gt;If I use RADIUS Token Server for the integration of my ISE, do I need to configure the username stored locally in ISE database? What I noticed in my client's setup is that they configured their own local username (same username as in their 2FA server) stored in the ISE local DB.&lt;/P&gt;&lt;P&gt;How can I setup ISE so that my users can authenticate (username and passcode) directly to the 2FA? Do I need to integrate my 2FA as RADIUS Token or External RADIUS Server?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 06 Aug 2020 09:54:20 GMT</pubDate>
    <dc:creator>fatalXerror</dc:creator>
    <dc:date>2020-08-06T09:54:20Z</dc:date>
    <item>
      <title>Radius Token vs External radius server differences?</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/3735566#M488912</link>
      <description>&lt;P&gt;What are the differences when configuring Radius with ISE between defining a "radius token" or "external radius server"?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 12:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/3735566#M488912</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2018-10-30T12:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Token vs External radius server differences?</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/3735589#M488914</link>
      <description>&lt;P&gt;RADIUS token server is used when you only really need an accept/reject back from the external RADIUS server.&amp;nbsp; You can map one attribute coming back from the RADIUS server to a AV pair value if needed.&amp;nbsp; The RADIUS token is treated like another identity store and can be used on its own or in a sequence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The RADIUS radius server is a full proxied RADIUS setup where all attributes from the external RADIUS server are passed back and accepted by ISE and in turn passed back to the NAD.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I typically use the RADIUS token server definition for most of my external RADIUS setups to keep things simple unless I need AV pairs from the external RADIUS server.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 13:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/3735589#M488914</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-30T13:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Token vs External radius server differences?</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/4131332#M562149</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;, just to have a follow up question.&lt;/P&gt;&lt;P&gt;If I use RADIUS Token Server for the integration of my ISE, do I need to configure the username stored locally in ISE database? What I noticed in my client's setup is that they configured their own local username (same username as in their 2FA server) stored in the ISE local DB.&lt;/P&gt;&lt;P&gt;How can I setup ISE so that my users can authenticate (username and passcode) directly to the 2FA? Do I need to integrate my 2FA as RADIUS Token or External RADIUS Server?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 09:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/4131332#M562149</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2020-08-06T09:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Token vs External radius server differences?</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/4131543#M562164</link>
      <description>&lt;P&gt;You can setup your network devices to point directly at the 2FA solution for authentication and point to ISE for authorization.&amp;nbsp; In your ISE policy set you can set the authentication to go against the Internal User Database and set the "User not Found" condition to Continue.&amp;nbsp; This allows you to essentially bypass authentication in ISE and perform authorization functions.&amp;nbsp; There is no need to have any local usernames in the ISE database.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 16:22:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-token-vs-external-radius-server-differences/m-p/4131543#M562164</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2020-08-06T16:22:12Z</dc:date>
    </item>
  </channel>
</rss>

