<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADIUS Vendor Specific Attributes (VSAs) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149933#M562809</link>
    <description>&lt;P&gt;yes, they are not RFC compliance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Sep 2020 20:26:19 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2020-09-11T20:26:19Z</dc:date>
    <item>
      <title>RADIUS Vendor Specific Attributes (VSAs)</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149827#M562801</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;What is the role VSA (vendor specific attribute) in Radius and why it is important?&lt;/P&gt;&lt;P&gt;When we configure Switch to integrate with ISE, we need to send vsa information to ISE. What will happen if we don't add vsa config in switch?&lt;/P&gt;&lt;P&gt;Sorry for my question but I still can't understand the important of VSA even after I've tried reading some documents.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 17:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149827#M562801</guid>
      <dc:creator>SaintEvn</dc:creator>
      <dc:date>2020-09-11T17:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Vendor Specific Attributes (VSAs)</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149885#M562804</link>
      <description>&lt;P&gt;High level :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Whenever a vendor chooses non-standard formats or data types for their attributes, it becomes nearly impossible for any RADIUS server to understand those attributes.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The VSA format should be the format defined in RFC 2865, Section 5.26. This type is automatically used by the server when a new vendor dictionary is defined.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="paragraph"&gt;
&lt;P&gt;The data types for each attribute should be one of the well-known data types defined above. Any other data type will not be understood by most RADIUS servers.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="paragraph"&gt;
&lt;P&gt;The attribute names should be prefixed with the name of the vendor in order to avoid global naming conflicts. For example, an attribute&lt;/P&gt;
&lt;P&gt;name such as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;Cisco-AVPair&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a good name, whereas&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;AV-Pair&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;would not be a good name.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is the example: ISE point of view.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-network-access-attributes/ta-p/3616253" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-network-access-attributes/ta-p/3616253&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You do not have any issue with Cisco Switch they are standard and ISE understands AV information, only issue if you configuring 3rd party device ISE . the device needs to be defined as the correct AV pair to understand the value.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the RADIUS does not understand the value you get unexpected outcome.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 11 Sep 2020 19:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149885#M562804</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-09-11T19:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Vendor Specific Attributes (VSAs)</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149912#M562807</link>
      <description>&lt;P&gt;Thank you so much!&lt;BR /&gt;So with third-party device that is not using standard RADIUS attribute, then the device should be configured to send its vsa to ISE.&lt;BR /&gt;Otherwise, the ISE will not recongnize the device vendor and RADIUS AAA Process may not work correctly .&lt;BR /&gt;Is my understanding correct ?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 19:45:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149912#M562807</guid>
      <dc:creator>SaintEvn</dc:creator>
      <dc:date>2020-09-11T19:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Vendor Specific Attributes (VSAs)</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149933#M562809</link>
      <description>&lt;P&gt;yes, they are not RFC compliance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 20:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-vendor-specific-attributes-vsas/m-p/4149933#M562809</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-09-11T20:26:19Z</dc:date>
    </item>
  </channel>
</rss>

