<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Sergio, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803926#M56513</link>
    <description>&lt;P&gt;Hello Sergio,&lt;/P&gt;
&lt;P&gt;Thank you for your question.&lt;/P&gt;
&lt;P&gt;In your case I would advise to start solving this issue from IP address assignment. I think you would agree that&amp;nbsp; log message "DHCP-DECLINE-CONFLICT" shouldn't&amp;nbsp; appear&amp;nbsp; on a router under&amp;nbsp; normal circumstances. Not sure about your router/switch configuration, however &lt;STRONG&gt;"ip dhcp ping"&lt;/STRONG&gt; is highly recommended in such situations.&amp;nbsp;&amp;nbsp; For troubleshooting purposes, you can check the conflict list of ip addresses with "&lt;STRONG&gt;show ip dhcp conflict&lt;/STRONG&gt;" command and/or to remove specific (or all)&amp;nbsp; ip address(es) from the list with "&lt;STRONG&gt;clear ip dhcp conflict &amp;lt;&lt;EM&gt;address&amp;gt;&lt;/EM&gt;&lt;/STRONG&gt;" command.&lt;/P&gt;
&lt;P&gt;More on this here:&lt;/P&gt;
&lt;P&gt;1. http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfdhcp.html&lt;/P&gt;
&lt;P&gt;2. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/15-mt/dhcp-15-mt-book/config-dhcp-server.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Once&amp;nbsp; issue with IP address assignments would be solved (you won't see any log messages about dhcp decline conflict) and ISE still misbehaves, I would encourage&amp;nbsp; you to open a case with Cisco TAC.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Artem&lt;/P&gt;</description>
    <pubDate>Thu, 17 Dec 2015 22:06:27 GMT</pubDate>
    <dc:creator>Artem Tkachov</dc:creator>
    <dc:date>2015-12-17T22:06:27Z</dc:date>
    <item>
      <title>Ask the Expert: Implementing and Troubleshooting Cisco Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803874#M56461</link>
      <description>&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/styles/80x110/public/photo/expert/ate-logo_80x110-for-upload_v2_5.jpg" style="padding-left: 10px;" align="right" /&gt;&lt;/P&gt;
&lt;P&gt;Welcome to this Cisco Support Community Ask the Expert conversation. This is an opportunity to ask questions about Cisco Identity Service Engine (ISE) to&amp;nbsp;&amp;nbsp;Artem Tkachov and Wojciech Cecot.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/12720501/ask-expert-implementing-and-troubleshooting-cisco-identity-services-engine-ise" style="outline-width: 0px; color: #005580; text-decoration: underline;" target="_blank"&gt;&lt;IMG alt="Join the Discussion : Cisco Ask the Expert" src="https://community.cisco.com/legacyfs/online/media/green-button-join-discussion.jpg" height="35" width="131" /&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Ask questions from Monday December 14&amp;nbsp;to Wednesday December 23rd&amp;nbsp;, 2015&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The Cisco Identity Services Engine (ISE) helps IT professionals meet enterprise mobility&amp;nbsp;challenges and secure the evolving network across the attack continuum. The market-leading platform for security-policy management, it unifies and automates access control to enforce compliance-driven role-based access to networks and network resources.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This session will help customers with troubleshooting, configuring and implementing ISE solutions in their networks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Artem and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Wojciech&amp;nbsp;&lt;/SPAN&gt;will be helping you with all your queries on all of the above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/artem-tkachov-atkachov-pix.png" style="padding-right: 8px;" align="left" height="125" width="82" /&gt;Artem Tkachov &lt;/STRONG&gt;is a Customer Support Engineer in Cisco TAC Security team in Poland. He has been working with TAC for past 3&amp;nbsp;years and has 8&amp;nbsp;years of industry experience working with enterprise deployment and troubleshooting.&amp;nbsp;His areas of expertise currently includes Firewalls, VPNs, AAA, 802.1X (MacSec/TrustSec), ISE (BYOD, HotSpot, etc.), ACS, as well as knowledge and in Routing and Switching, Service Provider, Data Center technologies. Artem&amp;nbsp;holds CCIE certifications (# 39668) in Routing and Switching, Service Provider, Wireless, as well as CCNP in Security, JNCIS-SP, RHCSA, and ITIL certification.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/wojciechcecot-wcecot-pix.png" style="padding-right: 8px;" align="left" height="125" width="82" /&gt;Wojciech Cecot&lt;/STRONG&gt; is a Customer Support Engineer in Cisco T&lt;SPAN&gt;AC Security team in Poland&lt;/SPAN&gt;. He has been working with TAC since May 2014 and has 3 years of industry experience working with enterprise deployment and troubleshooting. His area of expertise covers ISE, TrustSec, BYOD, ACS 5.x, 802.1x. Prior to joining Cisco, he worked as a junior system engineer at Comarch. He is graduated with a Bachelor's and&amp;nbsp;Master's degrees in Electronics and Telecommunications&amp;nbsp;from&amp;nbsp;AGH University of Science and Technology.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Find other&amp;nbsp;&amp;nbsp;&lt;A href="https://supportforums.cisco.com/expert-corner/events" target="_blank"&gt;https://supportforums.cisco.com/expert-corner/events.&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Because of the volume expected during this event, &lt;SPAN&gt;Artem and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Wojciech&amp;nbsp;&lt;/SPAN&gt;might not be able to answer every question.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff8c00;"&gt;&lt;STRONG&gt;**Ratings Encourage Participation! **&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff8c00;"&gt;&lt;STRONG&gt;Please be sure to rate the Answers to Questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff8c00;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/12720501/ask-expert-implementing-and-troubleshooting-cisco-identity-services-engine-ise" style="outline-width: 0px; color: #005580; text-decoration: underline;" target="_blank"&gt;&lt;IMG alt="Join the Discussion : Cisco Ask the Expert" src="https://community.cisco.com/legacyfs/online/media/green-button-join-discussion.jpg" height="35" width="131" /&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803874#M56461</guid>
      <dc:creator>Monica Lluis</dc:creator>
      <dc:date>2019-03-11T06:17:31Z</dc:date>
    </item>
    <item>
      <title>Hi guys,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803875#M56462</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;Is there any configuration guide regarding integration ISE 2.0 with 3rd party devices, like Aruba?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your prompt response.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- John&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 15:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803875#M56462</guid>
      <dc:creator>John Ventura</dc:creator>
      <dc:date>2015-12-14T15:17:16Z</dc:date>
    </item>
    <item>
      <title>I am researching utilizing</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803876#M56463</link>
      <description>&lt;P&gt;I am researching utilizing 802.1X and ISE for both wired and wireless access. The wireless access seems fairly straightforward when paired with Meraki MDM. The wired access seems a little more daunting. I would plan on leveraging Active Directory for the majority of device authentication. What is the recommended practice for authenticating devices not associated with AD? I am referring to network printers, medical devices, IP cameras, WAPs, etc. Does the solution add a large amount of complexity and difficulty for management?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 18:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803876#M56463</guid>
      <dc:creator>James Devan</dc:creator>
      <dc:date>2015-12-14T18:32:16Z</dc:date>
    </item>
    <item>
      <title>Hello John,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803877#M56464</link>
      <description>&lt;P&gt;Hello John,&lt;/P&gt;
&lt;P&gt;Thank you for your question.&lt;/P&gt;
&lt;P&gt;Indeed there are few guides for ISE 2.0 and Aruba integration, hence sharing the links below:&lt;/P&gt;
&lt;P&gt;1. http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200270-ISE-2-0-3rd-Party-integration-with-Aruba.html&lt;/P&gt;
&lt;P&gt;2. http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-85-Integrating_Aruba_Networks.pdf&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, sharing link to ISE 2.0 release notes, which might be useful:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/release_notes/ise20_rn.html&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Artem&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 23:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803877#M56464</guid>
      <dc:creator>Artem Tkachov</dc:creator>
      <dc:date>2015-12-14T23:00:44Z</dc:date>
    </item>
    <item>
      <title>Hello James,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803878#M56465</link>
      <description>&lt;P&gt;Hello James,&lt;/P&gt;
&lt;P&gt;Thank you for your question.&lt;/P&gt;
&lt;P&gt;To find the best solution in your scenario, we would need definitely to know more about your network and requirements&amp;nbsp; for dot1x integraton project you will have.&lt;/P&gt;
&lt;P&gt;In general, majority of the devices you mentioned usually don't support dot1x/EAP authentication, hence most probably you will use MAB (mac address bypass) authentication method. Having said this, MAB method is not really secure and would require some work on authentication/authorization rules on ISE. Also, switch/interface configuration is important here, for example, if you don't use dot1x authentication on end device, better to keep mab related configuration only on switch interface level.&lt;/P&gt;
&lt;P&gt;In your scenario you might consider to use profiling to have more granular access to your network.&lt;/P&gt;
&lt;P&gt;Sharing with you "how to" guide for profiling:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-30-ISE_Profiling_Design_Guide.pdf&lt;/P&gt;
&lt;P&gt;In short, I wouldn't say it's extremely complex to implement, but would require a time to plan all components correctly.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Artem&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 23:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803878#M56465</guid>
      <dc:creator>Artem Tkachov</dc:creator>
      <dc:date>2015-12-14T23:39:16Z</dc:date>
    </item>
    <item>
      <title>Thank you very much!</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803879#M56466</link>
      <description>&lt;P&gt;Thank you very much!&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 23:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803879#M56466</guid>
      <dc:creator>James Devan</dc:creator>
      <dc:date>2015-12-14T23:52:16Z</dc:date>
    </item>
    <item>
      <title>Hi Artem/Wojciech,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803880#M56467</link>
      <description>&lt;P&gt;Hi Artem/Wojciech,&lt;/P&gt;
&lt;P&gt;I have few project related with ISE as I am working with channel partner, in beginning I struggled a lot as no proper training material, videos not there (Or I might not be able to find them). But when i started watching Videos on labminutes.com, I understood the config details etc. Still a lot there which I need to master.&lt;/P&gt;
&lt;P&gt;May I know if Cisco has such video tutorials? or simple step by step config guides to deploy something like posture deployment, WSUS check etc?&lt;/P&gt;
&lt;P&gt;I see many config guides on Cisco.com but none of them help with real life config and scenarios. They are all generic.&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;
&lt;P&gt;Manjeetsing&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 11:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803880#M56467</guid>
      <dc:creator>manjeetsing_thakur</dc:creator>
      <dc:date>2015-12-15T11:11:29Z</dc:date>
    </item>
    <item>
      <title>Hello Manjeetsing,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803881#M56468</link>
      <description>&lt;P&gt;Hello Manjeetsing,&lt;/P&gt;
&lt;P&gt;Thank you for that question.&lt;/P&gt;
&lt;P&gt;Let me start with videos. Indeed there is such channel on youtube.com, it still under development however I could see many useful videos there already. Colleagues from US came up with that idea around 2 months ago and I can see that more and more videos related to ISE 2.0 are uploaded. Please take a look:&lt;/P&gt;
&lt;P&gt;https://www.youtube.com/user/CiscoISE/videos&lt;/P&gt;
&lt;P&gt;Regrading articles: ISE is quickly growing product, having many features and configuration strongly depends on particular deployment, however I could find article that should match your requirement: with posture/WSUS configuration:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/119214-configure-ise-00.html&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Wojciech&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 12:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803881#M56468</guid>
      <dc:creator>Wojciech Cecot</dc:creator>
      <dc:date>2015-12-15T12:37:50Z</dc:date>
    </item>
    <item>
      <title>Hi,In all what areas ISE and</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803882#M56469</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;Hi,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;In all what areas ISE and ASA can work together ?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;How can maximum utilize for VPN ?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'times new roman', times, serif;"&gt;Thank you&lt;/SPAN&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 14:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803882#M56469</guid>
      <dc:creator>susim</dc:creator>
      <dc:date>2015-12-15T14:23:25Z</dc:date>
    </item>
    <item>
      <title>Hello Sir/Madame</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803883#M56470</link>
      <description>&lt;P&gt;Hello Sir/Madame&lt;/P&gt;
&lt;P&gt;Thank you for that question.&lt;/P&gt;
&lt;P&gt;That is quite general one,&amp;nbsp; let me try to answer it in the following way. We have:&lt;BR /&gt;&lt;BR /&gt;--- TACACS+ for ASA administration (starting from ISE 2.0),&lt;BR /&gt;--- authentication of the VPN users,&lt;BR /&gt;--- VPN Posture, described in:&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200271-ISE-2-0-and-AnyConnect-4-2-Posture-BitLo.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200271-ISE-2-0-and-AnyConnect-4-2-Posture-BitLo.html&lt;/A&gt;&lt;BR /&gt;--- TrustSec (we can assign SGT tags to the VPN users),&lt;BR /&gt;--- Certificate provisioning for VPN users --- SCEP functionality on ISE.&lt;/P&gt;
&lt;P&gt;I might be missing something, however those are the most common use cases.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Wojciech&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 15:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803883#M56470</guid>
      <dc:creator>Wojciech Cecot</dc:creator>
      <dc:date>2015-12-15T15:46:02Z</dc:date>
    </item>
    <item>
      <title>Hi, </title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803884#M56471</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there any way to give an ERS Admin access to the External RESTful API? Currently I am only able to access the "ActiveList" using Super Admin privileges.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 20:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803884#M56471</guid>
      <dc:creator>jay.pandya1</dc:creator>
      <dc:date>2015-12-15T20:09:57Z</dc:date>
    </item>
    <item>
      <title>Hello Sir,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803885#M56472</link>
      <description>&lt;P&gt;Hello Sir,&lt;/P&gt;
&lt;P&gt;Thank you for your question.&lt;/P&gt;
&lt;P&gt;Unfortunately this is expected behavior. When authenticating external REST requests in addition to verifying admin user name and password, there will be a check that the admin role is SuperAdmin. This ensures that admins with lower permissions will not be able to issue REST requests.&lt;/P&gt;
&lt;P&gt;We do have bug for this scenario --&amp;gt;&amp;nbsp;CSCur87193. It's marked to be fixed in ISE 1.5 version&lt;B&gt;.&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;As for now you have to use accounts from Super Admin group to be able to use External Restful API.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Artem&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 22:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803885#M56472</guid>
      <dc:creator>Artem Tkachov</dc:creator>
      <dc:date>2015-12-15T22:29:50Z</dc:date>
    </item>
    <item>
      <title>Thanks for the response. I</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803886#M56473</link>
      <description>&lt;P&gt;Thanks for the response. I had another question. In the ISE documentation there is a mention of a response code returned by the External RESTful Services API called "&lt;SPAN&gt;429 Too many requests" which means too many simultaneous requests. Is there a particular number of simultaneous requests which would trigger this response code?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2015 23:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803886#M56473</guid>
      <dc:creator>jay.pandya1</dc:creator>
      <dc:date>2015-12-15T23:59:09Z</dc:date>
    </item>
    <item>
      <title>Hello Sir,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803887#M56474</link>
      <description>&lt;P&gt;Hello Sir,&lt;/P&gt;
&lt;P&gt;Thank you for this question.&lt;/P&gt;
&lt;P&gt;The message&amp;nbsp; you referring to might come from 2 different layers - application itself as well as transport/TCP layer. Since the newest ISE 2.0 is using Apache Tomcat Server 8.x,&amp;nbsp; application configuration should be stored there. Sharing with you link where you can read more on Tomcat Server 8.x and default settings:&lt;/P&gt;
&lt;P&gt;https://tomcat.apache.org/tomcat-8.0-doc/config/http.html&lt;/P&gt;
&lt;P&gt;Unfortunately, this is very specific question and without engineering team&amp;nbsp; looking into the source code I won't be able to fully answer this question. Because of that, if you still would like to have an answer to this question, I would encourage you to open a TAC case.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 08:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803887#M56474</guid>
      <dc:creator>Artem Tkachov</dc:creator>
      <dc:date>2015-12-16T08:35:04Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803888#M56475</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there any specific support or way to handle imaging/installation of pc's from Microsoft SCCM initiated with PXE boot ?&lt;/P&gt;
&lt;P&gt;A way to allow the client to temporary get access to the required network resources during the installation, since the pc is not able to authenticate itself before it's fully installed.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 11:37:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803888#M56475</guid>
      <dc:creator>stormfidus</dc:creator>
      <dc:date>2015-12-16T11:37:20Z</dc:date>
    </item>
    <item>
      <title>Hello Sir/Madame,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803889#M56476</link>
      <description>&lt;P&gt;Hello Sir/Madame,&lt;/P&gt;
&lt;P&gt;Thank you for that questions. When PXE device is booting we could use MAB authentication and limit its access using dACL: to allow DHCP and access to MS server.&lt;/P&gt;
&lt;P&gt;Once device will be fully installed, dot1x can take precedence (authentication priority dot1x mab) and machine will be securely authenticated with dot1x.&lt;/P&gt;
&lt;P&gt;That is explained with the example in the guide below (Low-Impact Mode section):&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_24_low_impact_mode.pdf&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Wojciech&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 12:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803889#M56476</guid>
      <dc:creator>Wojciech Cecot</dc:creator>
      <dc:date>2015-12-16T12:48:12Z</dc:date>
    </item>
    <item>
      <title>Hi Wojciech</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803890#M56477</link>
      <description>&lt;P&gt;Hi Wojciech&lt;/P&gt;
&lt;P&gt;The current SCCM setup requires access to a lot of different resources during the install, which makes it almost impossible to get a full dACL configured to allow access,&lt;/P&gt;
&lt;P&gt;So I was looking for if SCCM &amp;amp; ISE could exchange information, like when a PC is about to be installed the MAC address could be exchanged from SCCM to ISE allowing it full access to the network for a very limited amount of time, could something like this be possible ?&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 12:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803890#M56477</guid>
      <dc:creator>stormfidus</dc:creator>
      <dc:date>2015-12-16T12:58:46Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803891#M56478</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Well, I am afraid that will be not possible in the way that was described. ISE needs to know exactly what access should be allowed for the PXE process in order to send that to switch (VLAN or dACL). Another way could be to create some endpoint group for devices which will be allowed to access full resources. However that will require to manually add endpoint to that group and then either remove it or set some purge policy (like after one day endpoint will be removed from the PXE group and no longer will have full access).&lt;/P&gt;
&lt;P&gt;Hope that clarifies your question.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Wojciech&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 14:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803891#M56478</guid>
      <dc:creator>Wojciech Cecot</dc:creator>
      <dc:date>2015-12-16T14:01:19Z</dc:date>
    </item>
    <item>
      <title>Hi Guys,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803892#M56479</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I wonder if you&amp;nbsp;could share your experiences working with OSX and ISE and what is the best method for getting a working Posture/Dot1x setup in place when the workstation is joined to an active directory domain? I have had many issues with creating profiles for&amp;nbsp;OSX etc and although I'm sure you may not want&amp;nbsp;to go into the&amp;nbsp;specifics of OSX profiles&amp;nbsp;if you could give a general overview of the approach that&amp;nbsp;has worked best in your experiences it would help me greatly!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 14:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803892#M56479</guid>
      <dc:creator>Michael Harding</dc:creator>
      <dc:date>2015-12-16T14:02:58Z</dc:date>
    </item>
    <item>
      <title>Hi Experts,</title>
      <link>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803893#M56480</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;
&lt;P&gt;Recently we've upgraded from ISE 1.1 to 1.3 and although we gained lots of useful features we have lost a very important one:&lt;BR /&gt;With v1.1 if we created a guest user with the sponsor portal and set up the account validity for 24 hours the clock started ticking whenever the user first logged into the network. With 1.3 this is not possible.&lt;BR /&gt;Does 1.4 or 2.0 support this feature or is there any patch that can be applied to the current version (1.3) to get this feature back?&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;BR /&gt;Csaba&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 14:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ask-the-expert-implementing-and-troubleshooting-cisco-identity/m-p/2803893#M56480</guid>
      <dc:creator>Csaba Nagy</dc:creator>
      <dc:date>2015-12-16T14:16:18Z</dc:date>
    </item>
  </channel>
</rss>

