<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE use case/provisioning laptop or computers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413124#M567695</link>
    <description>&lt;PRE&gt;The testing and layout of our network is such that if the laptop is able to authenticate itself with 802.1x it gets the desired employee access. For this, the laptop already has the employee certificate and profiles.&lt;/PRE&gt;
&lt;P&gt;ISE put the device in default VLAN, which you can use for device provisioning based on the device authentication here allocate Device to different VLAN as on boarding VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope you looking the device to connect SCCM Server ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jun 2021 14:21:03 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2021-06-04T14:21:03Z</dc:date>
    <item>
      <title>Cisco ISE use case/provisioning laptop or computers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413116#M567694</link>
      <description>&lt;P&gt;Folks,&lt;/P&gt;&lt;P&gt;We have this use case of allowing laptops which are in provisioning stages to be connected to the network. The challenge is that these laptops must reach the provisioning servers bare minimum.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The testing and layout of our network is such that if the laptop is able to authenticate itself with 802.1x it gets the desired employee access. For this, the laptop already has the employee certificate and profiles.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If this is not the case the laptop get a guest access which means internet only.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This is not the same with a laptop under provisioning i.e. it should not get Internet only. Any hints or suggestions how we can overcome this use case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;N!!&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 14:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413116#M567694</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2021-06-04T14:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE use case/provisioning laptop or computers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413124#M567695</link>
      <description>&lt;PRE&gt;The testing and layout of our network is such that if the laptop is able to authenticate itself with 802.1x it gets the desired employee access. For this, the laptop already has the employee certificate and profiles.&lt;/PRE&gt;
&lt;P&gt;ISE put the device in default VLAN, which you can use for device provisioning based on the device authentication here allocate Device to different VLAN as on boarding VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope you looking the device to connect SCCM Server ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 14:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413124#M567695</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-06-04T14:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE use case/provisioning laptop or computers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413155#M567696</link>
      <description>&lt;P&gt;Thanks for the response Balaji.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The challenge we have is that the default VLAN is considered as the Guest VLAN which is internet access alone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unless I did not understand you well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other method we were thinking is using any API's? Enter the MAC of the laptop to be provisioned through some API and create a list of such MAC address. Then this policy set get a assigned VLAN for the provisioning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe any other method?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;N.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 15:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413155#M567696</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2021-06-04T15:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE use case/provisioning laptop or computers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413195#M567697</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Which you can use for device provisioning based on the device authentication here allocate Device to different VLAN as on boarding VLAN.&lt;/PRE&gt;
&lt;P&gt;My suggestion was the same as you thinking different VLAN not the same as the default. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you mentioned the First post the device has Certificate? yes or no.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if yes you identified the device to send the different VLAN, if no you need to MAB authentication with MAC Address based and allocated to provision VLAN as workflow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 16:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413195#M567697</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-06-04T16:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE use case/provisioning laptop or computers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413730#M567723</link>
      <description>&lt;P&gt;You will need to add ACL entry(s) to your default VLAN that also permits access to your provisioning server(s).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively, some customers use open ports in physically secure rooms to provision servers.&lt;/P&gt;
&lt;P&gt;You may also create temporary MAB exceptions if you know the devices but that's not very dynamic. I've seen this temporary access called a "voucher". See &lt;A href="https://developer.cisco.com/codeexchange/github/repo/obrigg/Vanilla-ISE" target="_blank"&gt;https://developer.cisco.com/codeexchange/github/repo/obrigg/Vanilla-ISE&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You could login to the guest portal with an ISE internal user 'provisioning' account that allows internal access only to the necessary servers.&lt;/P&gt;
&lt;P&gt;Many options here depending on what you find [un]acceptable.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jun 2021 23:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413730#M567723</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-06-06T23:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE use case/provisioning laptop or computers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413737#M567727</link>
      <description>&lt;P&gt;This is a common issue with NAC-enabled environments due to the way Windows builds work and the fact that MS never implemented a way to enable 802.1x at an early stage in the build. See a similar discussion with some suggestions in this post.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/pc-imaging-on-nac-secured-ports/td-p/3486098" target="_blank" rel="noopener"&gt;PC Imaging on NAC secured ports &lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 00:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4413737#M567727</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-06-07T00:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE use case/provisioning laptop or computers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4416587#M567797</link>
      <description>&lt;P&gt;Sorry again for the delayed response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device will have no certificate as it will still be in the provisioning state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The MAB based is fine, but now we will have to assign MAC addresses manually.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 06:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-use-case-provisioning-laptop-or-computers/m-p/4416587#M567797</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2021-06-11T06:37:36Z</dc:date>
    </item>
  </channel>
</rss>

