<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE per user policy map in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460493#M569530</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;These attributes work for WLC but not sure about IOS. Try them from&lt;BR /&gt;authorization results &amp;gt; advanced attributes &amp;gt; radius. You can verify them&lt;BR /&gt;using show session interface x/x details and see what has been passed from&lt;BR /&gt;server policies.&lt;BR /&gt;&lt;BR /&gt;Aire-Real-Time-Bandwidth-Average-UpStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Average-DownStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Burst-UpStream-Contract&lt;BR /&gt;Aire-Real-Time-Bandwidth-Burst-DownStream-Contract&lt;BR /&gt;Aire-Real-Time-Bandwidth-Average-DownStream-Contract&lt;BR /&gt;Aire-Real-Time-Bandwidth-Burst-UpStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Average-UpStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Burst-DownStream-Contract&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 06 Sep 2021 15:46:06 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2021-09-06T15:46:06Z</dc:date>
    <item>
      <title>ISE per user policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460485#M569529</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ISE 2.7 with Catalyst 9300. I want to apply policy-map on an interface as a result of authorization. The goal is to limit the speed for the connected device to 15/15M.&lt;/P&gt;&lt;P&gt;Is it possible? What av-pair to use?&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 15:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460485#M569529</guid>
      <dc:creator>peter.matuska1</dc:creator>
      <dc:date>2021-09-06T15:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE per user policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460493#M569530</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;These attributes work for WLC but not sure about IOS. Try them from&lt;BR /&gt;authorization results &amp;gt; advanced attributes &amp;gt; radius. You can verify them&lt;BR /&gt;using show session interface x/x details and see what has been passed from&lt;BR /&gt;server policies.&lt;BR /&gt;&lt;BR /&gt;Aire-Real-Time-Bandwidth-Average-UpStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Average-DownStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Burst-UpStream-Contract&lt;BR /&gt;Aire-Real-Time-Bandwidth-Burst-DownStream-Contract&lt;BR /&gt;Aire-Real-Time-Bandwidth-Average-DownStream-Contract&lt;BR /&gt;Aire-Real-Time-Bandwidth-Burst-UpStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Average-UpStream-Contract&lt;BR /&gt;Aire-Data-Bandwidth-Burst-DownStream-Contract&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Sep 2021 15:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460493#M569530</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-06T15:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE per user policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460521#M569531</link>
      <description>&lt;P&gt;thank you, but didn't work.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 17:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460521#M569531</guid>
      <dc:creator>peter.matuska1</dc:creator>
      <dc:date>2021-09-06T17:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE per user policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460534#M569532</link>
      <description>I did some research and seems its possible on routers with ISG enabled&lt;BR /&gt;(usually service providers enviroments).&lt;BR /&gt;&lt;BR /&gt;See below doc&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/isg/configuration/xe-3s/isg-xe-3s-book/isg-radius-pol.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/isg/configuration/xe-3s/isg-xe-3s-book/isg-radius-pol.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Sep 2021 18:08:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460534#M569532</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-06T18:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE per user policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460640#M569546</link>
      <description>&lt;P&gt;You might try this approach. I have not tested the traffic policing, but I have confirmed that the policy-map is applied in my lab.&lt;/P&gt;
&lt;P&gt;Create an empty class-map (e.g. CLASS_POLICE) and a policy-map (e.g. POLICY_POLICE) on the switch as per &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9400/software/release/16-6/configuration_guide/qos/b_166_qos_9400_cg/b_166_qos_9400_cg_chapter_01.html" target="_blank" rel="noopener"&gt;this guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Create a new template (e.g. NAC_Police) on the switch with the same configuration as your NAC template (e.g. DefaultWiredDot1xOpenAuth) but with the added configuration of your Policing policy (service-policy input POLICY_POLICE).&lt;/P&gt;
&lt;P&gt;In your ISE AuthZ Profile, enable the Common Task for 'Interface Template' and specify your new template name (NAC_Police).&lt;/P&gt;
&lt;P&gt;Upon authZ, you should see the Interface Template applied to the session:&lt;/P&gt;
&lt;PRE&gt;sw1#show access-sess interf gig0/x det 
            Interface:  GigabitEthernet0/x
&amp;lt;snip&amp;gt;
       Current Policy:  PMAP_DefaultWiredDot1xOpenAuth_1X_MAB

Server Policies:
&amp;lt;snip&amp;gt;
   &lt;STRONG&gt;Interface Template:  NAC_Police&lt;/STRONG&gt;
              ACS ACL:  xACSACLx-IP-MM-DACL-AD-User-609cc325&lt;/PRE&gt;
&lt;P&gt;You should also see the service-policy applied in the derived-config:&lt;/P&gt;
&lt;PRE&gt;sw1#show derived-config int gig0/x
Building configuration...

Derived configuration : 507 bytes
!
interface GigabitEthernet0/x
&amp;lt;snip&amp;gt;
 service-policy type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB
 service-policy input POLICY_POLICE
end&lt;/PRE&gt;</description>
      <pubDate>Tue, 07 Sep 2021 00:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4460640#M569546</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-09-07T00:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE per user policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4461540#M569589</link>
      <description>&lt;P&gt;thank you. this worked.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 07:34:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-per-user-policy-map/m-p/4461540#M569589</guid>
      <dc:creator>peter.matuska1</dc:creator>
      <dc:date>2021-09-08T07:34:05Z</dc:date>
    </item>
  </channel>
</rss>

