<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Breakglass Procedure for Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626123#M575242</link>
    <description>&lt;P&gt;Wired 802.1X you can use critical-auth-vlan or take a number of different actions when the RADIUS servers are down.&amp;nbsp; For VPN, there is no concept of "fail-open".&amp;nbsp; Even it was possible, would you REALLY want to open your VPN inbound to the entire internet with zero authentication???&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jun 2022 16:53:26 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2022-06-06T16:53:26Z</dc:date>
    <item>
      <title>Breakglass Procedure for Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626028#M575238</link>
      <description>&lt;P&gt;Hi Team,&lt;BR /&gt;&lt;BR /&gt;I am thinking of coming up with plans and ideas to form a procedure for how we can disable the Network Access Control of Cisco ISE entirely (in my case, it is wired 802.1x and VPN integration with FTD) in the event of a disaster of every node in the deployment going down.&lt;BR /&gt;&lt;BR /&gt;The idea here is that NAC would not be a block-point to businesses.&lt;BR /&gt;After NAC has been removed during the disaster, businesses can go on with traditional network access.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If anyone has been in this situation, could you kindly share your insight and advice on how to achieve this?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks and regards,&lt;BR /&gt;Sreng&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 15:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626028#M575238</guid>
      <dc:creator>sreng</dc:creator>
      <dc:date>2022-06-06T15:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Breakglass Procedure for Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626057#M575239</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;EM&gt;&amp;nbsp; &amp;nbsp;&lt;U&gt; &amp;nbsp; &amp;nbsp;&amp;gt;...&amp;nbsp;businesses can go on with traditional network access.&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;This is not a normal deployment method and or emergency action for ISE, meaning simply that in practice this is 'not done', as far as the phrase above&amp;nbsp; , &lt;STRONG&gt;will business go on&lt;/STRONG&gt; ? Doubt it&amp;nbsp; what if legitimate&amp;nbsp; network access is cracked during that period too. You put your business and business critical information at risk,&lt;EM&gt; amongst other arguments.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 15:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626057#M575239</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-06-06T15:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Breakglass Procedure for Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626065#M575240</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking at a similar solution for a "Critical Authentication" event in an ibns 2 environment using TrustSec. An excerpt from the Identity Control Policy on the switches is below (entries in bold show what the policy is when AAA is unavailable). I'm testing this with an ACL applied on the uplink of the switch (this acl drops all traffic to/from ISE to simulate ISE being unavailable).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its working well but I still have to consider that if ISE is totally unavailable, then:&lt;/P&gt;&lt;P&gt;Cisco Trustsec Environment data will eventually timeout an be lost from all the switches.&lt;BR /&gt;SXP connections will also be lost.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking at having vague/generic VLAN assigned SGTs with local policies on the switches - when ISE is available, ISE SGT assignment and policy will take precedence over them. But if ISE fails, these SGTs and policies will become active.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;event session-started match-all&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 class always do-until-failure&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 activate service-template PREAUTH&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;20 class always do-until-failure&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;20 authenticate using dot1x retries 3 retry-time 30 priority 10&lt;/EM&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;event authentication-failure match-first&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;10 clear-authenticated-data-hosts-on-port&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;30 activate service-template CRITICAL-SGT replace-all&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;40 authorize&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;20 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;10 pause reauthentication&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;30 activate service-template CRITICAL-SGT replace-all&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;40 authorize&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;30 class DOT1X_FAILED do-until-failure&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 terminate dot1x&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;20 authentication-restart 65535&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;40 class DOT1X_NO_RESP do-until-failure&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 terminate dot1x&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;20 authentication-restart 65535&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;60 class always do-until-failure&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 terminate dot1x&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;30 authentication-restart 65535&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;event agent-found match-all&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 class always do-until-failure&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;20 authenticate using dot1x retries 3 retry-time 30 priority 10&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;event aaa-available match-all&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 class always do-until-failure&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;10 clear-session&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 15:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626065#M575240</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-06-06T15:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: Breakglass Procedure for Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626070#M575241</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can use critical VLAN option. I have seen cases where people use EEM to&lt;BR /&gt;deploy limited-access-acls in case of radius servers down. This way they&lt;BR /&gt;get limited access until ISE restored (such http and https, dns, dhcp, no&lt;BR /&gt;lan access, etc).&lt;BR /&gt;&lt;BR /&gt;But as mentioned in other posts, there is always a risk factor which you&lt;BR /&gt;need to evaluate.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Jun 2022 15:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626070#M575241</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2022-06-06T15:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Breakglass Procedure for Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626123#M575242</link>
      <description>&lt;P&gt;Wired 802.1X you can use critical-auth-vlan or take a number of different actions when the RADIUS servers are down.&amp;nbsp; For VPN, there is no concept of "fail-open".&amp;nbsp; Even it was possible, would you REALLY want to open your VPN inbound to the entire internet with zero authentication???&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 16:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4626123#M575242</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-06-06T16:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: Breakglass Procedure for Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4651962#M576224</link>
      <description>&lt;P&gt;We are looking at this same question for a client. We have found ISE to be a not completely robust solution, and recently lost both nodes. ISE is used for network access control for wired clients on Cisco switches. The impact of the client's network grinding to a halt is much larger than the security risk of bypassing ISE for a time. We are investigating the use of critical vlan.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2022 07:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4651962#M576224</guid>
      <dc:creator>jmcgrady1</dc:creator>
      <dc:date>2022-07-18T07:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: Breakglass Procedure for Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4651992#M576225</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;EM&gt;&amp;nbsp; &amp;nbsp;&amp;gt;.&lt;U&gt;..&lt;FONT color="#993366"&gt;and recently lost both nodes&lt;/FONT&gt;&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; Find out&amp;nbsp; &lt;STRONG&gt;1)&lt;/STRONG&gt; why . &lt;STRONG&gt;2)&lt;/STRONG&gt; how and &lt;STRONG&gt;3)&lt;/STRONG&gt; &lt;FONT color="#008000"&gt;&lt;U&gt;resolve&lt;/U&gt;&lt;/FONT&gt;. It also will increase your knowledge to deal with further ise incidents and perform stronger ise management (too). If ISE is being used consider it business critical , that's a choice of IT and according to me a good one. &lt;EM&gt;Taking emergency&amp;nbsp;solutions then becomes bad practice.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2022 08:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/breakglass-procedure-for-cisco-ise/m-p/4651992#M576225</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-07-18T08:21:13Z</dc:date>
    </item>
  </channel>
</rss>

