<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x port authentication using Microsoft NPS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4669439#M576691</link>
    <description>&lt;P&gt;The &lt;LI-MESSAGE title="ISE Secure Wired Access Prescriptive Deployment Guide" uid="3641515" url="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/m-p/3641515#U3641515" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt; contains our best practice switch configurations for RADIUS and 802.1X&lt;/P&gt;</description>
    <pubDate>Mon, 15 Aug 2022 22:14:23 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2022-08-15T22:14:23Z</dc:date>
    <item>
      <title>802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4662329#M576495</link>
      <description>&lt;P&gt;I have a PKI environment and NPS servers.&amp;nbsp; We issuer certificates to machines and they use these certificates to authenticate to the Always on VPN.&amp;nbsp; I would like to configure my access ports so that when a computer is plugged in to the port, it will only let it onto the network if the computer has a valid certificate.&amp;nbsp; I have 3850 switches.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show aaa servers detail shows that the RADIUS server is up, but no requests are being sent to it:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RADIUS: id 1, priority 1, host xx.xx.xx.xx, auth-port 1812, acct-port 1813&lt;BR /&gt;State: current UP, duration 1653614s, previous duration 0s&lt;BR /&gt;Dead: total time 0s, count 0&lt;BR /&gt;Platform State from SMD: current UP, duration 1657968s, previous duration 0s&lt;BR /&gt;SMD Platform Dead: total time 0s, count 0&lt;BR /&gt;Platform State from WNCD: current UP, duration 0s, previous duration 0s&lt;BR /&gt;Platform Dead: total time 0s, count 0&lt;BR /&gt;Quarantined: No&lt;BR /&gt;Authen: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Author: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Account: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Request: start 0, interim 0, stop 0&lt;BR /&gt;Response: start 0, interim 0, stop 0&lt;/P&gt;&lt;P&gt;Here is my configuration:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius NPS_Servers&lt;BR /&gt;server name AZR-NPS-01&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x NPS_List group NPS_Servers&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client xx.xx.xx server-key xxxxxxxxxx&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;interface GigabitEthernet2/0/23&lt;BR /&gt;description 802.1x test&lt;BR /&gt;switchport access vlan 103&lt;BR /&gt;switchport mode access&lt;BR /&gt;access-session host-mode single-host&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;dot1x pae supplicant&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** the command&amp;nbsp;dot1x port-control auto is accepted vbut doesn't show on the config.&lt;/P&gt;&lt;P&gt;What am I missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 20:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4662329#M576495</guid>
      <dc:creator>edcrawford</dc:creator>
      <dc:date>2022-08-02T20:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4662346#M576497</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1386158"&gt;@edcrawford&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would start with the aaa command, which seems to be referencing a method list - rather use the 'default' method list as shown below:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa authentication dot1x default group NPS_Servers&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;You also need the aaa authorization:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa authorization network default group NPS_Servers&lt;/LI-CODE&gt;
&lt;P&gt;Do you have this command?&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dot1x system-auth-control&lt;/LI-CODE&gt;
&lt;P&gt;802.1X on switches is quite fussy. Needs a lot of specialised commands to make it work well.&lt;/P&gt;
&lt;P&gt;For a really thorough discussion on the topic you should reference the &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;Prescriptive Guide&lt;/A&gt; - it's excellent.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 20:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4662346#M576497</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-08-02T20:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4662374#M576498</link>
      <description>&lt;P&gt;I configured it on&amp;nbsp; Switches 3560 as following and working fine&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;On Switch&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;U&gt;:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;radius-server host X.X.X.X auth-port 1645 acct-port 1646 key 7 080211111111 ( set your radius IP &amp;amp; Key )&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&amp;nbsp;&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;On SW Port:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;authentication port-control auto&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On PC:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1-Service&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_0-1659478617355.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158882i4971A66D01438304/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_0-1659478617355.png" alt="WALI_0-1659478617355.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2- NIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_1-1659478617367.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158884i1385EB422E05EF8C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_1-1659478617367.png" alt="WALI_1-1659478617367.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_2-1659478617385.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158883iF7A090E1575EBDEC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_2-1659478617385.png" alt="WALI_2-1659478617385.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_3-1659478617400.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158885i4D35FC6D16F3FB72/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_3-1659478617400.png" alt="WALI_3-1659478617400.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On Radius_NPS:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;-Add the Client&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_4-1659478617414.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158887i01A5802A6932B6D8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_4-1659478617414.png" alt="WALI_4-1659478617414.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Configure Network Policies with conditions &amp;amp;&amp;nbsp;constraints&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_5-1659478617433.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158886i7E52F2B2D2428F6B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_5-1659478617433.png" alt="WALI_5-1659478617433.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_6-1659478617444.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158888i305789FC708F2789/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_6-1659478617444.png" alt="WALI_6-1659478617444.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WALI_7-1659478617453.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158889i4E9B7621682AD2C8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WALI_7-1659478617453.png" alt="WALI_7-1659478617453.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 22:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4662374#M576498</guid>
      <dc:creator>W-ALI</dc:creator>
      <dc:date>2022-08-02T22:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4663104#M576528</link>
      <description>&lt;P&gt;I added aaa authorization and now I see request tick up on show aaa servers, if I run "test aaa group NPS_Servers test-user test-password new-code".&amp;nbsp; It doesn't, however, tick up if I plug a machine into the port that is configured for dot1x.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the odd thing, I would expect that the default would be not to let me on the network when I plug into the dot1x configured port if i do not have a certificate, but it does.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2022 17:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4663104#M576528</guid>
      <dc:creator>edcrawford</dc:creator>
      <dc:date>2022-08-03T17:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4663144#M576531</link>
      <description>&lt;P&gt;The switch part looks very similar to what I have, with exception that I have&amp;nbsp;&lt;SPAN&gt;dot1x pae&amp;nbsp;&lt;/SPAN&gt;supplicant, rather than&amp;nbsp;&lt;SPAN&gt;dot1x pae authenticator.&amp;nbsp; I changed&amp;nbsp;it and&amp;nbsp;it doesn't seem to make a difference.&amp;nbsp; Right now, if I plug into the port, it will let me on the network whether I have a certificate or not, and I don't see any requests going&amp;nbsp;the the RADIUS.&amp;nbsp; I do see requests going&amp;nbsp;to the RADIUS, and NPS Server logs if I run "test aaa group NPS_Servers test-user test-password new-code".&amp;nbsp; The PC and NIC settings look interesting, but in the first instance, I am trying to get it to fail when I plug in with no certificate.&amp;nbsp; Once that happens, and I see requests being sent to the RADIUS server, then I can enable to PC service.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2022 17:50:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4663144#M576531</guid>
      <dc:creator>edcrawford</dc:creator>
      <dc:date>2022-08-03T17:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4663217#M576533</link>
      <description>&lt;P&gt;I would really recommend you look at that Prescriptive Guide document I linked to earlier. There is no need to hack your way through this - there is a set list of common switch commands that are necessary to make this delicate system do what it needs to do.&lt;/P&gt;
&lt;P&gt;If you're not seeing anything on the NPS then there will be some commands missing on the switch.&lt;/P&gt;
&lt;P&gt;Basic checks&lt;/P&gt;
&lt;P&gt;- can you ping the NPS from the switch?&lt;/P&gt;
&lt;P&gt;- the command "test aaa ..." is a good command to see if the RADIUS server receives anything - but keep in mind that the IOS sends a PAP Access-Request - if your NPS is not configured to handle PAP, then you might not get any response (e.g. an Access-Reject/Access-Accept is a sign that NPS replied - but a timeout is a sign that NPS didn't react)&lt;/P&gt;
&lt;P&gt;- Is your switch configured in NPS and does it have the same RADIUS shared secret as what's on the switch?&lt;/P&gt;
&lt;P&gt;- Don't use command pae supplicant on the switch - the switch must not act as the supplicant - it's always the authenticator&lt;/P&gt;
&lt;P&gt;- Read the Prescriptive Guide&lt;/P&gt;
&lt;P&gt;- Be aware that, once you get RADIUS working, that you might have the switch interface in Monitor Mode - in that case the interface will always be authorized if RADIUS sends back Access-Accept (try to avoid the command "access-session closed" in the early days until you are ready to move to Closed Mode)&lt;/P&gt;
&lt;P&gt;- NPS is a poor choice for a RADIUS platform unless you have nothing else - you will need a good grasp of how to configure it exactly- it's pretty bad at logging and debugging -&amp;nbsp; why not spin up a Cisco ISE Eval instead?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2022 20:21:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4663217#M576533</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-08-03T20:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4669439#M576691</link>
      <description>&lt;P&gt;The &lt;LI-MESSAGE title="ISE Secure Wired Access Prescriptive Deployment Guide" uid="3641515" url="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/m-p/3641515#U3641515" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt; contains our best practice switch configurations for RADIUS and 802.1X&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 22:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/4669439#M576691</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-08-15T22:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/5132735#M590132</link>
      <description>&lt;P&gt;Hello everyone&lt;/P&gt;&lt;P&gt;¿Can somebody help me please? I need to provide network access to&amp;nbsp;&lt;SPAN&gt;Out-of-domain computers by NPS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i have the following configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;dot1x system-auth-control&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;radius-server host 10.3.1.12 key cisconps&lt;BR /&gt;!&lt;BR /&gt;radius server PCRADIUS-123&lt;BR /&gt;address ipv4 10.100.1.12 auth-port 1812 acct-port 1813&lt;BR /&gt;key shared24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On port i have this configuration:&lt;BR /&gt;interface GigabitEthernet1/0/9&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;I can provide access to network by NPS but just for&amp;nbsp;Computers within the domain, now i need to provide the access to a guest network in&amp;nbsp;&lt;SPAN&gt;Out-of-domain computers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope you can help me, regards.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 17:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/5132735#M590132</guid>
      <dc:creator>dabitgall21</dc:creator>
      <dc:date>2024-06-17T17:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication using Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/5132808#M590143</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1699901"&gt;@dabitgall21&lt;/a&gt;&amp;nbsp;- it's a bit of a long answer and this thread is quite old. I would suggest the following.&amp;nbsp; Guest portals have many moving parts, and you can watch how it's built, step by step on &lt;A href="http://www.labminutes.com" target="_blank"&gt;www.labminutes.com&lt;/A&gt;&amp;nbsp;(&lt;A href="https://www.labminutes.com/sec0338_ise_30_byod_wired_onboarding_1" target="_self"&gt;SEC0338 and onwards&lt;/A&gt; - this is for BYOD specifically, but he talks through the ISE portal creation and switch config necessary - you can use his guidance to setup a normal Guest Portal instead of a BYOD portal) - in general, labminutes is an excellent tutorial website.&lt;/P&gt;
&lt;P&gt;And of course, a handy reference when you need config details, is the &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-guest-access-prescriptive-deployment-guide/ta-p/3640475" target="_self"&gt;Cisco Guest Prescriptive Guide&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 20:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-using-microsoft-nps/m-p/5132808#M590143</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-06-17T20:38:15Z</dc:date>
    </item>
  </channel>
</rss>

