<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Authentication for Network Devices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4694091#M577399</link>
    <description>&lt;P&gt;we have some switches that can't be easily secured properly, so it would be nice to have the everything authenticate through 802.1x. Also flex connect WAPs would be amazing to have better authenticated.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Sep 2022 19:32:47 GMT</pubDate>
    <dc:creator>Fenix12585</dc:creator>
    <dc:date>2022-09-26T19:32:47Z</dc:date>
    <item>
      <title>ISE Authentication for Network Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687302#M577248</link>
      <description>&lt;P&gt;We currently use ISE to manage 802.1x and limited mab authentication of endpoints on the network.&lt;/P&gt;&lt;P&gt;Is it possible to authenticate network devices as well?&lt;/P&gt;&lt;P&gt;For example we apply authentication configs to sw2.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Then connect sw2 to sw1.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Sw1 will not allow port access if SW2 does not authenticate itself with ise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 18:23:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687302#M577248</guid>
      <dc:creator>Fenix12585</dc:creator>
      <dc:date>2022-09-14T18:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication for Network Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687725#M577256</link>
      <description>&lt;P&gt;Yes, preferably with TACACS+.&amp;nbsp; Are you talking about daisy chained switches or Device Administration?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 09:12:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687725#M577256</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-09-15T09:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication for Network Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687791#M577257</link>
      <description>&lt;P&gt;specifically daisy chained switches.&lt;/P&gt;&lt;P&gt;We are pretty heavy with tacacs+ also so that wouldn't necessarily be a huge overhaul to implement. I was not aware tacacs+ could be used for more than device administration.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 11:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687791#M577257</guid>
      <dc:creator>Fenix12585</dc:creator>
      <dc:date>2022-09-15T11:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication for Network Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687795#M577258</link>
      <description>&lt;P&gt;I don’t think that would work, at least I haven’t tried, to make a device authenticate there is the port config and supplicant 802.1X config. In your case you are talking about configuring uplink trunk port for 802.1X authentication and then SW1 as supplicant…and it won’t work most likely because &lt;SPAN&gt;802.1X protocol is supported on both Layer 2 static-access ports and Layer 3 routed ports, but it is not supported on &lt;/SPAN&gt;&lt;SPAN&gt;Trunk port—If you try to enable 802.1X on a trunk port, an error message will appear.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 11:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687795#M577258</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2022-09-15T11:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication for Network Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687805#M577259</link>
      <description>&lt;P&gt;It can't.&amp;nbsp; I thought you were talking logging into the device itself.&amp;nbsp; The setup you describe will not work with a trunk port as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325330"&gt;@Ambuj M&lt;/a&gt;&amp;nbsp;mentioned?&amp;nbsp; What is your use-case?&amp;nbsp; Why do you want 802.1X on links between switches?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 11:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4687805#M577259</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-09-15T11:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication for Network Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4694090#M577398</link>
      <description>&lt;P&gt;gotcha... thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 19:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4694090#M577398</guid>
      <dc:creator>Fenix12585</dc:creator>
      <dc:date>2022-09-26T19:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication for Network Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4694091#M577399</link>
      <description>&lt;P&gt;we have some switches that can't be easily secured properly, so it would be nice to have the everything authenticate through 802.1x. Also flex connect WAPs would be amazing to have better authenticated.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 19:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-for-network-devices/m-p/4694091#M577399</guid>
      <dc:creator>Fenix12585</dc:creator>
      <dc:date>2022-09-26T19:32:47Z</dc:date>
    </item>
  </channel>
</rss>

