<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE with Multiple Interfaces in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702663#M577736</link>
    <description>&lt;P&gt;There isn't a concept of a "management plane" in ISE.&amp;nbsp; Sponsor Groups would cover your need for RBAC of certain guest types.&amp;nbsp; If I am understanding your requirement.&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2022 11:34:34 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2022-10-13T11:34:34Z</dc:date>
    <item>
      <title>ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/3087858#M25517</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a requirement to deploy an ISE appliance into a customer environment where the management network is separate from the data network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I understand that GEth0 is dedicated for management access to ISE so, I can assign an IP&amp;nbsp;address to this interface form the management network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I don't understand is how I configure&amp;nbsp;Geth1 for authentication traffic such&amp;nbsp;as radius requests.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After I have assigned an&amp;nbsp;IP&amp;nbsp;address to GEth1 from the data facing network how do I tell ISE to use this interface for authentication&amp;nbsp;requests?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Unless I have missed something this does not seem to be documented.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Scott&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/3087858#M25517</guid>
      <dc:creator>scottbreslin</dc:creator>
      <dc:date>2019-03-11T07:55:00Z</dc:date>
    </item>
    <item>
      <title>There is configuration on the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/3087859#M25525</link>
      <description>&lt;P&gt;There is configuration on the network devices that defines the IP address to use for AAA. Configure devices to send authentication traffic to GEth1 on ISE&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2017 22:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/3087859#M25525</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2017-08-06T22:52:21Z</dc:date>
    </item>
    <item>
      <title>Scott,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/3087860#M25526</link>
      <description>&lt;P&gt;Scott,&lt;/P&gt;
&lt;P&gt;Based on the three bullet points under the Cisco ISE Infrastructure heading (see link below), ISE listens for RADIUS request on all NIC's so no additional configuration is needed. &amp;nbsp;My guess on how to read the chart is that if the service is listed across both columns then the service is active on all NIC;'s. &amp;nbsp; &amp;nbsp;I have not used different NIC's for Admin and RADIUS but have used other NIC's for guest portals.&lt;/P&gt;
&lt;P&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/install_guide/b_ise_InstallationGuide21/b_ise_InstallationGuide21_appendix_0110.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Len&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 15:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/3087860#M25526</guid>
      <dc:creator>chatataridge</dc:creator>
      <dc:date>2017-08-07T15:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: Scott,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4275185#M564848</link>
      <description>&lt;P&gt;Hi C&lt;SPAN&gt;hatataridge&lt;/SPAN&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have u used Different NIC for Wired Portal traffic or Wireless? If yes, can you please share steps u did to do so. I want to use different NIC (ex: NIC3) for Wired CWA(Guest traffic).&amp;nbsp;&lt;/P&gt;&lt;P&gt;NIC1 + NIC2 Bundle for high availability for Management Traffic,&amp;nbsp;&lt;/P&gt;&lt;P&gt;NIC3 + NIC4 Bundle for High availability for CWA VLAN traffic to Internet. This for Guest&lt;/P&gt;&lt;P&gt;NIC5 + NIC6 Bundle for High Availability for RADIUS Internal Access for Endpoints.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions!?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;L&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 10:46:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4275185#M564848</guid>
      <dc:creator>laurathaqi</dc:creator>
      <dc:date>2021-01-19T10:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Scott,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4278221#M564933</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1081844"&gt;@laurathaqi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;first of all:&lt;/P&gt;&lt;P&gt;.&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;ISE Management&lt;/STRONG&gt; is restricted to &lt;STRONG&gt;Gigabit Ethernet 0 (Eth0)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;. &lt;STRONG&gt;Eth0&lt;/STRONG&gt;, &lt;STRONG&gt;Eth2&lt;/STRONG&gt; and &lt;STRONG&gt;Eth4&lt;/STRONG&gt; must be assigned an &lt;STRONG&gt;IPv4&lt;/STRONG&gt; (or &lt;STRONG&gt;IPv6&lt;/STRONG&gt;) address.&lt;/P&gt;&lt;P&gt;. &lt;STRONG&gt;Eth1&lt;/STRONG&gt;, &lt;STRONG&gt;Eth3&lt;/STRONG&gt; and &lt;STRONG&gt;Eth5&lt;/STRONG&gt; must not be assigned an &lt;STRONG&gt;IP&lt;/STRONG&gt; address.&lt;/P&gt;&lt;P&gt;.&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;RADIUS&lt;/STRONG&gt; listens on all &lt;STRONG&gt;NICs&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Second:&lt;/P&gt;&lt;P&gt;. configure &lt;STRONG&gt;Bond0&lt;/STRONG&gt; (&lt;STRONG&gt;Eth0+Eth1&lt;/STRONG&gt;) for&amp;nbsp;&lt;STRONG&gt;ISE Management&lt;/STRONG&gt;.&lt;/P&gt;&lt;PRE&gt;ise/admin(config)# interface GigabitEthernet 0 &lt;BR /&gt;ise/admin(config-GigabitEthernet)# backup interface GigabitEthernet 1 &lt;/PRE&gt;&lt;P&gt;. configure the &lt;STRONG&gt;Guest Portals&lt;/STRONG&gt; to point to &lt;STRONG&gt;Bond1&lt;/STRONG&gt; (&lt;STRONG&gt;Eth2+Eth3&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;In &lt;STRONG&gt;Work Centers&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Guest Access&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Portal &amp;amp; Components&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Guest Portal&lt;/STRONG&gt; ... select &lt;STRONG&gt;Portal Settings&lt;/STRONG&gt; &amp;gt; choose &lt;STRONG&gt;Bond1&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;. configure the &lt;STRONG&gt;NADs&lt;/STRONG&gt; to send the &lt;STRONG&gt;RADIUS&lt;/STRONG&gt; packets to &lt;STRONG&gt;Bond2&lt;/STRONG&gt; (&lt;STRONG&gt;Eth4+Eth5&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jan 2021 19:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4278221#M564933</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-01-23T19:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: Scott,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4278232#M564934</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the information I have been after, so many many thanks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Laura&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jan 2021 20:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4278232#M564934</guid>
      <dc:creator>laurathaqi</dc:creator>
      <dc:date>2021-01-23T20:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702182#M577706</link>
      <description>&lt;P&gt;When attempting to use a separate interface for management (behind a FW), how does one manipulate routing as the mgmt interface does not have its own VRF to my knowledge.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 17:55:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702182#M577706</guid>
      <dc:creator>Jonathan Schultz</dc:creator>
      <dc:date>2022-10-12T17:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702222#M577708</link>
      <description>&lt;P&gt;So you do mean gig0 on ISE?&amp;nbsp; Or the CIMC port on appliance?&amp;nbsp; The CIMC interface its completely out of band and has its own routing table.&amp;nbsp; All other ISE interfaces share the same routing table and you manipulate routing using static routes.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 19:15:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702222#M577708</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-10-12T19:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702243#M577712</link>
      <description>Basic routing. Management (Gig0) used for mgmt. access (own routing table). Gig1 used for policy enforcement. (Radius, Tacacs, 802.1x, portal, etc)&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Oct 2022 20:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702243#M577712</guid>
      <dc:creator>Jonathan Schultz</dc:creator>
      <dc:date>2022-10-12T20:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702244#M577713</link>
      <description>That’s not how ISE works, all interfaces will respond to RADIUS/TACACS+ (unless controlled by upstream firewall or ACL). Gig0 isn’t a dedicated management port. What is your use-case for this?&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Oct 2022 20:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702244#M577713</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-10-12T20:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702249#M577714</link>
      <description>Not give my end users, specifically Sponsored Guests access to the Mgmt plane&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Oct 2022 20:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702249#M577714</guid>
      <dc:creator>Jonathan Schultz</dc:creator>
      <dc:date>2022-10-12T20:39:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702663#M577736</link>
      <description>&lt;P&gt;There isn't a concept of a "management plane" in ISE.&amp;nbsp; Sponsor Groups would cover your need for RBAC of certain guest types.&amp;nbsp; If I am understanding your requirement.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 11:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/4702663#M577736</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-10-13T11:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5198970#M591992</link>
      <description>&lt;P&gt;For routing.....Will this work?&lt;/P&gt;&lt;P&gt;Gig0 ip add 192.168.66.253 255.255.255.0&lt;/P&gt;&lt;P&gt;ip default-gateway 192.168.66.1&lt;/P&gt;&lt;P&gt;Gig 1&lt;/P&gt;&lt;P&gt;IP add 192.168.70.253 255.255.255.0&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.70.1&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 18:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5198970#M591992</guid>
      <dc:creator>tfrechette</dc:creator>
      <dc:date>2024-09-25T18:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5199005#M591994</link>
      <description>&lt;P&gt;Depends.&amp;nbsp; Does this match what you need in your environment?&amp;nbsp;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_blank"&gt;https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 21:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5199005#M591994</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-09-25T21:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5199010#M591995</link>
      <description>&lt;P&gt;Is this how you configure the routing?&lt;/P&gt;&lt;P&gt;ip default-gateway x.x.x.x for Eth0 interface (gui mgmt)&lt;/P&gt;&lt;P&gt;and ..&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0 x.x.x.x for the Eth 2/3 (bonded) interface, fiber SFP ports on riser (authentication traffic, etc)&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 21:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5199010#M591995</guid>
      <dc:creator>tfrechette</dc:creator>
      <dc:date>2024-09-25T21:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5199600#M592011</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Depends.&amp;nbsp; Does this match what you need in your environment?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I would HIGHLY suggest making a new post versus commenting on a post from 2017.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 19:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-multiple-interfaces/m-p/5199600#M592011</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-09-26T19:33:23Z</dc:date>
    </item>
  </channel>
</rss>

