<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DHCP option parameters of third party switch in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198292#M591959</link>
    <description>&lt;P&gt;No, these are sent with RADIUS authentication request. I guessed these information may help device profiling. I may be wrong. TAC would help but not an option in my situation. Kind of dead end.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Sep 2024 17:42:22 GMT</pubDate>
    <dc:creator>pgamage</dc:creator>
    <dc:date>2024-09-24T17:42:22Z</dc:date>
    <item>
      <title>DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198069#M591943</link>
      <description>&lt;P&gt;We have added 3rd party switch to the ISE and switch send MAB authentication request along with DHCP options.&lt;/P&gt;
&lt;P&gt;HW-DHCP-Option=SEP70DA48E8B074;&lt;BR /&gt;HW-DHCP-Option=1 28 3 15 6 12 42 119 242 120 66 150 43 252;&lt;BR /&gt;HW-DHCP-Option=Cisco:Codec:1.0;&lt;/P&gt;
&lt;P&gt;The label "HW-DHCP-Option" is vendor specific, we can translate this name to the name desired by ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone tell me what label I should use to convert so that ISE would accept it?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 11:13:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198069#M591943</guid>
      <dc:creator>pgamage</dc:creator>
      <dc:date>2024-09-24T11:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198218#M591948</link>
      <description>&lt;P&gt;So you mean like Cisco Device Sensor?&amp;nbsp; Are these sent via RADIUS Accounting from the access switch in question?&amp;nbsp; &lt;A href="https://cs.co/ise-interop" target="_blank"&gt;https://cs.co/ise-interop&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 15:54:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198218#M591948</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-09-24T15:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198221#M591950</link>
      <description>&lt;P&gt;Why you want these dhcp op.?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 16:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198221#M591950</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-24T16:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198240#M591951</link>
      <description>&lt;P&gt;Phones and codec devices need to be authenticated by the ISE. Switch send phone and codec data collected by DHCP snooping to the ISE for profiling. Its Mac Address Bypass authentication. Everything is RADIUS.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 16:29:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198240#M591951</guid>
      <dc:creator>pgamage</dc:creator>
      <dc:date>2024-09-24T16:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198267#M591953</link>
      <description>&lt;P&gt;Please take a look at DHCP Attributes section in this guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456#toc-hId-826550277" target="_blank"&gt;ISE Profiling Design Guide - Cisco Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198267#M591953</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-24T17:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198270#M591955</link>
      <description>So this switch uses RADIUS accounting to send these attributes? This will most likely be an enhancement request, I’m not aware of there being any customizations to Device Sensor/RADIUS probe behavior. I would open a TAC case and ask your account team.&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198270#M591955</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-09-24T17:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198292#M591959</link>
      <description>&lt;P&gt;No, these are sent with RADIUS authentication request. I guessed these information may help device profiling. I may be wrong. TAC would help but not an option in my situation. Kind of dead end.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198292#M591959</guid>
      <dc:creator>pgamage</dc:creator>
      <dc:date>2024-09-24T17:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198323#M591962</link>
      <description>Why isn’t TAC an option? You can also always relay to ISE using an IP helper upstream. The access switch doesn’t have to send this information.&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Sep 2024 18:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198323#M591962</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-09-24T18:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198324#M591963</link>
      <description>&lt;P&gt;I will study this in depth. It suggest me that I must consider broader profiling data.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 18:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198324#M591963</guid>
      <dc:creator>pgamage</dc:creator>
      <dc:date>2024-09-24T18:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198354#M591965</link>
      <description>&lt;P&gt;3rd party SW' can I know exactly what is SW model&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 19:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198354#M591965</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-24T19:17:13Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP option parameters of third party switch</title>
      <link>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198403#M591969</link>
      <description>&lt;P&gt;Have you tried making a Network Device Profile for this vendor product?&amp;nbsp; You can start by creating a RADIUS dictionary definition into ISE to populate the custom attribute(s) you need, and then you can craft your own MAB and 802.1X authentication &lt;EM&gt;detection Rules&lt;/EM&gt; based on that. It means that ISE will do all the attribute matching/checks for you, based on your custom logic.&lt;/P&gt;
&lt;P&gt;If you're only after one RADIUS attribute "DHCP Option" then you could also create that one manually, and ensure you set it as a STRING and has tick box set for "&lt;SPAN&gt;Allow multiple instances of this attribute in a profile". I just made up the Attribute ID "5" (you can get the true values from a tcpdump/wireshark decode)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_1-1727213072506.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229800iDD57A70BE6C2CEA8/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_1-1727213072506.png" alt="ArneBier_1-1727213072506.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_2-1727213187186.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229801i2F96B4D5E5D7A918/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_2-1727213187186.png" alt="ArneBier_2-1727213187186.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_3-1727213250686.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229802iC03282C5B724CB47/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_3-1727213250686.png" alt="ArneBier_3-1727213250686.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you have this Device Profile, you can apply it to your 3rd party switch Network Device configuration (instead of the default Cisco value).&amp;nbsp; But also be aware, that any Authorization Profiles sent to such a custom device, must also be tagged with this Vendor Profile, or they must be "blank" (i.e. apply to all vendors - as an example of this, the ISE built-in Access-Accept is vendor neutral)&lt;/P&gt;
&lt;P&gt;I believe that, by adding the 3rd party device into ISE's RADIUS Dictionary, you will have access to these attributes in your Policy Set logic, and also Profiling logic (Type:RADIUS Attribute Name: VendorSpecific Operator: EQUALS Attribute Value: {VendorID})&lt;/P&gt;
&lt;P&gt;I reckon this should be worth a try.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 21:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dhcp-option-parameters-of-third-party-switch/m-p/5198403#M591969</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-24T21:47:40Z</dc:date>
    </item>
  </channel>
</rss>

