<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Guest Access wired in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5206128#M592342</link>
    <description>&lt;P&gt;On the wired client, can you open a command prompt and see if the DNS resolution of the ISE portal FQDN resolves in the IP address of the ISE PSN?&lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2024 21:15:47 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-10-09T21:15:47Z</dc:date>
    <item>
      <title>ISE Guest Access wired</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5203640#M592191</link>
      <description>&lt;P&gt;Hi friends&lt;BR /&gt;I have to configure wired guest access with ise, I don't know if anyone has any idea of ​​the errors I have in the live log, nothing appears, these are my configurations in the switch:&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 172.22.4.194 server-key 123456&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;BR /&gt;!&lt;BR /&gt;radius server RADIUS&lt;BR /&gt;address ipv4 172.22.4.194 auth-port 1812 acct-port 1813&lt;BR /&gt;key 123456&lt;/P&gt;
&lt;P&gt;ip device tracking probe delay 10&lt;BR /&gt;ip device tracking&lt;BR /&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/4&lt;BR /&gt;switchport access vlan 209&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 202&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order mab webauth&lt;BR /&gt;authentication priority mab webauth&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-WEBAUTH-REDIRECT&lt;BR /&gt;deny ip any host 172.22.4.194&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;permit udp any any eq domain&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_0-1728066094847.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230591iF08FFF8B5829EC6F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_0-1728066094847.png" alt="LeoTI_0-1728066094847.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_1-1728066258994.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230594iC0571B8487CC2B83/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_1-1728066258994.png" alt="LeoTI_1-1728066258994.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_2-1728066311069.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230595iFDEF3C781092974E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_2-1728066311069.png" alt="LeoTI_2-1728066311069.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_3-1728066349924.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230596i1E007CD43E671F31/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_3-1728066349924.png" alt="LeoTI_3-1728066349924.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_4-1728066382760.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230597i8DEE107005862A45/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_4-1728066382760.png" alt="LeoTI_4-1728066382760.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_5-1728066509421.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230598i73B6FC12B3C15B9F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_5-1728066509421.png" alt="LeoTI_5-1728066509421.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_6-1728066529568.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230599iD9A747C4F3C33D00/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_6-1728066529568.png" alt="LeoTI_6-1728066529568.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 18:31:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5203640#M592191</guid>
      <dc:creator>Leo TI</dc:creator>
      <dc:date>2024-10-04T18:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Access wired</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5203649#M592192</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/839551"&gt;@Leo TI&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check this. You are assigning the group "radius" to the aaa config but I dont see this group on the config. Rather I see the RADIUS in the radius server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The name radius on group is not a default name, I believe this is suppose to represent your radius group..&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 172.22.4.194 server-key 123456&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;BR /&gt;!&lt;BR /&gt;radius server RADIUS&lt;BR /&gt;address ipv4 172.22.4.194 auth-port 1812 acct-port 1813&lt;BR /&gt;key 123456&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 19:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5203649#M592192</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-10-04T19:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Access wired</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5203685#M592199</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/839551"&gt;@Leo TI&lt;/a&gt;&amp;nbsp;- the config looks like something out of a very old textbook - I would suggest to look at a more&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt; contemporary way of configuring this&lt;/A&gt; - and I would also suggest using a named aaa group, instead of the "group radius" - I have never used this style of config, because it seems like it's a lazy/default way to let IOS select any/all radius server definitions - instead, I always create a radius group, and then inside that group, refer to my named radius server definitions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If no RADIUS traffic is hitting ISE then also check things like source interface used for RADIUS - if your switch has multiple SVI's, then IOS will auto select the lowest numbered one for sending RADIUS - this might not match what you intended and ISE will ignore/drop those packets. Run a tcpdump on ISE to see if you get anything.&lt;/P&gt;
&lt;P&gt;Useful commands&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;test aaa 

show aaa servers&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 21:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5203685#M592199</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-04T21:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Access wired</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5205864#M592331</link>
      <description>&lt;P&gt;Do you have any configuration guide that you can tell me?&lt;/P&gt;
&lt;P&gt;It only accepts me with other policies, with the wired guest policy the tests do not work for me&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_0-1728487013475.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230939iBAA85237DAB9AA88/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_0-1728487013475.png" alt="LeoTI_0-1728487013475.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 15:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5205864#M592331</guid>
      <dc:creator>Leo TI</dc:creator>
      <dc:date>2024-10-09T15:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Access wired</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5206007#M592335</link>
      <description>&lt;P&gt;It seems to me that it works in the ISE because it goes to the authorization to redirect, I also see that in the switch there are matches with the specific ACL, but in the host it does not redirect to the ISE web page to enter the credentials and if I force it in the browser it appears to me that no radius sessions have been found, in addition to the fact that the host has full access, the ACL is not working&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_0-1728496840907.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230973i69067F86866E7FE9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_0-1728496840907.png" alt="LeoTI_0-1728496840907.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_1-1728496936154.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230974iBB4B2CA8FA290B07/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_1-1728496936154.png" alt="LeoTI_1-1728496936154.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_2-1728497001171.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230975iB5942DF239E84D7F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_2-1728497001171.png" alt="LeoTI_2-1728497001171.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_3-1728497090019.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230977iE68E93DD40FDB61B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_3-1728497090019.png" alt="LeoTI_3-1728497090019.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 18:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5206007#M592335</guid>
      <dc:creator>Leo TI</dc:creator>
      <dc:date>2024-10-09T18:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Access wired</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5206128#M592342</link>
      <description>&lt;P&gt;On the wired client, can you open a command prompt and see if the DNS resolution of the ISE portal FQDN resolves in the IP address of the ISE PSN?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 21:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5206128#M592342</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-09T21:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Access wired</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5220594#M593022</link>
      <description>&lt;P&gt;Hi friends&lt;BR /&gt;I just recently got it working. I'll leave you the configurations I applied to both the switch and the ISE.&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;
&lt;P&gt;aaa authorization network default group radius&lt;/P&gt;
&lt;P&gt;aaa accounting dot1x default start-stop group radius&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;radius server Grupo-ISE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;address ipv4 172.22.4.194 auth-port 1812 acct-port 1813&lt;/P&gt;
&lt;P&gt;&amp;nbsp;key 123456&lt;/P&gt;
&lt;P&gt;aaa server radius dynamic-author&lt;/P&gt;
&lt;P&gt;&amp;nbsp;client 172.22.4.194 server-key 123456&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip device tracking probe delay 10&lt;/P&gt;
&lt;P&gt;ip device tracking&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport access vlan 209&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport mode access&lt;/P&gt;
&lt;P&gt;&amp;nbsp;authentication event fail action next-method&lt;/P&gt;
&lt;P&gt;&amp;nbsp;authentication open&lt;/P&gt;
&lt;P&gt;&amp;nbsp;authentication order dot1x mab webauth&lt;/P&gt;
&lt;P&gt;&amp;nbsp;authentication priority dot1x mab webauth&lt;/P&gt;
&lt;P&gt;&amp;nbsp;authentication port-control auto&lt;/P&gt;
&lt;P&gt;&amp;nbsp;mab&lt;/P&gt;
&lt;P&gt;&amp;nbsp;dot1x pae authenticator&lt;/P&gt;
&lt;P&gt;&amp;nbsp;dot1x timeout tx-period 10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip http server&lt;/P&gt;
&lt;P&gt;ip http secure-server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL-WEBAUTH-REDIRECT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any eq domain&lt;/P&gt;
&lt;P&gt;&amp;nbsp;permit tcp any any eq www&lt;/P&gt;
&lt;P&gt;&amp;nbsp;permit tcp any any eq 443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;permit icmp any any&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_0-1730836856784.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/233248iFE34944EF2A5C499/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_0-1730836856784.png" alt="LeoTI_0-1730836856784.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_1-1730836871998.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/233249i0F2B3789B085EEBC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_1-1730836871998.png" alt="LeoTI_1-1730836871998.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_2-1730836925167.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/233250i746E633E1864749E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_2-1730836925167.png" alt="LeoTI_2-1730836925167.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LeoTI_3-1730836940644.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/233251iF595CE4AAA6971AB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LeoTI_3-1730836940644.png" alt="LeoTI_3-1730836940644.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 20:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-access-wired/m-p/5220594#M593022</guid>
      <dc:creator>Leo TI</dc:creator>
      <dc:date>2024-11-05T20:13:00Z</dc:date>
    </item>
  </channel>
</rss>

