<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Switch AAA config for forescout in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/switch-aaa-config-for-forescout/m-p/5225438#M593225</link>
    <description>&lt;P&gt;Dear experts,&lt;/P&gt;&lt;P&gt;We are moving from ISE to forescout, I need the Cisco switch AAA configuration (global &amp;amp; interface) to allow the scenario of&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Limited access of endpoint while it's authenticating&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. If host authentication is successful and Futher compliance check by forescout is passed, the host would receive a CoA from radius server to full access ACL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If compliance check fails, the host remains in the limited ACL to remediate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 16 Nov 2024 19:33:01 GMT</pubDate>
    <dc:creator>Danfurqan</dc:creator>
    <dc:date>2024-11-16T19:33:01Z</dc:date>
    <item>
      <title>Switch AAA config for forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-aaa-config-for-forescout/m-p/5225438#M593225</link>
      <description>&lt;P&gt;Dear experts,&lt;/P&gt;&lt;P&gt;We are moving from ISE to forescout, I need the Cisco switch AAA configuration (global &amp;amp; interface) to allow the scenario of&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Limited access of endpoint while it's authenticating&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. If host authentication is successful and Futher compliance check by forescout is passed, the host would receive a CoA from radius server to full access ACL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If compliance check fails, the host remains in the limited ACL to remediate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Nov 2024 19:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-aaa-config-for-forescout/m-p/5225438#M593225</guid>
      <dc:creator>Danfurqan</dc:creator>
      <dc:date>2024-11-16T19:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: Switch AAA config for forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-aaa-config-for-forescout/m-p/5225459#M593226</link>
      <description>&lt;P&gt;Your switch config will most likely stay the same, assuming that you have the same functionality configured today. You will however have to define new radius server groups. See the following documentation for this:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9200/software/release/17-12/configuration_guide/sec/b_1712_sec_9200_cg/configuring_radius.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9200/software/release/17-12/configuration_guide/sec/b_1712_sec_9200_cg/configuring_radius.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you post your the output of "show run aaa" here we will be able to help you further(remember to remove any sensitive data!).&lt;/P&gt;</description>
      <pubDate>Sat, 16 Nov 2024 22:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-aaa-config-for-forescout/m-p/5225459#M593226</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2024-11-16T22:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Switch AAA config for forescout</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-aaa-config-for-forescout/m-p/5225520#M593230</link>
      <description>&lt;P&gt;aaa authentication login AUTHENXX group tacacs+ local&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authentication dot1x default group loc1FO&lt;BR /&gt;aaa authentication username-prompt Local_Username:&lt;BR /&gt;aaa authentication password-prompt Local_Password:&lt;BR /&gt;aaa authentication attempts login 5&lt;BR /&gt;aaa authorization exec default group tacacs+ local&lt;BR /&gt;aaa authorization exec console local&lt;BR /&gt;aaa authorization exec AUTHOR-XX group tacacs+ local if-authenticated&lt;BR /&gt;aaa authorization network default group loc1FO&lt;BR /&gt;aaa authorization commands 0 console none&lt;BR /&gt;aaa authorization commands 0 AUTHOR-XX group tacacs+ local if-authenticated&lt;BR /&gt;aaa authorization commands 15 console none&lt;BR /&gt;aaa authorization commands 15 AUTHOR-XX group tacacs+ local if-authenticated&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting connection default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 0 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;BR /&gt;aaa accounting dot1x default start-stop group loc1FO&lt;BR /&gt;aaa accounting delay-start all&lt;BR /&gt;aaa accounting update newinfo periodic 1440&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt;client rad1 server-key xxx&lt;BR /&gt;client rad2 server-key xxx&lt;BR /&gt;client rad3 server-key xxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius server loc1&lt;BR /&gt;address ipv4 rad1 auth-port 1812 acct-port 1813&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;radius server loc2&lt;BR /&gt;address ipv4 rad2 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;radius server loc1DR&lt;BR /&gt;address ipv4 rad3 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;radius-server dead-criteria time 30 tries 3&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;aaa group server radius loc1FO&lt;BR /&gt;server name loc1&lt;BR /&gt;server name loc2&lt;BR /&gt;server name loc1DR&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;description ### Data &amp;amp; Voice ###&lt;BR /&gt;switchport access vlan 403&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 455&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;dot1x max-req 3&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;spanning-tree portfast&lt;/P&gt;</description>
      <pubDate>Sun, 17 Nov 2024 11:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-aaa-config-for-forescout/m-p/5225520#M593230</guid>
      <dc:creator>Danfurqan</dc:creator>
      <dc:date>2024-11-17T11:57:29Z</dc:date>
    </item>
  </channel>
</rss>

