<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Role based VLAN assignment needs to add a Domain check in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5231592#M593520</link>
    <description>&lt;P&gt;Agreed. Imagine the shock I felt when I saw that these &lt;SPAN&gt;unknown/untrusted devices&amp;nbsp;&lt;/SPAN&gt;devices were in the "protected" VLAN. I will research on certificate enablement.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Dec 2024 19:14:10 GMT</pubDate>
    <dc:creator>CoryMDubya601</dc:creator>
    <dc:date>2024-12-02T19:14:10Z</dc:date>
    <item>
      <title>Role based VLAN assignment needs to add a Domain check</title>
      <link>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5227338#M593301</link>
      <description>&lt;P&gt;We have role based VLAN assignment at my company. The issue is that in the current config the users can bring in their own devices, authenticate with their work credentials and then get access to internal resources. My solution is to add a domain check into the authentication policy to verify that the device is joined to the domain. Right now it is just for the Wireless devices. we would like to sent the BOYD non-company owned devices to a specific VLAN. we would like to put the company owned devices on the internal VLAN. I would like help in picking the correct CONDITION to check the domain. The role based policy check works well. I cannot get the domain check to work correctly&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 16:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5227338#M593301</guid>
      <dc:creator>CoryMDubya601</dc:creator>
      <dc:date>2024-11-21T16:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Role based VLAN assignment needs to add a Domain check</title>
      <link>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5227342#M593302</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1815364"&gt;@CoryMDubya601&lt;/a&gt; you can perform a domain check using ISE Posture and can check the registry. Registry: - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Domain Value=&amp;lt;DOMAIN&amp;gt;&lt;/P&gt;
&lt;P&gt;You might be better off using EAP Chaining (TEAP or EAP-FAST) on your domain joined computers, which can combine machine authentication and user authentication. Only your domain joined devices would be able to pass machine authentication, so therefore you can assign the appropriate VLAN. If EAP Chaining is not used, i.e., the BYOD devices you'd have a different authorisation rule and assign a different VLAN.&lt;/P&gt;
&lt;P&gt;Else use ISE BYOD certificate for the non-company owned assets, therefore you can distinguish between the different connections and apply different VLANS accordingly.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 17:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5227342#M593302</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-11-21T17:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Role based VLAN assignment needs to add a Domain check</title>
      <link>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5227513#M593308</link>
      <description>&lt;P&gt;Use certificates instead.&amp;nbsp; You should not be allowing unknown/untrusted devices onto the corporate network.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 00:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5227513#M593308</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-11-22T00:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: Role based VLAN assignment needs to add a Domain check</title>
      <link>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5231592#M593520</link>
      <description>&lt;P&gt;Agreed. Imagine the shock I felt when I saw that these &lt;SPAN&gt;unknown/untrusted devices&amp;nbsp;&lt;/SPAN&gt;devices were in the "protected" VLAN. I will research on certificate enablement.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 19:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5231592#M593520</guid>
      <dc:creator>CoryMDubya601</dc:creator>
      <dc:date>2024-12-02T19:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Role based VLAN assignment needs to add a Domain check</title>
      <link>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5231613#M593521</link>
      <description>&lt;P&gt;Another option is the MAR database. ISE can remember domain computers logged in before the use comes. EAP Chaining is better if your devices support it, but we use the MAR database to verify domain membership.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 20:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5231613#M593521</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2024-12-02T20:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Role based VLAN assignment needs to add a Domain check</title>
      <link>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5231620#M593522</link>
      <description>Friends don’t let friends use MAR&lt;BR /&gt;</description>
      <pubDate>Mon, 02 Dec 2024 21:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/role-based-vlan-assignment-needs-to-add-a-domain-check/m-p/5231620#M593522</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-12-02T21:11:39Z</dc:date>
    </item>
  </channel>
</rss>

