<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mist AP and Cisco ISE Guest Portal in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mist-ap-and-cisco-ise-guest-portal/m-p/5259360#M594911</link>
    <description>&lt;P&gt;If you use the default Cisco NAD profile, then you will get all the IETF RADIUS behaviour, as well as the CoA support that Cisco devices understand (as well as the Cisco icon etc.).&amp;nbsp; Unless you know exactly how the Juniper/Mist NAD device behaves with regards to RADIUS, I would not make a custom one. if their guide uses the example given, then follow their advice.&amp;nbsp; The only thing I don't like from their example is that they use an IP address instead of an FQDN - it's not clever to use an IP address, because that will 100% lead to certificate warnings. Use a DNS resolvable FQDN. The guest endpoint will get an IP via DHCP, and in the DHCP offer will be a DNS server. That DNS server must resolve the ISE Portal FQDN, and all other domains (internet).&lt;/P&gt;
&lt;P&gt;In general, if you make a custom NAD profile and assign it to your NAD device, then you MUST tag your Authorization Profiles with that same NAD Profile, else ISE won't return any attributes for that Access-Accept. There is one exception - some Authorization Profiles have a NULL profile (blank) - that one can be used for all NAD profiles.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Feb 2025 20:13:39 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2025-02-11T20:13:39Z</dc:date>
    <item>
      <title>Mist AP and Cisco ISE Guest Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/mist-ap-and-cisco-ise-guest-portal/m-p/5258989#M594882</link>
      <description>&lt;P&gt;Hi colleagues,&lt;/P&gt;
&lt;P&gt;I need some help from somebody who setup Cisco ISE Captive Portal for Juniper Mist (or any other cloud vendor as this maybe similar).&lt;/P&gt;
&lt;P&gt;I'm following this Mist guide about how to configure the Cisco ISE policies and profiles for the Captive Portal to be served to the Mist APs (&lt;A href="https://www.mist.com/wp-content/uploads/Mist-Integration-with-ISE-for-Guest-Access.pdf" target="_blank" rel="noopener"&gt;https://www.mist.com/wp-content/uploads/Mist-Integration-with-ISE-for-Guest-Access.pdf&lt;/A&gt;) using CoA (&lt;A href="https://www.mist.com/wp-content/uploads/COA-Change-of-Authorization.pdf" target="_blank" rel="noopener"&gt;https://www.mist.com/wp-content/uploads/COA-Change-of-Authorization.pdf&lt;/A&gt;), but there are few missing pieces in the process to create the "Guest_Access" authorization profile (under step C in page 5 of the Guest document).&lt;/P&gt;
&lt;P&gt;From Mist documentation above, this is the configuration for the CWA authorization profile:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JPavonM_0-1739256497301.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/239644iEF933D424D55FD57/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JPavonM_0-1739256497301.png" alt="JPavonM_0-1739256497301.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;As the Authorization profile for CWA in ISE must be attached to a "Network Device Profile", I don't know if we need to use Cisco or a custom one for Mist, like this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JPavonM_1-1739256653605.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/239645i3A1F0F781273B537/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JPavonM_1-1739256653605.png" alt="JPavonM_1-1739256653605.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If it would be like this, we need to create a custom NAD profile with all RADIUS attributes that are needed, and that's the point, as I cannot find any repository here (looking for tag "ise-nad-profile"), or the Internet. HEre all Msit information about supported RADIUS attributes (&lt;A href="https://www.mist.com/documentation/mist-radius-attributes/" target="_blank" rel="noopener"&gt;https://www.mist.com/documentation/mist-radius-attributes/&lt;/A&gt;) but this is a huge work to be done, unless I'm missing something here.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 07:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mist-ap-and-cisco-ise-guest-portal/m-p/5258989#M594882</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2025-02-11T07:12:46Z</dc:date>
    </item>
    <item>
      <title>Re: Mist AP and Cisco ISE Guest Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/mist-ap-and-cisco-ise-guest-portal/m-p/5259360#M594911</link>
      <description>&lt;P&gt;If you use the default Cisco NAD profile, then you will get all the IETF RADIUS behaviour, as well as the CoA support that Cisco devices understand (as well as the Cisco icon etc.).&amp;nbsp; Unless you know exactly how the Juniper/Mist NAD device behaves with regards to RADIUS, I would not make a custom one. if their guide uses the example given, then follow their advice.&amp;nbsp; The only thing I don't like from their example is that they use an IP address instead of an FQDN - it's not clever to use an IP address, because that will 100% lead to certificate warnings. Use a DNS resolvable FQDN. The guest endpoint will get an IP via DHCP, and in the DHCP offer will be a DNS server. That DNS server must resolve the ISE Portal FQDN, and all other domains (internet).&lt;/P&gt;
&lt;P&gt;In general, if you make a custom NAD profile and assign it to your NAD device, then you MUST tag your Authorization Profiles with that same NAD Profile, else ISE won't return any attributes for that Access-Accept. There is one exception - some Authorization Profiles have a NULL profile (blank) - that one can be used for all NAD profiles.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 20:13:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mist-ap-and-cisco-ise-guest-portal/m-p/5259360#M594911</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-02-11T20:13:39Z</dc:date>
    </item>
  </channel>
</rss>

