<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Integration queries with Catalyst Switch in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333379#M598317</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've below queries regarding ISE integration with Catalyst Switch (9300 etc.) for AAA and 802.1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1- is it true that we can use Catalyst dedicated OOB management port for AAA/TACACS only&lt;/P&gt;&lt;P&gt;2- but we cannot use catalyst dedicated OOB Management interface for 802.1x as its required in-band SVI to communicate with ISE due to port authentication required to check default VRF. (Please correct me)&lt;/P&gt;</description>
    <pubDate>Thu, 25 Sep 2025 07:35:33 GMT</pubDate>
    <dc:creator>hashimwajid1</dc:creator>
    <dc:date>2025-09-25T07:35:33Z</dc:date>
    <item>
      <title>ISE Integration queries with Catalyst Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333379#M598317</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've below queries regarding ISE integration with Catalyst Switch (9300 etc.) for AAA and 802.1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1- is it true that we can use Catalyst dedicated OOB management port for AAA/TACACS only&lt;/P&gt;&lt;P&gt;2- but we cannot use catalyst dedicated OOB Management interface for 802.1x as its required in-band SVI to communicate with ISE due to port authentication required to check default VRF. (Please correct me)&lt;/P&gt;</description>
      <pubDate>Thu, 25 Sep 2025 07:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333379#M598317</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2025-09-25T07:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration queries with Catalyst Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333380#M598318</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/263732"&gt;@hashimwajid1&lt;/a&gt;&amp;nbsp; you can use the mgmt port for AAA communication (RADIUS and TACACS), as long as routing is setup to allow the communication. The user ports configured with 802.1X don't need to be in the same VRF as the RADIUS source interface, as it's the switches source interface that communicates with RADIUS for authentication.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/radius-over-vrf/td-p/4106242" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/radius-over-vrf/td-p/4106242&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Sep 2025 07:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333380#M598318</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-09-25T07:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration queries with Catalyst Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333386#M598319</link>
      <description>&lt;P&gt;Thanks for Answer,&lt;/P&gt;&lt;P&gt;its mean even if I just assign IP to OOB Mgmt. Interface, that will be more then enough to handle 802.1x/MAB and Device admin traffic? no in-band SVI&lt;/P&gt;</description>
      <pubDate>Thu, 25 Sep 2025 08:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333386#M598319</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2025-09-25T08:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration queries with Catalyst Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333390#M598321</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/263732"&gt;@hashimwajid1&lt;/a&gt;&amp;nbsp;Yes, the mgmt interface is enough to do the RADIUS/TACACS authentications. You do need to do more than just assign IP address to the mgmt interface though, you need the routing and connectivity in place etc.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Sep 2025 08:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333390#M598321</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-09-25T08:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration queries with Catalyst Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333668#M598333</link>
      <description>&lt;P&gt;Apart from all the usual routing stuff you need, when involving a VRF in management processes such as RADIUS, TACACS, NTP, DNS, etc. requires careful configuration to always quote the VRF in all of these cases. One case that always catches me out is the RADIUS CoA on Catalysts - e.g.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa server radius dynamic-author
 client 172.16.0.100 vrf Mgmt-vrf server-key .....
&lt;/LI-CODE&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa group server radius dnac-client-radius-group
 server name dnac-radius_172.16.0.100
 ip radius source-interface Vlan6
 ip vrf forwarding Mgmt-vrf
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Sep 2025 06:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-queries-with-catalyst-switch/m-p/5333668#M598333</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-09-26T06:13:36Z</dc:date>
    </item>
  </channel>
</rss>

