<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MFA for network devices; currently authenticating through Cisco IS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mfa-for-network-devices-currently-authenticating-through-cisco/m-p/5338263#M598523</link>
    <description>&lt;P&gt;This required planning for the deployment—make sure ISE is highly available and that devices have an alternative path to reach it.&lt;/P&gt;
&lt;P&gt;If the ISE network is completely down, you may need to use a Local account with no MFA as the best option, or try the API (if available).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Oct 2025 06:26:08 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2025-10-14T06:26:08Z</dc:date>
    <item>
      <title>MFA for network devices; currently authenticating through Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-network-devices-currently-authenticating-through-cisco/m-p/5338004#M598511</link>
      <description>&lt;P&gt;Hello All&lt;/P&gt;&lt;P&gt;Currently, our admins login into network devices through their TACACS IDs local to Cisco ISE.&lt;/P&gt;&lt;P&gt;Admins managing Cisco ISE (WebGUI) have MFA configured. But now there is a requirement to have 2FA for network device login using TACACS.&lt;/P&gt;&lt;P&gt;Challenges:&lt;/P&gt;&lt;P&gt;1. Implementing 2FA for logging on n/w devices will have impact on resolution duration since after device timeout, admin have do perform 2FA for every device it logins&lt;/P&gt;&lt;P&gt;2. Under a circumstance if Cisco ISE is not able to reach 2FA server, admin will get prompt for authentication but never get push notification/ code to approve the login attempt.&lt;/P&gt;&lt;P&gt;Can someone please share insight onto this.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2025 12:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-network-devices-currently-authenticating-through-cisco/m-p/5338004#M598511</guid>
      <dc:creator>snbw16</dc:creator>
      <dc:date>2025-10-13T12:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: MFA for network devices; currently authenticating through Cisco IS</title>
      <link>https://community.cisco.com/t5/network-access-control/mfa-for-network-devices-currently-authenticating-through-cisco/m-p/5338263#M598523</link>
      <description>&lt;P&gt;This required planning for the deployment—make sure ISE is highly available and that devices have an alternative path to reach it.&lt;/P&gt;
&lt;P&gt;If the ISE network is completely down, you may need to use a Local account with no MFA as the best option, or try the API (if available).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2025 06:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mfa-for-network-devices-currently-authenticating-through-cisco/m-p/5338263#M598523</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-10-14T06:26:08Z</dc:date>
    </item>
  </channel>
</rss>

