<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have attached screenshots in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591116#M72142</link>
    <description>&lt;P&gt;I have attached screenshots of authentication and authorization policy's for dual ssid&amp;nbsp; on boarding&lt;/P&gt;</description>
    <pubDate>Mon, 17 Nov 2014 08:45:00 GMT</pubDate>
    <dc:creator>Venkatesh Attuluri</dc:creator>
    <dc:date>2014-11-17T08:45:00Z</dc:date>
    <item>
      <title>ISE 1.2 With WLC and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591111#M72137</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Hi everyone,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;What is the steps and Procedure implement Wired and wireless authentication with ISE, WLC and AD for a LAB environment. currently the following are done.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;The wireless network is configured with 2 SSID (Staff and Guest)&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Active Directory, DNS, DHCP, and &amp;nbsp;NTP configured &amp;amp; synced.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;ISE and AD running on C220 VMs, and WLC is 5760 Appliance.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Please provide your thoughts and assistance.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Regards&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591111#M72137</guid>
      <dc:creator>ddindevanis</dc:creator>
      <dc:date>2019-03-13T00:44:51Z</dc:date>
    </item>
    <item>
      <title>Hello,I supposed you have</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591112#M72138</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I supposed you have done communication between your NAD devices and ISE (Wired Switch and WLC).&amp;nbsp;&lt;/P&gt;&lt;P&gt;If done, that means for classification you have created two groups (wired and wireless)&amp;nbsp;&lt;/P&gt;&lt;P&gt;administration --&amp;gt;network resources--&amp;gt;network devices group--&amp;gt;group--&amp;gt;all devices Types.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now go to the policy --&amp;gt;authentications and if you want modify the defaults.&amp;nbsp;&lt;/P&gt;&lt;P&gt;wireless MAB, Wired MAB, ect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You &amp;nbsp;can check the default authentication protocols (Default Network Access) and customize or modify it to use EAP-FAST, EAP-MD5, LEAP and so on.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After authentication, you can then define authorization.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 11:06:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591112#M72138</guid>
      <dc:creator>fogemarttt</dc:creator>
      <dc:date>2014-11-12T11:06:19Z</dc:date>
    </item>
    <item>
      <title>I have made the reachability</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591113#M72139</link>
      <description>&lt;P&gt;I have made the reachability AD, WLC,ISE and 3850 SW, Appreciate if you can brief/send me the full steps to implement this solution.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 11:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591113#M72139</guid>
      <dc:creator>ddindevanis</dc:creator>
      <dc:date>2014-11-12T11:15:51Z</dc:date>
    </item>
    <item>
      <title>You have to implement dot1x</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591114#M72140</link>
      <description>&lt;P&gt;You have to implement dot1x and radius between your NAD and ISE device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using the switch 3850, that are the steps:&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;username RADIUS-HEALTH password radiusKey1 privilege 15&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa authorization auth-proxy default group radius&lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;aaa accounting auth-proxy default start-stop group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!this password will be used to communicate with ISE and to verify reachability&lt;BR /&gt;!between ISE and Switch&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;&amp;nbsp;client 172.16.1.18 server-key 7 radiuskey&lt;BR /&gt;&amp;nbsp;client 172.16.1.20 server-key 7 radiuskey&lt;BR /&gt;!&lt;BR /&gt;ip domain-name lab.local&lt;BR /&gt;ip name-server 172.16.1.1&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 50&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;ip access-group ACL-ALLOW in&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication event server dead action authorize voice&lt;BR /&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-auth&lt;BR /&gt;&amp;nbsp;authentication open&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication periodic&lt;BR /&gt;&amp;nbsp;authentication timer reauthenticate server&lt;BR /&gt;&amp;nbsp;authentication violation restrict&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 10&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-ALLOW&lt;BR /&gt;&amp;nbsp;permit ip any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!the comm between radius and ise will occur on these Port&lt;BR /&gt;ip radius source-interface Vlan100&lt;BR /&gt;logging origin-id ip&lt;BR /&gt;logging source-interface Vlan100&lt;BR /&gt;logging host 172.16.1.20 transport udp port 20514&lt;BR /&gt;logging host 172.16.1.18 transport udp port 20514&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface Vlan100&lt;BR /&gt;logging origin-id ip&lt;BR /&gt;logging source-interface Vlan100&lt;BR /&gt;logging host 172.16.1.20 transport udp port 20514&lt;BR /&gt;logging host 172.16.1.18 transport udp port 20514&lt;BR /&gt;!&lt;BR /&gt;snmp-server community ciscoro RO&lt;BR /&gt;snmp-server community public RO&lt;BR /&gt;snmp-server trap-source Vlan100&lt;BR /&gt;snmp-server source-interface informs Vlan100&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;BR /&gt;!&lt;BR /&gt;!defining ISE servers&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-RADIUS-1&lt;BR /&gt;&amp;nbsp;address ipv4 172.16.1.20 auth-port 1812 acct-port 1813&lt;BR /&gt;&amp;nbsp;automate-tester username RADIUS-HEALTH idle-time 15&lt;BR /&gt;&amp;nbsp;key radiusKey&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Please be sure that NTP servers and time are synchronized.&amp;nbsp;&lt;/P&gt;&lt;P&gt;enable dot1X on windows machine, or using cisco NAM.&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can enable debugging on aaa authentication to see the events.&amp;nbsp;&lt;/P&gt;&lt;P&gt;you have to create this user on ISE (RADIUS-HEALTH).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3850#test aaa group radius username password new-code&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and observe the result. You are supposed to have user authenticated successfully.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You Must also have define these device in ISE on the radius interface.&lt;/P&gt;&lt;P&gt;ip radius source-interface ..... use this interface ip address to define Ip address of the NAD device in ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;administration--&amp;gt;network resources --&amp;gt;Network Devices--&amp;gt;Add&lt;/P&gt;&lt;P&gt;input the name&lt;/P&gt;&lt;P&gt;input the Ip address for radius communication&lt;/P&gt;&lt;P&gt;select the authentication settings and field the corresponding shared secret radius key&lt;/P&gt;&lt;P&gt;select snmp settings and select version 2c.&amp;nbsp;&lt;/P&gt;&lt;P&gt;snmp community : ciscoro&lt;/P&gt;&lt;P&gt;you can customize the polling interval if you want and that all.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you are supposed to received message communication between your NAD and ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After you can do the procedure for WLC device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will fill it after you have passed the first steps (3850 authentication).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 12:11:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591114#M72140</guid>
      <dc:creator>fogemarttt</dc:creator>
      <dc:date>2014-11-12T12:11:55Z</dc:date>
    </item>
    <item>
      <title>Thank you fogemarttt , I will</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591115#M72141</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;SPAN class="fullname" style="color: rgb(153, 153, 153);"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A about="/users/fogemarttt" class="username" datatype="" href="https://supportforums.cisco.com/users/fogemarttt" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;fogemarttt&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(153, 153, 153);"&gt;&amp;nbsp;&lt;/SPAN&gt;, I will follow the same and update you soon.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 05:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591115#M72141</guid>
      <dc:creator>ddindevanis</dc:creator>
      <dc:date>2014-11-13T05:19:00Z</dc:date>
    </item>
    <item>
      <title>I have attached screenshots</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591116#M72142</link>
      <description>&lt;P&gt;I have attached screenshots of authentication and authorization policy's for dual ssid&amp;nbsp; on boarding&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 08:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-2-with-wlc-and-ad/m-p/2591116#M72142</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2014-11-17T08:45:00Z</dc:date>
    </item>
  </channel>
</rss>

