<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Let me ask you a quick in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521301#M73203</link>
    <description>&lt;P&gt;Let me ask you a quick question: Are all domain machines Windows and joined to AD?&lt;/P&gt;</description>
    <pubDate>Thu, 11 Sep 2014 22:41:32 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2014-09-11T22:41:32Z</dc:date>
    <item>
      <title>ISE MAB to external Radius then MAB internal for Guest User auth</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521299#M73199</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have the following requirements for our ISE Guest Access Deployment:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to provide guest access but only to non Company Laptops. To check if the Laptop is company or a non company Laptop we have have all MAC Addresses in our ACS server. So in my understanding we have to to the following.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check the MAC Address against the External Radius Server (ACS)&lt;/P&gt;&lt;P&gt;If Access-Accept returns -&amp;gt; Deny Access&lt;/P&gt;&lt;P&gt;If Access-Deny returns -&amp;gt; Check MAC Address against Internal Endpoint Store&lt;/P&gt;&lt;P&gt;If User not found -&amp;gt; Guestflow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right now i don´t no how i can sould design it but i need two Authentication Policys first for the redirect to the External Radius and then another one for check against internal Identity Endpoint Store. Am i right ? I don´t know if that is possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Really thanks for your help!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Greetings&lt;/P&gt;&lt;P&gt;Philip&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:00:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521299#M73199</guid>
      <dc:creator>Philip91</dc:creator>
      <dc:date>2019-03-11T05:00:19Z</dc:date>
    </item>
    <item>
      <title>You can create Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521300#M73201</link>
      <description>&lt;P&gt;You can create Identity source sequence&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 23:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521300#M73201</guid>
      <dc:creator>Saurav Lodh</dc:creator>
      <dc:date>2014-09-10T23:54:59Z</dc:date>
    </item>
    <item>
      <title>Let me ask you a quick</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521301#M73203</link>
      <description>&lt;P&gt;Let me ask you a quick question: Are all domain machines Windows and joined to AD?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 22:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521301#M73203</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-11T22:41:32Z</dc:date>
    </item>
    <item>
      <title>You can't configure External</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521302#M73206</link>
      <description>&lt;P&gt;You can't configure External Radius in an Identity Source sequence, you use it in a authentication policy which doesn't seem to have the option of fail-continue for External Radius.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did anybody find a way to do this?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2017 02:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521302#M73206</guid>
      <dc:creator>riwakefi</dc:creator>
      <dc:date>2017-07-21T02:09:15Z</dc:date>
    </item>
    <item>
      <title>Yes i did.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521303#M73208</link>
      <description>&lt;P&gt;Yes i did.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You build two authentication rules with different conditions. May the screens will help you:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2017 10:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521303#M73208</guid>
      <dc:creator>Philip91</dc:creator>
      <dc:date>2017-07-24T10:32:50Z</dc:date>
    </item>
    <item>
      <title>Thanks, this is helpful to</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521304#M73211</link>
      <description>&lt;P&gt;Thanks, this is helpful to see how you got this working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately, it doesn't help with my scenario. I have a customer who wants to check ISE for the MAC, if it's not registered, check a 2nd external Radius for the MAC, if it's not registered, onboard them on ISE.&lt;/P&gt;
&lt;P&gt;What I'm finding is that 'Radius Proxy' authentication rule doesn't have the option to 'continue if user is&amp;nbsp;rejected'. It seems like the 2nd external Radius becomes the 'last word' in the authentication, and if it sends back a deny that's the end of ISE's search. If it were to send a permit (to get it to drop to authorization stage), I wouldn't know if it was a Permit due to the MAC being there, or a Permit for the MAC not being there.&lt;/P&gt;
&lt;P&gt;What I was thinking was maybe have the 2nd Radius server send back a permit either way, but include some kind of AVP if&amp;nbsp;the user is there that I could match on with ISE, or no AVP if the user is not there. The I could write two rules, one to permit if-AVP, another to deny if no-AVP.... But this is getting very convoluted to make it work and another solution may be in order.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2017 13:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521304#M73211</guid>
      <dc:creator>Richard Wakefield</dc:creator>
      <dc:date>2017-07-24T13:50:37Z</dc:date>
    </item>
    <item>
      <title>Hello Richard,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521305#M73212</link>
      <description>&lt;P&gt;Hello Richard,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i´m not understanding your problem at all. Please describe what you wanna do in deep. What i have shown you is definitely a way to deny "known" Mac addresses from accessing anything with MAB (guest or byod) and still trigger authorization policies. If you wanna use my config but with byod instead of just guest access i don´t see a point why it shouldn´t work because it will use the guest portal as well &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Greetings&lt;/P&gt;
&lt;P&gt;Philip&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2017 14:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521305#M73212</guid>
      <dc:creator>Philip91</dc:creator>
      <dc:date>2017-07-24T14:41:11Z</dc:date>
    </item>
    <item>
      <title>For Guest.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521306#M73216</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For Guest.&lt;/P&gt;
&lt;P&gt;2 Radius Servers, 1 ISE, 1 3rd party.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This customer is migrating from a 3rd party Radius solution to ISE. They want ISE to look locally first for GuestEndpoints, then to a 3rd party Radius for endpoints, and if the user isn't found in either, the user is directed to the Self Registration Guest portal to sign up.&lt;/P&gt;
&lt;P&gt; &lt;BR /&gt;In this case, the 3rd party Radius can't send a 'deny' to ISE or ISE will not pass them to the authorization policy to push them to the Guest portal. You can't configure it to 'continue' if Radius Proxy sends back a deny.&amp;nbsp;&lt;BR /&gt; &lt;BR /&gt;What I'm going to attempt is:&lt;BR /&gt;1) Rather than sending just a Permit or&amp;nbsp;Deny back to ISE from&amp;nbsp;the 3rd party Radius&amp;nbsp;based on Device/MAC registration, configure&amp;nbsp;3rd party Radius&amp;nbsp;to send:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;A) If device is not found, send a&amp;nbsp;Permit&amp;nbsp;with a Radius Attribute (example: something=unknown)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;B) If device is found, send a&amp;nbsp;Permit&amp;nbsp;with a Radius Attribute (example: something=pass)&lt;/P&gt;
&lt;P&gt;2) In ISE, write two authorization rules.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;A) If Permit and Radius Attribute=something=unknown,&amp;nbsp;Guest&amp;nbsp;Portal.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;B) If Permit and Radius Attribute=something=pass, Permit access.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The point is simply:&lt;BR /&gt;1) You can't use Radius Proxy in a Identity Source Sequence.&lt;BR /&gt;2) You can't 'Continue' if Radius Proxy sends back a Deny.&lt;BR /&gt;But if Radius Proxy sends back a permit with an AVP if the device was found or not, I can continue to the authorization&amp;nbsp;policy and write rules based upon that AVP.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2017 20:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521306#M73216</guid>
      <dc:creator>Richard Wakefield</dc:creator>
      <dc:date>2017-07-24T20:43:35Z</dc:date>
    </item>
    <item>
      <title>Hello Richard,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521307#M73218</link>
      <description>&lt;P&gt;Hello Richard,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;got your point. Did you already test it?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Greetings&lt;/P&gt;
&lt;P&gt;Philip&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 07:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521307#M73218</guid>
      <dc:creator>Philip91</dc:creator>
      <dc:date>2017-07-27T07:52:27Z</dc:date>
    </item>
    <item>
      <title>No, not yet.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521308#M73220</link>
      <description>&lt;P&gt;No, not yet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The customer is also looking to see if the "Radius Token" could be manipulated to work, so we could make it a Identity Source Sequence rather than having to play games with the AVPs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2017 18:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-to-external-radius-then-mab-internal-for-guest-user-auth/m-p/2521308#M73220</guid>
      <dc:creator>Richard Wakefield</dc:creator>
      <dc:date>2017-07-31T18:35:11Z</dc:date>
    </item>
  </channel>
</rss>

