<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,I didn't configure ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500490#M73261</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I didn't configure ISE like this way i guess it will work&lt;/P&gt;&lt;P&gt;please check the below link&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_ins.html&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2014 16:59:59 GMT</pubDate>
    <dc:creator>abwahid</dc:creator>
    <dc:date>2014-10-02T16:59:59Z</dc:date>
    <item>
      <title>ISE Interfaces</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500485#M73246</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Has anyone used the separate physical interfaces on the ISE to separate the wireless client traffic to the ISE?&lt;/P&gt;&lt;P&gt;I haven't had the opportunity to test this.&lt;/P&gt;&lt;P&gt;I'm thinking of having all the authentication traffic hitting one interface with client traffic re-directs to the guest portal page hitting a separate interface that can be placed in a totally separate VLAN and secured with an ACL.&lt;/P&gt;&lt;P&gt;Any comments welcome.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:59:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500485#M73246</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2019-03-11T04:59:41Z</dc:date>
    </item>
    <item>
      <title>Hi Roger,Typically ISE is</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500486#M73250</link>
      <description>&lt;P&gt;Hi Roger,&lt;/P&gt;&lt;P&gt;Typically ISE is designed as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;All the ISE internal Management traffic is hardcoded to eth0 interface.This cannot be modified&lt;/LI&gt;&lt;LI&gt;RADIUS can listen on any NIC&lt;/LI&gt;&lt;LI&gt;All the available NICs can be IP&amp;nbsp;addressed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 10:27:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500486#M73250</guid>
      <dc:creator>Naresh Ginjupalli</dc:creator>
      <dc:date>2014-09-11T10:27:13Z</dc:date>
    </item>
    <item>
      <title>I have used it to separate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500487#M73254</link>
      <description>&lt;P&gt;I have used it to separate mgmt traffic from guest traffic and it works fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 22:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500487#M73254</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-11T22:35:05Z</dc:date>
    </item>
    <item>
      <title>You can use separate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500488#M73256</link>
      <description>&lt;P&gt;You can use separate interface for guest and Managment traffic&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_app_c-ports.html&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2014 14:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500488#M73256</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2014-09-16T14:19:57Z</dc:date>
    </item>
    <item>
      <title>Hi,I have a similar issue.In</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500489#M73260</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a similar issue.&lt;/P&gt;&lt;P&gt;In my network, I have 2 subnets, network A is used for external purpose and network B is used for internal purpose where the clients connected to my network via VPN use the internal network ip address to access the network resources like CPI, CPN etc.&lt;/P&gt;&lt;P&gt;On ISE 1.2, I am able to access it using the external ip ( Gig 0) but I am trying to access ISE from the other network IP which is on Gig 1 - network B, then I am unable to access it via both GUI and CLI. Although, I am able to ping the internal IP from other side of the VPN tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help on this would be really appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2014 04:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500489#M73260</guid>
      <dc:creator>Harish Chopra</dc:creator>
      <dc:date>2014-09-18T04:51:04Z</dc:date>
    </item>
    <item>
      <title>Hi,I didn't configure ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500490#M73261</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I didn't configure ISE like this way i guess it will work&lt;/P&gt;&lt;P&gt;please check the below link&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_ins.html&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 16:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interfaces/m-p/2500490#M73261</guid>
      <dc:creator>abwahid</dc:creator>
      <dc:date>2014-10-02T16:59:59Z</dc:date>
    </item>
  </channel>
</rss>

