<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE - Deploy Internet Access Wired GUEST in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168190#M1074878</link>
    <description>&lt;P&gt;Of course this is possible and it is also a good practice.&amp;nbsp; How are you currently classifying your company devices using dot1x and or MAB?&lt;/P&gt;
&lt;P&gt;If you have dot1x and MAB setup correctly, you only need to configure a catch all rule that sends a dACL that only allows internet access to the switch port&lt;/P&gt;</description>
    <pubDate>Fri, 16 Oct 2020 11:33:35 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2020-10-16T11:33:35Z</dc:date>
    <item>
      <title>ISE - Deploy Internet Access Wired GUEST</title>
      <link>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168189#M1074877</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Im having a huge struggle to deploy the cenario i want in ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i have dot1x and MAB working fine, the problem is when i want someone from outside the company plugs the cable (even if they don't belong to AD and not having the MAC associated with ISE) have access only to internet.&lt;/P&gt;&lt;P&gt;I'm not able to do this in ISE. Is it possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PC(outside company) -----&amp;gt; PLUGS CABLE -------&amp;gt; ISE ------&amp;gt; Give him VLAN (example 20) only internet access -----&amp;gt; Happy PC&lt;/P&gt;&lt;P&gt;Is it possible?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 11:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168189#M1074877</guid>
      <dc:creator>Kalimoz</dc:creator>
      <dc:date>2020-10-16T11:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Deploy Internet Access Wired GUEST</title>
      <link>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168190#M1074878</link>
      <description>&lt;P&gt;Of course this is possible and it is also a good practice.&amp;nbsp; How are you currently classifying your company devices using dot1x and or MAB?&lt;/P&gt;
&lt;P&gt;If you have dot1x and MAB setup correctly, you only need to configure a catch all rule that sends a dACL that only allows internet access to the switch port&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 11:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168190#M1074878</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-16T11:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Deploy Internet Access Wired GUEST</title>
      <link>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168210#M1074883</link>
      <description>&lt;P&gt;Hello Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply.&lt;/P&gt;&lt;P&gt;The condition i have for the dot1x is based on Location and Equipment, this is the same for MAB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For dot1x Pcs company need to validate de certificafe and user based on AD&lt;/P&gt;&lt;P&gt;For MAB is only based on MAC imported to the list (Like Printers / Cameras etc) each one with their respective profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what i can interper in what you say is like create an Authorization policy based on Location or Devices and use like VLAN 20 and dACL on it?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 12:06:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168210#M1074883</guid>
      <dc:creator>Kalimoz</dc:creator>
      <dc:date>2020-10-16T12:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Deploy Internet Access Wired GUEST</title>
      <link>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168211#M1074884</link>
      <description>&lt;P&gt;Yes, or if you have an unused VLAN, remediation VLAN for example that only has access to internet, you could push the devices into that VLAN.&amp;nbsp; If you do not have a remediation VLAN then a dACL will do the trick.&amp;nbsp; I find that many do not have a VLAN for unauthorized devices already configured which is why I recommended the dACL approach.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 12:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168211#M1074884</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-16T12:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Deploy Internet Access Wired GUEST</title>
      <link>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168233#M1074888</link>
      <description>&lt;P&gt;Thank you Marius,&lt;/P&gt;&lt;P&gt;Will try that approach &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 12:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-deploy-internet-access-wired-guest/m-p/4168233#M1074888</guid>
      <dc:creator>Kalimoz</dc:creator>
      <dc:date>2020-10-16T12:34:00Z</dc:date>
    </item>
  </channel>
</rss>

