<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Roman, in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876897#M22260</link>
    <description>&lt;P&gt;Hi Roman,&lt;/P&gt;
&lt;P&gt;The first part of the advice works well, and allows me to manually duplicate netusers on each WLC and thereby synchronise them. However, I must have missed the point with regards using the Ambassador account. The manual says:&lt;/P&gt;
&lt;P class="pSF_StepFirst"&gt;&lt;B&gt;Step 1&lt;/B&gt;&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" width="5" height="2" border="0" /&gt; Log in to Prime Infrastructure as a lobby ambassador.&lt;/P&gt;
&lt;P class="pSN_StepNext"&gt;&lt;A name="pgfId-1157653"&gt;&lt;/A&gt;&lt;B&gt;Step 2&lt;/B&gt;&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" width="5" height="2" border="0" /&gt; Choose &lt;B class="cBold"&gt;Select a command &amp;gt; A&lt;/B&gt; dd User Group&lt;B class="cBold"&gt; &amp;gt; Go&lt;/B&gt;.&lt;/P&gt;
&lt;P class="pSN_StepNext"&gt;which makes perfect sense, but when I try to select the "Add User Group", its not there: see attached screenshot&lt;/P&gt;
&lt;P class="pSN_StepNext"&gt;Am I doing something wrong, or is the manual at fault?&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jun 2016 14:20:25 GMT</pubDate>
    <dc:creator>jblake00111</dc:creator>
    <dc:date>2016-06-30T14:20:25Z</dc:date>
    <item>
      <title>Ask the Expert: Wireless LAN Security</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876849#M22212</link>
      <description>&lt;P&gt;&lt;IMG align="right" src="https://community.cisco.com/legacyfs/online/styles/80x110/public/photo/expert/ate-logo_80x110-for-upload_v2_5.jpg" style="padding-left: 10px;" /&gt;&lt;/P&gt;
&lt;P&gt;Welcome to this Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and any ask questions about how to secure&amp;nbsp;a wireless network&amp;nbsp;with Cisco expert&amp;nbsp;Roman Manchur&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Wireless networks have became pervasive in today's world. Cisco offers very strong wireless porfolio that helps business to connect to the Internet anywhere anytime. &lt;SPAN&gt;Network managers need reassurance that solutions are available to protect their WLANs from these vulnerabilities and that WLANs can provide the&amp;nbsp;same level of security, manageability, and scalability offered by wired LANs.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;This session will focus on answering question regarding&amp;nbsp;how to deploy, configure and troubleshot security in &amp;nbsp;a wireless network and also the common pitfalls and issues that might happen in an installed secured wireless network.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;To participate in this event, please use the&lt;/STRONG&gt; &lt;A href="https://supportforums.cisco.com/discussion/13025746/ask-expert-ios-xr-architecture-and-troubleshooting" target="_blank" title="Ask the Expert: Wireless LAN Security"&gt;&lt;IMG alt="Join the Discussion : Cisco Ask the Expert" height="27" src="https://community.cisco.com/legacyfs/online/media/reply-button.png" width="75" /&gt;&lt;/A&gt;&amp;nbsp;&lt;STRONG&gt;button&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;to ask your question.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Ask questions from Monday June 20&amp;nbsp;&amp;nbsp;to Friday July 1st , 2016&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG align="left" height="125" src="https://community.cisco.com/legacyfs/online/media/roman_manchur-rmanchur-pix.png" width="82" style="padding-right: 8px;" /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;Roman Manchur&amp;nbsp;&lt;/STRONG&gt;is a Customer&amp;nbsp;Support engineer in the Cisco Technical Assistance Center in Cisco Brussels. &amp;nbsp;He is expert on any wireless products, including Wireless LAN controllers and Access Points, as well as in many security products and technologies, including IBNS, ISE, ACS4.x/ACS5.x, AAA Security, RADIUS, &amp;nbsp;and TACACS. Roman &amp;nbsp;has over 8 years of experience in IT. He joined Cisco in 2011. Prior to Cisco he worked at Priocom, Pysus, Aricent and Telread. Roman holds a CCIE in Wireless (&lt;SPAN&gt;#47699) and&amp;nbsp;&lt;/SPAN&gt;a Master in Sciences in Telecommunications and IT&amp;nbsp;from the&amp;nbsp;National University Lviv Polytechnic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Roman&amp;nbsp;might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the &lt;A href="https://supportforums.cisco.com/community/5906/security-and-network-management" target="_blank"&gt;Security and Network Management &lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Community&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Find other&amp;nbsp;&amp;nbsp;&lt;A href="https://supportforums.cisco.com/expert-corner/events" target="_blank"&gt;https://supportforums.cisco.com/expert-corner/events.&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff8c00;"&gt;&lt;STRONG&gt;**Ratings Encourage Participation! **&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff8c00;"&gt;&lt;STRONG&gt;Please be sure to rate the Answers to Questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 12:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876849#M22212</guid>
      <dc:creator>Monica Lluis</dc:creator>
      <dc:date>2021-07-05T12:15:33Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876850#M22213</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What are the&amp;nbsp;policies need to be applied &amp;nbsp;on an ssid (open)which is redirecting a user to an ise portal page ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for example post and pre authentication acl&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 00:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876850#M22213</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2016-06-21T00:04:44Z</dc:date>
    </item>
    <item>
      <title>Hi Roman,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876851#M22214</link>
      <description>&lt;P&gt;Hi Roman,&lt;/P&gt;
&lt;P&gt;One of our customers has Cisco WLC, MS NPS RADIUS server, and some clients doing WPA2-Enterprise authentication.&lt;BR /&gt;For some reason, all the endpoints work, except Win7 clients.&lt;BR /&gt;&lt;BR /&gt;With either self, or public signed certs, Win7 would prompt for username/password, but after clicking OK, authentication would fail.&lt;BR /&gt;&lt;BR /&gt;Win7 does NOT prompt for user to accept cert, while NPS has a log saying cert is not trusted.&lt;BR /&gt;Why would Win7 not prompt for user to accept cert, and how do we enable that prompt? &lt;BR /&gt;&lt;BR /&gt;As a temporary workaround for testing purpose, we unchecked the option to validate server cert.&lt;BR /&gt;I don't remember having to do this extra step in any of my previous WPA2-Enterprise deployments...did Win7 clients change this behavior somehow in the past year or two?&lt;BR /&gt;&lt;BR /&gt;Have you seen this same issue before?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 00:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876851#M22214</guid>
      <dc:creator>CSCO10662744_2</dc:creator>
      <dc:date>2016-06-21T00:14:36Z</dc:date>
    </item>
    <item>
      <title>Hi Muhsi,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876852#M22215</link>
      <description>&lt;P&gt;Hi Muhsi,&lt;/P&gt;
&lt;P&gt;Thanks for your question.&lt;/P&gt;
&lt;P&gt;It depends what type of authentication with redirection are you trying to configure and on what platform. I will try to cover all scenarios in the response below.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;In case you are talking about CWA (central web auth) configurarion, you will need configure WLAN profile with MAC authentication / AAA override and RADIUS NAC. Redirect-ACL has also be configured on WLC and it must allow access to DNS and ISE servers and also can allow access to any additional resources that are considered to be accessible by your local security policy for users in pre-authentication state.&amp;nbsp; After initial MAC authentication, ISE will send redirect-ACL and redirect-URL in corresponding RADIUS AV-pairs. Any traffic that is denied in Redirect-ACL will be redirected to login portal on ISE. More details on that type of access can be found via this link: &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html"&gt;WLC CWA with ISE&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;In case you are interested in LWA with redirection to external login portal, then you need configure web-authentication policy on WLAN profile and assign corresponding Redirect-ACL&amp;nbsp; directly to SSID configuration. Redirect-URL can either be defined in global configuration or over-ride on WLAN. Details regarding on LWA configuration with external portal can be found via following link: &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/116217-configure-ISE-00.html"&gt;WLC LWA with ISE&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Those configuration follow the same logic, though different command syntax, with IOS XE controllers (the major difference is&amp;nbsp; with ACL entries, with IOS XE controllers traffic that is permitted without redirection is defined with 'deny' statements).&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;CWA configuration on 3650/3850/5760: &lt;A href="https://supportforums.cisco.com/sites/default/files/configure_ssid_for_central_web_authentication_cwa_using_ise_on_catalyst_3850_switches_and_5760_wireless_controller.pdf"&gt;CWA configuration on NGWC&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;LWA configuration on 3650/3850/5760: &lt;A href="https://supportforums.cisco.com/sites/default/files/local_webauth_with_local_authentication_and_radius_authentication_on_catalyst_3850_switches_and_5760_wireless_controller.pdf"&gt;LWA configuration on NGWC&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Post authentication ACL defines what resources are available to client after web-authentication is performed, it's regulated by your company security policies requirements.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 16:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876852#M22215</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-21T16:29:43Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876853#M22216</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thanks for your question.&lt;/P&gt;
&lt;P&gt;From what you are saying your customer is using EAP-PEAP authentication in the network. In generic case it &lt;STRONG&gt;does&lt;/STRONG&gt; require server certificate to be trusted by client, only after certificate validation is successful client will be prompted for username and password.&lt;/P&gt;
&lt;P&gt;In native supplicant configuration settings on Windows you have following options:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validate server certificate&amp;nbsp;&lt;/STRONG&gt; (enabled by default). Can be disabled as workaround in cases client has no trust for server certificate, like in your case.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG class="uiterm"&gt;Do not prompt user to authorize new servers or trusted root certification authorities &lt;/STRONG&gt;(disabled by default). That option enable / disable pop up for client to trust server certificate during authentication. That option is probably enabled on your Windows 7 client(s). If not, but no pop up is still happening, that's something you will need to check with Microsoft support team.&lt;STRONG class="uiterm"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Reference screenshot:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/cert_settings.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As final solution I would recommend to import your NPS server certificate under trusted CA list on all clients in your network (can be pushed with GPO policies), so all clients have&amp;nbsp; trust for the server certificate and therefor workaround with disabling server certificate validation is no longer needed.&lt;/P&gt;
&lt;P&gt;It has to be installed under following location &lt;STRONG&gt;"Console Root\Certificates(Local Computer)\Trusted Root Certification Authorities\Certificates".&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 16:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876853#M22216</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-21T16:31:51Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply Roman.</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876854#M22217</link>
      <description>Thanks for the reply Roman.

This particular customer is a University, where most of the endpoints are NOT managed, so ideally we prefer a solution that does not require the end user to modify any changes on their devices.

We were hoping to know the root cause of the Win7 clients not prompting to accept the cert.</description>
      <pubDate>Tue, 21 Jun 2016 19:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876854#M22217</guid>
      <dc:creator>CSCO10662744_2</dc:creator>
      <dc:date>2016-06-21T19:19:39Z</dc:date>
    </item>
    <item>
      <title>It could be that option "Do</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876855#M22218</link>
      <description>&lt;P&gt;It could be that option "&lt;STRONG&gt;Do not prompt user to authorize new servers or trusted root certification authorities&lt;/STRONG&gt;" is enabled on those device, something I would check first - cause that's the only setting in native supplicant that enforce user interaction on accepting/declining server certificate.&lt;/P&gt;
&lt;P&gt;But since you have no control on client device, neither you want to configure those client - another option will be generate CSR (certificate signing request) on your NPS server and sign it with some well known CA. After that install signed certificate on NPS server and use it as server certificate for EAP authentication. Clients will have trust for that certificate as they have corresponding signing CA certificate under default trusted CA list.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 20:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876855#M22218</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-21T20:00:18Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876856#M22219</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;First i apologies to posting my question here because i do not know whether i am reaching to right group or not .&lt;/P&gt;
&lt;P&gt;Please help me if it is right place.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;AP 1552E with regulatory domain C (China, in 5Ghz band, it has 5 channels: 149, 153, 157, 161, 165)&lt;/LI&gt;
&lt;LI&gt;AP 1572E with regulatory domain F (Indonesia, in 5Ghz, it has 4 channels: 149, 153, 157, 161)&lt;BR /&gt;&lt;BR /&gt; WLC SW version 8.1&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt; 1. Can We combine those two AP in single MESH bridge group?&lt;BR /&gt;&lt;BR /&gt;2. Is there any potential problem if we put AP 1572 domain F as RAP and AP 1552 domain C as MAP? The logic is channel will be driven by RAP, so it will avoid to use channel 165 as backbone MESH, is it correct logic?&lt;BR /&gt;&lt;BR /&gt;3. Is there any potential problem to combine AP 1552 and AP 1572 model in single MESH network since they have different capability?&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 22 Jun 2016 12:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876856#M22219</guid>
      <dc:creator>Prakash Parvathala</dc:creator>
      <dc:date>2016-06-22T12:09:36Z</dc:date>
    </item>
    <item>
      <title>Hi Prakash,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876857#M22220</link>
      <description>&lt;P&gt;Hi Prakash,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You are in the right section &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Answering your questions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Yes, you can combine APs from different RF domain and different AP models in same BGN (bridge group name)&lt;/LI&gt;
&lt;LI&gt;Normally, in the mesh world, channels are selected by the user for RAPs, and MAPs auto tune to RAP channels. In your question you are following this logic and if you configure 1572 domain -F as RAP with fixed channel, 1552 domain -C MAP will connect to it since it does scan on channels that RAP operates on.&lt;/LI&gt;
&lt;LI&gt;Yes, in case you have 1552 domain -C being parent or RAP and operating on channel 165, then 1572 domain -F MAP won't be able to connect to given parent or RAP. So careful planning is needed.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;You can use '&lt;STRONG&gt;Backhaul channel deselect&lt;/STRONG&gt;' feature to minimize administrative overhead when configuring MESH deployment to ensure you RAP/MAP never select certain channel (in your case channel 165): &lt;A href="http://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/111902-outdoor-mobi-guide-00.html#deselect"&gt;Backhaul channel deselect&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 13:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876857#M22220</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-22T13:14:16Z</dc:date>
    </item>
    <item>
      <title>Thank you so much for your</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876858#M22221</link>
      <description>&lt;P&gt;Thank you so much for your fast reply Roman.&lt;/P&gt;
&lt;P&gt;I appreciate you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 13:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876858#M22221</guid>
      <dc:creator>Prakash Parvathala</dc:creator>
      <dc:date>2016-06-22T13:27:06Z</dc:date>
    </item>
    <item>
      <title>Hi Roman</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876859#M22222</link>
      <description>&lt;P&gt;Hi Roman&lt;/P&gt;
&lt;P&gt;We have a rule in each policy set in our ISE 2.1 deployment that deals with staff attempting to connect their personal devices to our wireless network.&lt;/P&gt;
&lt;P&gt;Currenty it just responds with AccessReject but I was wondering if in addition to this I could also statically add the endpoint into a group as part of the authorization result?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 13:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876859#M22222</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2016-06-22T13:56:54Z</dc:date>
    </item>
    <item>
      <title>Hi Martin,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876860#M22223</link>
      <description>&lt;P&gt;Hi Martin,&lt;/P&gt;
&lt;P&gt;Thanks for your question.&lt;/P&gt;
&lt;P&gt;From what I know it's not possible to assign endpoint to certain group as part of authorization policy result. Authorization policies are a component of the Cisco ISE network authorization service. This service allows you to define authorization policies and configure authorization profiles for specific users and groups that access your network resources. They define permission on accessing certain network resources or do certain administrative actions.&lt;/P&gt;
&lt;P&gt;If you need map client devices to certain device groups on ISE dynamically you should use profiling service. Based on your explanation you are interested to put personal devices in certain group, so probably best option would be to use AD probe and check condition 'AD-Host-Exists', then assign device to corresponding group if not found in AD.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please refer to ISE profiling documentation for more details: &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html"&gt;Cisco ISE Endpoint Profiling Policies&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I hope this information will be useful for you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;P.S: This section is related to Wireless LAN security, for your question more relevant topic will be in Security/AAA section.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 14:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876860#M22223</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-22T14:26:13Z</dc:date>
    </item>
    <item>
      <title>Is there any way to pull up</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876861#M22224</link>
      <description>&lt;P&gt;Is there any way to pull up or scroll through the speed dial list on the screen of the 9971?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 14:31:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876861#M22224</guid>
      <dc:creator>kristina.pipes1</dc:creator>
      <dc:date>2016-06-22T14:31:45Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876862#M22225</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;On a 5508 WLC how can SSH Server CBC mode ciphers encryption be disabled and enable CTR or GCM cipher mode encryption?&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 15:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876862#M22225</guid>
      <dc:creator>netops1</dc:creator>
      <dc:date>2016-06-22T15:25:09Z</dc:date>
    </item>
    <item>
      <title>Hi Netops1,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876863#M22226</link>
      <description>&lt;P&gt;Hi Netops1,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Not possible since CTR and GCM ciphers aren't supported on WLC currently.&lt;/P&gt;
&lt;P&gt;Please check below specification regarding supported encryption modes and cipher suits on 5500 controller series (Table #2 &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/products/collateral/wireless/5500-series-wireless-controllers/data_sheet_c78-521631.html"&gt;http://www.cisco.com/c/en/us/products/collateral/wireless/5500-series-wireless-controllers/data_sheet_c78-521631.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 18:40:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876863#M22226</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-22T18:40:02Z</dc:date>
    </item>
    <item>
      <title>Hi Kristina,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876864#M22227</link>
      <description>&lt;P&gt;Hi Kristina,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Unfortunately, I won't be able to answer your question since it's related to IP telephony and not to wireless technology.&lt;/P&gt;
&lt;P&gt;I would recommend you to reach CUCM team regarding questions related to IP Phones functionality.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 18:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876864#M22227</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-22T18:43:29Z</dc:date>
    </item>
    <item>
      <title>Dear Roman,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876865#M22228</link>
      <description>&lt;P&gt;Dear Roman,&lt;/P&gt;
&lt;P&gt;I have a network that has a few access points connected to a 3850 that acts as a wireless controller, and a few more that cannot be directly connected due to the distance - so they are not a part of the wireless domain.&lt;/P&gt;
&lt;P&gt;1) Is there any workaround to connect distant APs to the wireless domain without them being connected directly to the 3850 and without us having to buy another 3850 to act as an agent? They are physically connected to a&amp;nbsp;WS-C2960S&lt;/P&gt;
&lt;P&gt;2) When troubleshooting an issue on a wireless VLAN, I've set up a monitor session with the VLAN as the source and a single switchport as destination. On the wireshark capture at the destination, each frame is reproduced about 20 times - which makes it pretty much unusable. Why would it do that, and what can I do for more effective packet capture? Here's the example of a single host coming online...&lt;/P&gt;
&lt;P&gt;3) Is there a best practices document that would outline the capacity planning, security considerations, and actual configuration for the wireless and wired components of an enterprise wlan using 3850 as a controller? I found bits and pieces in several documents, but not a single guide.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 21:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876865#M22228</guid>
      <dc:creator>michael.yurchenko</dc:creator>
      <dc:date>2016-06-22T21:52:53Z</dc:date>
    </item>
    <item>
      <title>Hi Prakash,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876866#M22229</link>
      <description>&lt;P&gt;Hi Prakash,&lt;/P&gt;
&lt;P&gt;Thanks for your feedback, glad to hear you found this information useful.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2016 09:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876866#M22229</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-23T09:26:15Z</dc:date>
    </item>
    <item>
      <title>Hi Roman.</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876867#M22230</link>
      <description>&lt;P&gt;Hi Roman.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;BR /&gt;In the ACL-REDIRECT the below ace meaning&lt;/P&gt;
&lt;P&gt;eans do not redirect dns request and redirect any www ? &lt;BR /&gt;deny udp any any eq domain &lt;BR /&gt;permit tcp any any eq www&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What about the postauthentication acl ,&lt;BR /&gt;Where should I apply the postauth ACL &lt;BR /&gt;Is it ok applying it on the core switch interface vlan ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2016 10:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876867#M22230</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2016-06-23T10:20:59Z</dc:date>
    </item>
    <item>
      <title>Hi Muhsi,</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876868#M22231</link>
      <description>&lt;P&gt;Hi Muhsi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Correct, given that you have following entries in&amp;nbsp;ACL-REDIRECT:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt; deny udp any any eq domain &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any any eq www&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;means don't redirect DNS traffic, but redirect all HTTP traffic&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Post-authentication ACL is also defined on controller as it will be sent to WLC / NGWC in RADIUS AV-pairs during authorization phase, since policy enforcement are done on controller per client session and not on core switch. In that ACL you define traffic that is permitted with 'permit' statement and traffic that needs to be dropped with 'deny'.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2016 14:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-expert-wireless-lan-security/m-p/2876868#M22231</guid>
      <dc:creator>Roman Manchur</dc:creator>
      <dc:date>2016-06-23T14:08:39Z</dc:date>
    </item>
  </channel>
</rss>

