<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Keeping Generic accounts from connecting to Guest network in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/keeping-generic-accounts-from-connecting-to-guest-network/m-p/4448450#M232205</link>
    <description>&lt;P&gt;Easily guessable Generic Account passwords?????? This itself is a big problem.&lt;/P&gt;&lt;P&gt;Regarding your question this has to be done on ISE, you need to edit the Authentication and Authorization policies to allow only the preferred group from AD. WLC cannot influence the Authentication here, I would recommend you open a discussion on ISE community.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Aug 2021 13:07:42 GMT</pubDate>
    <dc:creator>Arshad Safrulla</dc:creator>
    <dc:date>2021-08-12T13:07:42Z</dc:date>
    <item>
      <title>Keeping Generic accounts from connecting to Guest network</title>
      <link>https://community.cisco.com/t5/wireless/keeping-generic-accounts-from-connecting-to-guest-network/m-p/4447228#M232094</link>
      <description>&lt;P&gt;Is there an easy way from keeping generic accounts from connecting to our Guest network? Right now if a user has an AD account, they connect their personal devices to the Guest network and it authenticates against AD. The problem is that the generic accounts also reside in AD and anyone who knows the passwords for these generic accounts can use them to access the guest network. So I guess the question is, is there a way to exclude certain AD accounts in Cisco ISE from being able to connect to an SSID?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 16:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/keeping-generic-accounts-from-connecting-to-guest-network/m-p/4447228#M232094</guid>
      <dc:creator>CGidcumb1002</dc:creator>
      <dc:date>2021-08-10T16:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Keeping Generic accounts from connecting to Guest network</title>
      <link>https://community.cisco.com/t5/wireless/keeping-generic-accounts-from-connecting-to-guest-network/m-p/4448450#M232205</link>
      <description>&lt;P&gt;Easily guessable Generic Account passwords?????? This itself is a big problem.&lt;/P&gt;&lt;P&gt;Regarding your question this has to be done on ISE, you need to edit the Authentication and Authorization policies to allow only the preferred group from AD. WLC cannot influence the Authentication here, I would recommend you open a discussion on ISE community.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 13:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/keeping-generic-accounts-from-connecting-to-guest-network/m-p/4448450#M232205</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2021-08-12T13:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Keeping Generic accounts from connecting to Guest network</title>
      <link>https://community.cisco.com/t5/wireless/keeping-generic-accounts-from-connecting-to-guest-network/m-p/4448485#M232212</link>
      <description>&lt;P&gt;Ok, thanks for the info. We are new to ISE and was trying to setup some new policies that we haven't had in place and working through the flows. I didn't know if ISE had the ability to restrict individual usernames or not.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 13:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/keeping-generic-accounts-from-connecting-to-guest-network/m-p/4448485#M232212</guid>
      <dc:creator>CGidcumb1002</dc:creator>
      <dc:date>2021-08-12T13:59:17Z</dc:date>
    </item>
  </channel>
</rss>

