cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1127
Views
1
Helpful
1
Replies

ise 2.1 etherswitch support on ise 4321- 4331 models

mpeeters
Cisco Employee
Cisco Employee

In the ISE 2.1 compatibility matrix (link below) the router ISR 4321 is not listed.

http://www.cisco.com/c/en/us/td/docs/security/ise/2-1/compatibility/ise_sdt.html

Can you please check and confirm is the ISR 4321 or ISR 4331 compatible with ISE 2.1?

etherswitch module support.


If not, what is necessary from the module or os in functionality to be supported?

1 Accepted Solution

Accepted Solutions

Jason Kunst
Cisco Employee
Cisco Employee

Please see the general statement in the running for the link you provided

Ask the switch team about what they support

Unfortunately we can't test all switches and rely on general switching support to test the standards

Cisco ISE supports interoperability with any Cisco or non-Cisco RADIUS client network access device (NAD) that implements common RADIUS behavior (similar to Cisco IOS 12.x) for standards-based authentication. For a list of supported authentication methods, see the "Manage Authentication Policies" chapter of the Cisco Identity Services Engine Admin Guide, Release 2.1<https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21.html>.

Certain advanced use cases, such as those that involve posture assessment, profiling, and web authentication, are not consistently available with non-Cisco devices or may provide limited functionality, and are therefore not supported with non-Cisco devices. In addition, certain other advanced functions like central web authentication (CWA), Change of Authorization (CoA), Security Group Access (SGA), and downloadable access control lists (ACLs), are only supported on Cisco devices. For a full list of supported Cisco devices, see Table 1 <http://www.cisco.com/c/en/us/td/docs/security/ise/2-1/compatibility/ise_sdt.html#79546> .

For information on enabling specific functions of Cisco ISE on network switches, see the "Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions" chapter in Cisco Identity Services Engine Admin Guide, Release 2.1<https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100000.html>.

View solution in original post

1 Reply 1

Jason Kunst
Cisco Employee
Cisco Employee

Please see the general statement in the running for the link you provided

Ask the switch team about what they support

Unfortunately we can't test all switches and rely on general switching support to test the standards

Cisco ISE supports interoperability with any Cisco or non-Cisco RADIUS client network access device (NAD) that implements common RADIUS behavior (similar to Cisco IOS 12.x) for standards-based authentication. For a list of supported authentication methods, see the "Manage Authentication Policies" chapter of the Cisco Identity Services Engine Admin Guide, Release 2.1<https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21.html>.

Certain advanced use cases, such as those that involve posture assessment, profiling, and web authentication, are not consistently available with non-Cisco devices or may provide limited functionality, and are therefore not supported with non-Cisco devices. In addition, certain other advanced functions like central web authentication (CWA), Change of Authorization (CoA), Security Group Access (SGA), and downloadable access control lists (ACLs), are only supported on Cisco devices. For a full list of supported Cisco devices, see Table 1 <http://www.cisco.com/c/en/us/td/docs/security/ise/2-1/compatibility/ise_sdt.html#79546> .

For information on enabling specific functions of Cisco ISE on network switches, see the "Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions" chapter in Cisco Identity Services Engine Admin Guide, Release 2.1<https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100000.html>.