09-30-2021 08:01 AM
HI Guys,
Very new to ISE, so much I don't get yet (inc terminology), but I'm working on it, anyway
Needed to configured to profiles for 2 different OUI's (not the same ID group), 1 for Building Management systems and 1 for door access controllers.
I started on the BMS devices first and got them to work, so when a new BMS devices came up it profiled it correctly.
Using the lessons learnt from getting the BMS devices working I started on Door Access devices, but it's still going under the wrong authorization policy, I have set to match with RADIUS and OUI name, set the certainty factor to even a stupid high figure of 50 and still fails.
Any help please guys?
Thanks
Kevin
Solved! Go to Solution.
10-04-2021 05:35 AM
Rewrite your Rule to use EndPointPolicy instead of IdentityGroup.
According to the ISE Detail log the Device has the IdentityGroup: Profiled
09-30-2021 08:19 AM
In the authentication details from the Radius Live Logs page, do those devices show being profiled correctly?
If you can share the device profile and the auth details, it might help provide a better response.
10-01-2021 01:21 AM - edited 10-01-2021 01:28 AM
No that's my point or I'm missing the point
Do you mean show the Endpoint Context Visibility info?
I'm on a massive learning curve so please bear with me.
10-01-2021 02:19 AM - edited 10-01-2021 02:35 AM
@kevin.twaddell please provide the screenshot of the new profiling policy you created. Also go to Work Centers > Profiler > Endpoints, select the MAC address of the endpoint and provide a screenshot for review. We'll need the information such as OUI, Total Certainty Factor, Endpoint Policy amongst others etc.
FYI, Here is the offical Cisco ISE profiling guide.
https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456
10-03-2021 06:55 AM
If it's hitting the wrong authz policy, I prefer to get the auth details from the Radius Live Logs page.
Find a device that fails, and in the 3rd column from the left should be a paper icon, if you click that, it shows all of the info and logic for that session.
That, in addition to the profile should be everything needed for someone here to help you resolve this.
10-04-2021 02:31 AM
Hi all,
So back on this today, its matching against our default Authorization Policy, so everything goes in this unless it a different matching policy which is what I'm trying to create.
I've attached the log from it doing this but I'm not seeing why, if one of you kind chaps could point me in the right direction please?
Thanks
Kevin
10-04-2021 03:36 AM
Maybe you have a logic error in your Policy, because the Log shows 2 Logical Profiles the Device is assigned to.
What does your Policy look like for this device?
10-04-2021 03:59 AM
so PAH-BMS-Door-Access was the profile used before I create this one, it never worked then either, but we needed to split the profiles up so I created 2 new ones, as my opening message BMS works fine, there are NO conditions in the old PAH-BMS-Door-Access profile
I've attached the PAH-Door-Access profile
Thanks
Kevin
10-04-2021 05:06 AM
Sorry, I meant your Authorization Policy.
if you do a combined rule which should match multiple Profiles you have to check to do an "or" instead of on "and".
10-04-2021 05:21 AM
10-04-2021 05:35 AM
Rewrite your Rule to use EndPointPolicy instead of IdentityGroup.
According to the ISE Detail log the Device has the IdentityGroup: Profiled
10-04-2021 05:50 AM
That appears to have sorted it, I don't know the difference yet but I'll read up and try and work out what it is, thank you very much for your help.
Kevin
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide