07-02-2025 10:23 AM
Hi everyone,
According to the Advanced Security Group Tags presentation (BRKSEC-3707) from Cisco Live San Diego 2025, RADIUS accounting data must be formatted in a way that Cisco ISE can interpret in order to successfully bind a user's IP address to their associated SGT.
Could someone point me to an official Cisco document or guide that explains this requirement in detail?
Best regards,
Solved! Go to Solution.
07-03-2025 09:57 AM - edited 07-03-2025 09:59 AM
Thanks. Your provided link helped me to understand the problem.
To help ISE to assign IP-SGT to a client/user session, it must have at least two pieces of information: 1) MAC Address, 2) IP Address. The IP Address part is reported to ISE by the participating NAD through RADIUS Accounting Request message and to enable NAD to do so, it must have some technologies to help it to find the IP address of the endpoint (Cisco switches do this function through (IP) Device Tracking feature). The second part of the equation involves forcing the NAD to report the required information. In Cisco switches you must execute two commands to accomplish this: 1) radius-server attribute 8 include-in-access-request, 2) (optional command in newer platforms) radius-server vsa send accounting
Without these configurations, ISE cannot correlate IPs to endpoints, breaking dynamic SGT assignment and TrustSec enforcement.
07-03-2025 08:41 AM
07-03-2025 09:57 AM - edited 07-03-2025 09:59 AM
Thanks. Your provided link helped me to understand the problem.
To help ISE to assign IP-SGT to a client/user session, it must have at least two pieces of information: 1) MAC Address, 2) IP Address. The IP Address part is reported to ISE by the participating NAD through RADIUS Accounting Request message and to enable NAD to do so, it must have some technologies to help it to find the IP address of the endpoint (Cisco switches do this function through (IP) Device Tracking feature). The second part of the equation involves forcing the NAD to report the required information. In Cisco switches you must execute two commands to accomplish this: 1) radius-server attribute 8 include-in-access-request, 2) (optional command in newer platforms) radius-server vsa send accounting
Without these configurations, ISE cannot correlate IPs to endpoints, breaking dynamic SGT assignment and TrustSec enforcement.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide