08-10-2021 09:21 AM
Is there an easy way from keeping generic accounts from connecting to our Guest network? Right now if a user has an AD account, they connect their personal devices to the Guest network and it authenticates against AD. The problem is that the generic accounts also reside in AD and anyone who knows the passwords for these generic accounts can use them to access the guest network. So I guess the question is, is there a way to exclude certain AD accounts in Cisco ISE from being able to connect to an SSID?
Solved! Go to Solution.
08-12-2021 06:07 AM
Easily guessable Generic Account passwords?????? This itself is a big problem.
Regarding your question this has to be done on ISE, you need to edit the Authentication and Authorization policies to allow only the preferred group from AD. WLC cannot influence the Authentication here, I would recommend you open a discussion on ISE community.
08-12-2021 06:07 AM
Easily guessable Generic Account passwords?????? This itself is a big problem.
Regarding your question this has to be done on ISE, you need to edit the Authentication and Authorization policies to allow only the preferred group from AD. WLC cannot influence the Authentication here, I would recommend you open a discussion on ISE community.
08-12-2021 06:59 AM
Ok, thanks for the info. We are new to ISE and was trying to setup some new policies that we haven't had in place and working through the flows. I didn't know if ISE had the ability to restrict individual usernames or not.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide