KEMBAR78
ISE non-C3PL Switch Config With Device Sensor Template | PDF | Radius | Ip Address
0% found this document useful (0 votes)
96 views5 pages

ISE non-C3PL Switch Config With Device Sensor Template

Cisco ISE NAD Device config

Uploaded by

eryogeshpatel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views5 pages

ISE non-C3PL Switch Config With Device Sensor Template

Cisco ISE NAD Device config

Uploaded by

eryogeshpatel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

## Check compatibility before using: https://communities.cisco.

com/docs/DOC-72932
## Device Sensor only supported on specific IOS 15/ IOS XE 3.6 and up releases

# All commands below are under configure terminal


! Begin Global config with Device Sensor
ip domain-name [Domain]
! Test user to verify ISE node availability
! User account does not have to authenticate successfully
username [test user] secret 0 [password]
! HTTPS services are required for URL redirect
! Generate keys before enabling HTTPS
crypto key generate rsa general-keys mod 2048
aaa new-model
! If AAA was not enabled previously
! Enable local switch login authentication and authorization
aaa authentication login default local
aaa authorization exec default local
aaa authentication dot1x default group ISE-RADIUS
aaa authorization network default group ISE-RADIUS
aaa accounting dot1x default start-stop group ISE-RADIUS
aaa accounting network default start-stop group ISE-RADIUS
aaa accounting update newinfo periodic 2880
aaa server radius dynamic-author
client [ISE1 IP] server-key [RADIUS secret]
client [ISE2 IP] server-key [RADIUS secret]
aaa session-id common
authentication mac-move permit
epm access-control open
dot1x system-auth-control
dot1x critical eapol
! IP Device Tracking on IOS 15.2(2) or IOS-XE 03.06.00 and above
ip device tracking probe auto-source
! IP Device Tracking on earlier IOS/IOS-XE releases
ip device tracking probe delay 10
! Enable HTTP for redirect
ip http server
! Disable HTTP based admin access to switch
! Don’t enable if you need GUI access or use Prime Infrastructure
ip http active-session-modules none
ip http secure-active-session-modules none
! Limit HTTP connections
ip http max-connections 40
! Create the web auth redirect ACL
ip access-list extended ACL_WebAuth
permit tcp any any eq www
! Create the ACL used for blacklisted devices
ip access-list extended Blackhole
permit udp any any eq domain-name
permit udp any eq bootpc any eq bootps
permit tcp any host [ISE1 IP] eq 8443
permit tcp any host [ISE2 IP] eq 8443
! Create the low-impact mode ACL applied before RADIUS auth
ip access-list extended ACL_Default
permit udp any any eq domain-name
permit udp any eq bootpc any eq bootps
permit tcp any host [ISE1 IP] eq 8443
permit tcp any host [ISE2 IP] eq 8443
radius-server vsa send authentication
radius-server vsa send accounting
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server attribute 31 mac format ietf upper-case
radius-server attribute 31 send nas-port-detail mac-only
! Define the RADIUS servers and RADIUS group
radius server ISE1
address ipv4 [ISE1 IP] auth-port 1812 acct-port 1813
! Automated tester for IOS 15.2(2) & IOS-XE 03.06.00 and above
automate-tester username [RADIUS test account] probe-on
! Automated tester for earlier IOS/IOS-XE releases
automate-tester username [RADIUS test account] ignore-acct-port idle-time 10
key [RADIUS secret]
radius server ISE2
address ipv4 [ISE2 IP] auth-port 1812 acct-port 1813
! Automated tester for IOS 15.2(2) & IOS-XE 03.06.00 and above
automate-tester username [RADIUS test account] probe-on
! Automated tester for earlier IOS/IOS-XE releases
automate-tester username [RADIUS test account] ignore-acct-port idle-time 10
key [RADIUS secret]
aaa group server radius ISE-RADIUS
server name ISE1
server name ISE2
deadtime 15
radius-server dead-criteria time 10 tries 3
ip radius source-interface Loopback0
! DHCP snooping is required for device sensor data to work properly
! Uplink interface must be trusted for DHCP traffic
! This is required if DHCP snooping is enabled. Otherwise, DHCP will fail.
! Use on the Port channel if uplinks are in a port channel
interface [uplink interface]
ip dhcp snooping trust
ip dhcp snooping
no ip dhcp snooping information option
! VLAN list is comma separated
ip dhcp snooping vlan [1,10,15]
! Enable specific device sensors for profiling
device-sensor filter-list dhcp list dhcp_list
option name host-name
option name requested-address
option name parameter-request-list
option name class-identifier
option name client-identifier
device-sensor filter-spec dhcp include list dhcp_list
! Enable CDP globally
cdp run
device-sensor filter-list cdp list cdp_list
tlv name device-name
tlv name address-type
tlv name capabilities-type
tlv name platform-type
device-sensor filter-spec cdp include list cdp_list
! Enable LLDP globally
lldp run
device-sensor filter-list lldp list lldp_list
tlv name system-name
tlv name system-description
tlv name system-capabilities
device-sensor filter-spec lldp include list lldp_list
! Send sensor data to ISE and disable local analyzer
device-sensor accounting
device-sensor notify all-changes
no macro auto monitor
access-session template monitor
# Access port interface configuration

! Use 'authentication host-mode multi-domain' to restrict port to one voice


! and one data device per port
! If port is used by an AP in FlexConnect mode, configure as trunk with allowed VLANs

! Interface config - Monitor Mode


interface GigabitEthernetX/Y
switchport mode access
switchport access vlan [id]
switchport voice vlan [id]
! Allow access regardless of RADIUS response
! Only used for monitor and low-impact mode
authentication open
authentication control-direction in
authentication event fail action next-method
authentication event server dead action authorize
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication violation restrict
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity server dynamic
mab
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast
ip dhcp snooping limit rate 100
authentication port-control auto

! Interface config - Low-Impact Mode


interface GigabitEthernetX/Y
switchport mode access
switchport access vlan [id]
switchport voice vlan [id]
ip access-group ACL_Default in
! Allow access regardless of RADIUS response
! Only used for monitor and low-impact mode
authentication open
authentication control-direction in
authentication event fail action next-method
authentication event server dead action authorize
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication violation restrict
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity server dynamic
mab
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast
ip dhcp snooping limit rate 100
authentication port-control auto

! Interface config - Closed Mode


interface GigabitEthernetX/Y
switchport mode access
switchport access vlan [id]
switchport voice vlan [id]
authentication control-direction in
authentication event fail action next-method
authentication event server dead action authorize
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication violation restrict
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity server dynamic
mab
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast
ip dhcp snooping limit rate 100
authentication port-control auto

** Template created by Brad Johnson **


** https://www.ise-support.com **

You might also like