Networking | Cloud | DevOps | IaC

How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients

IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server is an important element to networking in the real world. User location cannot be predicted as they may be at and out of a desk and up and about should they need to do so. Tying them to a local VLAN may only be helpful if they are bound to desks in those locations, although the most ideal outcome, it is not the most practical.

It is only wise to incorporate IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server in areas where you expect different teams to come to. Meeting rooms could for a moment have the accounting group or the development group meeting there and based on the intelligent and dynamic vlan assignmnet with 802.1x authentication, users port-access are defined their appropriate vlans for their respective access to resources on the network.

How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients.

A typical configuration for a system under IEEE 802.1x Authentication control is shown in the following figure.

In this scenario, “Lady Smith” wishes to use services offered by servers on the LAN behind the switch. There are multiple VLANs with resources available based on user vlan membership. Her laptop computer is connected to a port on the Aruba 2920 Edge Switch that has 802.1x port authentication control enabled.

The laptop computer must therefore act in a supplicant role. Message exchanges take place between the supplicant and the authenticator which is the Aruba 2920 Switch, and the authenticator passes the supplicant’s credentials which is her (Windows Active Directory User Account Credentials) to the authentication server for verification. The NPS Server which is the authentication server then informs the authenticator whether or not the authentication attempt succeeded, at which point “Lady Smith” is either granted or denied access to the LAN behind the switch.

Setup Structure for IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

  • Supplicant: Laptop running Microsoft Windows 10 or Windows 7
  • Authenticator: HP Aruba 2920 Edge Switch
  • Authentication Server: Microsoft NPS (Network Policy Server) running on Windows Server 2012 R2.
  • User Database : Active Directory

For Windows Infrastructure

Create NPS Server – Add Role on Windows Server 2012 R2

  • Create DHCP Scopes for VLANS

Create RADIUS Client on NAC using Network Policy Server

  • Create Network Policies
  • Configure a Network Policy for VLANs
  • Start Wired Auto-Config Service
  • Enable Network Authentication

Create the DHCP Scopes for VLAN100 and VLAN200 Groups

  • Development Group Scope – VLAN 100

SVI: ip address 172.16.80.254 255.255.255.0 Scope Subnet: 172.16.80.1/24

  • Accounting Group Scope – VLAN 200

SVI:ip address 172.16.70.254 255.255.255.0 Scope Subnet: 172.16.70.0/24

Secret Key: secret12

Add Edge Switch Management IP as the RADIUS Client

The Shared Secret Key: secret12 will be used in the Switch Configuration.

Create Network Policy Settings for Accounting Group for VLAN 200

Configuration Example

Here’s an example of how you might consider when configuring Microsoft NPS Server to assign users to a VLAN based on their user group, using NPS for the authentication and authorization of users. This configuration has worked flawlessly on the HP Aruba 2920 Switch. The key to getting this to work is the use of a RADIUS element called: ‘Tunnel-PVT-Group-ID’. This is a RADIUS attribute that may be passed back to the authenticator (i.e. the Aruba 2920 Switch) by the authentication server (i.e. Microsoft NPS Server) when a successful authentication has been achieved. There are a few other elements which need to accompany it, but this is the key element, as it specifies the VLAN number that the user should be assigned to.

The other elements that need to be returned by the NPS Server are as follows:

  • Tunnel-PVT-Group-ID: 200
  • Service-Type: Framed
  • Tunnel-Type: VLAN
  • Tunnel-Medium-Type: 802

For Client Infrastructure

On the Supplicant, Windows 7 or 10 configure the following steps on the Ethernet Adapter to enable IEEE 802.1X Authentication

For Network Infrastructure

Connect Server Infrastructure to VLAN 400

Create VLAN for Accounting Group

Create VLAN for Development Group

Create AAA Configuration on Switch for Radius Authentication

Download the Switch Configuration:

Test the IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

Verify Port-Access with the following user groups – VLAN 100 and VLAN 200

Think of what other clever things you can do from the information below;

Breakdown of Commands for RADIUS Authentication

Verification Commands

Thanks for reading. Please share your thoughts in the comment box below;

Published in Configuring , Design , Installing and Configuring , Networking , Security and Switching

  • 802.1 x authentication step by step aruba
  • 802.1 x authentication step by step cisco
  • 802.1 x wireless authentication step by step
  • 802.1x authentication process
  • 802.1x authentication windows 10
  • 802.1x authentication windows server 2012
  • 802.1x certificate authentication
  • assignment wlc
  • cisco dot1x
  • cisco ise dynamic vlan
  • cisco ise dynamic vlan assignment wlc
  • cisco wireless radius attributes
  • configuration example
  • dynamic vlan assignment cisco 2960 dynamic vlan configuration in packet tracer
  • dynamic vlan assignment with windows radius server
  • dynamic vlan cisco
  • dynamic vlan ruckus
  • meraki dynamic vlan assignment
  • nps mac authentication wired
  • nps policy for mac-based authentication
  • radius multiple vlans
  • vlan radius server
  • vlan steering
  • vmps server

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

November 11, 2023

FreeRADIUS: Active Directory Integration and PEAP-MschapV2 with Dynamic Vlan Assignment

We will setup authentication and authorization for a wireless network that can be used for a large organization, ensuring network users are able to securely authenticate to the network. Here's what you'll need:

  • A FreeRADIUS Server
  • A Domain Controller
  • A Wireless Controller
  • An Access Point (AP)
  • Some Clients with Different Operating System

The clients will be classified depend on device type (Android, iPhone, Windows) and assigned to different vlans after being authenticated. We will use Protected Extensible Authentication Protocol (PEAP) with Mschapv2. My network topology will look like below.

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Following table shows the device type and the vlans they will be assigned.

Device Type VLAN
Android vlan 100
iPhone vlan 101
Windows vlan 102

Integrate FreeRADIUS with Active Directory

Mschapv2 is a challenge-response based authentication protocol. Since it does not support sending client credentials in complete clear text, we will not be able to use LDAP database in Active Directory for authentication. There can be a workaround but, we will not cover that scenario in this article. Instead, we will use Active Directory integration which supports Mschapv2 authentication. We will use Samba server ant it’s utilities to join the Active Directory .

Followings steps show Samba installation and the other required tools.

Step-1: A fully qualified domain name (FQDN) must be defined. Open " /etc/hosts " file in your preferred text editor and add localhost IP address, FQDN and hostname respectively as below.

My configuration is below.

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Step-2: Verify the hostname and FQDN with the commands below.

Step-3: Update package information from all the configured sources.

Step-4: Install the required packages with the command below.

During the installation, the window below will appear. Enter your domain name and click " OK ".

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Enter your Domain Controllers FQDN. If you have more than one, then separate them with a space.

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Enter the administrative server FQDN and click " OK ".

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Step-5: After the installation, we need to configure Samba server. Open " /etc/samba/smb.conf " file with your preferred text editor and modify it the way it suits you. Mine is below.

Step-6: Although we configured Kerberos in step 4, we need to add more config. Open " /etc/krb5.conf " and modify it as below.

Step-7: Now that we have installed and configured Samba server and Kerberos authentication, we need to join the Active Directory. Remember that when you join a windows client to an Active Directory, you must have an administrator account. Before joining the Active Directory, you provide your credentials. For Ubuntu, we will use "kinit" tool to obtain and cache Kerberos ticket-granting ticket then join the AD.

Following output shows Kerberos obtaining ticket-granting ticket in packet level.

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Join the Active Directory with command below.

Following figure shows joining the Active Directory in the packet level.

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Step-8: Restart the services as below.

Step-9: At this point, we have joined the Active Directory and will confirm if New Technology LAN Manager (NTLM) authentication works. FreeRADIUS uses "ntlm_auth" tool to allow external access to Winbind's NTLM authentication function. Apply the command below to confirm if NTLM authentication works.

When the authentication is successful, it returns 0 (zero). Following screenshot shows that the ntlm authentication has made over Remote Procedure Call (RPC), which is a Microsoft proprietary protocol.

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

Configure FreeRADIUS

I assume that you have already installed FreeRADIUS. If not, please visit here (FreeRADIUS Installing and Configuring (Part 1)).

Step-1: The "default" virtual server contains too much settings. Thus, I will remove it and create my own simple server.

Step-2: My Aruba testing wireless controller are able to classify a client based on its Operating System. It sends device type in an " Access-Request " packet, using " Aruba-Device-Type " vendor specific attribute. After authenticating the user, I use this attribute to distinguish the clients from each other, then I assign them the vlan accordingly with " post-auth " block. FreeRADIUS comes with many vendor specific dictionaries. They are stored in " /usr/share/freeradius/ " directory. If there is currently no dictionary for your vendor, you can create a new one in the directory. Change the configuration below to suit your needs.

Step-3: Define a RADIUS client in " /etc/freeradius/3.0/clients.conf " file.

Step-4: Change " default_eap_type " to " peap ". Some legacy clients may not support TLS version 1.2, so make the changes as you need. I commented out (disabled) some settings, and modified the TLS min and max values. Open " eap " module and follow below.

Step-5: Open "mschap" module and configure it as below. FreeRADIUS will use an external program called "ntlm_auth" to authenticate the users.

Step-6: Add "freerad" user to "winbindd_priv" group which will be able to reach "winbind" program.

Testing PEAP-MschapV2 with an Android device

I will connect my Service Set Identifier (SSID) using an Android device. During the authentication, I captured RADIUS packets between the wireless controller and FreeRADIUS. Because of most of packets are encrypted with TLS, I will omit them. Here is below the "Access-Request" packet.

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

As you see in the screenshot above, the wireless controller sends "Aruba-Device-Type" vendor specific attribute with value of "Android". After authentication, this attribute will be used in the policy to decide to which vlan a user will be assigned. Following shows the last RADIUS packet (Access-Accept).

How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

The FreeRADIUS server insert vlan information (in this case vlan 100), Wi-Fi Protected Access (WPA) encryption and decryption keys into the "Access-Accept" packet. The wireless controller receives the packet and apply the policy accordingly, then it conveys the encryption and decryption keys to the Access Point (AP).

Final thoughts

FreeRADIUS can be integrated into many systems. Active Directory is just one of them. With a simple configuration, you can have a RADIUS integrated into Active Directory.

Celal Dogan

Celal Dogan

He is proficient in System Administration, Python, Computer Network, Network Engineering, PHP, Web Testing, Penetration Testing, Wireshark, RADIUS, Cisco Router, TCP/IP, Kali Linux, OSPF, NPS, and Multiprotocol BGP. You can connect with him on his LinkedIn Profile.

Can't find what you're searching for? Let us assist you.

Enter your query below, and we'll provide instant results tailored to your needs.

If my articles on GoLinuxCloud has helped you, kindly consider buying me a coffee as a token of appreciation.

Buy GoLinuxCloud a Coffee

For any other feedbacks or questions you can send mail to [email protected]

Thank You for your support!!

10 thoughts on “How to Integrate FreeRADIUS with Active Directory [Step-by-Step]”

how to restrict users form certain groups only should authenticate

If I want Users from AD a member of group A can connect to Wi-Fi signal name Wi-Fi-A only and users which members of group B, can connect to Wi-Fi named Wi-Fi-B only.

How to do that?

Hello, i’m wanting to achieve the same thing.

Did you found a solution to get to this result ? If yes, please tell me how you managed to do it.

Cheers, Grégory BERTINI

Is it mandatory to use the same domain on both AD and Freeradius?

Very thanks!

I need to this config guest support. Add to end file /etc/freeradius/3.0/users endtry:

bob123 Cleartext-Password := “hello123”

But nod work – can Tou help me?:)

How can I tell Freeradius to send to the user a static IP address when authenticating against Active Directory ? Thanks.

Quelle version d’ubuntu avez-vous utilisé

Ubuntu 20.04

Your step 6 for Kerberos can’t be right, it’s missing a “}”

Thanks for highlighting this, there seems to have been a typo

Leave a Comment Cancel reply

Save my name and email in this browser for the next time I comment.

Notify me via e-mail if anyone answers my comment.

cisco dynamic vlan assignment active directory

We try to offer easy-to-follow guides and tips on various topics such as Linux, Cloud Computing, Programming Languages, Ethical Hacking and much more.

Recent Comments

Popular posts, 7 tools to detect memory leaks with examples, 100+ linux commands cheat sheet & examples, tutorial: beginners guide on linux memory management, top 15 tools to monitor disk io performance with examples, overview on different disk types and disk interface types, 6 ssh authentication methods to secure connection (sshd_config), how to check security updates list & perform linux patch management rhel 6/7/8, 8 ways to prevent brute force ssh attacks in linux (centos/rhel 7).

Privacy Policy

HTML Sitemap

IP With Ease

Dynamic VLAN Assignment: Wireless

cisco dynamic vlan assignment active directory

Dynamic VLAN Assignment

Objective: To dynamically Assign Wireless User to VLAN based on user credentials. This type of setup is called “Dynamic VLAN Assignment”

Description:  Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user. This task of assigning users to a specific VLAN is handled by a RADIUS authentication server, such as Cisco Secure ACS. This can be used, for example, to allow the wireless host to remain on the same VLAN as it moves within a campus network.

Related- Cisco ACS vs ISE Comparison

Therefore, when a client attempts to associate to a LAP registered with a controller, the LAP passes the credentials of the user to the RADIUS server for validation. Once the authentication is successful, the RADIUS server passes certain Internet Engineering Task Force (IETF) attributes to the user. These RADIUS attributes decide the VLAN ID that should be assigned to the wireless client. The SSID ( WLAN , in terms of WLC) of the client does not matter because the user is always assigned to this predetermined VLAN ID.

WLC Configuration

This configuration requires these steps:

Configure the WLC with the Details of the Authentication Server

  • Configure the Dynamic Interfaces (VLANs)
  • Configure the WLANs ( SSID )

It is necessary to configure the WLC so it can communicate with the RADIUS server to authenticate the clients, and also for any other transactions.

Complete these steps:

  • From the controller GUI, click  Security .
  • Enter the IP address of the RADIUS server and the Shared Secret key used between the RADIUS server and the WLC.

This Shared Secret key should be the same as the one configured in the RADIUS server under Network Configuration > AAA Clients > Add Entry. Here is an example window from the WLC:

Configure the Dynamic VLAN (Interfaces)

This procedure explains how to configure dynamic interfaces on the WLC. As explained earlier in this document, the VLAN ID specified under the Tunnel-Private-Group ID attribute of the RADIUS server must also exist in the WLC.

In the example, the user1 is specified with the  Tunnel-Private-Group ID of 10 (VLAN =10)  on the RADIUS server.

You can see the same dynamic interface (VLAN=10) configured in the WLC in this example. From the controller GUI, under the Controller > Interfaces window, the dynamic interface is configured.

  • Click  Apply  on this window.

This takes you to the Edit window of this dynamic interface (VLAN 10 here).

Enter the IP Address and default Gateway of this dynamic interface

Note:  Because this document uses an internal DHCP server on the controller, the primary DHCP server field of this window points to the Management Interface of the WLC itself. You can also use an external DHCP server, a router, or the RADIUS server itself as a DHCP server to the wireless clients. In such cases, the primary DHCP server field points to the IP address of that device used as the DHCP server. Refer to your DHCP server documentation for more information.

  • Click  Apply .

Now you are configured with a dynamic interface in your WLC. Similarly, you can configure several dynamic interfaces in your WLC. However, remember that the same VLAN ID must also exist in the RADIUS server for that particular VLAN to be assigned to the client.

Configure the WLANs (SSID)

This procedure explains how to configure the WLANs in the WLC.

  • From the controller GUI, choose  WLANs > New  in order to create a new WLAN.

The New WLANs window is displayed.

  • Enter the WLAN ID and WLAN SSID information.

You can enter any name to be the WLAN SSID. This example uses VLAN10 as the WLAN SSID.

  • Click  Apply  in order to go to the Edit window of the WLAN SSID10.

Normally, in a wireless LAN controller, each WLAN is mapped to a specific VLAN (SSID) so that a particular user that belongs to that WLAN is put into the specific VLAN mapped. This mapping is normally done under the Interface Name field of the WLAN SSID window.

In the example provided, it is the job of the RADIUS server to assign a wireless client to a specific VLAN upon successful authentication. The WLANs need not be mapped to a specific dynamic interface on the WLC. Or, even though the WLAN to dynamic interface mapping is done on the WLC, the RADIUS server overrides this mapping and assigns the user that comes through that WLAN to the VLAN specified under the user  Tunnel-Group-Private-ID  field in the RADIUS server.

  • Check the  Allow AAA Override  check box in order to override the WLC configurations by the RADIUS server.
  • Enable the Allow AAA Override in the controller for each WLAN (SSID) configured.

When AAA Override is enabled, and a client has AAA and controller WLAN authentication parameters that conflict, client authentication is performed by the AAA (RADIUS) server. As part of this authentication, the operating system moves clients to a VLAN returned by the AAA server. This is predefined in the controller interface configuration.

For instance, if the corporate WLAN primarily uses a Management Interface assigned to VLAN 2, and if the AAA Override returns a redirect to VLAN 100, the operating system redirects all client transmissions to VLAN 100 even if the physical port to which VLAN 100 is assigned. When AAA Override is disabled, all client authentication defaults to the controller authentication parameter settings, and authentication is only performed by the AAA server if the controller WLAN does not contain any client-specific authentication parameters.

Continue Reading:

CONFIGURE INTERFACES ON WIRELESS CONTROLLER 5508

Wireless Interview Questions

ABOUT THE AUTHOR

cisco dynamic vlan assignment active directory

I am here to share my knowledge and experience in the field of networking with the goal being – “The more you share, the more you learn.”

I am a biotechnologist by qualification and a Network Enthusiast by interest. I developed interest in networking being in the company of a passionate Network Professional, my husband.

I am a strong believer of the fact that “learning is a constant process of discovering yourself.” – Rashmi Bhardwaj (Author/Editor)

Related Posts

32 BITS VS 64 BITS operating system

Difference between 32 bits & 64 bits Operating System

benefits of Cloud Hosting

Why Should You Seek the Services of a Cloud Hosting Solution for Your Business?

HIPAA Compliance and Data Breaches

HIPAA Compliance and Data Breaches: How to Protect Your Patients’ Data

Leave a comment cancel reply.

Your email address will not be published. Required fields are marked *

LOOKINGPOINT

  • Collaboration
  • Data Center
  • Managed Services
  • Assess and Design
  • Wireless Surveys Assessments
  • Project Management
  • Lifecycle Management
  • Integration Center
  • Locations Serviced
  • Wireless Survey Assessment
  • +1 925-566-3480

phone@2x

  • Free Consultation

Home Blog Cisco ISE – Basic 802.1X Policy Set w/ AD Group Based Authorization

security network security ISE Cisco ISE Identity Services Engine Group Based Authorization ISE Policy network access security policy AD Group

In our previous entries to this series , we’ve deployed ISE , integrated it with Microsoft AD, and configured the ISE server-side certificates.  All of that being completed, we are now ready to configure our Policy Set for 802.1X and test it out.

The Scenario..

For our example here, we will be using 802.1X with PEAP-EAP-TLS authentication for one (shared) domain-joined Windows computer and two different users logging into the shared PC.  We need to create an ISE Policy set to enact the businesses Network Access Security Policy, which states:

  • When no user account is logged-in to a Windows domain-joined computer, that computer should only have access to the Microsoft AD Domain-Controller in order to receive GPO updates and process user logons.
  • All domain-user accounts should only have access to browse to secure websites.
  • All domain-admin accounts should have full, unobstructed access to the network.

Piece of cake. 

First, lets review what we’ve already completed behind the scenes..

In an effort to limit the scope of this post, we have already done some heavy lifting.  Don’t worry, we’ve covered all of that work for you in previous blog posts. 

What we have already done:

Untitled design (5)-1

               - [email protected]  (member of Domain-Users)

             - [email protected] (member of Domain-Admins)

(Before you try it, we’ve already deleted these users by the time your reading this!)

How should we accomplish the role-based access control?

We have a few different mechanisms in which we can enforce the access restrictions on the domain-user account. 

  •  This is the legacy approach. Anytime we call something legacy, what we really mean is that we don’t like “it” and we now have way better methods of accomplishing what “it” did.  This solution doesn’t scale, its not sexy, and we can have a sidebar later around all the issues you can run into with client DHCP renewals in various CoA scenarios.
  • This is better than VLAN assignment and commonly deployed still today...when we have to. This prevents a problem any time I want to make a modification to the ACL.  Since the ACL is configured on the access device (NAD), we’d need to have good, centralized configuration management tools or this approach can become operationally unwieldy.
  • Ah the downloadable ACL. Holy grail?  Not quite, but it beats the hell out of having to manage an ACL on each access device.  With this approach we can at least make ongoing ACL updates from a central location (ISE) and those updates take effect anytime the ACL is downloaded thereafter by the NAD.  The main issue here (along with #2) is that across time, the size of this ACL may become too big to be loaded in memory of some access devices.  In our scenario, where we aren’t using any IP addresses in the ACL, it works fine.  When you begin to define many different destination IP’s/subnets in the ACL, this is where the scale problems come in over time.
  • Group-based segmentation. The high-level concept here is that we never reference IP addresses in our ACL’s.  Instead we assign things to security groups and we write policy based on layer 4-7 information, from source group to destination group.  This is the way of the future for micro-segmentation.  This solution is still largely proprietary, but continuously being adopted by more vendors in one form or another.  We haven’t provided you enough background in this series yet in order to select this enforcement technique for this blog (without increasing blog scope too much), so that is why we’ll pass on it for now.  We’ll cover it before we are done with this series.

Ok, let’s go!  AD Group Import to ISE

We will start off by making sure we’ve got all the AD groups pulled into ISE that we want to use in our policies.  After navigating to Administration > Identity Management > External Identity Stores > AD Instance > Groups tab, we can see that we haven’t yet imported our domain admins group.

AD Group Import to ISE

No biggie.  We’ll click that Add button and pull it in.

AD Group Import to ISE

There we go, that looks better.  Save.

Policy Sets – Let’s Review

Let’s have a little primer on what Policy Sets are and how they get evaluated in ISE.  Policy Sets are different collections of Authentication (AuthC) Rules and Authorization (AuthZ) Rules that apply to various use-cases in the ISE deployment.  Being that we can have many Policy Sets in an ISE deployment, how does ISE know which one to use for a given authentication request?  Great question and thanks for asking!  ISE applies matching criteria to each policy set.  The matching criteria can be based on a combination of network access device (NAD) attributes and/or authentication protocols (EAP-TLS, PEAP-MSCHAP-V2, PAP, etc..). 

The policy sets reside in an ordered list.  The matching criteria are evaluated top-down, with the first matching policy set being selected.  Knowing this, we can understand that if we will end up with overlapping matching criteria between two (or more) different policy sets, we need to order the policy sets with more specific matching criteria higher than the more generic, overlapping ones.  As a second “sorting” best practice, you should order the most commonly used policy sets as close to the top of the policy set list as possible.  This saves ISE from having to evaluate the less frequently used policy set matching criteria on every request that will end up matching your most popular policy set.  This isn’t critical for small scale deployments, but can make a big difference in large scale distributed deployments. 

Policy Sets – Our Matching Criteria

For our purposes of this post, we’ll create a policy set with the following matching criteria.

  • Wired is matched based on the RADIUS NAS-Port-Type equaling “Ethernet”
  • 1X is matched based on the RADIUS Service-Type equaling “Framed”
  • ISE comes with a pre-built condition that uses these attributes, we’ll use it.
  • For this we will make a custom “Allowed Protocols” list where the only protocol selected is PEAP-EAP-TLS. This can be created at Policy > Policy Elements > Results > Authentication > Allowed Protocols.  For our example, we made one called “PEAP-EAP-TLS”.
  • ISE comes with a default Allowed Protocols list that allows for PEAP-EAP-TLS amongst others. As a best practice, we are creating a custom Allowed Protocols list to meet only our requirements.

Here is what it looks like all put together:

ISE Allowed Protocols

Policy Sets – Our Authentication Policy

The first thing that happens after we match our policy set (in this case meaning we have received an authentication request for Wired 802.1X using PEAP-EAP-TLS) is the actual authentication of the 802.1X supplicants supplied credential (a certificate in this case since we are using PEAP-EAP-TLS).  So, how do we authenticate certificates??  Just like everybody else on the planet does.  Mainly, we need to (1) trust the issuing CA/CA chain for client authentication and (2) the client (and CA) certificates needs to be within its validity period.

To this end, let’s take a quick peek at an example of the client’s public certificate that will be presented in EAP-TLS.                      

Authentication Policy

By looking at this certificate, we know that ISE needs to trust the “lookingpoint-PHDC01-CA” certificate for client authentication in order to successfully authenticate this certificate.  No problem, we’ll upload that certificate through the ISE administration portal here:  Administration > System > Certificates > Certificate Management > Trusted Certificates (oh, and this will only need to be done on the PAN.  PAN will replicate this to all secondary ISE nodes.  Thanks PAN!).

ISE administration

Sweetness, now that we have a CA trust established, are we ready to write our authentication rule??  Almost my friends, almost.  Remember how we need to differentiate access based on AD security group membership?  If you’ve been following closely, you see what I’m getting at.  How are we checking for AD group membership?  We are using certificates and can authenticate them independently of AD.  We never have to interact with AD to authenticate the client’s certificate!  Oh, no!  Design flaw.  Scratch the whole thing.  I quit. 

Not so fast, seems that Cisco thought of this too.  We don’t have to use AD for authentication in order to use AD user attributes to authorize the user.  We do however need an identity of the user in order to lookup those AD attributes.  This is where Certificate Authentication Profiles come in.  Lets head on over to Administration > Identity Management > External Identity Sources > Certificate Authentication Profile to create one.  First though we need to know which field in the certificate we should look for the user’s identifying information.  Let’s look at the client’s certificate again.

Certifiicate Authentication Profiles

Great Scott!  It appears we have identifying information in the Subject Alternative Name field!!  We’ll setup the Certificate Authentication Profile as follows.

Certifiicate Authentication Profiles

As an added layer of protection, you could ensure the certificate matches a certificate stored in AD for the user.  Whether or not this certificate is stored in AD would be dependent upon the certificate template configuration it was created from.  For now, we’ll just leave the default “Only to resolve identity ambiguity” checked (multiple accounts have the same identity attribute we grabbed from the certificate – not likely but could happen).  Ok, make sure you saved that.

My kid: “Can we make our authentication policy now?” 

Me: (long pause – no reaction – waiting for magic word)

My kid: “Pleeeease?”

Yes, we’re ready.  We’ll navigate to the policy set we created in the previous section and click the right-facing arrow on the right-hand side of the page to go inside and configure the authentication rule.

Certifiicate Authentication Profiles

The first thing we should do in Deny Access to the default authentication rule (I’m personally not keen on using defaults for anything – lets be specific).  Next, we’ll add our good rule above the default.  In this case, we’ve created a rule that matches certificates issued by “lookingpoint-PHDC01-CA” and uses the lookingpoint_PHDC01_CA Certificate Authentication Profile we created the previous step.

Certifiicate Authentication Profiles

Policy Sets – Our Authorization Policy

After we have successfully authenticated the computer/user certificate, we move onto evaluate the authorization policy (if the certificate authentication fails, we do not evaluate the authorization policy, instead we send an access-reject back to the NAD straight away).  Now, based on the requirements set forth at the outset of this post, we need to create three different authorization rules.

  • Should apply a DACL limiting access to the AD Domain Controllers / DNS / DHCP
  • Should simply permit access (no filter applied)
  • Should apply a DACL limiting access to secure web browsing / DNS / DHCP

For the authorization rule conditions, we’ll simply match on AD group membership.  In order to reference the DACL, we first need to create it, and the Authorization Profile that references it.  Then (and only then) we will be ready to create our Authorization Rules in the policy set.

We can create the DACL’s we need by navigating to Policy > Policy Elements > Results > Authorization > Downloadable ACLs > Add.

Domain Computers DACL

Domain Computers DACL

DACLs, check!  Now we can create the authorization profiles that will reference them by navigating to Policy > Policy Elements > Results > Authorization > Authorization Profiles > Add.

Domain Computer AuthZ Profile

Domain Computer AuthZ Profile

Domain User AuthZ Profile

Domain Computer AuthZ Profile

Authorization Profiles, check!  Now we are finally ready to tie this all together in our authorization policy.  Let’s navigate back to our authorization policy and create three rules; one for domain computers, one for domain users, and one for domain admins.

Here’s what that looks like!

ISE Authorization Profiles

The order of the rules above for domain user/admin are important as our domain admins will also be members of domain users (but the same is not true in reverse).  So you have an idea of what is inside those conditions above (Domain Computer, Domain Admin, and Domain User), here is what the Domain Admin condition contains.

ISE Domain Admin

We’re done!  Err..wait...should we test?

OK – Let’s Test!

I thought you might be interested to see if any of this actually worked.  Here we go.  For validation, we will look for the DACL applied to the switch port our computer is connecting to. 

Let’s see what happens when nobody is logged into Windows

DACL applied

Looks good!

Now, let’s see what happens when a domain user logs into Windows

DACL applied

Looks good! 

Now, let’s see what happens when a domain admin logs into Windows

ISE Domain log

Damn, we’re good.

What’s Next?

Hope you enjoyed this recent series of posts!  Being that we alluded to using SGT’s and SGACL’s as an option (in lieu of DACL’s, which we covered here), I think it is high time we introduced you to Cisco TrustSec micro-segmentation!  Be on the lookout for the next post!

Check out our awesome tech talk on ISE:

  Written By:  Dominic Zeni, LookingPoint Consulting Services SME - CCIE #26686

  If you are interested in LookingPoint installing ISE into your network, feel free to contact us here! 

CONTACT US

  • cybersecurity
  • collaboration
  • cisco webex

Latest Tweets

Subscribe to our blog, get new unique posts.

logoLates

  • Privacy Policy

Looking Point Inc. 2019

  • Skip to content
  • Skip to search
  • Skip to footer

2024 Template Guidelines and Instructions

Available languages, download options.

  • PDF (4.1 MB) View with Adobe Reader on a variety of devices
  • ePub (20.4 MB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
  • Mobi (Kindle) (5.8 MB) View on Kindle device or Kindle app on multiple devices

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

  • Open a TAC Case Online
  • US/Canada 800-553-2447
  • Worldwide Support Phone Numbers

Feedback

Table of Contents

Definitions of Styles tags to use

Outcomes and Requirements

Design Approach

High Level Journey

“ As Is” vs “To Be”

Occupancy Reference Architecture

Network High Level Design

Physical Infrastructure Overview

OT PoE Network Design Overview

IoT Partner PoE Technology Solutions

Wireless Network Design Overview

Webex Control Hub Integration

IoT Wired Gateway

Smart Workspace Application

Energy Utilization Application (Beta)

Meraki MV12 Security Camera

Webex Collaboration Devices

Webex Room Hub

Device Management

PoE Analytics

Architecture

Deployment Architecture

High Availability Design

Identity Services Engine (ISE)

Cisco DNA Center

Cisco DNA Infrastructure

Cisco Spaces

Webex Control Hub, Meeting Site Creation, Call Setup

WLAN Controllers and Access Points

End User and Hybrid Work Device Onboarding

Physical Collab Device Setup

Cisco Spaces, Webex Control Hub Integration, and Signage (Rich Maps)

Guest Access

Connecting Systems and Data (API/SDK)

Monitoring and Troubleshooting

Voice Assistant

How to use the template

Title guidelines and best practices:

●      100 Character Maximum (this includes spaces)

●      Make sure that the title mentions Cisco technology first

●      Manager should propose the title

◦      Titles should be brief and convey specific coverage

◦      Should follow marketing guidelines for co-branded documents

●      Partners should agree to the title prior to final publication

●      There are never to be dates in the title

●      SW versions in the title should be included sparingly, and used as a differentiator from a previously published document

Related image, diagram or screenshot

Note:     All headings are followed by the Body style tag.

Use the following Style tags in your document. These are the approved Styles tags that have been incorporated into the AEM template for publication. Using style tags outside of the approved tags will result in rendition problems and possibly rendition failures.

For heading level 1 use ToC_Subhead1

For heading level 2 use ToC_Subhead2

For heading level 3 use ToC_Subhead3

For heading level 4 use the Body style tag and apply bold. Currently, Toc_Subhead4 hasn’t been integrated into the AEM template. Stay tuned.

Body Text Indent, Code

Bullet_Indent

Bullet2_Indent

CellBullet2

Confidentiality

FigureCaption

Numlist_Indent

Procedure Heading

Step_Indent

TableCaption

Title Headline

Title subhead

TOC 1 and ToC_Contents is used by AEM (publishing tool) and not to be applied in your document but is included in Styles

ToC_Subhead1

ToC_Subhead2

ToC-Subhead3

The following are examples of what some of the Style tags look like:

This is the Body tag.

●      Bullet

◦      Bullet2

Confidentiality is used for the text in the header.

Copyright is applied to the copyright at the end of a document.

Hyperlink is used when you link to an external document or web page, or a document cross-reference.

Note:     This is Note.

Use Tech tips sparingly, and don’t stack them. They are good for pointing out traps, things easily missed, or perhaps avoidance of DDTS and field problems where you don’t want to call competition attention to an actual bug, but you want to steer readers away from triggering a problem.

Procedure 1.      This is Procedure Heading

Step 1.     This is Step1.

This is Step_Indent

Command (this is Body Text Indent,Code)

A yellow smiley face with blue eyes and a thumbs upDescription automatically generated

Note:     Apply the Body tag to images.

Note:     Do not apply the FigureCaption tag to images in numbered steps.

this is a Numlist_indent

Use Tech tips sparingly, and don’t stack them. They are good for pointing out traps, things easily missed, or perhaps avoidance of DDTS and field problems where you don’t want to call competition attention to an actual bug, but you want to steer readers away from triggering a problem.

Table 1.         This is TableCaption

Header A (this is Cellhead1)

Header B

Header C

Header D

Header E

A1 (this is Chart_body)

This is CellBullet

    This is CellBullet2

B1

C1

D1

E1

A2

B2

C2

D2

E2

A3

B3

C3

D3

E3

A4

B4

C4

D4

E4

Copy and paste this table and add or delete cells as needed. Styles for header and body are “Cellhead1” and “Chart_body.” Why is the top-left cell dark blue? It doesn’t matter – ignore it and it will render correctly. It’s not WYSIWYG, unless you save as PDF, in which case people will ask that question, and you’ll have no good answer.

The following content is the template with sample content. This was used to publish the Cisco Penn 1 Hybrid Work from Office Case Study .

This concludes the guidelines and instructions section. Delete this section when the document is ready for publishing.

*********************************************************************************************************

Introduction

A sign on a buildingDescription automatically generated

Cisco’s PENN 1 office located in Midtown Manhattan, New York City is one of Cisco’s newly reimagined office spaces designed to provide the ultimate hybrid work experience for employees and visitors while also leveraging smart building technology to help reach Cisco’s sustainability goals and provide real estate and facilities teams the operational insights needed to understand how the space is being used. The PENN 1 office was the first of its kind at Cisco and as such, was a learning experience. This document provides a case study of how networking and collaboration technologies were deployed alongside smart building technology and sensors providing a sustainable hybrid work experience. This document attempts to highlight some of the lessons learned but is not intended to be a generic design guide and not all decisions made for this deployment will apply to all customer use-cases. Technology has also evolved since the office was open and when applicable, we will note changes that have been incorporated into newer offices.

For a quick video tour of the office, please visit this link . This document views the deployment of hybrid work technologies at PENN 1 from a more technical lens, highlighting some of the devices and design decisions that were made. For more detail into the spaces and some of the architectural design decisions made, please take a look through the look book here .

As is the case with any production deployment, implementing such a solution requires a phased execution approach. Phases of implementation and the realization of targeted outcomes and requirements at each phase result in a journey map to deliver on the expected end state outcomes and business impact. In addition to streamlining operations, after the execution of each phase, the team leveraged learnings as well as knowledge of capability roadmaps to identify and implement appropriate optimizations.

The PENN 1 office was initially created as a proof of concept and as such, many of the technologies used had no pre-existing IT standards for their deployment. Additionally, there was a desire to reimagine the purpose of the office which required rethinking how space was allocated. As a result, a virtual team was created of subject matter experts from Cisco’s IT, sales, and workplace resources organizations, who were responsible for designing and deploying the office and then taking the learnings to create new IT standards that could be leveraged for future offices. This effort took place through 2021 and early 2022, so design decisions made here should be viewed through the lens of the state of the art at that time. Additionally, supply chain issues at the time influenced some of the product choice decisions. The document will point out alternate product selections that have been used in newer offices that have been implemented since the opening of PENN 1.

The goal of the office was to deliver on the following outcomes:

●      Transform all office workspaces, from open area seating, quiet rooms, and huddle rooms all the way to large collaboration spaces, meetings rooms, and training rooms. The goal was to create an environment that was more conducive to collaborative experiences (“we” spaces).

●      Connect people in new ways when they are in the office while being inclusive of remote participants, recognizing that 98% of all meetings will have at least one remote participant.

●      Help Cisco reach its sustainability goals by leveraging low-voltage technologies and automation to power as much of the infrastructure as possible.

●      Enhance health and well-being as well as provide a safe workspace that employees can trust.

Requirements associated with solution deployment also mapped directly back to Cisco's external solution messaging. Therefore, it shouldn't be a surprise that solution requirements at a high level were inclusive of:

●      Frictionless Employee and Guest Experience

◦      Secure, high-performance, enterprise-grade connectivity (Wireless and Wired)

◦      Pervasive Video Collaboration for all workspaces (Desk, Conference, Huddle)

◦      Signage (Occupancy, Safety, Environment)

◦      Interactive Signage (Find Points of Interest, Workspaces, Conference Rooms)

◦      Ad-Hoc Room Booking / Hot-Desking

●      Smart Workspaces

◦      Reporting & Dashboards for Workspace Occupancy, Environment (Temperature / Humidity), and Safety (Air Quality)

◦      API integrations with building management systems

◦      Data Export to cloud storage for consumption of historical raw data

●      Facilities Management / Reporting

◦      Workspace Occupancy and Utilization Reporting / Dashboards

◦      Workspace Environment & Safety Reporting / Dashboards

◦      Occupancy and Environmental Data Pipeline for Building Management Systems / custom integrations.

The team leveraged an outcome focused design strategy while considering the following:

A checklist with green ticksDescription automatically generated

With a specific focus on Hybrid Work from Office, the customer journey of building the PENN 1 office included the following phases:

●      Modernizing the infrastructure

●      Designing for digital building/smart building capabilities

●      Automating the deployment of the required wireless and wired capabilities to accommodate the rollout of location analytics

●      Implementing integrated security leveraging Identity Services Engine (ISE) to ensure asset visibility and access control

●      Deployment of Webex collaboration devices and Cisco Spaces

●      Deployment of IoT technologies (Meraki cameras, Molex, Igor, and Mecho PoE lighting, shades, sensors, and controls)

In addition to IT operations related considerations, the design and implementation teams had to ensure that all technology decisions were aligned to overall architectural goals. This is different than having various technologies randomly added over time without end state outcomes and requirements guiding decisions. When optimizing for collaborative “we” spaces rather than the traditional “me” space, the team understood that collaboration is not a single activity. Sharing information, making decisions, and brainstorming each has a specific set of technology requirements (single or dual display, display size, video-centric vs. interactive board). Once defined, the team was able to focus on the details that supported the activity. They were able to work with facilities management to refine things like table shape and orientation, surface size, the posture of seating, as well as the overall layout of the space including ambiance, density, and acoustics. Additional details associated with the process to design for a unified collaborative experience are not included as part of this documented case study.

The As Is state was no different than any typical office with cubicles, private offices, and large conference rooms. The goal was to transform the large conference room spaces to spaces that would provide an immersive video conferencing experience built for the modern hybrid workforce. Instead of having a large footprint of private offices, there was an expectation to transform these areas into small huddle spaces to support ad-hoc collaborative engagements. Spaces occupied by cubicles would need to be transformed into areas available for hot-desking as well as provide enough of a footprint for a community lounge area.

In the end, the office was split into two distinct areas. One half of the office is considered open to customers and guests while the other half is employee-only space. Larger conference and collaboration spaces are all located in the customer side while smaller huddle spaces, open area seating, and quiet rooms are in the employee-only side.

A design decision was made to make only larger spaces bookable through the calendaring system while smaller spaces are available on a first-come, first-served basis to optimize space utilization. Cisco Spaces, covered later in this document, facilitates the ability for employees to find the spaces they need when they need them.

A diagram of a buildingDescription automatically generated

A variety of different spaces were created, each with a distinct purpose. For example, some spaces are designed to accommodate large meetings while others are designed for whiteboarding and real-time brainstorming activities.

A collage of a meeting roomDescription automatically generated

For a more in-depth look into how each of the individual spaces was built including CAD drawings of the spaces, furniture used, acoustic treatments, power, data wiring, and more, design guides are available for each type of room. Please visit this site and fill out the form to gain access to the detailed design documents.

The office had to be designed to capture and leverage occupancy data and integrations with Webex Control Hub and 3rd party systems to take advantage of that data in a way that delivered on the agreed upon outcomes and requirements previously specified.

A screenshot of a computerDescription automatically generated

The PENN 1 Environment

This section highlights details related to the topology, hardware, software, and design selections that were made as part of the PENN 1 Hybrid Work from Office deployment.

Cisco maintains a variety of network standards and the target network design for the deployment at PENN 1 is based on the Cisco “Gold” Topology standard.

A diagram of a computer networkDescription automatically generated

You may notice that the environment at PENN 1 isolates the IT and OT environments, keeping OT devices such as PoE lighting, shades, and IoT devices in a network outside the standard IT environment. Future deployments will converge the IT and OT stacks into a single infrastructure and eliminate the dedicated DC and OT gateways for easier manageability. The decision to keep IT and OT networks separate was purely one of roles and responsibilities of managing the networks as opposed to technical limitations.

The office also includes a small Hyperflex-based datacenter environment to host virtual machines needed to control/manage the low voltage and IoT systems needed to create a smart building. These applications are detailed later in this document.

Wired Design, Platforms, and Connectivity

Infrastructure Cabling

The PENN 1 office is 54,000 sq ft requiring 2 wiring closets [1 Building Distribution (BD) and 1 Floor Distribution (FD)] to meet the Ethernet distance requirements. The diagram below provides details on the fiber and copper infrastructure cabling between the Minimum Point of Entry (MPoE), 9.1 BD racks, 9.2 FD racks, and Customer Experience Center (CXC) rack.

A diagram of a computer networkDescription automatically generated

The PENN 1 cabling design separated the endpoint cabling drops so the Production IT Access Network drops for the production wired and wireless desktop networks were terminated in the 9.1 BD and 9.2 FD IT racks, and the Operational Technology PoE Network drops for the PoE lighting, shading and HVAC control were terminated in the 9.1 BD and 9.2 FD OT PoE racks.

A close-up of a computerDescription automatically generated

The brand new 23AWG yellow patch cables used for the OT PoE Network are made from recycled cables from the previous Cisco office deployment, helping to further Cisco’s sustainability goals through recycling.

UPS Strategy

There are many different strategies for providing backup power during power outages and one of the challenges with the addition of new POE powered IOT endpoints such POE lighting and shading is balancing the cost, size, and weight of the battery backup solution versus the desired runtime for various IT and OT POE powered endpoints.

A screenshot of a computer serverDescription automatically generated

PENN1 was originally deployed with the IT network leveraging the All on UPS strategy and the OT network leveraging the None on UPS strategy, but now with more insights into our energy usage we are moving towards a UPS strategy driven by our PoE endpoint Service Owners and their UPS runtime requirements. As shown in the table above, certain Service Owners might require a 60-minute runtime and other Service Owners might not care if their POE endpoints go down so with a converged network infrastructure the only differentiator is the UPS runtime requirement.

During a building power outage, Cisco workplace policy states that users should vacate the office and PENN 1 has a dual-feed POE and building power emergency lighting solution in case either service is disrupted.

In order to gain insights into energy usage and capture historical energy usage data Raritan PX3-5551V Smart PDUs were deployed in the OT PoE Network 9.1 BD and 9.2 FD racks.

A collage of several computer equipmentDescription automatically generated

The browser interface of the Raritan iX7 PDU controller module allows easy access to the configurations and to the power and monitoring data.

We are leveraging Sunbird Power IQ to capture the historical energy usage and manage the Smart PDUs.

A screenshot of a computerDescription automatically generated

Power IQ also allows us to generate various energy usage reports for offices, networks, racks, and IT devices such as Catalyst 9300 stacks, Catalyst 9400 chassis or Cisco UCS servers.

A screenshot of a white paperDescription automatically generated

You can't manage what you can't measure, and the Smart PDUs provide us with the insights into the energy coming into our racks to power our PoE network infrastructure equipment.

The OT network Raritan Smart PDU and the IT network Server Technology Smart PDU energy data is being integrated into the new Cisco Spaces Energy app.

OOB Console Network

Cisco’s standard is for all network devices to have out-of-band async console network connections for management and troubleshooting so all the PENN 1 Catalyst 9300 async management ports patched to the Catalyst 8300 console server.

A computer server with a cableDescription automatically generated with medium confidence

Catalyst 9300

The Catalyst 9300 series C9300-24H and C9300-48H are purpose built for smart building network deployments providing 24 or 48 ports of gigabit ethernet with 90W UPoE+. With 1900W Power supplies installed, the C9300-24H provides 24 ports of 90W UPoE+ and the C9300-48H provides 32 ports of 90W UPoE+. These Catalyst 9300 series switches provide power redundancy features (redundant power supplies, StackPower, Port Priorities), PoE redundancy features (Perpetual PoE, Fast PoE, 2-Event Classification) and PoE Assurance features (Telemetry, Analytics Widgets, Troubleshooting). The switches are IEEE 802.3bt compliant and backwards compatible with all PoE Standards and additional switching details for these models can be found by accessing this data sheet .

A close-up of a switchDescription automatically generated

For the PENN 1 deployment, the C9300-24H was chosen for supply chain availability and capability to provide 90W UPoE+ on all 24 ports. Now that the new C9300X models are available, future IT deployments will utilize the C9300X-48HX with 1900W power supplies which can provide 36 ports of 90W UPoE+.

HyperFlex M5 Edge with Intersight

The Cisco HyperFlex M5 Edge with Intersight was chosen for its high availability to provide the local onsite compute resources required by the PoE lighting and shading deployments. Lighting vendor motion/occupancy detection and action requires low-latency response from the lighting management applications to provide a good end-user experience. (i.e., user walks into a conference room and the lights turn on immediately instead of having a several second delay).

A blue rectangular box with several wiresDescription automatically generated with medium confidence

The required HyperFlex Edge VMs were configured according to the IoT partner published specifications.

A close-up of a computer programDescription automatically generated

The following is the PENN 1 as-built network overview diagram of the IT and OT networks. As mentioned earlier, the OT infrastructure at PENN 1 was built as a POC environment, so Cisco considered that part of the network to be a “lab” environment that must adhere to different requirements than a standard infrastructure. Although the “lab” nomenclature is used, this is indeed a production deployment.

A diagram of a networkDescription automatically generated

As previously mentioned in the Infrastructure Cabling section, the PENN 1 cabling design separated the IT and OT networks with the IT wired and wireless cabling drops terminating in the IT racks and the OT 90W PoE cabling drops terminating in the OT racks. Thirty C9300-24H were installed in the OT racks to support the Molex lighting/sensors, Igor lighting/sensors, Mecho shading/sensors, Teknion Connected Desks/sensors, Delta Controls VAV, Raritan PDUs, and Anker USB-C data/power adapters (all described in further detail later in this document).

The OT PoE access layer switches were deployed leveraging the Campus LAN Layer 2 Access with Simplified Distribution Cisco Validated Design (located here ).

The decision to use the Campus LAN Layer 2 Access with Simplified Distribution was driven by the desire to reduce complexity by running fewer protocols and increase resiliency. In the simplified distribution layer, the distribution-layer node consists of a single logical entity that can be implemented using a pair of physically separate switches via StackWise Virtual operating as one device or using a physical stack of switches using StackWise operating as one device. Resiliency is provided by physically redundant components like power supplies, supervisors, and modules, as well as stateful switchover to redundant logical control planes. Also, little or no tuning is required to provide near-second or sub-second convergence around failures or disruptions.

The OT PoE access layer switch ports were configured using the Deploying 90W Cisco UPoE+ with Cisco Catalyst 9000 Switches Deployment Guide and the guide can be found here .

For PENN 1, the decision was to allocate a dedicated a VLAN for each IoT partner. The IP subnet sizing was driven by the number of the IoT partner endpoints deployed in each VLAN. Some of the subnet sizing was also driven by limitations of IoT vendors’ devices (e.g., some vendors do not support subnets larger than a /23) and 4 of the VLANs were configured with Port-based DHCP.

A table with numbers and symbolsDescription automatically generated

To support the IoT partner lighting and shading IP network commissioning requirements, there are several DHCP IP address assignment options for the various 90W UPoE+ endpoints.

The first option is DHCP using DHCP server reservations which statically binds the endpoint MAC address to IP address so that the IP addressing remains consistent for lights and wall controllers placed together in rooms. The DHCP reservations are simple to implement but hard to scale and maintain because when a UPoE+ endpoint fails and must be replaced, the DHCP server reservation must also be manually updated for the new MAC address.

Port-based DHCP is the second option that assigns/binds a specific IP address to a specific switch port so that no matter what device/MAC address is connected to the switch port, it will always receive the same IP address. For example, if switch port gi1/0/1 is configured with port-based DHCP IP address 10.1.1.1, any device connected to this port will be assigned 10.1.1.1. Port-based DHCP can be configured on a C9300 switch stack using the IOS-XE DHCP Server and the main advantage is that no external DHCP Server is required, which is great for isolated deployments. The major disadvantage is if you have multiple switch stacks in your network, then each stack requires its’ own IOX-XE DHCP Server to be configured which limits the scalability of this DHCP option. Additional information on Port-based DHCP running on C9300 IOS-XE is located here .

The third option is DHCP Option 82 which is also known as the DHCP Relay Agent Information. DHCP Option 82 enables the DHCP server to allocate dynamic IP addresses based on the relay information inserted and sent by a relay agent. The C9300 switch stacks can be configured to insert relay information (Circuit ID and Remote ID) by enabling DHCP Snooping and the DHCP server can be configured to assign specific IP addresses based on the received relay information so that no matter what device/MAC address is connected to a specific switch port, it will always receive the same IP address.

At the time of the PENN 1 deployment, Cisco’s global DHCP infrastructure did not support DHCP Option 82, so Port-based DHCP was configured on the 5 C9300 switch stacks in PENN 1. Since that time, the DHCP infrastructure has been upgraded so that our more recent Smart Building deployments are leveraging DHCP Option 82.

The HyperFlex Edge VM IP addressing was assigned for each of the IoT partner VLANs.

A table with numbers and linesDescription automatically generated

You should now have insight into the PENN 1 OT PoE network design, platforms, connectivity and VLAN and IP assignments. The next section provides a brief overview of the IoT Partner PoE Technology Solutions showcased at PENN 1.

Molex Lighting

The Molex PoE lighting solution installed in PENN 1 covers 60 percent of the 54,000 sq ft.

A close-up of a light switchDescription automatically generated

The Molex PoE lighting solution consists of both hardware and software. The following is the device count for the hardware installed in PENN 1:

●      107 - PoE Constant Voltage Gateways

●      336 - PoE Gateway 2.0

●      6 - PoE Wireless Gateways

●      746 - LED Drivers

●      87 - Wall Switches

●      121 - Advanced Lighting Sensors

●      13 - Advanced Environmental Sensors

The Molex PoE lighting solution software includes the following applications:

●      CoreSync Manager

●      API/BACnet Gateway

●      Design Tool (included with CoreSync Manager)

●      Facility Manager

●      MoDiag (included with CoreSync Manager)

Here is an overview diagram for how the Molex POE Gateway, LED Driver, Wireless Gateway, and Advanced Sensors are connected and deployed at PENN 1 with the goal to maximize the usage of each 90W UPoE+ port on the PoE Switch by daisy-chaining multiple fixtures:

A diagram of a light systemDescription automatically generated

The following is the Design Tool interface where all the physical lighting fixtures are added to the floorplan.

A computer screen shot of a blueprintDescription automatically generated

Once all the lighting fixtures have been added, user zones are created to group the fixtures into rooms or spaces and assign a lighting schedule or actions. A user zone can be programmed to turn on/off at specified times or triggered by activity detected by a motion sensor.

A computer screen shot of a blueprintDescription automatically generated

The Facility Manager is utilized by local support to monitor and manage the Molex PoE lighting solution.

A screenshot of a computerDescription automatically generated

Initial commissioning of the Molex POE lighting solution is performed using MoDiag and it also used for troubleshooting and upgrading Molex device firmware.

A screenshot of a computerDescription automatically generated

Igor Lighting

The Igor PoE lighting solution installed in PENN 1 covers the other 40 percent of the 54,000 sq ft space. Typically, an office space would only have one PoE lighting vendor, but with PENN 1 being a Smart Building showcase, a second PoE lighting vendor was chosen for the deployment to compare and contrast product capabilities and test interoperability with the Cisco network.

Note that as of this writing, Igor has gone out of business and their products are now being supported by Digital Building Solutions ; however we are still leaving the information regarding our deployment of the Igor solution here just to document the as-is state of PENN 1 and lessons learned. You will see how the solution is very similar to the Molex deployment.

Here is an overview of the Igor architecture and components with the sensors, luminaires, and wall controls connected to the Igor Network or Device Nodes. The Igor Network Nodes connect to the C9300 90W UPoE+ switches, and the Igor Gateway Software runs on the HyperFlex Edge VM, which communicates with the Igor Cloud Portal.

A diagram of a computer componentDescription automatically generated with medium confidence

The Igor PoE lighting solution consists of both hardware and software. The following is the device count for the hardware installed in Penn1:

●      27 - Rev 5 60W Standard Network Nodes

●      150 - Rev 6 90W Linear Network Nodes

●      46 - Rev 7 90W CV Network Nodes

●      61 - Device Nodes

●      39 - Light, motion, temperature sensors

●      16 - Wall Controls

The Igor PoE lighting solution software includes the following applications:

●      Gateway Software

●      Node Configuration Manager

●      Firmware Updater

Here is an overview diagram for how the Igor Network and Device Nodes are deployed at PENN 1:

A diagram of a systemDescription automatically generated

The C9300 switch port provides 90W UPoE+ to the Igor Network Node which is required for power and data negotiation with the C9300 switch. Depending on the wattage of the lighting fixtures, there could be one or more Device Nodes connected to the Network Node with the goal to fully utilize the 90W provided by each switch port.

The Igor Gateway Software Dashboard provides a web browser interface for configuration and monitoring of the Igor PoE lighting solution.

A screenshot of a computerDescription automatically generated

The Igor Nexos Cloud Portal provides a web browser interface for access to historical data, utilization, and insights; however, our design goal was to aggregate this data into Cisco Spaces along with other data points to have Cisco Spaces provide a holistic view of the building occupancy.

A screenshot of a graphDescription automatically generated

Mecho Shading

The Mecho PoE shading solution implemented in PENN 1 consists of PoE gateways, motors to raise/lower the shades, and the SolarTrac management system.

A grey rectangular object with a black borderDescription automatically generated with medium confidence

There are 39 Mecho motors powered by 39 NuLED PoE gateways and 4 Somfy motors powered by 4 Molex gateways. Typically, all the motors and gateways would be the same, but with PENN 1 being a Smart Building showcase, a second motor and PoE gateway was deployed in the office.

The Mecho SolarTrac management system provides a web browser interface for configuration and monitoring of the Mecho PoE shading solution. The physical PoE gateways with motors are added to the floorplan and indicated by the green circles. The blue triangles indicate the physical light sensors, and the green squares indicate the zones configured for the shades. The SolarTrac management system provides API for the programming of integrated outcomes and voice control of the shades.

A blueprint with green and blue arrowsDescription automatically generated

Delta Controls VAV

PENN 1 leverages building-provided HVAC and supplemental HVAC was added for several of the large conference rooms. An ABM System BMS was installed along with 7 PoE variable air volume controllers, 2 PoE room controllers, and 7 wireless wall controllers. The ABM Systems APIs allow for us to program integrated outcomes, such as adding additional cooling when conference room occupancy count provided by the Webex collaboration units exceeds predefined thresholds.

Several electronic componentsDescription automatically generated with medium confidence

Teknion Connected Desks

PENN 1 has several Teknion Connected Desks leveraging one 90W UPoE+ connection to the C9300 to provide 60W USB-C charging, 5W USB-A charging, and the motorized desk can be raised/lowered. The Teknion desk can also include occupancy, temperature, humidity, and air quality sensors that are integrated with Cisco Spaces and the Smart Workspaces application. The Teknion integrated occupancy sensor provides down to the desk occupancy data for open workspace hot-desking.

A desk with computers on itDescription automatically generated

Anker USB-C Power/Data Adapters

PENN 1 has several Anker USB-C adapters providing 60W of charging capacity and 10/100/1000 Mbps of wired Ethernet connectivity. This allows for desks to be completely powered by PoE, giving the workplace resources teams flexibility and agility to move desks around without having to re-run high voltage power lines.

A black box with a green wire next to itDescription automatically generated

Wireless Design, Platforms, and Connectivity

The wireless network provides ubiquitous data and voice connectivity for employees, guests, and connectivity for IoT devices and is the primary mode of network connectivity at PENN 1. With the emergence of high-density networks and the IoT, organizations are more dependent on wireless networks than ever before. Increasing numbers of devices connect to the network every year, ranging from high-performance client devices to low-bandwidth IoT devices.

Cisco wireless solutions are resilient, have the integrated security organizations need, and employ adaptive and insightful intelligence providing useful insight into the network. With intent-based networking built on Cisco Digital Network Architecture (Cisco DNA), Cisco’s wireless solutions go beyond the latest Wi-Fi 6 (802.11ax) standard and are ready for the growing user expectations, IoT devices, and next gen cloud-driven applications. With the ability to handle the increased mobile traffic (as well as support IoT at scale), Cisco’s first Wi-Fi 6 APs with superior RF innovations expand wireless access with intelligence and provide a secure, reliable high quality wireless experience for all networks.

The wireless network at PENN 1 was designed to scale to the bandwidth and density requirements necessary to support the increased data utilization of these next generation applications. The design and platform selection had to account for today's usage, as well as for additional future demands associated with the introduction of emerging technologies like virtual and augmented reality.

For the PENN 1 wireless network deployment, Cisco leveraged the Catalyst 9800 Series WLAN controllers and Catalyst 9130 Wi-Fi 6 APs. The Catalyst 9800 Series wireless controllers combine RF excellence with Cisco IOS-XE benefits. The Catalyst 9100 Series APs can handle the challenges of the next-generation network.

Two Cisco Catalyst 9800-L wireless LAN controllers are in use at PENN 1 to ensure high availability and sufficient throughput for client needs. Forty-four Cisco Catalyst 9130 Wi-Fi 6 APs are deployed in a high-density design to provide excellent coverage and seamless roaming for the 54,000 sq ft office space. The high-density AP placement also maximizes location capabilities in concert with Cisco Spaces.

At the time of the PENN 1 deployment, Wi-Fi 6E access points were not yet available, however newer offices are deploying the CW9166 access points with Wi-Fi 6E and environmental sensors.

A close up of a computerDescription automatically generated

AP Placement

A high-density wireless deployment was chosen to provide excellent coverage and seamless roaming. This is especially important in a hybrid work environment where users will often be using video streaming to connect with people outside the office. The demands of high throughput, low-latency video connections necessitate a high-density wireless deployment. AP placement was also designed to maximize location-detection capabilities to allow Cisco Spaces to monitor occupancy in different areas of the floor.

A map of a buildingDescription automatically generated

Cisco Spaces was integrated with Webex Control Hub to gather occupancy data from Webex devices located in the various collaboration spaces throughout the floor. This integration is a simple OAuth2 authentication to tie the Cisco Spaces account to the Webex Control Hub organization. Details on the integration are provided later in the document.

For Cisco Spaces to leverage the sensor data available on the OT PoE wired network from the Molex, Igor, Mecho and Teknion sensors at PENN 1, the IoT Wired Gateway is configured on the C9300 distribution-layer node which then communicates with the Cisco Spaces Connector to send the sensor data to Cisco Spaces for use by the Smart Workspaces application.

A diagram of a cloud computing systemDescription automatically generated

Here is example of the VLAN and IP address configuration required for configuring the IoT Wired Gateway, which runs on the C9300 in a Docker container.

A diagram of a networkDescription automatically generated

Logging into the Cisco Spaces Connector with a web browser provides access to view the status of the Connector.

A screenshot of a computerDescription automatically generated

Logging into Cisco Spaces with a web browser provides access to view the status of the IoT Wired Gateway.

A screenshot of a phoneDescription automatically generated

From Cisco Spaces you can also view the current sensor data from the POE powered sensors as shown here for the Molex Advanced Environment Sensor.

A screenshot of a computerDescription automatically generated

Here is the sensor data from a Teknion Connect Desk showing desk occupancy.

A screenshot of a computerDescription automatically generated

Here is an overview of the Cisco Spaces sensor and energy data flows from the various endpoints to the Connector up to Spaces.

A diagram of a computer networkDescription automatically generated

The Cisco Spaces Smart Workspace application provides the PENN 1 end users with a 3D floorplan enabling insight into occupancy, air quality, CO2 levels, temperature and humidity, and the ability to view and hold open workspaces and rooms.

A screenshot of a computer gameDescription automatically generated

The Smart Workspace application runs on Webex collaboration devices throughout PENN 1.

When employees and guests approach the sign, they are greeted with a 3D floor plan of the space which provides a quick view into the space utilization, with available rooms shown in green, occupied rooms in red, and booked, but empty, rooms in yellow. A room finder feature allows users to quickly find the space they need based on criteria such as number of seats and availability of video conferencing equipment. Users can simply tap the “Hold Room” button on the interface and head over to the room. When the room detects a person is present, the map is updated in real-time.

A screen on a wallDescription automatically generated

The Cisco Spaces Energy Utilization application provides data and insights into the energy usage as shown here for the C9300 switch stacks.

A screenshot of a graphDescription automatically generated

Cisco Spaces has integration with Raritan, Panduit, and Server Technology Smart PDUs and here is the output for the 8 Raritan PDUs in PENN 1.

A screenshot of a computerDescription automatically generated

Meraki Security

The MV12 cloud-managed smart camera is part of the MV smart camera family which brings physical security and advanced analytics together in a compact form factor and currently there are 27 MV12 cameras in PENN 1 to provide physical safety and security and business intelligence and insights.

A close-up of a dome cameraDescription automatically generated

Webex Collaboration

The PENN 1 office has 92 Cisco Collaboration devices throughout the office. The goal was to make every space video-enabled to facilitate an inclusive hybrid work experience. The look book goes into detail on the devices used for each different type of space at PENN 1. Note that newer offices will be using the Room Kit series of devices as opposed to the integrated Room devices which have built-in screens. The Room Bar, Board Pro, and Room Kit EQ are the preferred devices in newer office spaces and have capabilities beyond the devices deployed at PENN 1.

Recognizing that employees need to collaborate not only with other employees, but also customers and outside vendors, these devices allow employees to join meetings on any meeting platform – Webex, Zoom, Microsoft Teams, or Google Meet – while incorporating advanced features such as noise removal and frames.

Wall-mounted Room Navigators mounted outside the doors of each meeting space are critical to the user experience.

A screen on a wallDescription automatically generated

With a simple glance down the hallway, employees can easily visualize room availability (which is updated in real-time based on detection of people in the rooms) making it very easy to find an available room. Running Ethernet cables to the door jambs to enable connecting and powering the Navigators was important and something that should be planned for in new construction, although retrofitting after the fact is possible as we have done in other offices.

Modern conference rooms typically have a touch-panel or other control system in the room to control things like lighting in the room, access to AV equipment, and more. Vendors such as Crestron and AMX are often used for these purposes. At PENN 1, we wanted to simplify the experience by providing a single interface to the room. This was accomplished using Webex Room Hub.

Webex Room Hub is an open-source project to control smart building features (such as lights and shades) in office buildings from the Webex Room devices. It consists of a lightweight middleware server, macros, and UI extensions that are installed on the Webex devices. Out of the box, it supports a couple of light and shade systems standard at Cisco, but it is easy to replace or add drivers for any HTTP based smart integration. The application enables both touch controls in the room using the existing Room Navigator panel as well as voice-enabled controls using the Webex Assistant Skills feature, which allows for extending the Webex Assistant. By leveraging the existing Room Navigator, PENN 1 does not require more traditional room control systems (e.g., Crestron) because the functionality can be fully implemented using the Room Hub application.

The project requires that the customer has:

●      Webex devices, such as Webex Room Kit, Webex Board, Webex Desk, etc.

●      A smart building setup

●      Access to install macros to the devices, either with Control Hub or local device access

●      A way to host a docker image that is reachable by video devices and the smart system integrations

These smart integrations are supported out of the box:

●      Igor lighting system

●      Molex lighting system

●      Philips Hue lighting system

●      SolarTrac 4 shades

●      Webex-based “Report Issue” feedback

PENN 1 has several conference rooms with voice control, allowing users to change lighting and shades without having to touch any controls in the room.

Global DNA Center Deployment

DNA Center Plug and Play was not leveraged for the OT PoE C9300 switch deployment due to lack of WAN network connectivity from PENN 1 to the Cisco internal network and global DNA Center servers at the time of the switch deployment. The required configuration and commissioning of the PoE lighting usually takes place very early in the construction process, so this required the installation and configuration of the 30 C9300s for the OT PoE network to take place prior to the office having WAN connectivity.

The 30 C9300s for the OT PoE network were later added to our global DNA Center Deployment for device management and other services provided by DNA Center.

For PENN 1, we are leveraging PoE Analytics to monitor the C9300 switch stack power budgets and gain insights into our PoE endpoints.

A screenshot of a computerDescription automatically generated

Global ISE Deployment

The deployment of ISE was part of broader ongoing initiative to rollout integrated security. Use cases are inclusive of asset visibility, access control, and authenticated guest access.

The production ISE deployment consists of 29 ISE Nodes and 20 Policy Server Nodes (PSNs) in 7 Server Node Groups all running as virtual instances and with one in each of the major data centers. The Server Node Groups represent a group of PSNs in the same location, behind Load-Balancers.

As can be seen from the diagram below, the primary Policy Administration Node (PAN) and Monitoring (MnT) servers are in Mountain View, California, and the Secondary PAN and MnT servers are in Allen, Texas. Initially the team had the Primary PAN & MnT ISE in Allen, but this caused issues with replications to Bangalore as a result of exceeding latency requirements. The team needed to keep latency below 200ms between PSN / PAN / MnT due to the amount of traffic to avoid issues.

A map of the world with different colored circlesDescription automatically generated

As part of the high availability design, the team leveraged Virtual IPs for the different Server Node Groups and the Services within those Node Groups, in addition to Radius Server Node Groups.

They considered 6 Radius Server groups on each of our NADS – Primary, Secondary, Tertiary, Quaternary, Quinary, Senary.

The Load Balancer is used to send a User-Probe/Synthetic Authentication to each of the PSN’s every 10 seconds, and if it receives a failed Auth, then it removes the PSN from that Server Node Group. The load balancer continues sending requests and adds back the PSN once authentication is successful.

The ISE deployment supports internal “Automatic” Failover, which is an optimization that was added over time due to the release and validation of new capabilities.

Each Service has a VIP – Wireless/Wired/VPN/CVO/Extranet as this provides flexibility to upgrade specific services without impacting others. This means the version of ISE used for VPN could be upgraded without impacting Wireless.

A diagram of a computerDescription automatically generated

The PENN 1 Deployment Journey

This section highlights the deployment of capabilities, targeted technical results, lessons learned, and recommendations captured as part of the team's journey to deploy the PENN 1 office. Deploying the cross-architectural solution inclusive of Cisco Spaces, Webex Suite, Wireless LAN Controllers, Cisco DNA Center, ISE, and ThousandEyes has many moving parts and engineering stakeholders will be able to benefit from Cisco’s experience as a frontrunner deploying the solution in production.

Preparing, Planning, Designing

In addition to the business outcomes and requirements focused on transforming the end user and facilities management experiences, workplace resources captured technical result requirements associated with various aspects of the design and deployment. This additional area of focus factored into the overall design strategy and represented an opportunity to measure IT operations success as part of an implementation governance plan. A sampling of some of the technical results that were highlighted as being important included:

●      Streamlined deployment of Hybrid Work from Office infrastructure and components

●      Simplified integration of key platforms and devices

●      Seamless device setup

●      Flexible, secure onboarding of new infrastructure and devices to deliver on the Hybrid Work from Office experience for end users and delivery of operational outcomes for Facilities Management

●      Maximizing the guest experience

●      Insight into employee and guest behavior

With the business and technical requirements in focus, the team went through the preparation, planning, and design phases.

The team had to establish the organizational requirements, develop a network strategy consistent with a wider scale rollout of capabilities, and draft a high-level conceptual architecture incorporating the technologies that best support the architecture. This was critical in terms of understanding scope, schedule, talent, and financial requirements to execute the Hybrid Work from Office network design and solution rollout strategy.

The team identified initial network requirements based on goals, the facility, user needs, and Facilities Management needs. The plan phase involved characterizing the site, assessing the existing network deployment, and performing a gap analysis to determine whether the existing system infrastructure, site configuration, and the operational environment could support the proposed design. A project plan was leveraged to help manage the tasks, responsibilities, critical milestones, and resources required to transform the office to a Hybrid Work from Office destination. The project plan aligned with the scope, cost, and resource parameters established as part of the original business requirements. Planning required executing on specific activities such as:

●      Leveraging Cisco DNA Center (rolled out during an earlier part of the journey) to create a 2D floor map with appropriate scale and highlighting AP placement.

●      Running a predictive site survey using Ekahau to ensure site-specific data is available for wireless design guidance (AP density, channel width, radio configuration, and benchmarks)

●      Reviewing existing segmentation and security access controls associated with device onboarding, profiling, as well as policy impacting firewall/internet connectivity to identify and plan for changes. 

●      Reviewing existing QoS configurations and preparing for the deployment of appropriate QoS considerations to accommodate user/device/IoT onboarding nuances associated with transforming the space to accommodate the rollout of Hybrid Work technology.

●      Creating a CAD file of the site to be used within Cisco Spaces to enable the creation of 2D maps as well as 3D rich maps for the Smart Workspaces application.

The initial requirements that were derived in the planning phase were used to drive network design activities. The team drafted the required network design specification to meet the Hybrid Work from Office business and technical requirements. The specification accounted for availability, reliability, security, scalability, and performance criteria. The design specification acted as the basis for the implementation activities covered below.

Table 2.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendation

Physical Cabling and 90W UPOE+

90W UPOE+ enables new use cases in the office Cabling requirements for the IEEE 802.3bt standard IT and OT cabling convergence will be a journey Initial investment in higher grade cabling might provide better ROI over the long term Opportunities available for leveraging recycled cabling Account for FD/IDF cooling requirements

Become familiar with the " "

Compute Resources

Depending on the desired integrated outcomes, local on-premises compute might be required for low latency use cases such as motion detection lighting Research compute specifications provided by the lighting and shading vendors to make sure to meet or exceed their recommended requirements Compute resource required early in the construction phase for configuration and commissioning of lighting solutions Consider deploying UPS for any on-premises compute Invest in high availability compute to prevent single points of failure Create a support and maintenance plan for on-premises compute hardware and software Consider user access and security requirements for on-premises compute

Work with IOT vendors on the compute requirements to determine the best solution for the desired use case outcomes

UPS Strategy

Develop UPS strategy considering the desired runtime for the various IT and OT PoE powered endpoints versus the cost, size, and weight of the battery backup solution

Consider working with IT and OT service owners to right-size UPS for the desired runtimes

Smart PDUs

In addition to being able to remote power on/off devices, smart PDUs provide the ability to gain insight into energy consumption allowing you to measure and manage it

Consider the potential benefits and insights gained by deploying smart PDUs

Catalyst 90W UPOE+

The availability of 90W UPOE+ is enabling new use cases in the office environment 24-port model vs. 48-port model decision based on port density requirements and the willingness to manage switch power budget for the 48-port model The C9300 platforms support advanced POE features such as Perpetual POE, Fast POE, 2-Event Classification and StackPower, which are recommended for POE lighting deployments C9300X-24HX and C9300X-48HX were not available at time to deploy in PENN 1, but all future IT deployments will leverage the C9300X-48HX to provide 10 GE mGig and 90W UPOE+ and to enable converged IT and OT networks.

Become familiar with the " "

IP Addressing

Lighting and other IoT vendors can have subnet size restrictions so need to take this into account (e.g., Molex only supports /23 and smaller) Layer 2 Access using a Simplified Distribution Layer supports both VLAN per access switch and VLANs spanning multiple access switches so need to consider lighting and IoT vendor requirements Lighting and other IoT vendors can have DHCP requirements so need to consider (e.g., Molex requires the use of Port-based DHCP which ties an IP address to the physical switchport)

Work with IoT vendors on the IP addressing, VLAN sizing and DHCP requirements to determine the best solution for deployment

Network Protocols

LLDP protocol is required for POE power negotiation

POE Power negotiation " "

Network Security

Very few lighting gateways and other IoT devices support 802.1x (dot1x) so use of MAB (MAC Authentication Bypass) required in TrustSec deployments Some lighting vendors require Internet access for enhanced cloud features and functionality

Work with IoT vendors to understand their protocols and connectivity requirements

Implementation: Deployment of Fundamentals

The network was built (and additional components were incorporated by the team according to the design specifications) with the goal of integrating devices without disrupting the existing network or creating points of vulnerability. The deployment of the fundamentals required setting up all centralized management platforms and services that weren't already implemented. The team needed to ensure that if existing platforms weren't at the right versions of software that they were upgraded to accommodate the deployment of required capabilities. In some cases, upgrades were required to support integrations associated with the Hybrid Work from Office solution.

The following is a sampling of the technical results associated with the deployment of the fundamentals and highlighted as being important:

●      Provide visibility into physical spaces to understand user and device behaviors based on location data

●      Visualize “right now” near-real-time metrics from location

●      Leverage custom reports based on location, SSID, time range, and other areas of focus to identify trends

●      Provide deeper insight into location metrics such as number of visitors, number of visits, dwell time/dwell time breakdown, and device location

●      Address safety and sustainability use cases (occupancy, environmental metrics, and energy monitoring)

●      Setup the infrastructure to allow end users to host or join a video meeting from any device (i.e., mobile, tablet, laptop, or video device) with one consistent experience

●      Enable call control capabilities that are easy to procure, onboard, and manage through a central management portal and manage migration strategies that can leverage on-premises investments

●      Simplify software and license management

The team performed ISE set up, provisioning, and DNA Center integration to accommodate asset visibility, access control, and authenticated guest access considerations. The implementation required active directory integration, AAA, and 802.1x setup. As a result of having ISE deployed, the team was able to gather contextual information associated with Who, What, When, Where & How. They were also able to take advantage of tagging to classify wired and wireless devices. Although the current deployment is focused primarily on admission control, there are plans to deliver on some of the more advanced security use cases associated with a Secure Access solution implementation in the future.

The team leveraged the shared instance of Cisco DNA Center for IT map (heat map) creation and to prepare for secure onboarding of switching infrastructure.

The Cisco DNA infrastructure (inclusive of wired and wireless) needed to be upgraded to the appropriate versions as indicated in the table below.

Device Type

Platform

Software Version

Switching

C9300-24H, C9500-40X, C9407/Sup1

IOS-XE 17.9.3

Routing

C8300-1N1S-4T2X, ISR4451-X, ISR4331

IOS-XE 17.9.3

WLC/APs

C9800-L, C9130AX

IOS-XE 17.9.3

Upgrading the infrastructure required referencing a compatibility matrix to ensure proper interoperability and the ability to accommodate the newer Access Points, sensors, as well as integration with Cisco Spaces to take advantage of the latest capabilities at the time. WLANs were confirmed to be deployed within relevant segments to accommodate both guest and corporate users and ensure they could continue to track and remove bad actors (e.g., rogue APs, rogue clients, and interferers).

Although there are many Cisco Spaces configuration guides available here, the team partnered very closely with the Cisco Spaces product team to provision the solution leveraging the process flow shown in the image below:

A diagram of a company's processDescription automatically generated

The team needed to provision the Cisco Spaces Connector on the network to import/sync the Cisco DNA Center map. The connector was installed on a local Hyperflex Edge along with 3rd party Light/Shade management software. Installation of the Cisco Spaces Connector was done to ensure that Cisco Spaces would work with Detect & Locate, IoT Explorer, and IoT Services capabilities seamlessly. The team determined that functionality provided through the integration was required to meet the overall design specifications.

The Webex Control Hub cloud-based management infrastructure and the creation of the org was already in place leveraging the corporate instance. As this was the case, the initial setup (inclusive of the following considerations) was performed and could be taken advantage of without the need for additional work:   

●      Domain claim

●      SSO

●      Hybrid Calendar (Initial integration and setup vs. mapping that will happen during device deployment evaluation)

●      Directory integration and user onboarding

Webex onboarding can be performed by using the resources linked off of the Get Started in Control Hub page . Authorization is required to access the WalkMe videos that map to the following deployment checklist:

A close-up of a phoneDescription automatically generated

All the foundational Webex Meeting Site and call setup requirements were in place and could be leveraged as part of the solution deployment. Although this case study will not address the specific details associated with this area of focus, the Hybrid Work from Office device onboarding and the integration with Cisco Spaces are covered as part of this documented case study.

Table 3.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

ISE Skillset Requirements

ISE engineers must develop multiple skills:

ISE admin – health of the environment

    Install/replicate/patch

    Monitor health and take actions

Policy admin – configure security access policies in ISE

    700 access-policies

    Know scope policy for which domain

    Know traffic flow

    TrustSec

    Know scope policy for which domain

    Know traffic flow

    Deployment

    Troubleshooting

Dev/Ops skills

    Terraform and ansible (adapt BU scripts for migration)

    Python scripts to control TrustSec deployment

Troubleshooting

    On-call C2 app, a problem can extend globally, fast

Ensure the ISE Team has skills in the following areas:

App Middleware (compute) + NW background Integration: ISE-AD, ISE-Device Management Platform, ISE-Cloud Security: AAA, certificate management Splunk – data analysis DevOps – python, java, scripts, Self-service portal: updating infrastructure and config

DNA Center Plug-and-Play

Might not be option for the OT network as there might not be network connectivity to DNA Center infrastructure early in the construction phase CDP had to be enabled All connected switches had to have the PnP agent running and have no previous configuration

 

DNA Infrastructure

Network and compute resources required early in the construction phase for the configuration and commissioning of lighting solutions To capture ongoing energy usage data from Smart PDUs requires deployment of PDU management solution Optional deployment of OOB console solution allows remote access and troubleshooting of PDUs, switches and servers IP address to switch port assignment required for the commissioning of lighting and other IoT solutions Network devices configured according to the design guide standards specified on the Topology page Network devices configured for Smart Licensing and additional licensing might be required for advanced features and functionality Network and compute resources configured per corporate security standards and restricted user access LLDP protocol required for PoE power negotiation

Ensure DNA Infrastructure configured to support Cisco and IoT vendor solutions

Cisco Spaces

IOT Services (Wired) requires that switches must have Cisco DNA Advantage subscription The Map Service in Cisco Spaces includes features to keep Location Hierarchy in sync with the imported map data AAA configuration required on switches NTP synchronization required across controllers, connectors, and switches NETCONF must be enabled on switches IOT Wired Gateway requires the configuration of a new VLAN with IP subnet and address assignment

Become familiar with the " " and with the " "

Secure Onboarding

The WLAN controllers were used to deploy access points within the environment. All APs point back to DNA Center for proper AP group mapping, placement in DNA Center hierarchy, and placement on the map.

Accurate placement of APs on the map is critical to accurate location analytics in Cisco Spaces, so take the time to ensure the correct APs are placed in the correct locations of the 2D maps.

Onboarding devices leveraged the integration between Cisco DNA Center and ISE. The integration was used to automate the deployment of VLAN and VRF configurations and implement user/device policies to onboard users and devices into the appropriate network segments. As part of standard policy, devices are authenticated with 802.1x and AAA using Cisco Identity Services Engine (ISE) to provision access services via centrally configured policies. ISE also made it possible to profile non-802.1x devices using network telemetry, ISE data, and DNA Center’s cloud-based AI Endpoint Analytics. The onboarded Hybrid Work Devices included:

●      Desk Series

●      Room Series

●      Board Series

●      Signage

The team had to ensure the appropriate Internet connectivity, port access, and DNS resolution for the devices to function seamlessly.

The bulk of the setup for Hybrid Work Devices required accessing Webex Control Hub. As all the spaces in PENN 1 are shared spaces, all the devices were provisioned as shared workspaces in Webex. Once on the network, device onboarding was as simple as just entering an activation code on the device to associate the device with the workspace. Hot-desking capabilities and Hybrid Calendaring were also configured within Webex Control Hub where appropriate.

Physical device setup could not be overlooked as the setup of some Hybrid Work Devices is quite time consuming. The team had the overall goal of simplifying physical provisioning of various Hybrid Work devices. They leveraged previous experiences, learnings, and knowledge to connect ancillary offerings to Hybrid Work devices such as headsets, mics, speakers, touch controllers, etc.

Table 4.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Door Frame Design

Wall Mount Navigator requires thicker door frame siding PoE Network pass-through not supported with current door frames

Cisco Design Team to ensure Future Door Framing to accommodate Cisco Product Design (i.e., PoE and Navigators)

Shipping and Logistics

Managing logistics requires extensive off hour delivery Access to elevators is restricted to certain hours Higher costs will require off hour union and delivery labor Off-site shipping storage required to meet un-excepted delivery date changes Allocate more funding Allocate more timeline Identify external storage close to site (within city)

Construction Delivery Date / Go-Live Date

Room readiness changes due to many change requests

General contractors must do ample diligence

Hybrid Work from Office Integrations

The team was focused on delivering the following results as part of the various product integrations (inclusive of Cisco Spaces, DNA Center, Catalyst Wireless, Webex Control Hub, and Signage):

●      Provide data to partner applications to facilitate indoor wayfinding, conference room utilization tracking, asset tracking, and BLE-based engagement apps

●      Extend and enrich enterprise software applications with contextual location data (marketing automation, CRM, POS, building automation, HRMS, etc.)

●      Correlate data from Cisco Spaces Apps to create richer metrics

●      Ingest Presence, People Count, and environmental data in Smart Workspaces

The integration between Cisco Spaces and Webex Control Hub was required to perform rich map setup so that signage devices were able to display maps properly.

The high-level steps required for rich map set up and device integration included:

1.      Validating Cisco Spaces was set up properly

●      Account with correct license (ACT or Smart Workspaces license)

●      Locations added in location hierarchy (i.e., floor maps, floor numbers, AP placement) - this is part of DNAC to Cisco Spaces integration

●      Added correct metadata (manually) to each location (e.g., time zone, occupancy limits - building and floor level)

2.      Setting up Webex Control Hub

●      Enabled Workspace metrics at Webex Organization level during initial set up (had to revisit during device set up to enable per device)

●      Ensured devices are online and licensed (navigators)

●      During device provisioning, turned on device sensors to capture workspace metrics (presence, people count, environment, etc.) - The team was able to leverage pre-deployed template configurations

●      Configured Workspaces (calendar, map room types, and room level occupancy)

3.      Performing the Cisco Spaces to Control Hub integration

●      Activated Control Hub

●      Selected the workspaces where the information needed to be sent from

●      Generated token and pasted into Cisco Spaces. NOTE: This is now automated through an OAuth login flow directly from Webex Control Hub.

4.      Creating Rich Map

●      Uploaded CAD files to Cisco Spaces portal and ensured each file was associated with location hierarchy

●      Cisco Spaces took the CAD file, converted to a Rich Map, and admin notification occurred once the file was ready for use

●      Admin reviewed, requested changes, and accepted the file

●      Maps (bearing, zoom and pan) were edited and finalized

●      Webex devices were mapped to rich map IDs (i.e., Rooms). This is done from the Cisco Spaces Web UI.

Note:     At the time of configuration, the team's ability to configure independently was not possible and the capability was under development. All provisioning was handled by the Cisco Spaces team and was a manual process. This is no longer a limitation and can all be done by the customer inside of the space manager in Cisco Spaces.

5.      Creating signage

●      Created signage URLs for buildings and floors within Cisco Spaces (ability to configure was limited at the time of implementation and required provisioning to be handled by the Cisco Spaces team)

●      Enabled digital signage for Webex device in Control Hub leveraging created URLs

Table 5.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Signage Preparation

Enable WebGL and disable standby (to avoid sleep) on each device Can find WebGL under Web Engine Features

Location Accuracy

WAP location, height, and azimuth all need to be accurately captured for optimal location accuracy Floor maps "drift" over time More sources of location data mean better location data Use a tool like Ekahau to survey Verify, by sight, actual location of WAPs Ensure that maps are accurate and kept that way Leverage wi-fi, collaboration endpoint and other sensor data to build a comprehensive location data set

The team had multiple options when considering how they wanted to accommodate the seamless onboarding of visitors. They have traditionally deployed ISE at other locations. They were, however, very interested in Open Roaming functionality available with Cisco Spaces, which is not supported with ISE.

The decision came down to choosing between using authenticated or unauthenticated approaches. The Cisco Spaces Captive Portal did not support sponsored access at the time of deployment, but one could use access codes with proper permissions. Unfortunately, with no device security posturing capabilities offered as part of the Cisco Spaces solution, the team had to adhere to InfoSec requirements and continue leveraging ISE for this location.

Table 6.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Security Policy

Security policy can dictate technology choices Legacy processes and infrastructure sometimes need to be leveraged Educate all stakeholders Understand security requirements Be operationally cost effective without compromising security

Implementation: Hybrid Work IoT and 3rd Party Integrations

The team was tasked with identifying and leveraging prebuilt integrations with validated partners to deliver on additional smart building business outcomes. This involved powering the building with PoE and integrating PoE powered lighting and shades. To further deliver on the Hybrid Work from Office user experience, they used Cisco native APIs/SDKs for lighting and shade controls (provided by 3rd party vendors) to integrate to collaboration in-room controls.

The implementation consisted of:

●      Deploying Webex devices (Webex Board, Webex Room and Webex Room Kit with touch panels, Desk Pros, etc.) found on projectworkplace.cisco.com/products

●      Leveraging macros to control lighting & shades

●      Leveraging RoomHub to implement middleware for communicating between video device and IoT)

●      Referencing documentation found on Igor light system for REST API integration

●      Referencing documentation found on SolarTrac shades for REST API integration

●      Leveraging Issue Reporting Tool (UI and macro) on all Webex devices and posting feedback to Webex spaces using Webex SDK / REST API

●      Enabling Voice-Assist for controlling lights and shades in a few demo rooms as a proof of concept of the capabilities of the Webex Assistant Skills features.

A diagram of a webex room hubDescription automatically generated

As part of connecting systems and data to make this possible, the team leveraged Cisco Spaces Meta API and open REST APIs to integrated with custom applications. This integration enabled them to provide presence, people count, and environmental data to 3rd party data consumers.

Table 7.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Integration Planning

Video devices and IoT devices were on the same network. That was a requirement for this to actually work, since the video device talks to the RoomHub server when the user presses the UI controls, which then directs the lights, shades, etc.

Ensure you have the appropriate IP addressing and subnetting plan to deploy video and IoT devices on the same network.

Comparing Experiences

Worked equally well on devices with touch screen (Webex Board) and Room devices with touch panels

Don't waste time validating differences as experiences are similar

Macro Bulk Provisioning

Bulk provisioning macros on video devices is not currently supported on Control Hub. Luckily the internal tools of Cisco made it easy to deploy (and update) the macro to all devices.

Build in-house automation skills to deal with API based approach to provisioning.

Operations: IT Observability, Management, and Assurance

Supporting Day 2 operations is critical, and the team is consistently looking for new ways to:

●      Improve visibility into the Health and Performance of Users, Devices, and Applications

●      Reduce Mean Time to Resolution of Reported Issues

●      Leverage alert notifications for network and client issues to proactively address impact to end user experiences

●      Ensure a clear line of sight between user locations and Webex services to optimize performance and ensure exceptional Webex user experiences

Identifying new ways to perform monitoring and troubleshooting using the tools available is critical, and the team is consistently working within Webex Control Hub, DNA Center, and ThousandEyes when troubleshooting site issues. They use Cisco DNA Center to discover wired and wireless network devices and immediately begin collecting telemetry. Cisco DNA Center automatically correlates telemetry data and creates automated baselines that provide context for network metrics and events. The team is effectively able to analyze the telemetry data to take advantage of insights and visibility into overall network, client, and application health. Identifying anomalous events by comparing telemetry data to established baselines has become a best practice. When device specific issues are encountered, the team uses the 360-degree views for each device connected to the network to understand anything that may potentially be impacting the device that is challenged. Comparing current and historical end-user location data enhances the team's ability to provide enhanced support.

Below is a table highlighting areas of consideration and the platforms used to support ongoing operations:

Consideration

Description

Platform

Monitor Infrastructure Health

Monitor the health of the overall infrastructure inclusive of Webex services

WIP

Troubleshooting Connectivity

Troubleshoot device connectivity issues

WIP

Monitor User Experience

Monitor experience from the user's perspective

WIP

Monitor Application Health

Monitor application performance issues

WIP

Monitor Hybrid Work Device Health

Monitor Webex device health

WIP

Alerts and Notifications

Send alerts and triggers based on a rule engine via multiple channels like email, Webex Teams, API, webhook

WIP

Enhance Webex Cloud Performance

Monitor, benchmark, and troubleshoot network to Webex cloud performance and perform root cause analysis via ThousandEyes integration

WIP

Table 8.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Signage Preparation

Enable WebGL and disable standby (to avoid sleep) on each device Can find WebGL under Web Engine Features

The team recognized the need to enable voice assistant functionality to enhance the user experience. They decided to create custom skills using the Webex Assistant SDK to further enhance integrations (voice activated lighting and shade control).  It was important to leverage 3rd party solution API documentation and work with the appropriate talent to develop the necessary skills.

Cisco’s PENN 1 office was the first of many Cisco offices that have been transformed from traditional workspaces to smart workspaces tailored to the demands of hybrid work. The office provides a variety of spaces that draw employees to the office for collaborative experiences that might not be as effective remotely, while still being inclusive of remote participants and allowing those who could not make the commute the opportunity to participate. The site is a showcase of how technology can make the office welcoming to hybrid workers while providing the visibility to IT and facilities staff and helping the company get closer to our net-zero goals. This deployment was a learning experience, and we hope our journey helps you achieve your hybrid work from office outcomes.

Copyright

IMAGES

  1. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    cisco dynamic vlan assignment active directory

  2. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    cisco dynamic vlan assignment active directory

  3. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    cisco dynamic vlan assignment active directory

  4. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    cisco dynamic vlan assignment active directory

  5. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    cisco dynamic vlan assignment active directory

  6. Configure Dynamic VLAN Assignment with WLCs Based on ISE to Active

    cisco dynamic vlan assignment active directory

COMMENTS

  1. Configure Dynamic VLAN Assignment with WLCs Based on ISE to ...

    Cisco recommends that you have knowledge of these topics: ... Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user. This task to assign users to a specific VLAN is handled by a RADIUS authentication server, such as Cisco ISE. ... Active Directory. Generic ...

  2. Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 ...

    Complete these steps: From the ISE GUI, navigate to Administration > Identity Management > Identities and select Add. Complete the configuration with the username, password, and user group as shown in the image: Step 3. Configure the RADIUS (IETF) attributes used for dynamic VLAN Assignment.

  3. Configuring Dynamic VLAN Membership

    Configuring Dynamic Access Ports on a VMPS Client. To configure a dynamic access port on a VMPS client switch, perform this task: Enters global configuration mode. Enters interface configuration mode and specifies the port to be configured. Sets the port to access mode. Configures the port as eligible for dynamic VLAN access.

  4. IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius

    Setup Structure for IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server. Supplicant: Laptop running Microsoft Windows 10 or Windows 7; Authenticator: HP Aruba 2920 Edge Switch; Authentication Server: Microsoft NPS (Network Policy Server) running on Windows Server 2012 R2. User Database : Active Directory; For Windows ...

  5. IEEE 802.1X VLAN Assignment

    Book Title. Security Configuration Guide, Cisco IOS XE Bengaluru 17.6.x (Catalyst 9500 Switches) Chapter Title. IEEE 802.1X VLAN Assignment. PDF - Complete Book (13.29 MB) PDF - This Chapter (1.12 MB) View with Adobe Reader on a variety of devices

  6. Dynamic VLAN Assignment and Auto Smartport Configuration on a ...

    How to Configure Interface Settings on the SG550X-24 (active) Step 1. Navigate to VLAN Management > Interface Settings. Step 2. Select a Global Ethertype Tagging method. The options are: Dot1q-8100 — Also known as IEEE 802.1Q. It is the standard for tagging frames on a trunk and supports up to 4096 VLANs.

  7. Dynamic Vlan Assignment and AD?

    Please! 1 Spice up. aaron26237741 (Aaron2623) March 5, 2015, 4:51pm 2. the computer does not communicate with AD - the RADIUS server checks AD. it goes something like this - supplicant (computer) → Authenticator (switch) → Authentication server (RADIUS NPS server) → Active Directory (DC server) and then of course then the reverse until ...

  8. How To Configure NPS and Active Directory For Dynamic Radius based Vlan

    How Configure NPS and Active Directory For Dynamic Radius based Vlan assignment ===== This document is to describe the steps to configure NPS(network policy servicer)server with below use case Vlans need to be assigned based on different Radius group i.e Sales group to Vlan 10 Account group to Vlan 20. Steps:- Open Active directory Users and ...

  9. How to Integrate FreeRADIUS with Active Directory [Step-by-Step]

    FreeRADIUS: Active Directory Integration and PEAP-MschapV2 with Dynamic Vlan Assignment. We will setup authentication and authorization for a wireless network that can be used for a large organization, ensuring network users are able to securely authenticate to the network. Here's what you'll need:

  10. Layer 2 Configuration Guide, Cisco IOS XE 17.15.x (Catalyst 9200

    Spanning Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing loops in the network. For a Layer 2 Ethernet network to function properly, only one active path can exist between any two stations. Multiple active paths among end stations cause loops in the network.

  11. Dot1x Dynamic VLAN Assignment

    Our dot1x is used for dyamic VLAN assignement and it works using this config: int fa0/12. switchport access vlan A. switchport mode access. switchport nonegotiate. authentication event fail action authorize vlan A. authentication event no-response action authorize vlan A. authentication host-mode multi-host. authentication open.

  12. Dynamic Vlans

    using cisco Secure ACS and Active Directory. how to Assigned vlans according to the users Credentials. this is being done for wireless, if authentication fils have them be put in a visitor vlans. I very much appreciate your help with this matter. followed the meraki ,cisco guidlines. checked the internet, and did some out of the box thinking.

  13. PDF Configure Dynamic VLAN Assignment with WLCs Based on ISE to ...

    Respective Groups are added to ISE and can be saved. Press Save. Add WLC to the ISE Network device list - navigate to Administration > Network Resources > Network Devicesand press Add. Complete configuration, by providing WLC management IP address and RADIUS shared secret between WLC and ISE.

  14. Dynamic VLAN Assignment: Wireless

    Dynamic VLAN Assignment. Objective: To dynamically Assign Wireless User to VLAN based on user credentials. This type of setup is called "Dynamic VLAN Assignment" Description: Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user.This task of assigning users to a specific VLAN is handled by a RADIUS ...

  15. Dynamic VLAN assignment with ISE

    Edited by Admin February 16, 2020 at 2:06 AM. Dynamic VLAN assignment with ISE - 5508+5760. Hey, Scrambled a file with the configs that I use to have dynamic vlan assigned by my radius server (ISE). (apologies for such a raw presentation) Powerpoint. DynamicVlanassign_ISE.pptx. Download file DynamicVlanassign_ISE.pptxDownload.

  16. Cisco ISE

    The authentication request is Wired 802.1X. Wired is matched based on the RADIUS NAS-Port-Type equaling "Ethernet". 1X is matched based on the RADIUS Service-Type equaling "Framed". ISE comes with a pre-built condition that uses these attributes, we'll use it. The authentication protocol is PEAP-EAP-TLS.

  17. DOT1X Dynamic VLAN assignment

    Our dot1x is used for dyamic VLAN assignement and it works using this config: int fa0/12. switchport access vlan A. switchport mode access. switchport nonegotiate. authentication event fail action authorize vlan A. authentication event no-response action authorize vlan A. authentication host-mode multi-host. authentication open.

  18. Cloud Campus Fabric with BGP EVPN VXLAN CVD

    Learn more about how Cisco is using Inclusive Language. Contact Cisco . Open a TAC Case Online ... ISE performs policy implementation, enabling dynamic mapping of users and devices to scalable groups, and simplifying end- to-end security policy enforcement. ... The following table summarizes the VLANs and their VXLAN mappings used in this ...

  19. 2024 Template Guidelines and Instructions

    How to use the template. Title guidelines and best practices: 100 Character Maximum (this includes spaces) Make sure that the title mentions Cisco technology first Manager should propose the title Titles should be brief and convey specific coverage Should follow marketing guidelines for co-branded documents Partners should agree to the title prior to final publication