ISE Using my device Portal , devices still in pending registration status
Abstract: I'm on ISE 1.2 patch 8. We want give access wireless to devices mobile using 802.1x with Active Directory. The condition is that he previously the user must register mobile device in "my device portal"
-The corporate user connected from the LAN network, login in "my device portal" using their active directory account and register your device. -The policy defined in ISE indicates that 802.1x users in a group of AD and over condition "RegistredDevices" can access to the network (see screen 1)
-Users access the wireless network from your mobile device by entering its name from AD and finally accesses the network. -From my "devices portal" devices always shows “Pending” status. All works as expected except for this situation.
It looks like you dont have any provisioning profiles configured.
Under Admin settings make sure client provisioning is enabled. Try to set native supplicant provisioning policy unavailable: to Allow Network Access.
I use ISE 1.3 and experience the same - did you ever get this sorted out ?
What I am trying to do, is to make a portal where super-users can add MAC adresse, which the in turns are allowed on the LAN. Devices like printers, and other devices not running dot1x supplicants, and are not profilled. I have noticed the new device portals, in the ISE 1.3 and also the auto-purge function. I kinda like it and want to use these features to support MAB devices via MAC Address Bypass, managed by super-user (AD integrated login) But I need to fully understand the flow.
When I add a MAC via the mydeviceportal, it says the state i "pending" When will a device registered via device portals, go to state "registered" ? and hence stay in the InternalIdentityStore
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :