

Cisco switch hosting SVIs/VLANs for Management (10), USER1 (100), USER2 (101), and DHCP scopes for all threeįirst we’ll need to set ISE up as a RADIUS server which I’ll assume you know how to do, but ensure you support Change of Authorization (CoA).2 end devices (iPhone and iPad in this case) for testing.Cisco 1702 AP (Any LW that can do 8.5.x should work).Test iPad can access iPSK-TEST with PSK “psktest101” to VLAN 101įor this lab I am using the following equipment:.

Test iPhone can access iPSK-TEST with PSK “psktest100” to VLAN 100.Configure ISE policies to support dynamic PSK assignment.

Cisco ise 2.4 hits password#
In a nutshell, you can assign a single PSK password to a device or group of devices for a WLAN, whilst assigning a different PSK to other devices using the same WLAN. The iPSK feature Cisco offers is a genuine way to ease the stress levels of your security team by limiting the vulnerability of a shared password, whilst providing the flexibility to assign AAA override attributes such as VLAN, QoS marking, and ACL, which are normally reserved for 802.1X WLANs. *For those unfamiliar with the Australian meme, check out
