• Cisco Community
  • Technology and Support
  • Network Access Control

Dynamic vlan with Cisco ise

munish.dhiman1

‎08-30-2019 09:18 AM

Solved! Go to Solution.

Mike.Cifelli

‎08-30-2019 10:55 AM

View solution in original post

marce1000

‎08-30-2019 09:23 AM

Colby LeMaire

‎08-30-2019 10:30 AM

jordanburnett

‎08-30-2019 10:42 AM

‎08-30-2019 12:02 PM

UN Minustah

‎09-02-2020 02:26 AM

‎09-02-2020 06:44 AM

Greg Gibbs

‎09-02-2020 03:28 PM

ise dynamic vlan assignment wired

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

ise dynamic vlan assignment wired

Dynamic VLAN Assignment with WLCs based on ISE to Active Directory Group Mapping Configuration Example

ise dynamic vlan assignment wired

Available Languages

Download options.

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Introduction

This document introduces the concept of dynamic VLAN assignment. The document describes how to configure the wireless LAN controller (WLC) and ISE server to assign wireless LAN (WLAN) clients into a specific VLAN dynamically.

Prerequisites

Requirements.

Ensure that you meet these requirements before you attempt this configuration:

Have basic knowledge of Wireless LAN Controllers (WLCs) and Lightweight Access Points (LAPs)

Have functional knowledge of an Authentication,Authorization and Accounting (AAA) server such as Identity Services Engine (ISE)

Components Used

The information in this document is based on these software and hardware versions:

Cisco 5520 Series WLC that runs firmware release 8.8.111.0

Cisco 4800 Series AP

Native Windows supplicant and Anyconnect NAM.

Cisco Secure ISE version 2.3.0.298

Microsoft Windows 2016 Server configured as a domain controller

Cisco 3560-CX Series Switch that runs version 15.2(4)E1

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Conventions

Refer to Cisco Technical Tips Conventions for more information on document conventions.

  

Dynamic VLAN Assignment with RADIUS Server

In most WLAN systems, each WLAN has a static policy that applies to all clients associated with a Service Set Identifier (SSID), or WLAN in the controller terminology. Although powerful, this method has limitations because it requires clients to associate with different SSIDs in order to inherit different QoS and security policies.

Cisco WLAN solution addresses that limitation by support of identity networking. That allows the network to advertise a single SSID, but allows specific users to inherit different QoS, VLAN attributes and/or security policies based on the user credential.

Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user. This task of assigning users to a specific VLAN is handled by a RADIUS authentication server, such as Cisco ISE. This can be used, for example, to allow the wireless host to remain on the same VLAN as it moves within a campus network.

Cisco ISE server authenticates wireless users against one of several possible databases, which includes its internal database, e.g:

Active directory

Generic Lightweight Directory Access Protocol (LDAP)

Open Database Connectivity (ODBC)-compliant relational databases

Rivest, Shamir, and Adelman (RSA) SecurID token servers

RADIUS-compliant token servers

Cisco ISE Authentication Protocols and Supported External Identity Sources list the various authentication protocols supported by ISE internal and external databases.

This document focuses on authenticating wireless users that use Windows Active direcory external database.

After successful authentication, ISE retrieves group information of that user from the Windows database and associates the user to the respective authorization profile.

When a client attempts to associate to a LAP registered with a controller, the LAP passes the credentials of the user to the WLC using the respective EAP method.

WLC sends those credentials to ISE using RADIUS protocol (encapsulating the EAP) and ISE passes credentials of users to AD for validation using KERBEROS protocol.

AD validates the user credentials and upon successful authentication, informs the ISE.

Once the authentication is successful, the ISE server passes certain Internet Engineering Task Force (IETF) attributes to WLC. These RADIUS attributes decide the VLAN ID that should be assigned to the wireless client. The SSID (WLAN, in terms of WLC) of the client does not matter because the user is always assigned to this predetermined VLAN ID.

The RADIUS user attributes used for the VLAN ID assignment are:

IETF 64 (Tunnel Type) — Set this to VLAN.

IETF 65 (Tunnel Medium Type) — Set this to 802

IETF 81 (Tunnel Private Group ID) — Set this to VLAN ID.

The VLAN ID is 12-bits, and takes a value between 1 and 4094, inclusive. Because the Tunnel-Private- Group-ID is of type string, as defined in RFC2868 for use with IEEE 802.1X, the VLAN ID integer value is encoded as a string. When these tunnel attributes are sent, it is necessary to fill in the Tag field.

As noted in RFC 2868 , section 3.1: The Tag field is one octet in length and is intended to provide a means of grouping attributes in the same packet which refer to the same tunnel. Valid values for this field are 0x01 through 0x1F, inclusive. If the Tag field is unused, it must be zero (0x00). Refer to RFC 2868 for more information on all RADIUS attributes.

  In this section, you are presented with the information to configure the features described in this document.

Network Diagram

ise dynamic vlan assignment wired

Configurations

These are configuration details of the components used in this diagram:

IP address of the ISE (RADIUS) server is 10.48.39.128.

The Management and AP-manager Interface address of the WLC is 10.48.71.20.

DHCP server resides in LAN network and is configured for respective client pools; it is not shown on the diagram

VLAN1477 and VLAN1478 are used throughout this configuration. Users from Marketing  department  are configured to be placed into the VLAN1477 and users from HR department  are configured to be placed into VLAN1478 by the RADIUS server when both users connect to the same SSID ―  office_hq .

VLAN1477: 192.168.77.0/24. Gateway: 192.168.77.1 VLAN1478: 192.168.78.0/24. Gateway: 192.168.78.1 

This document uses 802.1x with PEAP-mschapv2 as the security mechanism.

Note: Cisco recommends that you use advanced authentication methods, such as EAP-FAST and EAP-TLS authentication, in order to secure the WLAN.

These assumptions are made before you perform this configuration:

The LAP is already registered with the WLC.

DHCP server is assigned a DHCP scope.

The document discusses the configuration required on the wireless side and assumes that the wired network is in place.

In order to accomplish dynamic VLAN assignment with WLCs based on ISE to AD group mapping, these steps must be performed:

ISE to AD integration and configuration of authentication and authorization policies for users on ISE

ise dynamic vlan assignment wired

WLC configuration to support dot1x authetnication and AAA override for SSID 'office_hq'

ise dynamic vlan assignment wired

We will use Windows 10 native supplicant and Anyconnect NAM to test connections.

Since we are using EAP-PEAP authentication and ISE is using a Self-Signed Certificate (SSC)  we would need to agree to certificate warning or disable certificate validation. In a corportate environment, you should use a signed and trusted certificate on ISE and ensure that end user devices have the appropriate root certificate installed under Trusted CA list.

Test connection with Windows 10 and native supplicant.

ise dynamic vlan assignment wired

Test connection with Windows 10 and Anyconnect NAM.

ise dynamic vlan assignment wired

Troubleshoot

TAC Authored

Contributed by Cisco Engineers

Was this Document Helpful?

Feedback

Contact Cisco

login required

This Document Applies to These Products

ise dynamic vlan assignment wired

Stack Exchange Network

Stack Exchange network consists of 181 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Network Engineering Stack Exchange is a question and answer site for network engineers. It only takes a minute to sign up.

Q&A for work

Connect and share knowledge within a single location that is structured and easy to search.

RADIUS VLAN Assignment with Cisco ISE

I am trying to install Cisco ISE 2.1 to be used as a RADIUS server with 802.1x on my switches. I want to dynamically assign a VLAN based to a user who connects on the switch port.

The problem is that, although my end client is authenticated and authorized by ISE, the VLAN id never gets received on the switch from ISE.

On ISE, I see my end user being authenticated with the correct policy, and authorized with the policy I created.

DOT1X config ISE

As seen on this image, I want to assign VLAN 56. However, my port does not get this information and stays in the hardcoded VLAN.

What could be the issue here?

Could it be that RADIUS options 064,065,081 are not forwarded from the ISE to the switch? I have a firewall between them.

Here is the configuration for dot1x on my switch :

And here is an output when the end user is authenticated through dot1x :

Here is the output of a debug dot1x all

Here is the output for "debug radius authentication"

Jeremy G.'s user avatar

2 Answers 2

I don't know if you've already done this, but you have to go a step further than just creating the Auth profile. You have to apply that auth profile with an auth policy. To create the auth policy do the following.

Go to Policy / Authorization Edit – profiles –standard, select your auth profile click Done click Save

BlackMagix's user avatar

For those still interested in this issue, I had to upgrade the IOS to 12.2(55)SE10. Now it's working with the initial configuration.

Your Answer

Sign up or log in, post as a guest.

Required, but never shown

By clicking “Post Your Answer”, you agree to our terms of service , privacy policy and cookie policy

Not the answer you're looking for? Browse other questions tagged cisco vlan radius cisco-ise or ask your own question .

Hot Network Questions

ise dynamic vlan assignment wired

Your privacy

By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .

Airheads Community logo. This will take you to the homepage

Wired Intelligent Edge

ise dynamic vlan assignment wired

Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

1.  dynamic vlan assignment /dacl's with cisco ise and arubaos-switch.

ise dynamic vlan assignment wired

Attachment(s)

pdf

2.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

ise dynamic vlan assignment wired

is there a way to do a reassing os the DACL, if ofr example on the cisco ISE for thet user i need ot assing him a new ACL, can id do that with the COA?

or is this not possible at all?

Hi Created,

This guide below is how to set up DACL's and how to dynamically assign a vlan to a device connecting to the network.

3.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

ise dynamic vlan assignment wired

What you normally would do is trigger a 'Terminate Session', where the switch will do a new authentication for the user/device and you can then return the new role/DACL as part of your policy/enforcement.

I'm not sure if ISE support DACL for Aruba switches, but you may fallback to user roles and return a local user role.

4.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

Yes i have configure DACL from ISE to ARUBA switches and its working perfectly but i need to do changes of the DACL and i havent figure out how to do that.(use vsa 92 standard by the way) if you need the config just let me do a session withb the cliente to do screenshot of ise and the config of the switch(the hardest part was to send the client ip address to ISE).

With the COA 'Terminate Session' if you have the experience with Cisco ISE could you show me how that configuration of the terminate session goes, i havent got that part i still have doubts with that configuration.

Gerardo Andree Mejia 

5.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

ise dynamic vlan assignment wired

You can initially deploy user role with policy and assign different user role having different policy based on your requirement using reauthentication CoA as below

ise dynamic vlan assignment wired

6.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

so i can add the:

and send that information on the reauthenticate for the Aruba siwtches rigth?

i think i gettoting so what you do on the definition of the ISE is defines de VSA that im going to send the switch rigth?

thanks for the help by the way.

7.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

Yes we could send NAS-Filter-Rule via CoA.  

8.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

Hi Shobana, 

i had problem with the COA re-authenticate

ise dynamic vlan assignment wired

this is the configuration i put on the ISE profile and sitll got no response from the switch

ise dynamic vlan assignment wired

do you see anything bad in there??

am going to add the config of the switch i dont know if maybe theres something else that need to be done.

thanks for the help.

txt

9.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

You have to enable this CLI for radius dyn authorization 

radius dyn-authorization enable

radius dyn-authorization client { <IPV4> | <IPV6> | <HOSTNAME> }

[secret-key [plaintext <PASSKEY> | ciphertext] <PASSKEY> ]]

[time-window <WIDTH> ] [replay-protection {enable|disable}]

More details here - 

https://www.arubanetworks.com/techdocs/AOS-CX/10.08/HTML/security_6200-6300-6400/Content/Chp_RAD_dyn_auth/RAD_dyn_auth_cmds/rad-dyn-aut-com-fl-10.htm

10.  RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

does this applyes to version 16.11  for AOS-S??

------------------------------ Shobana Aruba Original Message Original Message: Sent: Mar 10, 2023 09:45 AM From: vivarock12 Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

Original Message: Sent: Mar 02, 2023 12:29 AM From: Shobana Nandakumar Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

------------------------------ Shobana Aruba Original Message: Sent: Feb 28, 2023 10:45 AM From: vivarock12 Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

Original Message: Sent: Feb 28, 2023 01:17 AM From: Shobana Nandakumar Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

------------------------------ Shobana Aruba Original Message: Sent: Feb 27, 2023 10:13 AM From: vivarock12 Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

Original Message: Sent: Feb 27, 2023 06:36 AM From: Herman Robers Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

------------------------------ Herman Robers ------------------------ If you have urgent issues, always contact your Aruba partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact Aruba TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or Aruba Networks. In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that. Original Message: Sent: Feb 23, 2023 06:53 PM From: vivarock12 Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

Original Message: Sent: Mar 20, 2019 01:46 PM From: ClarenceHillard2 Subject: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

New Best Answer

 Aruba Networks

At Aruba, we believe that the most dynamic customer experiences happen at the Edge. Our mission is to deliver innovative solutions that harness data at the Edge to drive powerful business outcomes.

© Copyright 2021 Hewlett Packard Enterprise Development LP All Rights Reserved.

Dynamic Vlan/Similar option is not working for Wired Clients (MAB/8021x) on Meraki Switches

Sachin

ww

View all community news »

custom.footer.

integrating IT

ISE Dynamic VLAN assignment

Dynamic VLAN assignment by a RADIUS server (e.g. Cisco ISE) can be useful when you want to assign a specific VLAN to a user or group of users. In order to achieve this the VLANS configured on the switches must be configured with a name, this name must be consistent across multiple switches. However the VLAN number does not necessarily need to be the same across the switches.The scenario in this blog post will simply define 2 VLANS (ADMIN and USERS), members of the AD group Domain Admins will be assigned to a VLAN called ADMIN and members of the AD group Domain Users will be assigned to a VLAN called USERS.

The configuration of ISE in this post only describes the steps in order to configure Dynamic VLAN assignment. Refer to this previous post on how to configure Cisco ISE for 802.1x authentication.

Switch Configuration

Configure the name on the VLANS. These names must match the name specified in the Authorisation Profile on ISE.

ISE Configuration

Authorisation profiles.

ise dynamic vlan assignment wired

ise dynamic vlan assignment wired

Authorisation Policy

ise dynamic vlan assignment wired

Verification

Before logging in as a user, confirm the configuration of the interface the test computer is plugged into. Notice the VLAN is set to VLAN 10.

ise dynamic vlan assignment wired

ise dynamic vlan assignment wired

Login as a user that is a member of the AD group Domain Users.

ise dynamic vlan assignment wired

ise dynamic vlan assignment wired

Logoff and log back in as a user in the Domain Admins AD group.

ise dynamic vlan assignment wired

ise dynamic vlan assignment wired

Share this:

' src=

Published by integratingit

View all posts by integratingit

3 thoughts on “ ISE Dynamic VLAN assignment ”

Hi it is cool . What happend if some device has IP fix

If the device has a static IP address and is moved to a different VLAN, the user will not be able to communicate. It will only work if using DHCP.

Leave a Reply Cancel reply

Fill in your details below or click an icon to log in:

Gravatar

You are commenting using your WordPress.com account. (  Log Out  /  Change  )

Twitter picture

You are commenting using your Twitter account. (  Log Out  /  Change  )

 width=

You are commenting using your Facebook account. (  Log Out  /  Change  )

Connecting to %s

Notify me of new comments via email.

Notify me of new posts via email.

This site uses Akismet to reduce spam. Learn how your comment data is processed .

' src=

Table of Contents

Dynamic VLAN assignment

Administration Guide

You can configure the RADIUS server to return a VLAN in the authentication reply message:

Using the GUI:

ise dynamic vlan assignment wired

Using the CLI:

To select port-based authentication and the security group on the FortiSwitch unit:

config switch interface

edit <interface_name>

config port-security

set port-security-mode 802.1X

set security-groups <security-group-name>

The FortiSwitch unit will change the native VLAN of the port to that of the VLAN from the server.

To select MAC-based authentication and the security group on the FortiSwitch unit:

set port-security-mode 802.1X-mac-based

Here, the switch assigns the returned VLAN only to this userʼs MAC address. The native VLAN of the port remains unchanged.

Use the following configuration command to view the MAC-based VLAN assignments:

diagnose switch vlan assignment mac list [sorted-by-mac | sorted-by-vlan]

Configure the following attributes in the RADIUS server: 

NOTE: If the Tunnel-Private-Group-Id attribute is set to the VLAN name, the same string must be specified in the set description command under the config switch vlan command. For example:

config switch vlan

set description "local_vlan"

Starting in FortiSwitchOS 7.0.0, you can use the following RADIUS attributes to configure dynamic non-native VLANs:

To set the VLAN ID value, use 0x31 for a tagged VLAN or 0x32 for an untagged VLAN. For example, to indicate that VLAN 16 is untagged, the Egress-VLANID is 0x32000010 or 838860816.

To provide the VLAN name as the VLAN description string defined under the config switch vlan command, use ‘1’ for a tagged VLAN or ‘2’ for an untagged VLAN. For example:

NOTE: The VLAN name in the Egress-VLAN-Name attribute must match the string specified in the set description command under the config switch vlan command. For example:

You can verify your configuration with the diagnose switch 802-1x status <port_name> command. In the following example, the lines in boldface show the dynamic non-native VLANs:

Fortinet.com logo

IMAGES

  1. 802.1X on Cisco ISE 2.6 Dynamic VLAN and DACL From Scratch

    ise dynamic vlan assignment wired

  2. 802.1X on Cisco ISE 2.6 Dynamic VLAN and DACL From Scratch

    ise dynamic vlan assignment wired

  3. Segmenting Your Network with Dynamic VLAN

    ise dynamic vlan assignment wired

  4. aaa

    ise dynamic vlan assignment wired

  5. How to configure DLink DGS 1510 802 1x Wired Authentication, Dynamic Vlan Assignment Using CISCO

    ise dynamic vlan assignment wired

  6. Cisco ISE

    ise dynamic vlan assignment wired

VIDEO

  1. Teknik Presentasi & Negosiasi

  2. MCO 04 SOLVED ASSIGNMENT 2022-23 I MCO 04 SOLVED ASSIGNMENT 2022

  3. Campagne MODERN WARFARE 2 Gameplay #2 eaux placides + techniques d'espionnage

  4. PODCAST! Talking About Innovative ways that young people can do to foster a love for local culture

  5. Pawan kalyan Mass Entry At Vizianagaram

  6. How Does Seattle Kraken Center Matty Beniers Measure Up?

COMMENTS

  1. Solved: Wired Dynamic VLAN Assignment

    Wired Dynamic VLAN Assignment Go to solution averill.johnson1 Beginner Options 06-04-2019 07:34 AM - edited ‎02-21-2020 11:06 AM I have been doing a bit of research on this and haven't found anything definitive on this but I feel it should work. Can anyone confirm or deny? Equipment: Virtual: ISE 2.4 Cisco 3850 Stack (s) IOS 3.6.9E

  2. Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 ...

    Dynamic VLAN Assignment with RADIUS Server Configure Network Diagram Configuration Steps Cisco ISE Configuration Step 1. Configure the Catalyst WLC as an AAA Client on the Cisco ISE server Step 2. Configure internal users on Cisco ISE Step 3. Configure the RADIUS (IETF) attributes used for dynamic VLAN Assignment

  3. Solved: Dynamic vlan with Cisco ise

    ISE responds with the Access-Accept and the dynamic VLAN assignment instructions to put the port in whatever VLAN the user is supposed to get. That will cause the PC to request a new IP address since it detects a link state change. It gets a new IP address in the dynamically assigned VLAN.

  4. Dynamic VLAN Assignment with WLCs based on ISE to Active ...

    Dynamic VLAN assignment is one such feature that places a wireless user into a specific VLAN based on the credentials supplied by the user. This task of assigning users to a specific VLAN is handled by a RADIUS authentication server, such as Cisco ISE.

  5. Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

    Hi Created, This guide below is how to set up DACL's and how to dynamically assign a vlan to a device connecting to the network.

  6. RADIUS VLAN Assignment with Cisco ISE

    I want to dynamically assign a VLAN based to a user who connects on the switch port. The problem is that, although my end client is authenticated and authorized by ISE, the VLAN id never gets received on the switch from ISE. On ISE, I see my end user being authenticated with the correct policy, and authorized with the policy I created.

  7. 802.1X /w Dynamic VLAN Assignment

    Dynamic VLAN Assignment In lieu of CoA, MS switches can still dynamically assign a VLAN to a device by assigned the VLAN passed in the Tunnel-Pvt-Group-ID attribute. It may be necessary to perform dynamic VLAN assignment on a per computer or per user basis. This can be done on your wired network via 802.1x authentication (RADIUS).

  8. Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch

    1. Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch. This guide below is how to set up DACL's and how to dynamically assign a vlan to a device connecting to the network. 2. RE: Dynamic Vlan Assignment /DACL's with Cisco ISE and ArubaOS-Switch.

  9. Dynamic Vlan/Similar option is not working for Wired Clients (MAB/8021x

    I s it possible to configure a dynamic vlan allocation via Cisco ISE (Radius Server) for wired clients (MAB/8021X) ? ... The documentation says that dynamic VLAN assignment is supported though. Make sure you are passing all theee required parameters from ISE back to the switch (Tunnel-Medium-Type, Tunnel-Pvt-Group-ID and Tunnel-Type). ...

  10. Dynamic VLAN assignment with ISE

    Dynamic VLAN assignment with ISE - 5508+5760 ... Just concluded the dynamic vlan authentication with flexconnect. In the ISE, the config is the same as demonstrated in the pptx file. ... wired infrastructure: For my flexconnect site, I have a l3 switch directly connected to my OSPF area 0.

  11. ISE Dynamic VLAN assignment

    Dynamic VLAN assignment by a RADIUS server (e.g. Cisco ISE) can be useful when you want to assign a specific VLAN to a user or group of users. In order to achieve this the VLANS configured on the switches must be configured with a name, this name must be consistent across multiple switches.

  12. Dynamic VLAN assignment

    Dynamic VLAN assignment You can configure the RADIUS server to return a VLAN in the authentication reply message: On the FortiSwitch unit, select port-based authentication or MAC-based authentication and a security group. On the RADIUS server, configure the attributes. Using the GUI: Go to Switch > Interfaces. Select a port and then select Edit.