Cisco Identity Services Engine (ISE) is the policy backbone of a zero trust network. It answers the fundamental question: who and what is connecting to my network, and what should they be allowed to do? Whether you are enforcing 802.1X authentication on wired switch ports, wireless SSIDs, or VPN connections through a Cisco FTD firewall, ISE is the centralized policy decision point that ties it all together.

This guide walks through a practical ISE deployment covering switch configuration, Windows supplicant setup, FMC/FTD integration for VPN, profiling basics, and the policy sets that make it all work. We assume ISE is already installed and licensed — this guide focuses on the configuration that matters.

What This Guide Covers

  • Cisco switch configuration for 802.1X on wired access ports
  • Windows 802.1X supplicant configuration for wired and wireless
  • Wireless 802.1X with Cisco WLC
  • RADIUS/VPN authentication with Cisco FMC and FTD
  • ISE policy sets for wired, wireless, and VPN
  • Profiling basics — identifying what is on your network
  • What comes next: posture, compliance, and MDM integration

ISE Architecture Overview

At its core, ISE operates as a RADIUS server that makes access decisions based on identity and context. When a user or device attempts to connect — whether plugging into a switch port, joining a wireless network, or establishing a VPN tunnel — the network access device (NAD) sends a RADIUS Access-Request to ISE. ISE evaluates the request against its policy sets and returns an Access-Accept (with authorization attributes like VLAN, dACL, or SGT) or an Access-Reject.

ISE 802.1X authentication flow showing endpoint, network device, ISE policy engine, and Active Directory integration

The key components:

  • Authentication — verifying the user/device identity (who are you?)
  • Authorization — determining what access to grant (what can you do?)
  • Accounting — logging what the user did (audit trail)
  • Profiling — identifying device type and posture (what are you?)

Part 1: Wired 802.1X — Switch Configuration

Enable AAA and RADIUS on the Switch

Before configuring individual ports, the switch needs global AAA and RADIUS configuration pointing to ISE.

Cisco switch AAA and RADIUS configuration for ISE integration

! Enable AAA globally
aaa new-model

! Define RADIUS server
radius server ISE-PRIMARY
  address ipv4 10.1.1.100 auth-port 1812 acct-port 1813
  key 0 YourSharedSecret

radius server ISE-SECONDARY
  address ipv4 10.1.1.101 auth-port 1812 acct-port 1813
  key 0 YourSharedSecret

! Create RADIUS server group
aaa group server radius ISE-SERVERS
  server name ISE-PRIMARY
  server name ISE-SECONDARY

! AAA authentication for dot1x
aaa authentication dot1x default group ISE-SERVERS

! AAA authorization for network access
aaa authorization network default group ISE-SERVERS

! AAA accounting
aaa accounting dot1x default start-stop group ISE-SERVERS

! Enable CoA (Change of Authorization) for dynamic policy updates
aaa server radius dynamic-author
  client 10.1.1.100 server-key YourSharedSecret
  client 10.1.1.101 server-key YourSharedSecret

! Enable dot1x globally
dot1x system-auth-control

! Enable device tracking for IP-to-MAC binding (required for profiling)
device-tracking policy IPDT-POLICY
  tracking enable

! Enable RADIUS attributes for profiling
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server dead-criteria time 30 tries 3
radius-server deadtime 15

Configure Access Ports for 802.1X

Apply 802.1X configuration to access ports where endpoints connect.

Cisco switch 802.1X access port configuration with dot1x and MAB

interface GigabitEthernet1/0/1
  description >> 802.1X Enabled Access Port <<
  switchport access vlan 100
  switchport mode access

  ! Enable device tracking on this port
  device-tracking attach-policy IPDT-POLICY

  ! 802.1X port configuration
  authentication host-mode multi-auth
  authentication order dot1x mab
  authentication priority dot1x mab
  authentication port-control auto
  authentication periodic
  authentication timer reauthenticate server

  ! Enable dot1x on the port
  dot1x pae authenticator
  dot1x timeout tx-period 10

  ! MAB fallback for non-802.1X devices (printers, phones, IoT)
  mab

  ! Spanning tree edge port
  spanning-tree portfast edge

Key design decisions:

  • authentication order dot1x mab — try 802.1X first, fall back to MAC Authentication Bypass (MAB) for devices that don’t support 802.1X like printers and IP phones
  • authentication host-mode multi-auth — allows multiple devices on the same port (useful for IP phones with passthrough PCs)
  • mab — enables MAB so ISE can profile and authorize non-802.1X devices based on their MAC address

Configure Trunk Ports (Skip 802.1X)

Trunk ports connecting to other switches, WLCs, or servers should NOT have 802.1X enabled.

interface GigabitEthernet1/0/48
  description >> Uplink to Core <<
  switchport trunk encapsulation dot1q
  switchport mode trunk
  switchport trunk allowed vlan 1,100,200,300
  ! No authentication commands here

Part 2: Windows 802.1X Supplicant Configuration

Windows has a built-in 802.1X supplicant, but it is disabled by default. Here is how to enable and configure it for both wired and wireless.

Enable the Wired AutoConfig Service

  1. Open Services (services.msc)
  2. Find Wired AutoConfig
  3. Set Startup type to Automatic
  4. Click Start

Or via PowerShell (run as Administrator):

Windows PowerShell enabling the Wired AutoConfig service for 802.1X supplicant

1Set-Service -Name dot3svc -StartupType Automatic
2Start-Service -Name dot3svc

Configure Wired 802.1X Authentication

  1. Open Network Connections (ncpa.cpl)
  2. Right-click your Ethernet adapter > Properties
  3. Go to the Authentication tab
  4. Check Enable IEEE 802.1X authentication
  5. Set authentication method to Microsoft: Protected EAP (PEAP)
  6. Click Settings:
    • Check Verify the server’s identity by validating the certificate
    • Select your ISE root CA under Trusted Root Certification Authorities
    • Authentication method: Secured password (EAP-MSCHAPv2)
    • Check Enable Fast Reconnect
  7. Click Configure next to EAP-MSCHAPv2:
    • Check Automatically use my Windows logon name and password

Configure Wireless 802.1X (WPA2/WPA3-Enterprise)

  1. Open Settings > Network & Internet > Wi-Fi
  2. Click Manage known networks > Add a new network
  3. Configure:
    • Network name: your SSID (e.g., Corp-Secure)
    • Security type: WPA2-Enterprise or WPA3-Enterprise
    • EAP method: PEAP
    • Authentication method: EAP-MSCHAPv2
    • Check Connect automatically

For enterprise deployments, configure 802.1X via Group Policy:

  1. Open Group Policy Management (gpmc.msc)
  2. Create or edit a GPO linked to the OU containing your computers
  3. Navigate to: Computer Configuration > Policies > Windows Settings > Security Settings > Wired Network (IEEE 802.3) Policies
  4. Right-click > Create A New Wired Network Policy
  5. Configure:
    • Enable Windows Wired AutoConfig service
    • Authentication method: PEAP with EAP-MSCHAPv2
    • Validate server certificate with your ISE CA
    • Use Windows credentials automatically

Repeat the same under Wireless Network (IEEE 802.11) Policies for wireless 802.1X.

Part 3: Wireless 802.1X with Cisco WLC

On the Cisco Wireless LAN Controller, create a WLAN profile with 802.1X authentication pointing to ISE.

Add ISE as RADIUS Server on WLC

Navigate to Security > AAA > RADIUS > Authentication and add:

  • Server IP: 10.1.1.100 (ISE Primary)
  • Shared Secret: YourSharedSecret
  • Port: 1812
  • Server Status: Enabled
  • Support for CoA: Enabled

Repeat for the secondary ISE node.

Create 802.1X WLAN

Navigate to WLANs > Create New:

  • Profile Name: Corp-Secure
  • SSID: Corp-Secure
  • Status: Enabled

Under the Security tab:

  • Layer 2 Security: WPA + WPA2
  • WPA2 Policy: Enabled
  • WPA2 Encryption: AES
  • Authentication Key Management: 802.1X

Under AAA Servers:

  • Server 1: ISE-PRIMARY (10.1.1.100)
  • Server 2: ISE-SECONDARY (10.1.1.101)

Enable AAA Override to allow ISE to push VLAN, ACL, and SGT assignments dynamically.

Part 4: VPN Authentication with Cisco FMC/FTD

Cisco Secure Firewall Threat Defense (FTD), managed by Firewall Management Center (FMC), supports RADIUS authentication against ISE for remote access VPN. This enables ISE to apply the same identity-based policies to VPN users that it applies to wired and wireless users.

Configure ISE as RADIUS Server in FMC

  1. In FMC, navigate to Objects > Object Management > RADIUS Server Group
  2. Click Add RADIUS Server Group:
    • Name: ISE-SERVERS
    • Add servers:
      • IP: 10.1.1.100, Secret: YourSharedSecret, Port: 1812/1813
      • IP: 10.1.1.101, Secret: YourSharedSecret, Port: 1812/1813
    • Enable Authorize Only for CoA support
    • Set Dead Time: 10 minutes
    • Set Max Failed Attempts: 3

Configure Remote Access VPN in FMC

  1. Navigate to Devices > VPN > Remote Access
  2. Click Add to create a new RA VPN policy
  3. Connection Profile:
    • Name: Corp-VPN
    • Authentication: AAA Only
    • Authentication Server: ISE-SERVERS (the RADIUS group created above)
    • Client Address Assignment: DHCP or IP Pool (e.g., 10.250.0.0/24)
    • Group Policy: Create or assign a group policy with:
      • Split tunneling or full tunnel as needed
      • DNS servers
      • Banner text
  4. AnyConnect Client:
    • Upload the AnyConnect package for the target platforms
    • Configure client profiles as needed
  5. Deploy the configuration to the FTD appliance

Add FTD as Network Device in ISE

In ISE, navigate to Administration > Network Resources > Network Devices and add the FTD:

  • Name: FTD-PRIMARY
  • IP Address: FTD management IP (or the IP that sends RADIUS requests)
  • RADIUS Shared Secret: YourSharedSecret
  • Device Type: Create a device type called VPN-Firewalls
  • Location: Assign to the appropriate network device group

ISE Policy Set for VPN

Create a dedicated policy set in ISE for VPN authentication:

Authentication Policy:

  • Condition: RADIUS:NAS-Port-Type EQUALS Virtual AND Network Access:Device Type EQUALS VPN-Firewalls
  • Identity Source: Active Directory
  • Allowed Protocols: PAP/MSCHAP (for password-based) or EAP-TLS (for certificate-based)

Authorization Policy:

  • Rule 1 — VPN-Admins: If user is member of AD-Group:VPN-Admins → permit access, assign VLAN 250, push dACL PERMIT-ALL
  • Rule 2 — VPN-Standard: If user is member of AD-Group:VPN-Users → permit access, assign VLAN 251, push dACL LIMITED-ACCESS
  • Rule 3 — Default Deny: Deny access

Enable Change of Authorization (CoA) for VPN

CoA allows ISE to push policy changes to the FTD mid-session — for example, re-authenticating a user after posture assessment. In FMC:

  1. Navigate to the RADIUS server group settings
  2. Ensure Dynamic Authorization (CoA) is enabled
  3. The FTD must allow CoA on UDP port 1700 from the ISE nodes

Part 5: ISE Policy Sets

ISE policy sets are the brain of the operation. They determine how authentication and authorization are handled for every type of connection. Here is a recommended policy set structure:

Policy Set Structure

Policy Set: Wired-802.1X
  Condition: RADIUS:NAS-Port-Type = Ethernet
  Authentication: AD + Internal Endpoints
  Authorization Rules:
    1. Employee-Wired → Full Access VLAN + SGT
    2. MAB-Known-Devices → Limited VLAN (printers, phones)
    3. MAB-Unknown → Guest VLAN (quarantine)
    4. Default → Deny

Policy Set: Wireless-802.1X
  Condition: RADIUS:NAS-Port-Type = Wireless - IEEE 802.11
  Authentication: AD + Internal Endpoints
  Authorization Rules:
    1. Employee-Wireless → Corp VLAN + SGT
    2. BYOD → BYOD VLAN + limited ACL
    3. Guest → Guest Portal redirect
    4. Default → Deny

Policy Set: VPN
  Condition: RADIUS:NAS-Port-Type = Virtual
  Authentication: AD
  Authorization Rules:
    1. VPN-Admins → Full tunnel, admin VLAN
    2. VPN-Users → Split tunnel, standard VLAN
    3. VPN-Contractors → Limited access, contractor VLAN
    4. Default → Deny

Authorization Profiles

For each authorization rule, create an authorization profile that defines what the user gets:

  • VLAN assignment — dynamically assign the user to a VLAN based on their role
  • Downloadable ACL (dACL) — push an access list that defines permitted traffic
  • Security Group Tag (SGT) — assign a TrustSec SGT for scalable group-based segmentation
  • RADIUS attributes — push additional attributes like session timeout or URL redirect

Part 6: Profiling Basics

Profiling is ISE’s ability to identify and classify every device that connects to the network — even devices that cannot perform 802.1X authentication. This is critical for IoT devices, IP phones, printers, medical devices, cameras, and building automation systems.

How Profiling Works

ISE uses multiple probes to gather device information:

ProbeWhat It CollectsHow to Enable
RADIUSCalling-Station-ID (MAC), NAS-PortAlways active
DHCPDHCP fingerprint, hostname, classDHCP helper to ISE or SPAN
DNSReverse DNS lookupEnabled in ISE
HTTPUser-Agent stringHTTP redirect or SPAN
SNMPCDP/LLDP, device platformSNMP trap/query from NADs
NetFlowTraffic patternsNetFlow export to ISE
EndpointAgent-based attributesAnyConnect ISE Posture module

Enable Profiling on the Switch

To maximize profiling accuracy, enable DHCP and CDP/LLDP on the switch:

! Send DHCP requests to ISE for profiling
ip dhcp snooping
ip dhcp snooping vlan 100,200,300

! Enable CDP and LLDP for device identification
cdp run
lldp run

! SNMP configuration for ISE profiling queries
snmp-server community ISE-PROFILE ro
snmp-server host 10.1.1.100 version 2c ISE-PROFILE
snmp-server host 10.1.1.101 version 2c ISE-PROFILE

! Enable RADIUS profiling attributes
radius-server vsa send authentication
radius-server vsa send accounting

Profiling Policy Examples

ISE ships with hundreds of built-in profiling policies. Common ones include:

  • Cisco-IP-Phone — identified by CDP/LLDP attributes, automatically assigned to voice VLAN
  • Apple-Device — identified by DHCP fingerprint and HTTP User-Agent
  • Printer — identified by DHCP hostname patterns and SNMP OID
  • Windows-Workstation — identified by DHCP and HTTP User-Agent

You can create custom profiling policies for devices unique to your environment. For example, if you have medical devices with a specific DHCP fingerprint or MAC OUI, create a custom policy that classifies them and applies the appropriate authorization.

Profiling and MAB Together

The real power of profiling shows when combined with MAB. When a non-802.1X device connects:

  1. The switch sends a MAB request to ISE with the device’s MAC address
  2. ISE checks the MAC against its endpoint database
  3. If the endpoint is profiled (e.g., as a Cisco IP Phone), ISE applies the corresponding authorization policy — voice VLAN, limited ACL
  4. If the endpoint is unknown, ISE can place it in a restricted VLAN for further profiling or quarantine

What Comes Next

This guide covers the foundation — getting 802.1X authentication working across wired, wireless, and VPN with ISE as the policy engine. But authentication is only the first step in a comprehensive zero trust deployment.

In our next blog post, we will cover Posture and Compliance — how ISE evaluates the security posture of endpoints before granting full network access. This includes:

  • ISE Posture Module — checking for antivirus, firewall, disk encryption, and OS patch level before allowing access
  • Compliance policies — defining what a “healthy” endpoint looks like and automatically remediating non-compliant devices
  • MDM Integration with Microsoft Intune — leveraging Intune device compliance data in ISE authorization decisions so that ISE and Intune work together to enforce a unified device trust policy
  • Remediation workflows — automatically redirecting non-compliant users to a remediation portal with instructions to fix their device

Posture turns ISE from a network access control tool into a true zero trust enforcement point — verifying not just who is connecting, but whether their device meets your organization’s security baseline.


This is part of our Security in 45 technical guide series. Subscribe on YouTube, Apple Podcasts, or Spotify for more security deep dives.