Overview

This document describes Cisco Identity Services Engine (ISE) validated compatibility with switches, wireless LAN controllers, and other policy enforcement devices as well as operating systems with which Cisco ISE interoperates.

Validated Network Access Devices

Cisco ISE supports interoperability with any Cisco or non-Cisco RADIUS client network access device (NAD) that implements common RADIUS behavior (similar to Cisco IOS 12.x) for standards-based authentication.

RADIUS

Cisco ISE interoperates fully with third-party RADIUS devices that adhere to the standard protocols. Support for RADIUS functions depends on the device-specific implementation.


Note

Certain advanced use cases, such as those that involve posture assessment, profiling, and web authentication, are not consistently available with non-Cisco devices or may provide limited functionality. We recommend that you validate all network devices and their software for hardware capabilities or bugs in a particular software release.


TACACS+

Cisco ISE interoperates fully with third-party TACACS+ client devices that adhere to the governing protocols. Support for TACACS+ functions depends on the device-specific implementation.

For information on enabling specific functions of Cisco ISE on network switches, see the “Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions” chapter in Cisco Identity Services Engine Admin Guide.

For information about third-party NAD profiles, see the ISE Community Resources.


Note

Some switch models and IOS versions may have reached the end-of-life date and interoperability may not be supported by Cisco TAC.



Note

You must use the latest version of NetFlow for the Cisco ISE profiling service. If you use NetFlow Version 5, you can use it only on the primary NAD at the access layer.


For Wireless LAN Controllers, note the following:

  • MAC authentication bypass (MAB) supports MAC filtering with RADIUS lookup.

  • Support for session ID and COA with MAC filtering provides MAB-like functionality.

  • DNS-based ACL feature is supported in WLC 8.0. Not all Access Points support DNS-based ACL. See the Cisco Access Points Release Notes for more details.

The following notations are used to mark the device support:

  • : Fully supported
  • X : Not supported

  • ! : Limited support, some functionalities are not supported.

The following functionalities are supported by each feature:

Table 1. Features and Functionalities
Feature Functionality

AAA

802.1X, MAB, VLAN Assignment, dACL

Profiling

RADIUS CoA and Profiling Probes

BYOD

RADIUS CoA, URL Redirection and SessionID

Guest

RADIUS CoA, Local Web Auth, URL Redirection and SessionID

Guest Originating URL

RADIUS CoA, Local Web Auth, URL Redirection and SessionID

Posture

RADIUS CoA, URL Redirection and SessionID

MDM

RADIUS CoA, URL Redirection and SessionID

TrustSec

SGT Classification

TACACS+

AAA NAD Access

Table 2. Supported End-to-End Flows

Platforms

AAA 802.1X

AAA MAB

Profiling

BYOD

Guest

Guest Originating URL

Posture

MDM

TrustSec

TACACS+

Switching

Routing

x

x

x

x

x

x

Wireless

x

Validated Cisco Network Access Devices

Table 3. Validated Cisco Network Access Devices

Product Category

Device Family

Cisco ISE 3.0

Cisco ISE 2.7

Cisco ISE 2.6/Patch 2

Cisco ISE 2.4/Patch 5/Patch 10

Cisco Switches

Cisco Catalyst 9000 series switch family including:

Catalyst 9200

Catalyst 9300

Catalyst 9400

Catalyst 9500

Catalyst 9600

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco IOS XE 16.9.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco IOS XE 16.9.2

Cisco IOS XE 16.6.2

Catalyst 4500-X

Cisco IOS 15.2(6)E

Cisco IOS 15.2(6)E

Cisco IOS 15.2(6)E

Cisco IOS 15.2(6)E

Catalyst 4500 Supervisor 8-E

Cisco IOS 3.11.0E ED

Cisco IOS 3.11.0E ED

Cisco IOS 3.11.0E ED

Cisco IOS 3.10.3E

Cisco IOS 3.10.3E

Cisco IOS XE 3.6.8E

Catalyst 3560-G

Cisco IOS 15.0(2)SE11

Cisco IOS 15.0(2)SE11

Cisco IOS 15.2(2)E6

Cisco IOS 12.2(55)SE11

Cisco IOS 12.2(55)SE11

Catalyst 3560-X

Cisco IOS 15.2.4E10

Cisco IOS 15.2(4)E9

Cisco IOS 15.2(2)E6

Cisco IOS 15.2(2)E6

Catalyst 3650

Catalyst 3650-X

Catalyst 3850

Cisco IOS XE 16.12.1

Cisco IOS XE 16.12.1

Cisco IOS 16.6.2 ES

Cisco IOS 16.6.2 ES

Catalyst 3750-G

Catalyst 3750-E

Cisco IOS 15.0(2)SE11

Cisco IOS 15.0(2)SE11

Cisco IOS 12.2(55)SE11

Cisco IOS 12.2(55)SE10

Cisco IOS 15.0(2)SE11

Catalyst 2960-S

Catalyst 2960-XR

Catalyst 2960-X

Cisco IOS 15.0(2)SE11

Cisco IOS 15.0(2)SE11

Cisco IOS 15.0(2)SE11

Cisco IOS 15.2.2E8

Catalyst 1000

Cisco IOS 15.2(7)E3

Cisco IOS 15.2(7)E3

Cisco IOS 15.2(7)E3

Cisco IOS 15.2(7)E3

Cisco Wireless LAN Controllers

Catalyst 9800-LC-eWC

Catalyst 9800-Fabric

Catalyst 9800-80

Catalyst 9800-40

Catalyst 9800-L

Cisco IOS XE 17.3.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco Mobility Express

Access Point 9115

Access Point 9117

Access Point 9117AXI

Access Point 9120

Access Point 9130

Cisco IOS XE 17.3.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1

Cisco IOS XE 17.3.1

Cisco IOS XE 17.2.1

Cisco IOS XE 17.1.1

Cisco IOS XE 16.12.1


Note

The last validated version for the following devices is Cisco ISE 2.7:

  • Catalyst 4500-X

  • Catalyst 4500 Supervisor 8-E

  • Catalyst 3560-G

  • Catalyst 3650

  • Catalyst 3850

  • Catalyst 2960-S

  • Catalyst 2960-XR


Validated Cisco Digital Network Architecture Center Release

Table 4. Validated Cisco Digital Network Architecture Center Release

Validated Cisco DNA Center Version

Validated Cisco ISE Release

1.2.12.0

Cisco ISE 2.7

1.3.0.0

Cisco ISE 2.7

1.3.0.6

Cisco ISE 3.0

1.3.1.0

Cisco ISE 2.4 patch 9, patch 11

Cisco ISE 2.6 patch 2

Cisco ISE 2.7

1.3.1.4

Cisco ISE 2.4 patch 12

Cisco ISE 2.6 patch 6

Cisco ISE 2.7 patch 2

Cisco ISE 3.0

1.3.2.0

Cisco ISE 2.4 patch 10, patch 11

Cisco ISE 2.7

1.3.3.0

Cisco ISE 2.7 patch 1

Cisco ISE 3.0

1.3.3.4

Cisco ISE 2.6 patch 6

1.3.3.5

Cisco ISE 2.4 patch 13

Cisco ISE 2.7 patch 2

2.1.1.0

Cisco ISE 2.4 patch 12

Cisco ISE 2.6 patch 6, patch 7

Cisco ISE 2.7 patch 1, patch 2

Cisco ISE 3.0

2.1.1.1

Cisco ISE 3.0

2.1.2.0

Cisco ISE 3.0

For more information about Cisco ISE compatibility with Cisco Digital Network Architecture Center (Cisco DNA Center), see Cisco SD-Access Compatibility Matrix.

Validated Security Product Integrations (over pxGrid)

Table 5. Validated Security Product Integrations (over pxGrid)

Product

Cisco ISE 3.0

Cisco ISE 2.7

Cisco ISE 2.6

Cisco Firepower Management Center

Firepower Threat Defense with Cisco Firepower Management Center 6.5

Firepower Threat Defense with Cisco Firepower Management Center 6.6

Firepower Threat Defense with Firepower Device Management 6.5

Firepower Threat Defense with Firepower Device Management 6.6

Firepower Threat Defense with Cisco Firepower Management Center 6.4

Firepower Threat Defense with Cisco Firepower Management Center 6.4

Cisco Stealthwatch Management

Cisco Stealthwatch Management 7.1.2

Cisco Stealthwatch Management 7.0

Cisco Stealthwatch Management 6.9

Cisco Web Security Appliance

Cisco Web Security Appliance 12.1

Cisco Web Security Appliance 11.5.1

AAA Attributes for RADIUS Proxy Service

For RADIUS proxy service, the following authentication, authorization, and accounting (AAA) attributes must be included in the RADIUS communication:

  • Calling-Station-ID (IP or MAC_ADDRESS)

  • RADIUS::NAS_IP_Address

  • RADIUS::NAS_Identifier

AAA Attributes for Third-Party VPN Concentrators

For VPN concentrators to integrate with Cisco ISE, the following authentication, authorization, and accounting (AAA) attributes should be included in the RADIUS communication:

  • Calling-Station-ID (tracks individual client by MAC or IP address)

  • User-Name (tracks remote client by login name)

  • NAS-Port-Type (helps to determine connection type as VPN)

  • RADIUS Accounting Start (triggers official start of session)

  • RADIUS Accounting Stop (triggers official end of session and releases ISE license)

  • RADIUS Accounting Interim Update on IP address change (for example, SSL VPN connection transitions from Web-based to a full-tunnel client)


Note

For VPN devices, the RADIUS Accounting messages must have the Framed-IP-Address attribute set to the client’s VPN-assigned IP address to track the endpoint while on a trusted network.


Validated Client Machine Operating Systems, Supplicants, and Agents

This section lists the validated client machine operating systems, browsers, and agent versions for each client machine type. For all devices, you must also have cookies enabled in the web browser. Cisco AnyConnect-ISE Posture Support Charts are available at: https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-device-support-tables-list.html

Cisco ISE, Release 2.3 and later support only the Cisco AnyConnect and Cisco Temporal Agents.

All standard 802.1X supplicants can be used with Cisco ISE, Release 2.4 and above standard and advanced features as long as they support the standard authentication protocols supported by Cisco ISE. For the VLAN change authorization feature to work in a wireless deployment, the supplicant must support IP address refresh on VLAN change.


Note

Cisco ISE does not support any trial version or evaluation edition of an operating system.


Google Android

Cisco ISE may not support certain Android OS version and device combinations due to the open access-nature of Android implementation on certain devices.

The following Google Android versions have been validated with Cisco ISE:

  • Google Android 10.x

  • Google Android 9.x

  • Google Android 8.x

  • Google Android 7.x

The following Android devices have been validated with Cisco ISE. See the Validated Network Access Devices section for the list of devices for which BYOD flow is supported in Cisco ISE.

Table 6. Validated Android Devices

Device Model

Android Version

Google Pixel 3

10

OnePlus 6

10

Samsung S9

9

Google Nexus 6P

8.1

Huawei Mate Pro 10

8

Ensure that the Location service is enabled on the Android 9.x and 10.x devices before starting the supplicant provisioning wizard (SPW).

Android no longer uses Common Name (CN). The Hostname must be in the subjectAltName (SAN) extension, or trust fails.If you are using self-signed certificates, regenerate Cisco ISE self-signed certificate by selecting Domain Name or IP Address option from the SAN drop-down list for Portals. To view this window, click the Menu icon () and choose Administration > System > Certificates > System Certificates.

If you are using Android 9.x, you must update the posture feed in Cisco ISE to get the NSA for Android 9.

Apple iOS

While Apple iOS devices use Protected Extensible Authentication Protocol (PEAP) with Cisco ISE or 802.1x, the public certificate includes a CRL distribution point that the iOS device needs to verify but it cannot do it without network access. Click “confirm/accept” on the iOS device to authenticate to the network.

The following Apple iOS versions have been validated with Cisco ISE:

  • Apple iOS 13.x

  • Apple iOS 12.x

  • Apple iOS 11.x

The following iPhone/iPad devices have been validated with Cisco ISE. See the Validated Network Access Devices section for the list of devices for which BYOD flow is supported in Cisco ISE.

Table 7. Validated iPhone/iPad Devices

Device Model

iOS Version

iPhone X

iOS 13

iPhone 8

iOS 12.3

iPhone 7

iOS 13.2

iPhone 6

iOS 12.6

iPhone 5s

iOS 12, iOS 10.3

iPad

iPad OS 13.1


Note

  • If you are using Apple iOS 12.2 or later version, you must manually install the downloaded Certificate/Profile. To do this, choose Settings > General > Profile in the Apple iOS device and Click Install.

  • If you are using Apple iOS 12.2 or later version, RSA key size must be 2048 bits or higher. Otherwise, you might see an error while installing the BYOD profile.

  • If you are using Apple iOS 13 or a later version, regenerate the self-signed certificate for portal role by adding the <<FQDN>> as DNS Name in the SAN field.

  • If you are using Apple iOS 13 or a later version, ensure that SHA-256 (or greater) is selected as the signature algorithm.


Apple macOS

Table 8. Apple macOS

Client Machine Operating System

AnyConnect

Apple macOS 11

4.9.04043 or later

Apple macOS 10.15

4.8.01090 or later

Apple macOS 10.14

4.8.01090 or later

Apple macOS 10.13

4.8.01090 or later

Cisco ISE does work with earlier release of AnyConnect 4.x. However, only newer AnyConnect releases support newer features.


Note

For Apple macOS 11, you must use Cisco AnyConnect 4.9.04043 or above and MAC OSX compliance module 4.3.1466.4353 or above.


For information about the Windows and MAC OSX anti-malware, patch management, disk encryption, and firewall products that are supported by the Cisco ISE Posture Agent, see the Cisco AnyConnect-ISE Posture Support Charts.

Microsoft Windows

Table 9. Microsoft Windows

Client Machine Operating System

Supplicants (802.1X)

Cisco Temporal Agent

AnyConnect1

Microsoft Windows 10

  • Windows 20H1

  • Windows 19H2

  • Windows 19H1

  • Windows 10 Enterprise

  • Windows 10 Enterprise N

  • Windows 10 Enterprise E

  • Windows 10 Enterprise LTSB

  • Windows 10 Enterprise N LTSB

  • Windows 10 Professional

  • Windows 10 Professional N

  • Windows 10 Professional E

  • Windows 10 Education

  • Windows 10 Home

  • Windows 10 Home Chinese

  • Windows 10.0 SLP (Single Language Pack)

  • Microsoft Windows 10 802.1X Client

  • AnyConnect Network Access Manager

4.5 or later

4.8.01090 or later

1 If you have AnyConnect Network Access Manager (NAM) installed, NAM takes precedence over Windows native supplicant as the 802.1X supplicant and it does not support the BYOD flow. You must disable NAM completely or on a specific interface. See the Cisco AnyConnect Secure Mobility Client Administration Guide for more information.

To enable wireless redirection in Firefox 70 for BYOD, Guest, and Client Provisioning portals:

  1. In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Settings > Security Settings.

  2. Check the Allow SHA1 ciphers check box. SHA1 ciphers are disabled by default.

  3. In your Firefox browser, choose Options > Privacy & Settings > View Certificates > Servers > Add Exception.

  4. Add https://<FQDN>:8443/ as exception.

  5. Click Add Certificate and then refresh your Firefox browser.

Google Chromebook

Google Chromebook is a managed device and does not support the Posture service. See the Cisco Identity Services Engine Administration Guide for more information.

Table 10. Google Chromebook

Client Machine Operating System

Web Browser

Cisco ISE

Google Chromebook

Google Chrome version 49 or later

Cisco ISE 2.4 Patch 8

Cisco ISE 2.6 Patch 1

Cisco ISE BYOD or Guest portal may fail to launch in Chrome Operating System 73 even though the URL is redirected successfully. To launch the portals in Chrome Operating System 73, follow the steps below:

  1. Generate a new self-signed certificate from ISE GUI by filling the Subject Alternative Name field. Both DNS and IP Address must be filled.

  2. Export and copy the certificate to the end client (chrome book).

  3. Choose Settings > Advanced > Privacy and Security > Manage certificates > Authorities.

  4. Import the certificate.

  5. Open the browser and try to redirect the portal.

In Chromebook 76 and later, if you are configuring EAP-TLS settings using an internal CA for EAP, upload the CA certificate chain with SAN fields to the Google Admin Console Device Management > Network > Certificates. Once the CA chain is uploaded, the Cisco ISE generated certificate with SAN fields is mapped under Chromebook Authorities section to consider your Cisco ISE certificate as trusted.

If you are using a third-party CA, you do not have to import CA chain to Google Admin Console. Choose Settings > Advanced > Privacy and Security > Manage certificates > Server certificate Authority and select Use any default Certificate Authority from the drop-down list.

Validated Operating Systems and Browsers for Sponsor, Guest, and My Devices Portals

These Cisco ISE portals support the following operating system and browser combinations. These portals require that you have cookies enabled in your web browser.

Table 11. Validated Operating Systems and Browsers

Supported Operating System2

Browser Versions

Google Android3 10.x, 9.x, 8.x, 7.x

  • Native browser

  • Mozilla Firefox

  • Google Chrome

Apple iOS 13.x, 12.x, 11.x

  • Safari

Apple macOS 11, 10.15, 10.14, 10.13

  • Mozilla Firefox

  • Safari

  • Google Chrome

Microsoft Windows 10

  • Microsoft IE 11.x

  • Mozilla Firefox

  • Google Chrome

2 The latest two officially-released browser versions are supported for all operating systems except Microsoft Windows; refer to Table 14 for the supported Internet Explorer versions.
3 Cisco ISE may not support certain Android OS version and device combinations due to the open access-nature of Android implementation on certain devices.

Validated Devices for On-Boarding and Certificate Provisioning

Cisco Wireless LAN Controller (WLC) 7.2 or later support is required for the BYOD feature. See the Release Notes for the Cisco Identity Services Engine for any known issues or caveats.


Note

To get the latest Cisco-supported client Operating System versions, check the posture update information. To do this:
  1. In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Settings > Posture > Updates.

  2. Click Update Now.


Table 12. BYOD On-Boarding and Certificate Provisioning - Validated Devices and Operating Systems

Device

Operating System

Single SSID

Dual SSID (open > PEAP (no cert) or open > TLS)

Onboard Method

Apple iDevice

Apple iOS 13.x, 12.x, 11.x

Apple iPad OS 13.x

Yes

Yes4

Apple profile configurations (native)

Google Android

10.x, 9.x, 8.x, 7.x

Yes5

Yes

Cisco Network Setup Assistant

Barnes & Noble Nook (Android) HD/HD+6

Windows

Windows 10

Microsoft Windows 10 Version 2004 (OS build 19041.1) and higher is required for EAP TEAP.

Yes7

Yes

2.2.1.53 or later

Windows

Mobile 8, Mobile RT, Surface 8, and Surface RT

No

No

Apple macOS

Apple macOS 11, 10.15, 10.14, 10.13

Yes

Yes

2.2.1.43 or later

4 Connect to secure SSID after provisioning.
5

You cannot modify the system-created SSIDs using the Cisco supplicant provisioning wizard (SPW), if you using Android version 6.0 or above . When the SPW prompts you to forget the network, you must choose this option and press the Back button to continue the provisioning flow.

6 Barnes & Noble Nook (Android) works when it has Google Play Store 2.1.0 installed.
7 While configuring the wireless properties for the connection (Security > Auth Method > Settings > Validate Server Certificate), uncheck the valid server certificate option . If you check this option, ensure that you select the correct root certificate.

Supported Protocol Standards, RFCs, and IETF Drafts

Devices Validated with Cisco ISE 2.3 or Earlier

The following section lists the devices that are validated with Cisco ISE. Cisco ISE supports interoperability with any Cisco or non-Cisco RADIUS client network access device (NAD) that implements common RADIUS behavior for standards-based authentication. Cisco ISE supports protocol standards like RADIUS, its associated RFC Standards, and TACACS+. For more information, see the ISE Community Resources.

Validated Cisco Access Switches

Table 13. Validated Cisco Access Switches

Device

Validated OS 8

AAA

Profiling

BYOD

Guest

Guest Originating URL

Posture

MDM

TrustSec 9

Minimum OS 10

IE2000

IE3000 

Cisco IOS 15.2(2)E4

Cisco IOS 15.2(4)EA6

Cisco IOS 15.0(2)EB

X

IE4000

IE5000

Cisco IOS 15.2(2)E5

Cisco IOS 15.2(4)E2

Cisco IOS 15.2(4)EA6

Cisco IOS 15.0.2A-EX5

IE4010

Cisco IOS 15.2(2)E5

Cisco IOS 15.2(4)E2

Cisco IOS 15.0.2A-EX5

CGS 2520

Cisco IOS 15.2(3)E3

X

Cisco IOS 15.2(3)E3

X

Catalyst 2960 LAN Base

Cisco IOS 15.0(2)SE11

X

X

Cisco IOS v12.2(55)SE5 11

!

X

!

!

X

Catalyst 2960-C

Catalyst 3560-C

Cisco IOS 15.2(2)E4

Cisco IOS 12.2(55)EX3

Catalyst 2960-L

Cisco IOS 15.2(6.1.27)E2

X

Cisco IOS 15.2(6)E2

X

Catalyst 2960-Plus

Catalyst 2960-SF

Cisco IOS 15.2(2)E4

Cisco IOS 15.0(2)SE7

X

Catalyst 2960-CX

Catalyst 3560-CX

Cisco IOS 15.2(3)E1

Cisco IOS 15.2(3)E

Catalyst 3560V2

Catalyst 3750V2

Cisco IOS 12.2(55)SE10

Cisco IOS 12.2(55)SE5

Catalyst 3560-E

Cisco IOS 15.0(2)SE11

Cisco IOS 12.2(55)SE5

Catalyst 3750-E

Cisco IOS 15.2(2) E6

Cisco IOS 15.0(2)SE11

Cisco IOS 12.2(55)SE5

Catalyst 3750-X

Cisco IOS 15.2(2) E6

Cisco IOS 15.2(2)E5

Cisco IOS 15.2(4)E2

Cisco IOS 12.2(55)SE5

Catalyst 4500 Supervisor 7-E, 7L-E

Cisco IOS XE 3.6.4

Cisco IOS XE 3.4.4 SG

X

Catalyst 4500 Supervisor 6-E, 6L-E

Cisco IOS 15.2(2)E4

X

Cisco IOS 15.2(2)E

X

Catalyst 5760

Cisco IOS XE 3.7.4

X

Catalyst 6500-E (Supervisor 32)

Cisco IOS 12.2(33)SXJ10

X

Cisco IOS 12.2(33)SXI6

X

Catalyst 6500-E (Supervisor 720)

Cisco IOS 15.1(2)SY7

X

Cisco IOS v12.2(33)SXI6

X

Catalyst 6500-E (VS-S2T-10G)

Cisco IOS 152-1.SY1a

X

Cisco IOS 15.0(1)SY1

X

Catalyst 6807-XL

Catalyst 6880-X (VS-S2T-10G)

Cisco IOS 152-1.SY1a

X

Cisco IOS 15.0(1)SY1

X

Catalyst 6500-E (Supervisor 32)

Cisco IOS 12.2(33)SXJ10

X

Cisco IOS 12.2(33)SXI6

X

Catalyst 6848ia

Cisco IOS 152-1.SY1a

X

Cisco IOS 15.1(2) SY+

X

Meraki MS Platforms

Latest Version

! 12

! 13

X

! 14

X

Latest Version

!

!

X

!

X

8 Validated OS is the version tested for compatibility and stability.
9 See the Cisco TrustSec Product Bulletin for a complete list of Cisco TrustSec feature support.
10 Minimum OS is the version in which the features got introduced.
11 The IOS 12.x version does not fully support the Posture and Guest flows because of CSCsx97093. As a workaround, when you configure URL redirect in Cisco ISE, assign a value to “coa-skip-logical-profile.”
12 dACL is not supported for Meraki switches.
13 Local Web Authentication is not supported for Meraki switches.
14 Only Meraki MDM is supported. Third-party MDM is not supported.

Validated Third Party Access Switches

Table 14. Validated Third Party Access Switches

Device

Validated OS 15

AAA

Profiling

BYOD

Guest

Posture

MDM

TrustSec 16

Minimum OS 17

Avaya ERS 2526T

4.4

!

X

X

X

X

X

4.4

!

X

X

X

X

X

Brocade ICX 6610

8.0.20

X

X

8.0.20

X

X

Extreme X440-48p

ExtremeXOS 15.5

X

X

X

ExtremeXOS 15.5

X

X

X

HP H3C

HP ProCurve

5.20.99

X

X

5.20.99

X

X

HP ProCurve 2900

WB.15.18.0007

X

X

WB.15.18.0007

X

X

Juniper EX3300

12.3R11.2

X

X

12.3R11.2

X

X

15 Validated OS is the version tested for compatibility and stability.
16 See the Cisco TrustSec Product Bulletin for a complete list of Cisco TrustSec feature support.
17 Minimum OS is the version in which the features got introduced.

For more information on third-party device support, see https://communities.cisco.com/docs/DOC-64547

Validated Cisco Wireless LAN Controllers

Table 15. Validated Cisco Wireless LAN Controllers

Device

Validated OS 18

AAA

Profiling

BYOD

Guest

Guest Originating URL

Posture

MDM

TrustSec 19

WLC 2100

AireOS 7.0.252.0

!

X

!

X

X

X

X

AireOS 7.0.116.0 (minimum)

!

X

!

X

X

X

X

WLC 2504

AirOS 8.5.120.0(ED)

WLC 3504

AirOS 8.5.105.0

Not validated

WLC 4400

AireOS 7.0.252.0

!

X

!

X

X

X

X

AireOS 7.0.116.0 (minimum)

!

X

!

X

X

X

X

WLC 2500

AireOS 8.0.140.0

X

X

AireOS 8.2.121.0

X

AireOS 8.3.102.0

X

AireOS 8.4.100.0

X

AireOS 7.2.103.0 (minimum)

!

X

X

WLC 5508

AireOS 8.0.140.0

X

X

AireOS 8.2.121.0

X

AireOS 8.3.102.0

X

AireOS 8.3.114.x

X

AireOS 8.3.140.0

X

AireOS 8.4.100.0

X

AireOS 7.0.116.0 (minimum)

!

X

!

X

X

X

WLC 5520

AireOS 8.0.140.0

X

X

AireOS 8.2.121.0

X

AireOS 8.3.102.0

X

AireOS 8.4.100.0

X

AireOS 8.5.1.x

AireOS 8.6.1.x

AirOS 8.6.101.0(ED)

AireOS 8.1.122.0 (minimum)

X

WLC 7500

AireOS 8.0.140.0

X

X

AireOS 8.2.121.0

X

AireOS 8.2.154.x

X

AireOS 8.3.102.0

X

AireOS 8.4.100.0

X

AirOS 8.5.120.0(ED)

AireOS 7.2.103.0 (minimum)

!

X

X

X

X

X

X

WLC 8510

AireOS 8.0.135.0

X

X

AireOS 7.4.121.0 (minimum)

X

X

X

X

X

WLC 8540

AireOS 8.1.131.0

X

X

AireOS 8.1.122.0 (minimum)

X

X

WiSM1 6500

AireOS 7.0.252.0

!

X

!

X

X

X

X

AireOS 7.0.116.0 (minimum)

!

X

!

X

X

X

X

WiSM2 6500

AireOS 8.0.135.0

X

AireOS 7.2.103.0 (minimum)

!

X

WLC 5760

IOS XE 3.6.4

IOS XE 3.3 (minimum)

X

WLC for ISR (ISR2 ISM, SRE700, and SRE900)

AireOS 7.0.116.0

!

X

!

X

X

X

X

AireOS 7.0.116.0 (minimum)

!

X

!

X

X

X

X

Meraki MR Platforms

Public Beta

X

Latest Version (minimum)

X

18 Validated OS is the version tested for compatibility and stability.
19 See the Cisco TrustSec Product Bulletin for a complete list of Cisco TrustSec feature support.

Refer to the Cisco Wireless Solutions Software Compatibility Matrix for a complete list of supported operating systems.


Note

Due to CSCvi10594, IPv6 RADIUS CoA fails in AireOS Release 8.1 and later. As a workaround, you can use IPv4 RADIUS or downgrade Cisco Wireless LAN Controller to AireOS Release 8.0.



Note

Cisco Wireless LAN Controllers (WLCs) and Wireless Service Modules (WiSMs) do not support downloadable ACLs (dACLs), but support named ACLs. Autonomous AP deployments do not support endpoint posturing. Profiling services are supported for 802.1X-authenticated WLANs starting from WLC release 7.0.116.0 and for MAB-authenticated WLANs starting from WLC 7.2.110.0. FlexConnect, previously known as Hybrid Remote Edge Access Point (HREAP) mode, is supported with central authentication configuration deployment starting from WLC 7.2.110.0. For additional details regarding FlexConnect support, refer to the release notes for the applicable wireless controller platform.


Supported Cisco Access Points

Table 16. Supported Cisco Access Points

Cisco Access Point

Minimum Cisco Mobility Express Version

AAA

Profiling

BYOD

Guest

Guest Originating URL

Posture

MDM

TrustSec

Cisco Aironet 1540 Series

Cisco Mobility Express 8.7.106.0

X

X

X

X

X

Cisco Aironet 1560 Series

Cisco Mobility Express 8.7.106.0

X

X

X

X

X

Cisco Aironet 1815i

Cisco Mobility Express 8.7.106.0

X

X

X

X

X

Cisco Aironet 1815m

Cisco Mobility Express 8.7.106.0

X

X

X

X

X

Cisco Aironet 1815w

Cisco Mobility Express 8.7.106.0

X

X

X

X

X

Cisco Aironet 2800 Series

Cisco Mobility Express 8.7.106.0

X

X

X

X

X

Cisco Aironet 3800 Series

Cisco Mobility Express 8.7.106.0

X

X

X

X

X

Validated Third Party Wireless LAN Controllers

Table 17. Validated Third Party Wireless LAN Controllers

Device

Validated OS 20

AAA

Profiling

BYOD

Guest

Posture

MDM

TrustSec 21

Minimum OS 22

Aruba 320023

Aruba 3200XM

Aruba 650

6.4

X

X

6.4

X

X

6.4

X

X

Aruba 7000

Aruba IAP

6.4.1.0

X

X

6.4.1.0

X

X

Motorola RFS 4000

5.5

X

X

5.5

X

X

HP 830

35073P5

X

X

35073P5

X

X

Ruckus ZD1200

9.9.0.0

X

X

9.9.0.0

X

X

20 Validated OS is the version tested for compatibility and stability.
21 See the Cisco TrustSec Product Bulletin for a complete list of Cisco TrustSec feature support.
22 Minimum OS is the version in which the features got introduced.
23 Aruba 3200 is supported for ISE 2.2 patch 2 and above.

For more information on third-party device support, see https://communities.cisco.com/docs/DOC-64547

Validated Cisco Routers

Table 18. Validated Cisco Routers

Device

Validated OS 24

Minimum OS 25

AAA

Profiling

BYOD

Guest

Posture

MDM

TrustSec 26

ISR 88x, 89x Series

IOS 15.3.2T(ED)

X

X

X

X

X

X

IOS 15.2(2)T

X

X

X

X

X

X

ASR 1001-HX

ASR 1001-X

ASR 1002-HX

ASR 1002-X

IOS XE 17.1.1

IOS XE 17.2.1

X

X

X

X

X

IOS XE 17.1.1

X

X

X

X

X

ISR 19x, 29x, 39x Series

IOS 15.3.2T(ED)

!

X

!

X

X

IOS 15.2(2)T

!

X

!

X

X

CE 9331

IOS XE 17.1.1

X

X

X

X

X

IOS XE 17.1.1

X

X

X

X

X

CGR 2010

IOS 15.3.2T(ED)

!

X

!

X

X

IOS 15.3.2T(ED)

!

X

!

X

X

4451-XSM-X L2/L3 Ethermodule

IOS XE 3.11

IOS XE 3.11

24 Validated OS is the version tested for compatibility and stability.
25 Minimum OS is the version in which the features got introduced.
26 See the Cisco TrustSec Product Bulletin for a complete list of Cisco TrustSec feature support.

Validated Cisco Remote Access

Table 19. Validated Cisco Remote Access

Device

Validated OS 27

AAA

Profiling

BYOD

Guest

Posture

MDM

TrustSec 28

Minimum OS 29

ASA 5500, ASA 5500-X (Remote Access Only)

ASA 9.2.1

NA

NA

NA

X

ASA 9.1.5

NA

NA

X

NA

X

X

X

Meraki MX Platforms

Latest Version

X

Latest Version

X

27 Validated OS is the version tested for compatibility and stability.
28 See the Cisco TrustSec Product Bulletin for a complete list of Cisco TrustSec feature support.
29 Minimum OS is the version in which the features got introduced.

Validated Cisco Prime Infrastructure Release

Cisco Prime Infrastructure, Release 3.6 or above can be integrated with Cisco ISE 2.6 or above to leverage the monitoring and reporting capabilities of Cisco ISE.

Validated Cisco WAN Service Administrator Release

Cisco ISE has been validated with Cisco WAN Service Administrator, Release 11.5.1.

Support for Threat Centric NAC

Cisco ISE is validated with the following adapters:

  • SourceFire FireAMP

  • Cognitive Threat Analytics (CTA) adapter

  • Rapid7 Nexpose

  • Tenable Security Center

  • Qualys (Only the Qualys Enterprise Edition is currently supported for TC-NAC flows)