Autoconf uses the Device Classifier to identify the end devices that are connected to a port.
The Autoconf feature uses the device classification information gleaned from Cisco Discovery Protocol, LLDP, DHCP, MAC addresses,
and the Organizationally Unique Identifier (OUI) that is identified by the Device Classifier.
The Device Classifier provides improved device classification capabilities and accuracy, and increased device visibility for
enhanced configuration management.
Device classification is enabled when you enable the Autoconf feature using autoconf enable command in global configuration mode.
The device detection acts as an event trigger, which in turn applies the appropriate automatic template to the interface.
The Autoconf feature is based on a three-tier hierarchy.
-
A policy map identifies the trigger type for applying the Autoconf feature.
-
A parameter map identifies the appropriate template that must be applied, based on the end device.
-
The templates contain the configurations to be applied.
The Autoconf built-in templates and triggers perform the these three steps automatically.
The Autoconf feature provides the following built-in templates:
-
AP_INTERFACE_TEMPLATE
-
DMP_INTERFACE_TEMPLATE
-
IP_CAMERA_INTERFACE_TEMPLATE
-
IP_PHONE_INTERFACE_TEMPLATE
-
LAP_INTERFACE_TEMPLATE
-
MSP_CAMERA_INTERFACE_TEMPLATE
-
MSP_VC_INTERFACE_TEMPLATE
-
PRINTER_INTERFACE_TEMPLATE
-
ROUTER_INTERFACE_TEMPLATE
-
SWITCH_INTERFACE_TEMPLATE
-
TP_INTERFACE_TEMPLATE

Note
|
By default built-in templates are not displayed under running configuration. The built-in templates show in the running configuration
only if you edit them.
|
The template that is selected is based on parameter map information applied to an interface. This information can be based
on the following criteria:
-
End Device type
-
MAC address
-
OUI
-
User role
-
Username
The Autoconf feature provides one built-in parameter map BUILTIN_DEVICE_TO_TEMPLATE with the following configuration:
Parameter-map name: BUILTIN_DEVICE_TO_TEMPLATE
Map: 10 map device-type regex "Cisco-IP-Phone"
Action(s):
20 interface-template IP_PHONE_INTERFACE_TEMPLATE
Map: 20 map device-type regex "Cisco-IP-Camera"
Action(s):
20 interface-template IP_CAMERA_INTERFACE_TEMPLATE
Map: 30 map device-type regex "Cisco-DMP"
Action(s):
20 interface-template DMP_INTERFACE_TEMPLATE
Map: 40 map oui eq "00.0f.44"
Action(s):
20 interface-template DMP_INTERFACE_TEMPLATE
Map: 50 map oui eq "00.23.ac"
Action(s):
20 interface-template DMP_INTERFACE_TEMPLATE
Map: 60 map device-type regex "Cisco-AIR-AP"
Action(s):
20 interface-template AP_INTERFACE_TEMPLATE
Map: 70 map device-type regex "Cisco-AIR-LAP"
Action(s):
20 interface-template LAP_INTERFACE_TEMPLATE
Map: 80 map device-type regex "Cisco-TelePresence"
Action(s):
20 interface-template TP_INTERFACE_TEMPLATE
Map: 90 map device-type regex "Surveillance-Camera"
Action(s):
10 interface-template MSP_CAMERA_INTERFACE_TEMPLATE
Map: 100 map device-type regex "Video-Conference"
Action(s):
10 interface-template MSP_VC_INTERFACE_TEMPLATE

Note
|
Use the show parameter-map type subscriber attribute-to-service All command to view the configuration for the built-in parameter map.
|
The Autoconf feature provides one built-in policy map BUILTIN_AUTOCONF_POLICY with the following configuration:
BUILTIN_AUTOCONF_POLICY
event identity-update match-all
10 class always do-until-failure
10 map attribute-to-service table BUILTIN_DEVICE_TO_TEMPLATE

Note
|
Use the show policy-map type control subscriber BUILTIN_AUTOCONF_POLICY command to view the configuration for the built-in policy map.
|
You can also manually create policy maps, parameter maps, and templates.
When a trigger is created that is based on specific user information, a local 802.1X Cisco Identity Services Engine (ISE)
server authenticates it ensuring the security of the operation.
An interface template can be dynamically activated (on an interface) using any of the following methods:
-
RADIUS CoA—While Change of Authorization (CoA) commands are targeted to one or more access sessions, any referenced template
must be applied to the interface hosting the referenced session.
-
RADIUS Access-Accept for client authentication or authorization—Any referenced interface template returned in an Access-Accept
must be applied to the port that is hosting the authorized access session.
-
Service template—If an interface template is referenced in a service template that is either locally defined or sourced from
the AAA server, the interface template must be applied to the interface hosting any access-session on which the service template
is applied (add a new command for interface template reference from within a locally defined service template).
-
Subscriber control-policy action—A mapping action under the subscriber control policy activates service and/or interface
template (as referenced in a parameter map) based on the type of filter, and removes any templates associated with a previous
policy.
-
Device-to-template parameter map—A subscriber parameter map that allows the filter type to service and/or interface template
mappings to be specified in an efficient and readable manner.