<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco is putting their in Cloud Security</title>
    <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971248#M436</link>
    <description>&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;
&lt;DIV class="field-items"&gt;
&lt;DIV class="field-item even" property="content:encoded"&gt;
&lt;P&gt;Cisco is putting their resources into the more strategic platforms for identity such as ISE. We expect enhancements to ISE's passive identity feature set going forward and even an entry level licensing that's designed to do only that.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 18 Jul 2017 17:13:41 GMT</pubDate>
    <dc:creator>Farhan Mohamed</dc:creator>
    <dc:date>2017-07-18T17:13:41Z</dc:date>
    <item>
      <title>CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971244#M432</link>
      <description>&lt;P&gt;Has anyone seen a roadmap or ETA&amp;nbsp;for a CDA patch to support Windows Server 2016 Domain Controller connections? &amp;nbsp;It appears there is a version check since the WMI namespace it is utilizing hasn't changed from server 2012R2. &amp;nbsp;Its just checking the security event log, I don't understand why there is an OS version constraint to begin with I mean from their doc:&lt;/P&gt;
&lt;H3 class="p_H_Head2"&gt;Supported Active Directory Versions&lt;/H3&gt;
&lt;P class="pB1_Body1"&gt;CDA supports the following Active Directory versions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="pBu1_Bullet1"&gt;Windows 2003&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;Windows 2003R2&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;Windows 2008&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;Windows 2008 R2&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;Windows 2012&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;Windows 2012 R2&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Other than &lt;SPAN&gt;Windows&amp;nbsp;&lt;/SPAN&gt;2000, they support them all. &amp;nbsp;If someone on the Dev team insisted on putting one in, then test and release an update while the OS has been in Beta. &amp;nbsp;I'll take back everything bad I have said this past week if I just missed the release AND I will also admit I suck.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/cdadcfail_0.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2019 01:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971244#M432</guid>
      <dc:creator>lavazzzza</dc:creator>
      <dc:date>2019-03-09T01:40:25Z</dc:date>
    </item>
    <item>
      <title>I would be surprised to see</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971245#M433</link>
      <description>&lt;P&gt;I would be surprised to see any update of CDA's official support listing since that would involve validation testing and support.&lt;/P&gt;
&lt;P&gt;Cisco is putting their resources into the more strategic platforms for identity such as ISE. We expect enhancements to ISE's passive identity feature set going forward and even an entry level licensing that's designed to do only that.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 02:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971245#M433</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-22T02:54:33Z</dc:date>
    </item>
    <item>
      <title>i´m facing with this issue</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971246#M434</link>
      <description>&lt;P&gt;i´m facing with this issue too, how did you work arround it?&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 03:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971246#M434</guid>
      <dc:creator>aquariibusiness</dc:creator>
      <dc:date>2017-05-05T03:54:07Z</dc:date>
    </item>
    <item>
      <title>I haven't heard anything</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971247#M435</link>
      <description>&lt;P&gt;I haven't heard anything official, but from back-channel sources I've heard that CDA is dead. Cisco has not done their customer base&amp;nbsp;the courtesy of announcing this nor have they done the courtesy of informing their customer base of the supported way forward, which appears to be ISE. People with inside knowledge and people who spend their time pouring over&amp;nbsp;every Cisco product announcement are probably all over this, but the rest of us are not.&lt;/P&gt;
&lt;P&gt;My impression here is that Cisco is pulling a bait-and-switch move: offering a very nice feature and then turning around and requiring you to purchase another product to make it work. Hopefully I'm very, very wrong about this. If I'm not, then this is the sort of business practice that makes us look much more closely at other vendors during our next refresh cycle - we would only stick with Cisco ASA if we had no reasonable alternative.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 14:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971247#M435</guid>
      <dc:creator>ecarlseen</dc:creator>
      <dc:date>2017-05-05T14:46:01Z</dc:date>
    </item>
    <item>
      <title>Cisco is putting their</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971248#M436</link>
      <description>&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;
&lt;DIV class="field-items"&gt;
&lt;DIV class="field-item even" property="content:encoded"&gt;
&lt;P&gt;Cisco is putting their resources into the more strategic platforms for identity such as ISE. We expect enhancements to ISE's passive identity feature set going forward and even an entry level licensing that's designed to do only that.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 18 Jul 2017 17:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971248#M436</guid>
      <dc:creator>Farhan Mohamed</dc:creator>
      <dc:date>2017-07-18T17:13:41Z</dc:date>
    </item>
    <item>
      <title>ISE-PIC (Identity Services</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971249#M437</link>
      <description>&lt;P&gt;ISE-PIC (Identity Services Engine - Passive Identity Connector) has been available for several months now.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/datasheet-c78-738846.html&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/pic_admin_guide/PIC_admin/PIC_admin_chapter_00.html&lt;/P&gt;
&lt;P&gt;It is the recommended and supported platform going forward. It is not free, but the list price is just US$1250 plus US$200 per year for full TAC support.&lt;/P&gt;
&lt;P&gt;If you have a full ISE deployment, the features are all included in there as well.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 02:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971249#M437</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-19T02:33:55Z</dc:date>
    </item>
    <item>
      <title>We were told ICE-PIC wouldn't</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971250#M438</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We were told ICE-PIC wouldn't currently work with the WSAs and still have the WSA apply policies based on AD groups, at least a month ago now.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2017 13:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971250#M438</guid>
      <dc:creator>blroberts2</dc:creator>
      <dc:date>2017-07-21T13:55:24Z</dc:date>
    </item>
    <item>
      <title>My understanding is that ISE</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971251#M439</link>
      <description>&lt;P&gt;My understanding is that ISE-PIC is the "budget" way forward for WSA and ATA identity firewall, but that it's not ready to replace CDA yet. &amp;nbsp;The situation is a mess for the time being, because CDA is in an appallingly deep state of neglect. We're not impressed at all by the way Cisco is handling this.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jul 2017 16:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971251#M439</guid>
      <dc:creator>Erik Carlseen</dc:creator>
      <dc:date>2017-07-22T16:00:35Z</dc:date>
    </item>
    <item>
      <title>Like you Erik, I am not</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971252#M440</link>
      <description>&lt;P&gt;Like you Erik, I am not impressed with how Cisco is handeling this. We now have to choose between removing Identity Firewall or staying on Windows AD 2012 indefenitly.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 12:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971252#M440</guid>
      <dc:creator>Daniel Fjortoft</dc:creator>
      <dc:date>2017-08-07T12:12:46Z</dc:date>
    </item>
    <item>
      <title>Allegedly ISE-PIC will</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971253#M441</link>
      <description>&lt;P&gt;Allegedly ISE-PIC will resolve this issue eventually, and the street price of a pair (for redundancy) isn't going to break many budgets. But the amount of time between the release of Server 2016 and "eventually" is completely ridiculous, and the necessity of adding an additional paid component to maintain existing functionality is sketchy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is arguable worse than the situation with Symantec adding support for Windows 2012 to BackupExec, and comparisons with Symantec are seldom flattering.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Aug 2017 22:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/2971253#M441</guid>
      <dc:creator>ecarlseen</dc:creator>
      <dc:date>2017-08-14T22:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3337918#M539</link>
      <description>&lt;P&gt;Is there an update on the status of this? Are 2016 domain controllers still not supported on the CDA? Workarounds?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 15:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3337918#M539</guid>
      <dc:creator>Tim Jackson</dc:creator>
      <dc:date>2018-02-26T15:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3357037#M543</link>
      <description>&lt;P&gt;No they are still not. It also looks like WSA and CWS are going to go EOL, assumingly with CDA as well.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 20:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3357037#M543</guid>
      <dc:creator>tom234679</dc:creator>
      <dc:date>2018-03-28T20:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3726691#M577</link>
      <description>&lt;P&gt;We have serious problems with our Identity Firewall feature on ASA.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;We set up our new Windows 2016 domain controllers and added them to the domain.&lt;BR /&gt;As a result, users' authentications have also passed through these new Domain controllers, and the CDAs have not noticed the logs from the new DCs, which caused not working firewall rules. So we had to power down our new DCs.&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;I tried to integrate the 2016 DC into the CDA, but it’s not supported and I only got error messages.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We already escalated this to Cisco, but they don‘t have a solution yet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SGT is a nice additional feature, but it is not an substitute for us, because it doesn‘t have feature parity to identity firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Furthermore ISE-PIC is using pxgrid which is not supported by ASA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So we have actually a scenario were we even cannot work parallel with the old 2008 domain controllers, which makes migration to Win 2016 impossible.&lt;/P&gt;
&lt;P&gt;That‘s insane.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 00:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3726691#M577</guid>
      <dc:creator>lide.one</dc:creator>
      <dc:date>2018-10-17T00:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3801214#M611</link>
      <description>&lt;P&gt;Very late, but finally they added support for Windows 2016 in CDA Patch 6.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ibf/cda_10/release_notes/cda10_rn.html#pgfId-189162" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ibf/cda_10/release_notes/cda10_rn.html#pgfId-189162&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 17:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3801214#M611</guid>
      <dc:creator>lide.one</dc:creator>
      <dc:date>2019-02-13T17:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3808801#M619</link>
      <description>&lt;P&gt;Wow, this was unexpected. Tested and surprisingly it works with Windows Server 2016. Just read the documentation.&lt;/P&gt;
&lt;P&gt;This solved an issue we had with IPv6 with CDA using ISE's syslogs as the identity provider, as the syslogs with IPv6 addresses were not parsed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CDA however has its shortcomings&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Looking at Windows Event Logs you will get the IP address used when the user logs in. Not a great idea when your clients are dual stack. You will usually only get the IPv6 address. You don't really have control of how the workstation communicates, so if it communicates with a IPv4 only enabled device you don't have identity&lt;/LI&gt;
&lt;LI&gt;IP Filter Exclusions don't work with IPv6. Tried adding a IPv6 subnet but it won't validate the input&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than that the Windows Server 2016 support was welcomed considering there is no alternative from Cisco for a client using ASA and recent Windows Server versions.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 07:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3808801#M619</guid>
      <dc:creator>mikaelbje</dc:creator>
      <dc:date>2019-02-25T07:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3841042#M636</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I came across a very annoying&amp;nbsp;restriction. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CDA is very rudimentary implemented, that f&lt;/SPAN&gt;&lt;SPAN&gt;or VPN connections (vpn) and cut-through logins (ctp), the CDA writes LOCAL as the domain in the mapping table and I would need our domain name instead.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Because of that the identity firewall rules do not work for&amp;nbsp;that "LOCAL" users.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have already found an enhancement request "&lt;/SPAN&gt;CDA should allow configurable default domain CSCuh33454", but Cisco is not worth the effort to invest decent programming in this product yet.&lt;/P&gt;&lt;P&gt;And they still have no alternative to CDA for ASA. That's very shameful!&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 11:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3841042#M636</guid>
      <dc:creator>lide.one</dc:creator>
      <dc:date>2019-04-18T11:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3889338#M663</link>
      <description>&lt;P&gt;Hi I need Patch 6, where is the download?&amp;nbsp; I can't find it in Cisco's search box for software downloads, and its not under the Security category.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have a link?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 15:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3889338#M663</guid>
      <dc:creator>keithsauer507</dc:creator>
      <dc:date>2019-07-12T15:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Support for Windows Server 2016</title>
      <link>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3889416#M664</link>
      <description>&lt;A href="https://software.cisco.com/download/home/284143131/type/284724387/release/CDA" target="_blank"&gt;https://software.cisco.com/download/home/284143131/type/284724387/release/CDA&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Jul 2019 17:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cda-support-for-windows-server-2016/m-p/3889416#M664</guid>
      <dc:creator>lide.one</dc:creator>
      <dc:date>2019-07-12T17:10:51Z</dc:date>
    </item>
  </channel>
</rss>

