<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL VPN Authentication using different Identity Sources Sequence in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-authentication-using-different-identity-sources/m-p/2213356#M112201</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Retracted the previous statement. Yes that makes sense now.&lt;BR /&gt;Thanks for that&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Si&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Jun 2013 13:31:00 GMT</pubDate>
    <dc:creator>Si</dc:creator>
    <dc:date>2013-06-25T13:31:00Z</dc:date>
    <item>
      <title>SSL VPN Authentication using different Identity Sources Sequences</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-authentication-using-different-identity-sources/m-p/2213354#M112196</link>
      <description>&lt;P&gt;Morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment we have setup SSL vpns that pass security to ACS. This is acomplished using strong authentication. On ACS the &lt;/P&gt;&lt;P&gt;Identity Sources Sequence&amp;nbsp; is &lt;SPAN style="font-size: 10pt;"&gt;OTP then AD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We would like to setup on the same firewall a select few users that just abide by AD authentication, these will have a different tunnel group name etc when making the connection&lt;SPAN style="font-size: 10pt;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;On ACS im not sure how i would setup two Identidy Sources Sequence to this effect using the same&amp;nbsp; Service Selection Rule. At the moment i have IF RADIUS and IP is XXX then use XXX policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We are currently installed ISE so in the not to distant future is ACS cannot do this can ISE?&lt;BR /&gt;If this is confusing i can expand were nesscessary&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;S&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-authentication-using-different-identity-sources/m-p/2213354#M112196</guid>
      <dc:creator>Si</dc:creator>
      <dc:date>2019-03-11T03:35:01Z</dc:date>
    </item>
    <item>
      <title>SSL VPN Authentication using different Identity Sources Sequence</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-authentication-using-different-identity-sources/m-p/2213355#M112198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't remember how it looked like on ACS but on ISE its quite flexible&lt;/P&gt;&lt;P&gt;so the rule is simple&lt;/P&gt;&lt;P&gt;if the radius request comes forma ASA device type then check tunnel-group-name attribute (146) and accourding to string value choose LOCAL or AD store. &lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/3/1/143134-ScreenShot481.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 13:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-authentication-using-different-identity-sources/m-p/2213355#M112198</guid>
      <dc:creator>Przemyslaw Konitz</dc:creator>
      <dc:date>2013-06-25T13:15:21Z</dc:date>
    </item>
    <item>
      <title>SSL VPN Authentication using different Identity Sources Sequence</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-authentication-using-different-identity-sources/m-p/2213356#M112201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Retracted the previous statement. Yes that makes sense now.&lt;BR /&gt;Thanks for that&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Si&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 13:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-authentication-using-different-identity-sources/m-p/2213356#M112201</guid>
      <dc:creator>Si</dc:creator>
      <dc:date>2013-06-25T13:31:00Z</dc:date>
    </item>
  </channel>
</rss>

