<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Identity Firewall in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019959#M173268</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;The laptop cannot authenticate on the domain and the asa does not seem to retrieve the user identity&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the Domain-Controller doesn't see the authentication of the user, the ASA can never know that the user has a particular IP to allow the traffic. The Identity Firewall needs that Domain-Login-information to work,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Aug 2012 06:33:31 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-08-28T06:33:31Z</dc:date>
    <item>
      <title>ASA Identity Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019958#M173267</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup an Identity Firewall on a ASA version 5.6 on a DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have installed the ADAgent on a domain member Win2008 and configured as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server ADAGENT_SERVER protocol radius&lt;/P&gt;&lt;P&gt;ad-agent-mode&lt;/P&gt;&lt;P&gt;aaa-server ADAGENT_SERVER (VPN) host 172.17.v.x&amp;nbsp; key *****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the LDAP connection to the DC as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server DOMAIN_SERVER protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server DOMAIN_SERVER (VPN) host 172.17.v.z&lt;/P&gt;&lt;P&gt;ldap-base-dn DC=YYY,DC=local&lt;/P&gt;&lt;P&gt;ldap-scope subtree&lt;/P&gt;&lt;P&gt;ldap-login-password *****&lt;/P&gt;&lt;P&gt;ldap-login-dn vvvvv&lt;/P&gt;&lt;P&gt;server-type microsoft&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The identity config is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user-identity domain YYY aaa-server DOMAIN_SERVER&lt;/P&gt;&lt;P&gt;user-identity default-domain YYY&lt;/P&gt;&lt;P&gt;user-identity action netbios-response-fail remove-user-ip&lt;/P&gt;&lt;P&gt;user-identity logout-probe netbios local-system&lt;/P&gt;&lt;P&gt;user-identity ad-agent aaa-server ADAGENT_SERVER&lt;/P&gt;&lt;P&gt;user-identity user-not-found enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 122 extended permit ip user YYY\ashdew any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where ashdew is a domain user and ACL 122(only one line) is applied on the dmz interface and NAT is properly configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ADagent has been properly tested and ASA can register to it.&lt;/P&gt;&lt;P&gt;The ASA can connect to AD DC controller and query user database.&lt;/P&gt;&lt;P&gt;I have placed a laptop ip 172.17.h.x on the DMZ and can ping the DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The laptop cannot authenticate on the domain and the asa does not seem to retrieve the user identity &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to add extra rules in the access-list 122 to permit trafic to DC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I check on the AD Agent if it can retrieve the user to ip mapping ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashley&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:28:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019958#M173267</guid>
      <dc:creator>ashley_dew</dc:creator>
      <dc:date>2019-03-11T02:28:17Z</dc:date>
    </item>
    <item>
      <title>ASA Identity Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019959#M173268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;The laptop cannot authenticate on the domain and the asa does not seem to retrieve the user identity&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the Domain-Controller doesn't see the authentication of the user, the ASA can never know that the user has a particular IP to allow the traffic. The Identity Firewall needs that Domain-Login-information to work,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 06:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019959#M173268</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-28T06:33:31Z</dc:date>
    </item>
    <item>
      <title>ASA Identity Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019960#M173269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the advise,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So do I need to allow flows from the laptop to the DC,DNS for authentication ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, my access-list should include at least where 172.17.x.y is the DC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 122 extended permit ip user YYY\ashdew any any&lt;/P&gt;&lt;P&gt;access-list 122 extended permit ip 172.17.137.0 255.255.255.0 172.17.x.y &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the sequencing ok? Or do I need to allow traffic to the DC first? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashley&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 06:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019960#M173269</guid>
      <dc:creator>ashley_dew</dc:creator>
      <dc:date>2012-08-28T06:42:39Z</dc:date>
    </item>
    <item>
      <title>ASA Identity Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019961#M173270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that our user ADAgent User IP mapping cache remains 0 but the AD agent DC list status is up&amp;nbsp; on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashley &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 07:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019961#M173270</guid>
      <dc:creator>ashley_dew</dc:creator>
      <dc:date>2012-08-28T07:03:26Z</dc:date>
    </item>
    <item>
      <title>ASA Identity Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019962#M173271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To use the identity-firewall the user needs to authenticate to the domain. So the user needs the right to reach a domain-controller. This has to be configured with the IP-addresses in the ACL. After the user authenticates, the AD-Agent can see the successfull login on the DC-log and add the IP of the user to the mapping cache.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on the systems you have on your DMZ it could be the wrong way to do that. If a system in the DMZ gets compromized, it can attack your domain-controller, so your DMZ not really is one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that solution the usage of the old and unloved cut-through-proxy could be the better way to achieve your goal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 07:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019962#M173271</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-28T07:14:29Z</dc:date>
    </item>
    <item>
      <title>ASA Identity Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019963#M173272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great its clear now. I know the DMZ seems a bit odd. Actually, the DMZ is only accessible through the any-connect VPN.&lt;/P&gt;&lt;P&gt;In the DMZ, we will have a citrix farm to access internal resources through identity management. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are testing with a laptop in the first place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, we have allowed in the acl to access AD, the laptop authenticates in the domain but then all connections are refused since the AD Agent is not retrieving the mapping. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to check if the ADAgent is properly retrieved the mapping. We suspect the problem is here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We did a capture on the ASA and we have found that the ASA contact the ADAgent when the user authenticates but then ADAgent does not return any ip mapping. The ASA sees the user as&amp;nbsp; ip as user-not -found .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashley&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 07:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019963#M173272</guid>
      <dc:creator>ashley_dew</dc:creator>
      <dc:date>2012-08-28T07:32:28Z</dc:date>
    </item>
    <item>
      <title>ASA Identity Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019964#M173273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ashley,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to make sure the domain controller is configured appropriately, please follow the instructions mentioned here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ibf/setup_guide/ibf10_install.html#wp1058066"&gt;http://www.cisco.com/en/US/docs/security/ibf/setup_guide/ibf10_install.html#wp1058066&lt;/A&gt;&lt;SPAN&gt; (Configuring AD Agent to Obtain Information from AD Domain Controllers)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest to first verify login events are generated in the security event log of the domain controller. In Windows 2008 you will need to see event with ID number 4768. If they are not, you will need to change the audit policy as described in the link above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 08:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-identity-firewall/m-p/2019964#M173273</guid>
      <dc:creator>eshabat</dc:creator>
      <dc:date>2012-08-28T08:43:13Z</dc:date>
    </item>
  </channel>
</rss>

