<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re:Anyconnect and ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082103#M177062</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Yes you can use ise to push acls to your vpn clients. Are you using per user acls or dacl for your acls configuration?&lt;BR /&gt;&lt;BR /&gt;All you need to do is note the contents of your acls, and migrate that over in the results section in the policy elements configuration.&lt;BR /&gt;&lt;BR /&gt;You can then place the asa in its own device group, map the network device group and the domain user group and send back the result for vpn access.&lt;BR /&gt;&lt;BR /&gt;Since the ise uses radius accounting to track license enforcement. You will need add a new aaa-server configuration on your asa, under you tunnel group you will have to set the authentication server group and accounting server group to point to ise.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 27 Jan 2013 06:28:21 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2013-01-27T06:28:21Z</dc:date>
    <item>
      <title>Anyconnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082102#M176997</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Currently i have setup a ASA 5510, 8.4 as vpn headend, Cisco ACS 4.2 as RADIUS server for AAA (groups in radius server are mapped to AD groups). &lt;/P&gt;&lt;P&gt;Would like to see if i can use ISE to authenticate vpn users, push VPN ACL to vpn users, basically to replace ACS with ISE. we are planning to use ISE for other AAA/posture/policy usages for our wired and wireless clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any good docs explaining how to configure ISE to provide aaa for Anyconnect VPN users? I got some basics ISE configured (AD integration, get groups from AD, added ASA VPN and WLC devices into ISE) but missing pars how to basically replace ACS with ISE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help in this filed is appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:01:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082102#M176997</guid>
      <dc:creator>endpoint</dc:creator>
      <dc:date>2019-03-11T03:01:00Z</dc:date>
    </item>
    <item>
      <title>Re:Anyconnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082103#M177062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Yes you can use ise to push acls to your vpn clients. Are you using per user acls or dacl for your acls configuration?&lt;BR /&gt;&lt;BR /&gt;All you need to do is note the contents of your acls, and migrate that over in the results section in the policy elements configuration.&lt;BR /&gt;&lt;BR /&gt;You can then place the asa in its own device group, map the network device group and the domain user group and send back the result for vpn access.&lt;BR /&gt;&lt;BR /&gt;Since the ise uses radius accounting to track license enforcement. You will need add a new aaa-server configuration on your asa, under you tunnel group you will have to set the authentication server group and accounting server group to point to ise.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Jan 2013 06:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082103#M177062</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-27T06:28:21Z</dc:date>
    </item>
    <item>
      <title>Re:Anyconnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082104#M177117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik&lt;/P&gt;&lt;P&gt;Thanks for responce. &lt;/P&gt;&lt;P&gt;I am using per group ACL.&lt;/P&gt;&lt;P&gt;Do you have any good documents you want to share about setting it all up?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 15:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082104#M177117</guid>
      <dc:creator>endpoint</dc:creator>
      <dc:date>2013-01-28T15:25:33Z</dc:date>
    </item>
    <item>
      <title>Anyconnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082105#M177196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check this document, I hope this helps you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/acs.pdf"&gt;http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/acs.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 21:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise/m-p/2082105#M177196</guid>
      <dc:creator>Naveen Kumar</dc:creator>
      <dc:date>2013-04-26T21:17:14Z</dc:date>
    </item>
  </channel>
</rss>

