<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re:VPN inline posture using iPEP ISE and cisco ASA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019528#M195118</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all thanks for the reply. Here's some follow up question on my question. &lt;/P&gt;&lt;P&gt;Would like to make some amendment on my business requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;01.&amp;nbsp; It is a 2 factor authentication, where user credential validate on&amp;nbsp; external ID store (AD) and RSA token. Agent is using AnyConnect client&amp;nbsp; VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This part i a bit confuse. How's the&amp;nbsp; authentication sequence look like? Because i am thinking when IPEP and&amp;nbsp; PSN done on the RADIUS Access request and Access, then only do the RSA&amp;nbsp; SDI challenge?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this part done, there's posture&amp;nbsp; validation checking either user install NAC agent. If Yes then only&amp;nbsp; grant access to the network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;02. Since this&amp;nbsp; involve RADIUS authentication, so where i can create the authorization&amp;nbsp; profile for the user? Can ISE PSN authorization doing split tunnel this&amp;nbsp; kind of feature? (is it need to configure customize AV-Pair attribute&amp;nbsp; etc for this?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;03. Please suggest and comment, with the business requirement of &lt;/P&gt;&lt;P&gt;a. 2 factor authentication (RSA, Exrternal ID store)&lt;/P&gt;&lt;P&gt;b. Using ISE PSN for authorization profile (Instead of ASA)&lt;/P&gt;&lt;P&gt;c. posture checking on NAC agent installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client OS were all WINDOW 7 64 bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached topology1.png diagram for reference&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Oct 2012 12:04:17 GMT</pubDate>
    <dc:creator>yong khang NG</dc:creator>
    <dc:date>2012-10-17T12:04:17Z</dc:date>
    <item>
      <title>VPN inline posture using iPEP ISE and cisco ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019524#M194986</link>
      <description>&lt;P&gt;Hi All, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would like to check out these 2 question from you all:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 1:&lt;/P&gt;&lt;P&gt;For VPN inline posture using iPEP ISE and cisco ASA. Is it mandatory for&amp;nbsp; endpoint VPN client must go through client provisioning and posture&amp;nbsp; after authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Can i just simplify the process as: authentication success, CoA comply to setting AuthZ profile, Full access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Question 2:&lt;/P&gt;&lt;P&gt; For design perspective (VPN inline posture using iPEP ISE and cisco ASA platform):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; For the Remote Access VPN (VPN client using AnyConnect secure mobility&amp;nbsp; client), we will configuring the AnyConnect client profile for VPN&amp;nbsp; client on PRE-login phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; What's the practice for Post-Login phase authorization policy provision?&amp;nbsp; Is it the only option after the CoA happen VPN user are provision with&amp;nbsp; the authorization profile and dACL from ISE policy service node? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Can we still inherit or use the setting on AnyConnect Client profile's group policy?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Is there any document discussing about this topic: authorization policy&amp;nbsp; for post-login in the environment of VPN inline posture using iPEP, ISE&amp;nbsp; policy service node serve as central policy? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; It's lovely if you share the relevant reference URL regarding this topic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; My platform using these device and version &lt;/P&gt;&lt;P&gt;a. ISE 3355, ISE version 1.1&lt;/P&gt;&lt;P&gt;b. ASA 5520, ASA version 8.4.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019524#M194986</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2019-03-11T02:35:39Z</dc:date>
    </item>
    <item>
      <title>Re:VPN inline posture using iPEP ISE and cisco ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019525#M195024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Noel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not mandatory to deploy an inline node if you are only performing authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to download acls to the client to restrict access you can do that from the central psn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The entire purpose of ipep is to dynamically change the user access through change of authorization at the inline.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the client must have a vpn session established before the ipep builds a session and determines it access policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 12:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019525#M195024</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-26T12:56:51Z</dc:date>
    </item>
    <item>
      <title>VPN inline posture using iPEP ISE and cisco ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019526#M195059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. But my concern is on the POST-LOGIN phase authorization part. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can ISE policy service node able to perform the feature of what ASDM remote access VPN anyconnect's group policy can do? example split tunnel. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 02:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019526#M195059</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2012-09-27T02:07:17Z</dc:date>
    </item>
    <item>
      <title>Re:VPN inline posture using iPEP ISE and cisco ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019527#M195087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you trying to assign accesslist to users?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so you can do this through radius and do not need ipep.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ipep us only for coa. Here is an example of what I use ipep for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I establish a vpn connection. I hit a remediation policy, the asa routes all my traffic to the ipep (at this point the asa is done authenticating) now the ipep is enforcing the remediation policy by redirecting all my traffic to the policy service node (via a downloadable acls defined on ise remediation policy), and allowing me access to mcafee server and windows update server in case I am out of compliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I meet the requirements the agrnt report let's ise know I am compliant and coa is sent to ipep where my access is elevated to a compliant policy. Ipep applies a new accesslist to my session and removes the redirection policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 02:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019527#M195087</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-27T02:19:28Z</dc:date>
    </item>
    <item>
      <title>Re:VPN inline posture using iPEP ISE and cisco ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019528#M195118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all thanks for the reply. Here's some follow up question on my question. &lt;/P&gt;&lt;P&gt;Would like to make some amendment on my business requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;01.&amp;nbsp; It is a 2 factor authentication, where user credential validate on&amp;nbsp; external ID store (AD) and RSA token. Agent is using AnyConnect client&amp;nbsp; VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This part i a bit confuse. How's the&amp;nbsp; authentication sequence look like? Because i am thinking when IPEP and&amp;nbsp; PSN done on the RADIUS Access request and Access, then only do the RSA&amp;nbsp; SDI challenge?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this part done, there's posture&amp;nbsp; validation checking either user install NAC agent. If Yes then only&amp;nbsp; grant access to the network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;02. Since this&amp;nbsp; involve RADIUS authentication, so where i can create the authorization&amp;nbsp; profile for the user? Can ISE PSN authorization doing split tunnel this&amp;nbsp; kind of feature? (is it need to configure customize AV-Pair attribute&amp;nbsp; etc for this?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;03. Please suggest and comment, with the business requirement of &lt;/P&gt;&lt;P&gt;a. 2 factor authentication (RSA, Exrternal ID store)&lt;/P&gt;&lt;P&gt;b. Using ISE PSN for authorization profile (Instead of ASA)&lt;/P&gt;&lt;P&gt;c. posture checking on NAC agent installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client OS were all WINDOW 7 64 bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached topology1.png diagram for reference&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 12:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019528#M195118</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2012-10-17T12:04:17Z</dc:date>
    </item>
    <item>
      <title>VPN inline posture using iPEP ISE and cisco ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019529#M195144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are questions that I am not able to answer at the moment since I havent had a chance to lab these up. However if you are an ATP partner and are looking for help, you can wait for someone who can chime in on the forums or use the Partner help desk: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/web/partners/tools/pdihd_faqs.html"&gt;http://www.cisco.com/web/partners/tools/pdihd_faqs.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you can open a TAC case to get this issues resolved much faster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 16:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019529#M195144</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-10-17T16:26:01Z</dc:date>
    </item>
    <item>
      <title>Re:VPN inline posture using iPEP ISE and cisco ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019530#M195182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please review the below link which might be helpful&amp;nbsp; as this is already on support forum: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-24412"&gt;https://supportforums.cisco.com/docs/DOC-24412&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.cisco.com/image/gif/paws/115724/vpn-inpost-asa-00.pdf"&gt;http://www.cisco.com/image/gif/paws/115724/vpn-inpost-asa-00.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 03:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-inline-posture-using-ipep-ise-and-cisco-asa/m-p/2019530#M195182</guid>
      <dc:creator>vikasyad</dc:creator>
      <dc:date>2013-05-24T03:20:22Z</dc:date>
    </item>
  </channel>
</rss>

