<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows Active Directory in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-active-directory/m-p/1869222#M199008</link>
    <description>&lt;P&gt;Can I use AAA Radius on a ASA 5505 to block outgoing user access by user name in a group? Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:43:46 GMT</pubDate>
    <dc:creator>tsouza</dc:creator>
    <dc:date>2019-03-11T01:43:46Z</dc:date>
    <item>
      <title>Windows Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-active-directory/m-p/1869222#M199008</link>
      <description>&lt;P&gt;Can I use AAA Radius on a ASA 5505 to block outgoing user access by user name in a group? Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-active-directory/m-p/1869222#M199008</guid>
      <dc:creator>tsouza</dc:creator>
      <dc:date>2019-03-11T01:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-active-directory/m-p/1869223#M199017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that you might be interested on Checking the new ASA 8.4 Feature: Identity Firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp578684table578679" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; Identity Firewall &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;P&gt; Typically, a firewall is not aware of the user identities and, therefore, cannot apply security policies based on identity. &lt;/P&gt;&lt;BR /&gt;&lt;P&gt; The Identity Firewall in the ASA provides more granular access control&amp;nbsp; based on users' identities. You can configure access rules and security&amp;nbsp; policies based on usernames and user groups name rather than through&amp;nbsp; source IP addresses. The ASA applies the security policies based on an&amp;nbsp; association of IP addresses to Windows Active Directory login&amp;nbsp; information and reports events based on the mapped usernames instead of&amp;nbsp; network IP addresses. &lt;/P&gt;&lt;BR /&gt;&lt;P&gt; The Identity Firewall integrates with Window Active Directory in&amp;nbsp; conjunction with an external Active Directory (AD) Agent that provides&amp;nbsp; the actual identity mapping. The ASA uses Windows Active Directory as&amp;nbsp; the source to retrieve the current user identity information for&amp;nbsp; specific IP addresses. &lt;/P&gt;&lt;BR /&gt;&lt;P&gt; In an enterprise, some users log onto the network by using other&amp;nbsp; authentication mechanisms, such as authenticating with a web portal&amp;nbsp; (cut-through proxy) or by using a VPN. You can configure the Identity&amp;nbsp; Firewall to allow these types of authentication in connection with&amp;nbsp; identity-based access policies. &lt;/P&gt;&lt;BR /&gt;&lt;P&gt; We introduced or modified the following commands: &lt;STRONG&gt;user-identity enable&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity default-domain&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity domain&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity logout-probe&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity inactive-user-timer&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity&lt;/STRONG&gt; &lt;STRONG&gt;poll-import-user-group-timer&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity action netbios-response-fail&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity user-not-found&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity action ad-agent-down&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity action mac-address-mismatch&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity action domain-controller-down&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity ad-agent active-user-database&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity ad-agent hello-timer&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity ad-agent aaa-server&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity update import-user&lt;/STRONG&gt;, &lt;STRONG&gt;user-identity static user&lt;/STRONG&gt;, &lt;STRONG&gt;ad-agent-mode&lt;/STRONG&gt;, &lt;STRONG&gt;dns domain-lookup&lt;/STRONG&gt;, &lt;STRONG&gt;dns poll-timer&lt;/STRONG&gt;, &lt;STRONG&gt;dns expire-entry-timer&lt;/STRONG&gt;, &lt;STRONG&gt;object-group user, show user-identity, show dns&lt;/STRONG&gt;, &lt;STRONG&gt;clear configure user-identity&lt;/STRONG&gt;, &lt;STRONG&gt;clear dns, debug user-identity, test aaa-server ad-agent&lt;/STRONG&gt;. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the Configuration Guide Chapter referring to the Identity Firewall attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this points you into the right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 23:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-active-directory/m-p/1869223#M199017</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-16T23:36:41Z</dc:date>
    </item>
    <item>
      <title>Windows Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-active-directory/m-p/1869224#M199029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos, Thanks you for the quick response and your answer. I will review the document. Thanks again Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 23:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-active-directory/m-p/1869224#M199029</guid>
      <dc:creator>tsouza</dc:creator>
      <dc:date>2012-01-16T23:45:32Z</dc:date>
    </item>
  </channel>
</rss>

