<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Identity Firewall not work with NAT in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783478#M223914</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is wrong: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When use NAT not work, just removing NAT.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When use NAT not work, just removing &lt;STRONG&gt;access-rules user-based&lt;/STRONG&gt; (IDFW) and configure access-rules IP based.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AD Server and Desktop Users are same side of ASA (inside interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the image attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/6/8/62868-Lab_ASA.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Sep 2011 11:33:26 GMT</pubDate>
    <dc:creator>Rodrigo Rosa da Silva</dc:creator>
    <dc:date>2011-09-22T11:33:26Z</dc:date>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783476#M223908</link>
      <description>&lt;P&gt;We are implementing an environment that restrict the Internet access with rules based on users and groups of Active Directory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There was a lot of dificulties but the actual state is:&lt;/P&gt;&lt;P&gt; - The "Test" of AD Server Group on Firewall-&amp;gt; Identity Options results GOOD&lt;/P&gt;&lt;P&gt; - The "Test" of Active Directory Agent on Windows-&amp;gt; Identity Options results GOOD&lt;/P&gt;&lt;P&gt; - The Rules that we applied on the Inside Interface based on Identity Firewal are no 'respected'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The enviroment:&lt;/P&gt;&lt;P&gt;- We have two ASA 5520 in FailOver.&lt;/P&gt;&lt;P&gt;- There is four Contexts in that pair of ASA.&lt;/P&gt;&lt;P&gt;- By now we are activating the Identity firewall only in one context.&lt;/P&gt;&lt;P&gt;- Obviously, the AD are in one of the inside networks of that context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Configuration Guide of the Identity Firewal, at &lt;/P&gt;&lt;P&gt; &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/access_idfw.html#wp1349541" style="color: #0000cc;" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/access_idfw.html#wp1349541&lt;/A&gt;&lt;/P&gt;&lt;P&gt; we saw that there is a lot of features that are not supported:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following ASA features do not support using the identity-based object and FQDN:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - route-map&lt;/P&gt;&lt;P&gt;&amp;nbsp; - Crypto map&lt;/P&gt;&lt;P&gt;&amp;nbsp; - WCCP&lt;/P&gt;&lt;P&gt;&amp;nbsp; - NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp; - group-policy (except VPN filter)&lt;/P&gt;&lt;P&gt;&amp;nbsp; - DAP&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When use NAT not work, just removing NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How configure this functionality? Identity work with NAT?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783476#M223908</guid>
      <dc:creator>Rodrigo Rosa da Silva</dc:creator>
      <dc:date>2019-03-11T01:25:24Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783477#M223909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually there are some limitation for IDFW to work with NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, AD server and users should be at the same side of ASA.&lt;/P&gt;&lt;P&gt;Here is a deployment scenario. &lt;/P&gt;&lt;P&gt;For example, AD server and logon users are in inside network. Users from inside network can access outside network via NAT or PAT.&lt;/P&gt;&lt;P&gt;In this example, ASA is able to create user-ip mappings for its inside users, and basically AD server sees the real IP address of logon users, then ASA admin can configure ACL rules in inside interface&amp;nbsp; to control outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, if AD server is in outside network. Inside users need to access and get authenticated by AD server via NATed or PATed IP address, then AD will only see those translated IP addresses. This scenario is not supported because multiple users may be mapped to single IP address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Sep 2011 08:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783477#M223909</guid>
      <dc:creator>zhijliu</dc:creator>
      <dc:date>2011-09-22T08:35:20Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783478#M223914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is wrong: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When use NAT not work, just removing NAT.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When use NAT not work, just removing &lt;STRONG&gt;access-rules user-based&lt;/STRONG&gt; (IDFW) and configure access-rules IP based.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AD Server and Desktop Users are same side of ASA (inside interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the image attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/6/8/62868-Lab_ASA.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Sep 2011 11:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783478#M223914</guid>
      <dc:creator>Rodrigo Rosa da Silva</dc:creator>
      <dc:date>2011-09-22T11:33:26Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783479#M223916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We may have different network deployment scenarios. Whether or not IDFW is supporting NAT really depends on the deployment. For IDFW to work with NAT, the base line is that AD /ASA should see the real IP address of AD logon user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your deployment diagram, are you saying IDFW/NAT is not working? Can you please elaborate it a little bit? is 3560 a switch? I assume NAT is only happening in ASA. In your case, AD and users are in the same side, AD should be able to see the user's IP address. As long as ASA sees and receives the traffic from user's real IP address, you may config IDFW rules to control the network access for the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Sep 2011 17:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783479#M223916</guid>
      <dc:creator>zhijliu</dc:creator>
      <dc:date>2011-09-22T17:48:54Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783480#M223922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; font-family: arial, helvetica, sans-serif; font-size: 10pt; text-align: left; padding: 8px;"&gt;Yes 3560 is a switch working layer 3 with vrf.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat is only in ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Context configuration:*some settings omitted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname test4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface inside&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.200.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface outside&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 172.16.100.4 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network Invalida_Calsse-A&lt;/P&gt;&lt;P&gt; subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;object network Invalida_Classe-B&lt;/P&gt;&lt;P&gt; subnet 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt;object network Invalida_Classe-C&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network router-loopback&lt;/P&gt;&lt;P&gt; host 192.168.14.254&lt;/P&gt;&lt;P&gt;object network 172.16.4.1&lt;/P&gt;&lt;P&gt; host 172.16.4.1&lt;/P&gt;&lt;P&gt;object network 172.16.4.254&lt;/P&gt;&lt;P&gt; host 172.16.4.254&lt;/P&gt;&lt;P&gt;object network all&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip user test4.local\rodrigo any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network router-loopback&lt;/P&gt;&lt;P&gt; nat (any,any) static 172.16.4.254&lt;/P&gt;&lt;P&gt;object network all&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic 172.16.4.1&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.100.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.0.0 192.168.200.254 1&lt;/P&gt;&lt;P&gt;aaa-server AD-TEST4 protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server AD-TEST4 (inside) host 192.168.4.10&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=test4,DC=local&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=administrator,CN=users,DC=test4,DC=local&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;aaa-server AG-TEST4 protocol radius&lt;/P&gt;&lt;P&gt; ad-agent-mode&lt;/P&gt;&lt;P&gt;aaa-server AG-TEST4 (inside) host 192.168.4.10&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;user-identity domain test4.local aaa-server AD-TEST4&lt;/P&gt;&lt;P&gt;user-identity default-domain test4.local&lt;/P&gt;&lt;P&gt;no user-identity action mac-address-mismatch remove-user-ip&lt;/P&gt;&lt;P&gt;user-identity logout-probe netbios local-system&lt;/P&gt;&lt;P&gt;user-identity ad-agent aaa-server AG-TEST4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;****************************************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5520-frw/test4# sh access-list inside_access_in&lt;/P&gt;&lt;P&gt;access-list inside_access_in; 2 elements; name hash: 0x433a1af1&lt;/P&gt;&lt;P&gt;access-list inside_access_in line 1 extended deny ip user test4.local\rodrigo any any (&lt;STRONG&gt;hitcnt=0&lt;/STRONG&gt;) 0xd663546c &lt;/P&gt;&lt;P&gt;access-list inside_access_in line 2 extended permit ip any any (&lt;STRONG&gt;hitcnt=7037&lt;/STRONG&gt;) 0xa925365e&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5520-frw/test4# sh access-list inside_access_in&lt;/P&gt;&lt;P&gt;access-list inside_access_in; 3 elements; name hash: 0x433a1af1&lt;/P&gt;&lt;P&gt;access-list inside_access_in line 1 extended deny ip user test4.local\rodrigo any any (hitcnt=0) 0xd663546c &lt;/P&gt;&lt;P&gt;access-list inside_access_in line 2 extended deny ip object Desktop_test any (hitcnt=0) 0x8036771b &lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;access-list inside_access_in line 2 extended deny ip host 192.168.4.50 any (hitcnt=8) 0x8036771b &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in line 3 extended permit ip any any (hitcnt=7037) 0xa925365e &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2011 13:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783480#M223922</guid>
      <dc:creator>Rodrigo Rosa da Silva</dc:creator>
      <dc:date>2011-09-23T13:06:03Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783481#M223928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First of all, I 'd like to check if ASA correctly receives user-ip mapping for test4.local\rodrigo from AD agent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please collect the output of the following CLIs in AD agent server?&lt;/P&gt;&lt;P&gt;adacfg dc list&lt;/P&gt;&lt;P&gt;adacfg cache list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the CLI in ASA and check if the user-ip is created in ASA.&lt;/P&gt;&lt;P&gt;show user-identity user all list detail.&lt;/P&gt;&lt;P&gt;show user-idneityt ad-agent&lt;/P&gt;&lt;P&gt;show user-idneityt ad-agent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2011 17:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783481#M223928</guid>
      <dc:creator>zhijliu</dc:creator>
      <dc:date>2011-09-23T17:22:14Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783482#M223938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Two more CLIs to collect.&lt;/P&gt;&lt;P&gt;Here is the new list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in AD agent server&lt;/P&gt;&lt;P&gt;adacfg dc list&lt;/P&gt;&lt;P&gt;adacfg cache list&lt;/P&gt;&lt;P&gt; adacfg client list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in ASA&lt;/P&gt;&lt;P&gt;show user-identity user all list detail.&lt;/P&gt;&lt;P&gt;show user-idneityt ad-agent&lt;/P&gt;&lt;P&gt;show user-idneityt ad-agent statis&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you may tuen on debug "debug user-identity ad-agent" and collect more info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2011 17:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783482#M223938</guid>
      <dc:creator>zhijliu</dc:creator>
      <dc:date>2011-09-23T17:28:05Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783483#M223946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PS C:\IBF\CLI&amp;gt; .\adacfg.exe dc list&lt;/P&gt;&lt;P&gt;Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Host/IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Username&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain-Name Latest Status&lt;/P&gt;&lt;P&gt;----------- ----------------------- ------------- ----------- -------------&lt;/P&gt;&lt;P&gt;ASA-TEST4 2k8test.test4.local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; administrator&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TEST4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS C:\IBF\CLI&amp;gt; .\adacfg.exe cache list&lt;/P&gt;&lt;P&gt;IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain&amp;nbsp; Responds-To-Probe Mapping-Type Mapping-Origin Create-Time&lt;/P&gt;&lt;P&gt;------------ ------------- ------- ----------------- ------------ -------------- --------------------&lt;/P&gt;&lt;P&gt;192.168.4.50 teste&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TEST4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; true&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TEST4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2011-09-23T14:54:52Z&lt;/P&gt;&lt;P&gt;192.168.4.10 Administrator&amp;nbsp; TEST4&amp;nbsp;&amp;nbsp; true&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TEST4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2011-09-23T19:04:51Z&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS C:\IBF\CLI&amp;gt; .\adacfg.exe client list&lt;/P&gt;&lt;P&gt;Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP/Range&lt;/P&gt;&lt;P&gt;---------- ----------------&lt;/P&gt;&lt;P&gt;AG-TEST4&amp;nbsp; 192.168.200.1/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5520-frw/test4# show user-identity user all list detail&lt;/P&gt;&lt;P&gt;Total users: 4&amp;nbsp; Total IP addresses: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; test4.local\Administrator: 0 active conns&lt;/P&gt;&lt;P&gt;&amp;nbsp; test4.local\teste: 0 active conns&lt;/P&gt;&lt;P&gt;&amp;nbsp; test4.local\bunda: 0 active conns&lt;/P&gt;&lt;P&gt;&amp;nbsp; test4.local\rodrigo: 0 active conns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5520-frw/test4# show user-identity ad-agent &lt;/P&gt;&lt;P&gt;Primary AD Agent:&lt;/P&gt;&lt;P&gt; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up (registered)&lt;/P&gt;&lt;P&gt; Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; full-download&lt;/P&gt;&lt;P&gt; IP address:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.4.10&lt;/P&gt;&lt;P&gt; Authentication port:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp/1645&lt;/P&gt;&lt;P&gt; Accounting port:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp/1646&lt;/P&gt;&lt;P&gt; ASA listening port:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp/3799&lt;/P&gt;&lt;P&gt; Interface:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt; Up time:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8 hours 22 mins&lt;/P&gt;&lt;P&gt; Average RTT:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 msec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AD Domain Status:&lt;/P&gt;&lt;P&gt; Domain TEST4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5520-frw/test4# show user-identity ad-agent statis &lt;/P&gt;&lt;P&gt;Primary AD Agent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total&amp;nbsp; Last Activity&lt;/P&gt;&lt;P&gt;-------------------------&amp;nbsp; ----------&amp;nbsp; ------------------------&lt;/P&gt;&lt;P&gt;Input packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp; 5 mins 44 secs&lt;/P&gt;&lt;P&gt;Output packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2022&amp;nbsp; 6 secs&lt;/P&gt;&lt;P&gt;Send updates:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;Recv updates:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp; 5 mins 44 secs&lt;/P&gt;&lt;P&gt;Keepalive failed:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp; 8 hours 24 mins&lt;/P&gt;&lt;P&gt;Send update failed:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;Query failed:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;Update pending:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;Update high-watermark:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;Update dropped:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp; N/A&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2011 19:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783483#M223946</guid>
      <dc:creator>Rodrigo Rosa da Silva</dc:creator>
      <dc:date>2011-09-23T19:08:49Z</dc:date>
    </item>
    <item>
      <title>Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783484#M223955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the reason you did not get any user-ip mappings in ASA.&lt;/P&gt;&lt;P&gt;The domain name configured in ASA should be netbios domain name and it needs to be matched with the one you see in "adacfg dc list" output, otherwise ASA will drop any user-ip reports from AD agent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may have a try with the following new configs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user-identity domain TEST4 aaa-server AD-TEST4&lt;/P&gt;&lt;P&gt;user-identity default-domain TEST4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip user TEST4\rodrigo any any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2011 19:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783484#M223955</guid>
      <dc:creator>zhijliu</dc:creator>
      <dc:date>2011-09-23T19:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Firewall not work with NAT</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783485#M223963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for help Liu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very nice the new feature of ASA 8.4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now Identity is work!&amp;nbsp; \o/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ ]' s&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Sep 2011 02:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-firewall-not-work-with-nat/m-p/1783485#M223963</guid>
      <dc:creator>Rodrigo Rosa da Silva</dc:creator>
      <dc:date>2011-09-24T02:38:28Z</dc:date>
    </item>
  </channel>
</rss>

