<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hi Rahul, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3908548#M25975</link>
    <description>&lt;P&gt;hi Alberto&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wondered if you had managed to integrate the Posture assessment capabilities of the ISE into the Solution you have implemented with global Protect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also have you had any issues with the solution since you implemented it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&lt;/P&gt;</description>
    <pubDate>Thu, 15 Aug 2019 09:13:03 GMT</pubDate>
    <dc:creator>andypage1</dc:creator>
    <dc:date>2019-08-15T09:13:03Z</dc:date>
    <item>
      <title>Cisco ISE 2.2.0 and Palo Alto VPN client GlobalProtect</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005585#M25959</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have Cisco ISE 2.2.0 installed and running for a bunch of things and everything works perfectly except Palo Alto remote access VPN user validation with the GlobalProtect client.&lt;/P&gt;
&lt;P&gt;This works perfectly with the Microsoft NPS Radius, but there is no way to reproduce the conditions and authorization profile to work with Cisco ISE.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Does anyone have the necessary parameters or can someone help me?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005585#M25959</guid>
      <dc:creator>albertofdez</dc:creator>
      <dc:date>2019-03-11T07:48:11Z</dc:date>
    </item>
    <item>
      <title>I have not integrated them</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005586#M25960</link>
      <description>&lt;P&gt;I have not integrated them both together, but if you are able to get it working with NPS, the same principles should hold true for ISE. What exactly is failing when you have ISE as the AAA server?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 21:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005586#M25960</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-21T21:38:27Z</dc:date>
    </item>
    <item>
      <title>Hi Rahul,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005587#M25963</link>
      <description>&lt;P&gt;Hi Rahul,&lt;/P&gt;
&lt;P&gt;In NPS there are created 2 attributes with a specific vendor the 25461, I attach images of how they are created.&lt;/P&gt;
&lt;P&gt;I just found Palo Alto website a document, I attached image, to create a new Vendor in Cisco ISE for this manufacturer and the parameters to be defined, but the VSA1 and VSA2 do not seem to match those used by the NPS .&lt;/P&gt;
&lt;P&gt;VSA 1 = PaloAlto-Admin-Role&lt;BR /&gt;VSA 2 = PaloAlto-Admin-Access-Domain&lt;/P&gt;
&lt;P&gt;They look more like access to management than VPN access.&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 22:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005587#M25963</guid>
      <dc:creator>albertofdez</dc:creator>
      <dc:date>2017-06-21T22:05:03Z</dc:date>
    </item>
    <item>
      <title>I am not sure if I understood</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005588#M25969</link>
      <description>&lt;P&gt;I am not sure if I understood your issue. But it looks like you are on the right track. You have the Palo Alto VSA Dictionary and Attributes on the ISE. Now all you have to do is to have this Attribute mapped to a value (in your case SE-Admin-Access and SANLUCAR) in the Authorization profile. See attached.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 22:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005588#M25969</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-21T22:49:29Z</dc:date>
    </item>
    <item>
      <title>Correct, is what I have</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005589#M25970</link>
      <description>&lt;P&gt;Correct, is what I have configured tomorrow I try with the client and I tell you if it works&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 23:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005589#M25970</guid>
      <dc:creator>albertofdez</dc:creator>
      <dc:date>2017-06-21T23:07:26Z</dc:date>
    </item>
    <item>
      <title>Hi Rahul,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005590#M25972</link>
      <description>&lt;P&gt;Hi Rahul,&lt;/P&gt;
&lt;P&gt;I just tried it and it works perfectly, I had to create a new Radius Vendor called PaloAlto_Vendor and a new Network Device Profile called PaloAltoNetworks to which I added this dictionary.&lt;/P&gt;
&lt;P&gt;Then I have associated the 2 PA-500s created in Network Devices with their Profile Name PaloAltoNetworks.&lt;/P&gt;
&lt;P&gt;And finally I created an Authorization Profile called Permit_VPN where I added the VSA1 and VSA2 with the parameters of the image.&lt;/P&gt;
&lt;P&gt;I hope this is clear, if anyone needs more data or help I will be happy to help.&lt;/P&gt;
&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 11:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005590#M25972</guid>
      <dc:creator>albertofdez</dc:creator>
      <dc:date>2017-06-22T11:05:27Z</dc:date>
    </item>
    <item>
      <title>Glad to heat that it is</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005591#M25973</link>
      <description>&lt;P&gt;Glad to heat that it is working for you. Thanks for reverting back with this information.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 11:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3005591#M25973</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-22T11:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: Hi Rahul,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3908548#M25975</link>
      <description>&lt;P&gt;hi Alberto&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wondered if you had managed to integrate the Posture assessment capabilities of the ISE into the Solution you have implemented with global Protect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also have you had any issues with the solution since you implemented it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2019 09:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/3908548#M25975</guid>
      <dc:creator>andypage1</dc:creator>
      <dc:date>2019-08-15T09:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Hi Rahul,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4102565#M561177</link>
      <description>&lt;P&gt;So VSA1 and VSA2, where in globalprotect, as that is not in the client anywhere&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2020 05:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4102565#M561177</guid>
      <dc:creator>Jeffrey Jones</dc:creator>
      <dc:date>2020-06-13T05:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 2.2.0 and Palo Alto VPN client GlobalProtect</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4298732#M565768</link>
      <description>&lt;P&gt;Have anyone got Globalprotect agent working with Cisco ISE posture module. ie when Remote VPN user connects via Globalprotect ISE posture module kicks and send info to Cisco ISE.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2021 10:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4298732#M565768</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2021-02-27T10:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 2.2.0 and Palo Alto VPN client GlobalProtect</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4304454#M566005</link>
      <description>&lt;P&gt;ISE Posture is a module in AnyConnect. You would need to use AnyConnect as your VPN agent.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 03:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4304454#M566005</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-03-10T03:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 2.2.0 and Palo Alto VPN client GlobalProtect</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4306635#M566096</link>
      <description>&lt;P&gt;You are right, but how to implement Cisco ISE posture for Remote VPN users who are already using PA Globalprotect.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 04:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-2-0-and-palo-alto-vpn-client-globalprotect/m-p/4306635#M566096</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2021-03-13T04:55:56Z</dc:date>
    </item>
  </channel>
</rss>

