<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication for outbound Internet Traffic in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-for-outbound-internet-traffic/m-p/1485345#M297916</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Russel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at command "aaa authentication match" on the ASA. You can use an ACL for traffic that will be matched for cut-through proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Jul 2010 22:42:59 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-07-22T22:42:59Z</dc:date>
    <item>
      <title>Authentication for outbound Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-for-outbound-internet-traffic/m-p/1485344#M297915</link>
      <description>&lt;P&gt;Hi, I have a site where everybody on the inside interface has to be authenticated by a RADIUS Server.&amp;nbsp; I have that part working but the problem is I've got a lot of AAA entries for exclude.&amp;nbsp; What I want to accomplish (if possible) is to use access-list and object-group so that if I have a new host I need to exclude, I can just add that into my object-group statement instead of adding another aaa exclude line.&amp;nbsp; Please look at my configuration below and any suggestion would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server AuthInbound protocol radius&lt;BR /&gt;aaa-server AuthInbound (inside) host 192.168.234.100 ********** timeout 5&lt;BR /&gt;max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa authentication include tcp/0 inside 192.168.234.0 255.255.255.0 0 0 AuthInbound&lt;BR /&gt;aaa authentication include udp/0 inside 192.168.234.0 255.255.255.0 0 0 AuthInbound&lt;/P&gt;&lt;P&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 4.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 4.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 208.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 208.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude tcp/6260 inside 192.168.234.0 255.255.255.0 4.xxx.xxx.165 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 4.2.2.1 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 4.2.2.2 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 4.2.2.3 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 8.8.4.4 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 8.8.8.8 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude ftp inside 192.168.234.0 255.255.255.0 69.xxx.xxx.179 255.255.255.255 AuthInbound &lt;BR /&gt;aaa authentication exclude ftp inside 192.168.234.0 255.255.255.0 63.xxx.xxx.113 255.255.255.255 AuthInbound &lt;BR /&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 96.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 72.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 64.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 64.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude tcp/12975 inside 192.168.234.0 255.255.255.0 74.xxx.xxx.0 255.255.255.0 AuthInbound&lt;BR /&gt;aaa authentication exclude tcp/32976 inside 192.168.234.0 255.255.255.0 74.xxx.xxx.0 255.255.255.0 AuthInbound&lt;BR /&gt;and more ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-for-outbound-internet-traffic/m-p/1485344#M297915</guid>
      <dc:creator>rmanapat</dc:creator>
      <dc:date>2019-03-11T00:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication for outbound Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-for-outbound-internet-traffic/m-p/1485345#M297916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Russel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at command "aaa authentication match" on the ASA. You can use an ACL for traffic that will be matched for cut-through proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 22:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-for-outbound-internet-traffic/m-p/1485345#M297916</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-07-22T22:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication for outbound Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-for-outbound-internet-traffic/m-p/1485346#M297917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;Hi, I have a site where everybody 
on the inside interface has to be authenticated by a RADIUS Server.&amp;nbsp; I 
have that part working but the problem is I've got a lot of AAA entries 
for exclude.&amp;nbsp; What I want to accomplish (if possible) is to use 
access-list and object-group so that if I have a new host I need to 
exclude, I can just add that into my object-group statement instead of 
adding another aaa exclude line.&amp;nbsp; Please look at my configuration below 
and any suggestion would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server AuthInbound protocol radius&lt;BR /&gt;aaa-server AuthInbound (inside) host 192.168.234.100 ********** timeout 5&lt;BR /&gt;max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa authentication include tcp/0 inside 192.168.234.0 255.255.255.0 0 0 AuthInbound&lt;BR /&gt;aaa authentication include udp/0 inside 192.168.234.0 255.255.255.0 0 0 AuthInbound&lt;/P&gt;&lt;P&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 4.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 4.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 208.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 208.xxx.xxx.164 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude tcp/6260 inside 192.168.234.0 255.255.255.0 4.xxx.xxx.165 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 4.2.2.1 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 4.2.2.2 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 4.2.2.3 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 8.8.4.4 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude 53 inside 192.168.234.0 255.255.255.0 8.8.8.8 255.255.255.255 AuthInbound&lt;BR /&gt;aaa authentication exclude ftp inside 192.168.234.0 255.255.255.0 69.xxx.xxx.179 255.255.255.255 AuthInbound &lt;BR /&gt;aaa authentication exclude ftp inside 192.168.234.0 255.255.255.0 63.xxx.xxx.113 255.255.255.255 AuthInbound &lt;BR /&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 96.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude http inside 192.168.234.0 255.255.255.0 72.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 64.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude https inside 192.168.234.0 255.255.255.0 64.xxx.xxx.0 255.255.0.0 AuthInbound &lt;BR /&gt;aaa authentication exclude tcp/12975 inside 192.168.234.0 255.255.255.0 74.xxx.xxx.0 255.255.255.0 AuthInbound&lt;BR /&gt;aaa authentication exclude tcp/32976 inside 192.168.234.0 255.255.255.0 74.xxx.xxx.0 255.255.255.0 AuthInbound&lt;BR /&gt;and more ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Hi Russell,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check out the below link for outbound authentication using auth proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.ciscosystems.com.pe/application/pdf/paws/13886/auth3.pdf"&gt;http://www.ciscosystems.com.pe/application/pdf/paws/13886/auth3.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope to Help !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ganesh.H&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate the helpful post&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jul 2010 07:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-for-outbound-internet-traffic/m-p/1485346#M297917</guid>
      <dc:creator>Ganesh Hariharan</dc:creator>
      <dc:date>2010-07-26T07:40:16Z</dc:date>
    </item>
  </channel>
</rss>

