<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you all! in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944150#M37319</link>
    <description>&lt;P&gt;Thank you all!&lt;/P&gt;</description>
    <pubDate>Tue, 13 Dec 2016 09:49:13 GMT</pubDate>
    <dc:creator>Jernej Vodopivec</dc:creator>
    <dc:date>2016-12-13T09:49:13Z</dc:date>
    <item>
      <title>Machine authorization when connecting via VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944145#M37311</link>
      <description>&lt;DIV class="jive-rendered-content"&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;is it possible to create authorization policy on ISE that uses information from machine certificate installed on client laptops?&lt;/P&gt;
&lt;P&gt;Users are using anyconnect 4.3. They are authenticated on ASA using user certificates.&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944145#M37311</guid>
      <dc:creator>Jernej Vodopivec</dc:creator>
      <dc:date>2019-03-11T07:17:18Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944146#M37313</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can use NAM module on top of AC secure mobility client for machine and user cert using EAP chaining on ISE.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gagan&lt;/P&gt;
&lt;P&gt;PS : rate if it helps!!!!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2016 16:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944146#M37313</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2016-12-09T16:29:45Z</dc:date>
    </item>
    <item>
      <title>Hello Jernej-</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944147#M37315</link>
      <description>&lt;P&gt;Hello Jernej-&lt;/P&gt;
&lt;P&gt;I don't think this is possible. The certificate based authentication for VPN access is done locally on the ASA and not through ISE. At the moment there isn't an EAP based AnyConnect VPN that is supported by ISE. As a result, the certificate authentication and attributes checking is done on the ASA directly. You can still get the 2nd factor (for instance user authentication) against ISE but that is not done via EAP but PAP-ASCII.&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2016 19:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944147#M37315</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-09T19:39:53Z</dc:date>
    </item>
    <item>
      <title>Thank you both for your</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944148#M37316</link>
      <description>&lt;P&gt;Thank you both for your answers.&lt;/P&gt;
&lt;P&gt;Gagan, I've already checked this document about EAP chaining. But the document is about EAP chaining for 802.1x (wired &amp;amp; wireless) and there is no hint for VPN connections. And as Neno also said there is only PAP supported for VPN connections AFAIK.&lt;/P&gt;
&lt;P&gt;Is there any other way to use NAM module for VPN connections? &lt;/P&gt;</description>
      <pubDate>Sat, 10 Dec 2016 10:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944148#M37316</guid>
      <dc:creator>Jernej Vodopivec</dc:creator>
      <dc:date>2016-12-10T10:36:50Z</dc:date>
    </item>
    <item>
      <title>Not at the moment. I am by no</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944149#M37318</link>
      <description>&lt;P&gt;Not at the moment. I am by no means an expert on the topic but I had some discussions with TAC and here is my understanding. EAP is a Layer 2 protocol while the remote user communicates to the ASA via layer 3. Thus, with IKEv1 this is not possible. It appears that IKEv2 utilizes EAP so I am guessing there is some encapsulation that happens behind the scenes. However, the EAP-AnyConnect protocol is not supported by ISE/ACS.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the exact reply that I got from TAC a while back and from the looks of it nothing has changed with regards to ISE supporting EAP-AnyConnect or AnyConnect supporting EAP &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;PRE class="p1 prettyprint"&gt;The current ASA implementation utilizes the core IKEv2 protocol but it requires the addition of many extensions including a proprietary EAP authentication method, AnyConnect EAP, which is the only authentication method supported. The AnyConnect EAP method serves as a conduit in IKEv2 to carry the new Aggregate Authentication protocol that has been developed for remote-access which streamlines and preserves all of the existing functionality for authenticating the client. This new Aggregate Authentication protocol will be used for both IKEv2 and SSL AnyConnect connections for the new client.&lt;BR /&gt;&lt;BR /&gt;IKEv2 remote-access support is limited to the Cisco AnyConnect client since it uses a proprietary EAP authentication method and therefore, no 3rd party IKEv2 are supported.&lt;BR /&gt;&lt;BR /&gt;Cisco ISE and Cisco ACS do not support EAP-Anyconnect.&lt;BR /&gt;Oddly, the IOS implementation of IKEv2 appears to support EAP-GTC, EAP-MD5, EAP-MSCHAPv2 and NOTEAP-Anyconnect.&lt;/PRE&gt;
&lt;P&gt;Now, keep in mind that this is only for the authentication part. You can still configure the authorization to go to ISE, thus, any attributes that you are able to collect during the AAA process you should be able to use with an authorization rule in ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Dec 2016 05:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944149#M37318</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-11T05:34:59Z</dc:date>
    </item>
    <item>
      <title>Thank you all!</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944150#M37319</link>
      <description>&lt;P&gt;Thank you all!&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 09:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944150#M37319</guid>
      <dc:creator>Jernej Vodopivec</dc:creator>
      <dc:date>2016-12-13T09:49:13Z</dc:date>
    </item>
    <item>
      <title>Even if the certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944151#M37320</link>
      <description>&lt;P&gt;Even if the certificate authentication occurs on the ASA the authorization part can be assigned to ISE:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;tunnel-group AC-ISE-cert general-attributes&lt;BR /&gt;&amp;nbsp;authorization-server-group ISE-RAD&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;AnyConnect can pick up a user certificate&amp;nbsp;or a machine certificate.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 09:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944151#M37320</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2016-12-13T09:51:05Z</dc:date>
    </item>
    <item>
      <title>In addition, you have to set</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944152#M37321</link>
      <description>&lt;P&gt;In addition, you have to set this RADIUS server group to authorize-only on ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jan 2017 19:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/2944152#M37321</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2017-01-15T19:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: In addition, you have to set</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/3297801#M37322</link>
      <description>&lt;P&gt;Hi there, so you can basically let the ASA "trust" the certificate (signed by a trusted CA) and then authorise the device/user on ISE by (I assume) extracting the CN and verifying it. As an example, the CN is deviceXYZ so the ASA can strip off deviceXYZ and authorise it via ISE which in turn verifies it exists in AD. Is that correct?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 11:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/3297801#M37322</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-12-18T11:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: In addition, you have to set</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/3814488#M37323</link>
      <description>&lt;P&gt;Thank you for this info. It was the missing piece for getting this to work. I saw many statements to use ISE for authorization only, but this is the first I have seen on how to configure it. I was trying to set authorization only on ISE itself before finding this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FYI... I used this with SAML authentication to Azure instead of certificate, but it worked the same. I was able to use ISE with AD backend to assign group-policy based on user AD group assignment.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 19:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authorization-when-connecting-via-vpn/m-p/3814488#M37323</guid>
      <dc:creator>MARK BAKER</dc:creator>
      <dc:date>2019-03-05T19:58:04Z</dc:date>
    </item>
  </channel>
</rss>

