<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I am not terribly familiar in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953867#M38833</link>
    <description>&lt;P&gt;I am not terribly familiar with ISE. &amp;nbsp;How would ISE report on or block an unapproved device if it plugged into our network? &amp;nbsp;For example, if an unapproved device plugged into a network port at a remote site...how would ISE know immediately? &amp;nbsp;Is there something on the remote site switch that would inform ISE? &amp;nbsp;Thanks again.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Aug 2016 15:21:48 GMT</pubDate>
    <dc:creator>willfrui88</dc:creator>
    <dc:date>2016-08-09T15:21:48Z</dc:date>
    <item>
      <title>FirePower Services NAC capabilities?</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953864#M38826</link>
      <description>&lt;P&gt;We are looking at implementing FirePower Services on our current ASA's. &amp;nbsp;Does FirePower services have any Network Access Control capabilities? &amp;nbsp;Specifically, we want to block or at least notify our resources of any non-domain joined machine that plugs into our network. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953864#M38826</guid>
      <dc:creator>willfrui88</dc:creator>
      <dc:date>2019-03-11T06:58:46Z</dc:date>
    </item>
    <item>
      <title>Not directly. That would be</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953865#M38828</link>
      <description>&lt;P&gt;Not directly. That would be more of an ISE function.&lt;/P&gt;
&lt;P&gt;Your discovery policy can ascertain the usernames (via integration with AD) associated with all hosts (where such association exists). You could possibly craft a policy to block connections through the firewall from hosts without an associated username but it would be a hack vs. using the product in the way its designed.&lt;/P&gt;
&lt;P&gt;It also would not do anything to keep them off the network - only prevent their traffic from going through the firewall.&lt;/P&gt;
&lt;P&gt;With ISE you can do exactly what you're asking - it's a common use case and what the product is designed for.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2016 23:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953865#M38828</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-08T23:51:56Z</dc:date>
    </item>
    <item>
      <title>Thank you Marvin!</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953866#M38831</link>
      <description>&lt;P&gt;Thank you Marvin!&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2016 15:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953866#M38831</guid>
      <dc:creator>willfrui88</dc:creator>
      <dc:date>2016-08-09T15:09:46Z</dc:date>
    </item>
    <item>
      <title>I am not terribly familiar</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953867#M38833</link>
      <description>&lt;P&gt;I am not terribly familiar with ISE. &amp;nbsp;How would ISE report on or block an unapproved device if it plugged into our network? &amp;nbsp;For example, if an unapproved device plugged into a network port at a remote site...how would ISE know immediately? &amp;nbsp;Is there something on the remote site switch that would inform ISE? &amp;nbsp;Thanks again.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2016 15:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953867#M38833</guid>
      <dc:creator>willfrui88</dc:creator>
      <dc:date>2016-08-09T15:21:48Z</dc:date>
    </item>
    <item>
      <title>ISE is a NAC solution that</title>
      <link>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953868#M38835</link>
      <description>&lt;P&gt;ISE is a NAC solution that uses a combination of technologies to assesses devices connecting to your networks and instruct the network access devices (switches, wireless controllers, ASAs etc.) to authorize (or change the authorization) accordingly.&lt;/P&gt;
&lt;P&gt;It uses RADIUS, 802.1x, integration with an external identity store (like AD or LDAP) along with the capabilities built into Cisco and other vendors' NADs to take action according to the context of the situation (who, what where where how etc.).&lt;/P&gt;
&lt;P&gt;For instance, you could integrate ISE with AD and to your switches and create policies that say, for instance, if wired user connects and both the user and computer do not have the right conditions (i.e. computer belongs to domain, has required software installed, user has valid domain credentials and is a member of certain group) then their access is denied or restricted.&lt;/P&gt;
&lt;P&gt;ISE can push an ACL to the port, switch it to a quarantined or restricted VLAN, redirect all user traffic to a registration or remediation portal, etc.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2016 19:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/firepower-services-nac-capabilities/m-p/2953868#M38835</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-09T19:54:30Z</dc:date>
    </item>
  </channel>
</rss>

