<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS + One time password collaboration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822419#M408804</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure I understand your question.&lt;/P&gt;&lt;P&gt;Can you elaborate on it?  In term of OTP,&lt;/P&gt;&lt;P&gt;I use SecurID and ACS integration and it &lt;/P&gt;&lt;P&gt;works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Sep 2007 20:42:06 GMT</pubDate>
    <dc:creator>kevin.jones1</dc:creator>
    <dc:date>2007-09-25T20:42:06Z</dc:date>
    <item>
      <title>ACS + One time password collaboration</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822418#M408803</link>
      <description>&lt;P&gt;I am having problems implementing ACS to work with One Time Password (OTP) server. The problem is that there are multiple NAS devices, and ACS is not representing them with their own IP address but with ACS ip address which leads to security issues. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do i transfer NAS Ip address to OTP so otp knows where from is client coming. &lt;/P&gt;&lt;P&gt;I am aware of radius IETF attribute 4 (NAS IP address), however i cant find it on attribute list and im not even sure that that would resolve the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Suggestions welcome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sinisa&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822418#M408803</guid>
      <dc:creator>smitrovi</dc:creator>
      <dc:date>2019-03-10T22:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: ACS + One time password collaboration</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822419#M408804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure I understand your question.&lt;/P&gt;&lt;P&gt;Can you elaborate on it?  In term of OTP,&lt;/P&gt;&lt;P&gt;I use SecurID and ACS integration and it &lt;/P&gt;&lt;P&gt;works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2007 20:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822419#M408804</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-09-25T20:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: ACS + One time password collaboration</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822420#M408807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its Active identity OTP. Request for authentication goes to OTP over ACS and ACS always represents users with its own address and it does not include NAS ip address. However some users for instance can gain access via 802.1x but not via VPN access, but OTP can not distinguish where are they coming from. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also a little bit unsure about this issue...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2007 20:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822420#M408807</guid>
      <dc:creator>smitrovi</dc:creator>
      <dc:date>2007-09-25T20:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: ACS + One time password collaboration</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822421#M408809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I know what you're trying to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically you want to have the ACS acting&lt;/P&gt;&lt;P&gt;like a Proxy between the NAS and the OTP &lt;/P&gt;&lt;P&gt;server.  Problem is that ACS will proxy &lt;/P&gt;&lt;P&gt;all the connection from the NAS devices&lt;/P&gt;&lt;P&gt;so the OTP will only see the IP address&lt;/P&gt;&lt;P&gt;of the ACS.  Is that a pretty accurate&lt;/P&gt;&lt;P&gt;picture of what you're trying to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think RSA SecurID and the OTP you're&lt;/P&gt;&lt;P&gt;referring to is also doing the same thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, there is a work around that you&lt;/P&gt;&lt;P&gt;can do.  You can have multiple IP addresses&lt;/P&gt;&lt;P&gt;on the OTP server, like 192.168.1.1 and .2&lt;/P&gt;&lt;P&gt;on the OTP server.  Then on the ACS server,&lt;/P&gt;&lt;P&gt;you define two separate external database&lt;/P&gt;&lt;P&gt;configuration with separate ip addresses for&lt;/P&gt;&lt;P&gt;the OTP server.  you then create two separate&lt;/P&gt;&lt;P&gt;user group, one for VPN and one for 802.1x&lt;/P&gt;&lt;P&gt;group.  Then you map group into the NDG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2007 01:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-one-time-password-collaboration/m-p/822421#M408809</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-09-26T01:56:20Z</dc:date>
    </item>
  </channel>
</rss>

