<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE HAVE to use AnyConnect - just a confirmation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4027039#M454008</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;For Posture, yes you will need Anyconnect, no 3rd party software will work.&lt;BR /&gt;Sure you can have Anyconnect just for posture and use your current VPN vendor or any other tools. VPN and Posture are 2 different things.&lt;BR /&gt;However, if you want to force VPN users to do posture, then it will be complex because you need to force a user to get redirected. Never tried for VPN (not so often I use ISE posture for VPN because prefer integration with TCNAC solutions) , if you authenticate your users through ISE and push a policy to redirect them on your CPP portal + setup your VPN to force ISE to act as DHCP/DNS for these users, it may works. Not tested but it worth a test.</description>
    <pubDate>Mon, 10 Feb 2020 18:58:52 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2020-02-10T18:58:52Z</dc:date>
    <item>
      <title>ISE HAVE to use AnyConnect - just a confirmation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4026968#M454007</link>
      <description>&lt;P&gt;I know this is relatively a "dumb" question, but just wanted to be sure because someone put doubt in my head. Actually, two questions to ensure absolute clarity.&lt;/P&gt;&lt;P&gt;1. Will Cisco ISE ONLY work with AnyConnect, specifically for the posture and other modules to deliver the rules and profiles "to and from" ISE? Meaning no other "third-party" resource delivery agent would work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Assuming the answer to number 1 is "Yes," then the question is: while you need AnyConnect "as a tool of ISE," are you required to only use AnyConnect specifically for the VPN service/connection? Meaning, you can have a different VPN solution (say, OpenVPN) for the actual "tunnel"/protection of the connection, but you still have to have AnyConnect installed and configured to work with ISE for the profile access rules, correct?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 17:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4026968#M454007</guid>
      <dc:creator>steven#13</dc:creator>
      <dc:date>2020-02-10T17:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE HAVE to use AnyConnect - just a confirmation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4027039#M454008</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;For Posture, yes you will need Anyconnect, no 3rd party software will work.&lt;BR /&gt;Sure you can have Anyconnect just for posture and use your current VPN vendor or any other tools. VPN and Posture are 2 different things.&lt;BR /&gt;However, if you want to force VPN users to do posture, then it will be complex because you need to force a user to get redirected. Never tried for VPN (not so often I use ISE posture for VPN because prefer integration with TCNAC solutions) , if you authenticate your users through ISE and push a policy to redirect them on your CPP portal + setup your VPN to force ISE to act as DHCP/DNS for these users, it may works. Not tested but it worth a test.</description>
      <pubDate>Mon, 10 Feb 2020 18:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4027039#M454008</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-02-10T18:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE HAVE to use AnyConnect - just a confirmation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4029260#M454009</link>
      <description>&lt;P&gt;Thank you, that is helpful information. I guess what I'm focussing on is pushing out network access based on specific profiles within ISE which will determine what that person can access or if accessing from a non-domain joined computer it would read that and then could limit access. I guess determination of the type of device from which the user is connecting could only be determined from the Posture through AnyConnect. However, if just interested in network access rights/permissions controlled by ISE (profiles), could that be done without the Posture process you mentioned - meaning, would there be an easy/simple way to trigger DACL based on user authentication in order to control what the person could access over VPN?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 19:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4029260#M454009</guid>
      <dc:creator>steven#13</dc:creator>
      <dc:date>2020-02-13T19:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE HAVE to use AnyConnect - just a confirmation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4029274#M454010</link>
      <description>However, if just interested in network access rights/permissions controlled by ISE (profiles), could that be done without the Posture process you mentioned - meaning, would there be an easy/simple way to trigger DACL based on user authentication in order to control what the person could access over VPN?&lt;BR /&gt;-You can accomplish this without the use of the ISE posture module.  If you wish to push authz policy based on tunnel-group-name you can reference this condition: Cisco-VPN3000: CVPN3000/ASA/Pix7x-Tunnel-Group-Name EQUALS &amp;lt;group&amp;gt;&lt;BR /&gt;Create your dacl, assign it to authz profile, and assign to authz policy as you desire.</description>
      <pubDate>Thu, 13 Feb 2020 19:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4029274#M454010</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-02-13T19:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE HAVE to use AnyConnect - just a confirmation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4029489#M454012</link>
      <description>Yes you can push acl based on user id during the authentication.&lt;BR /&gt;However, you won't be able to determine if this user uses a corporate laptop or not without the posture feature.</description>
      <pubDate>Fri, 14 Feb 2020 03:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-have-to-use-anyconnect-just-a-confirmation/m-p/4029489#M454012</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-02-14T03:06:38Z</dc:date>
    </item>
  </channel>
</rss>

