<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN identification and authentication before establishing a connection in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897930#M471120</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case, you can make a group in ISE with static MAC addresses. This should work. You can also create local accounts in the ISE which I believe you already created. So you can use combination of local account + mac or any of either.&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jul 2019 23:26:25 GMT</pubDate>
    <dc:creator>Muhammad Awais Khan</dc:creator>
    <dc:date>2019-07-25T23:26:25Z</dc:date>
    <item>
      <title>VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897016#M471114</link>
      <description>&lt;P&gt;Have a customer who needs to follow IRS regulations. He needs to have verification of VPN clients BEFORE a connection is established. It looks like this might be possible on ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What would be the easiest way? whitelist, MAC filtering, ???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would I do it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 20:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897016#M471114</guid>
      <dc:creator>joseph.williams@atos.net</dc:creator>
      <dc:date>2019-07-24T20:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897095#M471115</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What hardware are you/your customer using? I don't believe it's possible on ASA but it certainly is on IOS routers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The router can send it's credentials to the RADIUS server, which checks to confirm if valid and if sucessful establish a VPN tunnel. If using FlexVPN as part of authorization you can also dynamically assign QoS Policies, ZBFW membership, VRF etc per tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information here and example configuration:-&lt;/P&gt;
&lt;P&gt;&lt;A href="%20http://www.ciscopress.com/articles/article.asp?p=1684781&amp;amp;seqNum=3" target="_self"&gt;http://www.ciscopress.com/articles/article.asp?p=1684781&amp;amp;seqNum=3&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2018/03/31/configuring-flexvpn-external-aaa-with-radius/" target="_self"&gt;FlexVPN example&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 22:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897095#M471115</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-24T22:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897118#M471116</link>
      <description>&lt;P&gt;I am using a cisco 5508-x for my VPN. connecting with cisco anyconnect and authorizing under cisco ISE2.4&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 22:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897118#M471116</guid>
      <dc:creator>joseph.williams@atos.net</dc:creator>
      <dc:date>2019-07-24T22:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897119#M471117</link>
      <description>&lt;P&gt;And these are customers coming into the network, not hubs, switches or routers.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 23:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897119#M471117</guid>
      <dc:creator>joseph.williams@atos.net</dc:creator>
      <dc:date>2019-07-24T23:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897144#M471118</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding for your question is to allow only specified VPN client devices ( pcs, tablets ) to the network when they connected via VPN. And it seems you are already using ISE which is then integrated with AD for the authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are multiple ways to do it depend on the scenario you want to use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) You can use machine cert + user authentication if you have internal PKI server. By this way only clients having valid pki certificate installed will be able to connect&lt;/P&gt;&lt;P&gt;2) You can create whitelist of MAC in AD. For this you need to&amp;nbsp;use ACIDEX attribute. You need to pre-populate the MAC in AD and then can use Auth policy to match it. I saw a good example mentioned in below post for this method.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/dynamic-attributes-mac-address-with-ise-and-vpn/td-p/3728301" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/dynamic-attributes-mac-address-with-ise-and-vpn/td-p/3728301&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 00:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897144#M471118</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2019-07-25T00:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897767#M471119</link>
      <description>&lt;P&gt;Nope. Will not work. We do not use AD. These are customers and they do not have AD accounts and I cannot give them one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certs? Nope don't have a pki server.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 17:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897767#M471119</guid>
      <dc:creator>joseph.williams@atos.net</dc:creator>
      <dc:date>2019-07-25T17:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897930#M471120</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case, you can make a group in ISE with static MAC addresses. This should work. You can also create local accounts in the ISE which I believe you already created. So you can use combination of local account + mac or any of either.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 23:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3897930#M471120</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2019-07-25T23:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3898744#M471147</link>
      <description>&lt;P&gt;Besides Mohammad's, you might be able to use &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa912/asdm712/vpn/asdm-712-vpn-config/vpn-asdm-dap.html#ID-2184-000001e5" target="_blank"&gt;Endpoint Attribute Selection Criteria in a DAP&lt;/A&gt;. Please note DAP might have some limitations.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jul 2019 23:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3898744#M471147</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-27T23:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899505#M471148</link>
      <description>&lt;P&gt;Is there any way to accomplish this using only NAC settings or ASA CSD HostScan values? Or are the AAA attributes returned from ISE before any authentication occurs, or does it only happen after a successful authentication?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think i'm trying to satisfy the exact same audit finding that Joseph is, and it explicitly says "...restrict access...before authentication occurs...", which according to the "Remote access sequence" in &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa912/asdm712/vpn/asdm-712-vpn-config/vpn-asdm-dap.html#ID-2184-000001e5" target="_blank" rel="noopener"&gt;this document&lt;/A&gt;&amp;nbsp;means the ASA has to allow/deny the anyconnect client using NAC or HostScan &lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;before&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; the AAA sequence starts authentication.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 19:05:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899505#M471148</guid>
      <dc:creator>david.haughn</dc:creator>
      <dc:date>2019-07-29T19:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899506#M471149</link>
      <description>&lt;P&gt;Or for example is there a way to use eap-chaining where the computer authentication happens first, and if it fails, it doesn't continue with the user authentication?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 19:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899506#M471149</guid>
      <dc:creator>david.haughn</dc:creator>
      <dc:date>2019-07-29T19:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899511#M471150</link>
      <description>&lt;P&gt;In order to get the ACIDex attributes from AD, you have to successfully authenticate the user first, correct? What if you need to identify and deny/allow the machine &lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;before&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;any authentication occurs? I'm trying to satisfy some very specific (and frankly unreasonable) requirements from the IRS as well.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 19:12:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899511#M471150</guid>
      <dc:creator>david.haughn</dc:creator>
      <dc:date>2019-07-29T19:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899679#M471151</link>
      <description>&lt;P&gt;Certs is really the way to go.&amp;nbsp; Setting up a PKI is not that difficult, but not sure how many devices would would need to get certs out to.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 02:36:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3899679#M471151</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-07-30T02:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3902295#M471152</link>
      <description>&lt;P&gt;Nope, customers do not want a cert solution&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 19:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3902295#M471152</guid>
      <dc:creator>joseph.williams@atos.net</dc:creator>
      <dc:date>2019-08-02T19:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN identification and authentication before establishing a connection</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3902315#M471153</link>
      <description>Well part of our job as consultants is to educate the customer on what the right solution is.  I "guide" many customers away from their crazy ideas to the correct solution.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;But I guess if they won't listen to the right solution, best of luck piecing one together.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Aug 2019 20:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-identification-and-authentication-before-establishing-a/m-p/3902315#M471153</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-08-02T20:37:59Z</dc:date>
    </item>
  </channel>
</rss>

