<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Flows between an ASA and an ISE with dACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3856541#M473150</link>
    <description>&lt;P&gt;Thanks both of you, seems we can't indeed.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 May 2019 07:53:06 GMT</pubDate>
    <dc:creator>Jeremy Dubrulle</dc:creator>
    <dc:date>2019-05-15T07:53:06Z</dc:date>
    <item>
      <title>Flows between an ASA and an ISE with dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3855227#M473144</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using ASA with Anyconnect VPN clients. The ASA asks the ISE to auth the user and the ISE checks the user with the Domain Controller. Once authentified, the ISE pushes downloadable ACL depending on the user. These ACL are then used by the ASA to restrict the rights of the user.&lt;/P&gt;&lt;P&gt;I'm not sure of how it works, I mean the exchange since the beginning until the ACL on the ASA, I don't know this thing. But I have to tell if we can replace the ASA by Fortigate and Forticlients. So I'm trying to understand how it works so that I can tell if the ISE can still pushes its ACL if it's a Fortigate instead of an ASA. Is it a thing we can only do if we have ASA with the ISE ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you help me, provide me documentation ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 16:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3855227#M473144</guid>
      <dc:creator>Jeremy Dubrulle</dc:creator>
      <dc:date>2019-05-13T16:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Flows between an ASA and an ISE with dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3855372#M473147</link>
      <description>&lt;P&gt;Please take a look at these:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html" target="_blank"&gt;ASA Version 9.2.1 VPN Posture with ISE Configuration Example - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113449-asa-vpn-acs-00.html" target="_blank"&gt;ASA 8.3 and Later: Radius Authorization (ACS 5.x) for VPN Access Using Downloadable ACL with CLI and ASDM Configuration Example - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.petenetlive.com/KB/Article/0001156" target="_blank"&gt;AnyConnect Group Authentication With Cisco ISE and Downloadable ACLs (Part&amp;nbsp;1)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.petenetlive.com/KB/Article/0001156" target="_blank"&gt;AnyConnect Group Authentication With Cisco ISE and Downloadable ACLs (Part 2)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 19:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3855372#M473147</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-13T19:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: Flows between an ASA and an ISE with dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3855382#M473148</link>
      <description>&lt;P&gt;I doubt the Fortigate will support dACLs.&amp;nbsp; If you look at the details of the RADIUS live log record for your VPN traffic you can see the RADIUS Attribute/Value (AV) pairs passed between ISE and the ASA.&amp;nbsp; The dACL is passed as AV pairs and needs to be supported by the network device.&amp;nbsp; Only Cisco devices (and not all Cisco devices) support dACLs that I know of.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am guessing you can build ACLs on the Fortigate and assigning the user to a group on the Fortigate that limits their access, but I am not at Fortigate expert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This may help:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://kb.fortinet.com/kb/viewContent.do?externalId=FD36919&amp;amp;sliceId=1" target="_blank"&gt;https://kb.fortinet.com/kb/viewContent.do?externalId=FD36919&amp;amp;sliceId=1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 19:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3855382#M473148</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-05-13T19:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Flows between an ASA and an ISE with dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3856541#M473150</link>
      <description>&lt;P&gt;Thanks both of you, seems we can't indeed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 07:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flows-between-an-asa-and-an-ise-with-dacl/m-p/3856541#M473150</guid>
      <dc:creator>Jeremy Dubrulle</dc:creator>
      <dc:date>2019-05-15T07:53:06Z</dc:date>
    </item>
  </channel>
</rss>

