<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Location based authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3766752#M487026</link>
    <description>It should be client's physical NIC ip (or mac address?) since the VPN connection is not complete and the tunnel IP would not have been assigned.</description>
    <pubDate>Wed, 19 Dec 2018 15:37:17 GMT</pubDate>
    <dc:creator>Surendra</dc:creator>
    <dc:date>2018-12-19T15:37:17Z</dc:date>
    <item>
      <title>Location based authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3764660#M487022</link>
      <description>&lt;P&gt;Hi there,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A customer with requirement to return different&amp;nbsp;AUTHZ policy in ISE based on location from ASA remote VPN.&lt;/P&gt;
&lt;P&gt;What is the best way to achieve this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Wing Churn&lt;/P&gt;</description>
      <pubDate>Sun, 16 Dec 2018 23:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3764660#M487022</guid>
      <dc:creator>wileong</dc:creator>
      <dc:date>2018-12-16T23:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: Location based authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3764665#M487023</link>
      <description>&lt;P&gt;In case the location is that of an ASA headend, then we may set the NAD to a specific location in ISE configuration and use that info for authorization.&lt;/P&gt;
&lt;P&gt;In case the location is the geo-location&amp;nbsp;of a remote access VPN session, we may use the calling-station-ID RADIUS attribute as conditions. ISE is not currently supporting to perform a lookup for geo-location info of a remote access client so the conditions would likely need set explicitly.&lt;/P&gt;
&lt;P&gt;Additionally...&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046" target="_blank"&gt;Marvin Rhoads&lt;/A&gt; mentioned a solution using IPS --&amp;nbsp;&lt;A href="https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication" target="_blank"&gt;The new model&amp;nbsp;ASA (5500-X - Cisco Community&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766" target="_blank"&gt;Karsten Iwen&lt;/A&gt;&amp;nbsp;suggested using DAP --&amp;nbsp;&lt;A href="https://community.cisco.com/t5/firewalls/can-cisco-asa-locate-anyconnect-geographically-and-block-access/m-p/2254852/highlight/true#M112451" target="_blank"&gt;Re: Can CISCO ASA locate anyconnect geo... - Cisco Community&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Dec 2018 23:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3764665#M487023</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-12-16T23:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Location based authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3766460#M487025</link>
      <description>&lt;P&gt;Hi Hsing,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the tip, follow up question on the suggestion. Is calling-station-ID appear as private IP of the AnyConnect real client IP in ISE or the egress IP of the client?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Wing Churn&lt;/P&gt;</description>
      <pubDate>Wed, 19 Dec 2018 08:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3766460#M487025</guid>
      <dc:creator>wileong</dc:creator>
      <dc:date>2018-12-19T08:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: Location based authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3766752#M487026</link>
      <description>It should be client's physical NIC ip (or mac address?) since the VPN connection is not complete and the tunnel IP would not have been assigned.</description>
      <pubDate>Wed, 19 Dec 2018 15:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3766752#M487026</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-19T15:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Location based authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3768123#M487028</link>
      <description>&lt;P&gt;It's the external gateway IP address, usually the one from the ISP, that used to contact the RA-VPN head-end.&lt;/P&gt;
&lt;P&gt;For example, in [ client -- home router -- Internet -- RA-VPN ], the internet facing IP address of the home router.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Dec 2018 00:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/location-based-authorization/m-p/3768123#M487028</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-12-22T00:41:22Z</dc:date>
    </item>
  </channel>
</rss>

