<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN and ISE Profiling in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701220#M494032</link>
    <description>&lt;P&gt;Is there any way around certificates?&lt;/P&gt;</description>
    <pubDate>Wed, 05 Sep 2018 14:22:15 GMT</pubDate>
    <dc:creator>Alex Pfeil</dc:creator>
    <dc:date>2018-09-05T14:22:15Z</dc:date>
    <item>
      <title>VPN and ISE Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701213#M494030</link>
      <description>&lt;P&gt;We have requirement to allow users to VPN into our network on work equipment only (no BYOD).&amp;nbsp;Do we have to use posture in order to meet this requirement?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701213#M494030</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2018-09-05T14:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN and ISE Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701217#M494031</link>
      <description>&lt;P&gt;You could do posture, but that would be overkill to simply answer the question "Is this device a corporate asset?"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configure your VPN head-end to do certificate authentication then send the authentication over to ISE to do User/MFA authentication.&amp;nbsp; This assumes you have certificates pushed to your corporate devices.&amp;nbsp; I usually setup two group URLs for my customers:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://vpn.mycompany.com/vendor" target="_blank"&gt;https://vpn.mycompany.com/vendor&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://vpn.mycompany.com/employee" target="_blank"&gt;https://vpn.mycompany.com/employee&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The vendor group URL does User/MFA auth only, no certificate, but DACLs are applied to limit access to the network based on what the vendors need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The employee group URL does certificate + User/MFA auth to ensure connecting devices are corporate devices.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701217#M494031</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-05T14:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN and ISE Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701220#M494032</link>
      <description>&lt;P&gt;Is there any way around certificates?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701220#M494032</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2018-09-05T14:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN and ISE Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701226#M494033</link>
      <description>If the VPN head-end requires certificates to connect the user/device must present a proper certificate from a CA the VPN device trusts to issue certs.  The only way to get around this would be extracting the certificate/private key from one device and move it to another.  If your certificate templates allow for private key exporting and you are making it easy to do this then the integrity of your CA is gone.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701226#M494033</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-05T14:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN and ISE Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701229#M494034</link>
      <description>&lt;P&gt;I just meant: is there a way to make sure the device is a corporate device without the certificate?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:26:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701229#M494034</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2018-09-05T14:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN and ISE Profiling</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701236#M494035</link>
      <description>Posturing, but that is way more difficult to configure and support than a certificate check.  The certificate check is a trivial setup, assuming you have certs already issues to connecting corporate devices.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:30:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-and-ise-profiling/m-p/3701236#M494035</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-05T14:30:15Z</dc:date>
    </item>
  </channel>
</rss>

