<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.2 - Permanently hide false negatives in ISE Live Logs  / Logs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-2-permanently-hide-false-negatives-in-ise-live-logs-logs/m-p/3676108#M495924</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you, I will try the suggestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am getting two failed authentications for each RAVPN session due to the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- ASA is configured to use a SAML IdP for authentication and ISE for authorization&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;SAML : authentication is a two factor one in the solution I am working on, i.e. first session is a user and pass based authentication, then if this succeeds an SMS is sent to the user with an access code, once the access code has been entered the second session completes and the user is fully authenticated.&lt;/P&gt;
&lt;P&gt;- RADIUS : For each of the two authentication sessions mentioned above&amp;nbsp;in the context of&amp;nbsp;SAML, the ASA will send a RADIUS Access-Request to the ISE and will get an Access-Reject from ISE, which is normal, hence the reason i was referring to these as false negatives. Same RADIUS sessions will be used for authorization, specifically the second one will be the one which will&amp;nbsp;send sufficient attributes to ISE (&lt;SPAN&gt;Cisco&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;AnyConnect&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;Identity Extensions (&lt;/SPAN&gt;&lt;EM&gt;ACIDex&lt;/EM&gt;&lt;SPAN&gt;)).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Istvan&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jul 2018 10:08:22 GMT</pubDate>
    <dc:creator>Istvan Matyasovszki</dc:creator>
    <dc:date>2018-07-27T10:08:22Z</dc:date>
    <item>
      <title>ISE 2.2 - Permanently hide false negatives in ISE Live Logs  / Logs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-permanently-hide-false-negatives-in-ise-live-logs-logs/m-p/3675482#M495921</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using split authentication / authorization in a ravpn setup (ASA used to terminated the VPNs). Authentication is done by a third party software using SAML and Authorization done by ISE. The SAML IdP in question has no RADIUS interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As in RADIUS we cannot separate the authentication session from the authorization and as the SAML authentication is a two factor one, for each stage of authentication&lt;/P&gt;
&lt;P&gt;we get a failed authentication log in ISE (two failed authentications for each ravpn session authentication).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you aware of a way / filter that could allow us to permanently filter out and hide the 'false negative' failed authentications so that we can only keep the authorization related session logs /data?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Istvan&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 15:30:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-permanently-hide-false-negatives-in-ise-live-logs-logs/m-p/3675482#M495921</guid>
      <dc:creator>Istvan Matyasovszki</dc:creator>
      <dc:date>2018-07-26T15:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.2 - Permanently hide false negatives in ISE Live Logs  / Logs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-permanently-hide-false-negatives-in-ise-live-logs-logs/m-p/3675740#M495922</link>
      <description>&lt;P&gt;Please explain why you are getting two failed auths for each session. The authentication usually continue with authorization. You might want to try a collection&amp;nbsp;filter.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-07-26 at 12.41.36 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/15468iFAFDF7E48BEB896A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-07-26 at 12.41.36 PM.png" alt="Screen Shot 2018-07-26 at 12.41.36 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 19:46:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-permanently-hide-false-negatives-in-ise-live-logs-logs/m-p/3675740#M495922</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-07-26T19:46:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.2 - Permanently hide false negatives in ISE Live Logs  / Logs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-permanently-hide-false-negatives-in-ise-live-logs-logs/m-p/3676108#M495924</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you, I will try the suggestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am getting two failed authentications for each RAVPN session due to the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- ASA is configured to use a SAML IdP for authentication and ISE for authorization&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;SAML : authentication is a two factor one in the solution I am working on, i.e. first session is a user and pass based authentication, then if this succeeds an SMS is sent to the user with an access code, once the access code has been entered the second session completes and the user is fully authenticated.&lt;/P&gt;
&lt;P&gt;- RADIUS : For each of the two authentication sessions mentioned above&amp;nbsp;in the context of&amp;nbsp;SAML, the ASA will send a RADIUS Access-Request to the ISE and will get an Access-Reject from ISE, which is normal, hence the reason i was referring to these as false negatives. Same RADIUS sessions will be used for authorization, specifically the second one will be the one which will&amp;nbsp;send sufficient attributes to ISE (&lt;SPAN&gt;Cisco&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;AnyConnect&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;Identity Extensions (&lt;/SPAN&gt;&lt;EM&gt;ACIDex&lt;/EM&gt;&lt;SPAN&gt;)).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Istvan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jul 2018 10:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-permanently-hide-false-negatives-in-ise-live-logs-logs/m-p/3676108#M495924</guid>
      <dc:creator>Istvan Matyasovszki</dc:creator>
      <dc:date>2018-07-27T10:08:22Z</dc:date>
    </item>
  </channel>
</rss>

