<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE as dedicated radius in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3952360#M497113</link>
    <description>&lt;HR /&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;there was also a discussion of using windows nps instead of dedicated radius solutions(eg. ISE).&lt;/P&gt;&lt;P&gt;I have not used windows nps before &amp;amp; have no idea on how good/bad it is for a vpn scenario?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additionally,i also heard that having the asa directly talk to ldap or windows nps is not considered best security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate inputs.&lt;/P&gt;</description>
    <pubDate>Sun, 03 Nov 2019 22:28:34 GMT</pubDate>
    <dc:creator>suthomas1</dc:creator>
    <dc:date>2019-11-03T22:28:34Z</dc:date>
    <item>
      <title>ISE as dedicated radius</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3952264#M497110</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;for one of our projeccts, we are looking at using ise as radius primarily for VPN users.&lt;/P&gt;&lt;P&gt;now, what is the case for spending on ISE instead of directly getting ASA firewall talk to MS active directory or ldap.&lt;/P&gt;&lt;P&gt;After all ISE will only be facilatiting communication between asa &amp;amp; active directory for user authentication.&lt;/P&gt;&lt;P&gt;Appreciate &amp;nbsp;all inputs.thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 10:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3952264#M497110</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-11-03T10:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as dedicated radius</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3952278#M497112</link>
      <description>&lt;P&gt;If you're only looking for using LDAP accounts for your logins, then ISE does not bring much to the table.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The biggest advantage that you'll get is that you can manage your policies much more effectively in ISE than using ldap attribute-map on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Moreover, ISE allows you to more effectively build your policy and to expand your identity control to other solutions that do not natively support LDAP authentication/authorization.For example, if you have a multi-vendor network or if you want to implement Duo two-factor authentication with Duo Prompt, RADIUS is the best option.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 11:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3952278#M497112</guid>
      <dc:creator>alex_dufresne</dc:creator>
      <dc:date>2019-11-03T11:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as dedicated radius</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3952360#M497113</link>
      <description>&lt;HR /&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;there was also a discussion of using windows nps instead of dedicated radius solutions(eg. ISE).&lt;/P&gt;&lt;P&gt;I have not used windows nps before &amp;amp; have no idea on how good/bad it is for a vpn scenario?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additionally,i also heard that having the asa directly talk to ldap or windows nps is not considered best security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate inputs.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 22:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3952360#M497113</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-11-03T22:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE as dedicated radius</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3955775#M497114</link>
      <description>&lt;P&gt;Our team can't comment on any 3rd-party products. I would suggest you to test it yourself and consult the vendor's support if running any issue.&lt;/P&gt;
&lt;P&gt;The main issue with connecting AD using an LDAP interface is that it does not scale well. In case you have only one domain controller and one ASA, then it's likely simpler for you to connect ASA directly to AD via LDAP.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 17:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-as-dedicated-radius/m-p/3955775#M497114</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-11-08T17:53:37Z</dc:date>
    </item>
  </channel>
</rss>

