<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN AutH with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718193#M507248</link>
    <description>&lt;P&gt;The same user is getting authenticated on the mobile device and then going to the correct authorization policy, why is it just going other way around for laptops&lt;/P&gt;</description>
    <pubDate>Wed, 03 Oct 2018 11:37:45 GMT</pubDate>
    <dc:creator>zaheer.jahangir1</dc:creator>
    <dc:date>2018-10-03T11:37:45Z</dc:date>
    <item>
      <title>VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718022#M507234</link>
      <description>&lt;P&gt;I am using ISE as Auth server for vpn clients, everything works fine when I am using anyconnect on mobile phone, the user gets connected instantly and in ISE logs it shows correct AUTH and AUTHZ policies but when I am trying to connect the same user over a laptop then ISE denies the user request and in ISE logs it shows the correct AUTH policy but in AUTZ it hits default which has deny access profile.&lt;/P&gt;
&lt;P&gt;Is this a known issue?&lt;/P&gt;
&lt;P&gt;If anyone knows the solution then kindly let me know&lt;/P&gt;
&lt;P&gt;ISE 2.3&lt;/P&gt;
&lt;P&gt;ASA 9.7.1&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 07:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718022#M507234</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T07:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718059#M507235</link>
      <description>&lt;P&gt;We would need to know the conditions in the policy you expect the user to match when on wired device and compare them against the observed Authorization details from the RADIUS Live Log.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 08:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718059#M507235</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T08:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718170#M507236</link>
      <description>&lt;P&gt;well I have specified&amp;nbsp;Radius port type virtual&amp;nbsp;for All_User_ID_Store which contains my AD, this if for Auth policy and it hits this policy.&lt;/P&gt;
&lt;P&gt;Then I have created a group for vpn users and defined the users locally with password from AD.&lt;/P&gt;
&lt;P&gt;In authZ conditions it is as follow&lt;/P&gt;
&lt;P&gt;If Identity Group Name=Allow_VPN_USERS &amp;amp; Radius NAS IP Address=ip_add_of_ASA(defined IP address here)&lt;/P&gt;
&lt;P&gt;then permit access&lt;/P&gt;
&lt;P&gt;default policy deny acccess&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718170#M507236</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T11:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718176#M507239</link>
      <description>&lt;P&gt;Also one more thing I would like to add here is that in Radius logs on ISE for mobile devices it does not takes endpoint profile, but in case of laptop it takes&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it as workstation, but I have not defined these machines here, I just want to authenticate the user on base of his username, later on I will be doing posture validation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718176#M507239</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T11:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718177#M507241</link>
      <description>&lt;P&gt;So the user on remote mobile device is working but the same user on remote laptop (both cases on same VPN) does not work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you compare the Authorization detail report from RADIUS live logs is ISE seeing the username correctly in both cases?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:17:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718177#M507241</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T11:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718183#M507243</link>
      <description>&lt;P&gt;Please check attached images, for cellphone it does not gets any endpoint profile but for laptop it says Microsoft-Workstation&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718183#M507243</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T11:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718192#M507246</link>
      <description>&lt;P&gt;Well you're getting Authentication Failed and thus it drops to the default Authorization rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We would normally expect an unauthenticated user to be denied access.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:35:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718192#M507246</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T11:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718193#M507248</link>
      <description>&lt;P&gt;The same user is getting authenticated on the mobile device and then going to the correct authorization policy, why is it just going other way around for laptops&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718193#M507248</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T11:37:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718195#M507249</link>
      <description>&lt;P&gt;Does the user hit the same tunnel-group (connection profile) in both cases? Are you entering your credentials via the AnyConnect UI dialog box?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could capture the LDAP traffic between your PSN and AD to verify the correct password is being sent to AD.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718195#M507249</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T11:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718203#M507250</link>
      <description>&lt;P&gt;Yes, both requests are going to same connection profiles and yes I am entering credentials via UI.&lt;BR /&gt;Can you&amp;nbsp;elaborate on how to verify the LDAP traffic from ISE?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718203#M507250</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T11:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718204#M507252</link>
      <description>&lt;P&gt;When I am testing the user credentials againt the AD from ISE, it gives success, also I have imported all the groups from the AD.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 11:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718204#M507252</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T11:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718209#M507254</link>
      <description>&lt;P&gt;Under Monitor &amp;gt; Troubleshoot &amp;gt; Diagnostic Tools do a tcpdump / packet capture from your PSN. Restrict it to just traffic to your AD server (e.g., host x.x.x.x). Start the capture, run a (failed) authentication&amp;nbsp; and then stop the capture and open up the traffic in Wireshark.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 12:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718209#M507254</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T12:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718243#M507256</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Sorry for late response, credentials are correct and I have also verified them by test user against the AD from ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 12:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718243#M507256</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T12:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718248#M507258</link>
      <description>Ok I have done a small change, in the AUTHZ policy in conditions I removed user identity group and just kept NAS_IP_ADDRESS and it worked, so I guess it has something to do with the user group</description>
      <pubDate>Wed, 03 Oct 2018 12:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718248#M507258</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T12:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718252#M507260</link>
      <description>&lt;P&gt;Ok, thanks for the update.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's odd that the same user would be found to be a group memeber when on m,obile device and not found to be group member when on laptop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd look at the details of&amp;nbsp;ExternalGroups under Other Attributes in the Authentication Details report. It should report which SID(s) it found the user to be a member of. (You can see values for the SIDs vs. group name when you do the server-based Authentication test.)&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 12:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718252#M507260</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T12:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718258#M507261</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did a little change and it worked, but I dont want it to work this way, if I specify internal user in authZ policy and put in my name it works and even in this case the credentials are coming from the AD.&lt;/P&gt;
&lt;P&gt;Now this username is a part of a user identity group if i specify this user identity group it stops working. Please check attached images.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 13:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718258#M507261</guid>
      <dc:creator>zaheer.jahangir1</dc:creator>
      <dc:date>2018-10-03T13:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718271#M507264</link>
      <description>&lt;P&gt;Normally when you have an external group we would have selected the external identity store and AD group in the Authz condition. You seem to have some hybrid where the user is external but the groupo is local to ISE (or at least not explicitly specified as coming from AD as far as I can see). I suspect that's the cause of the issue. Not sure why it's working properly for mobile devices though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would probably be best authoritatively determined by TAC looking at your system live.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 13:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718271#M507264</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-03T13:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: VPN AutH with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718353#M507266</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you share the failure reason here?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 14:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-auth-with-ise/m-p/3718353#M507266</guid>
      <dc:creator>Aravind Ravichandran</dc:creator>
      <dc:date>2018-10-03T14:30:38Z</dc:date>
    </item>
  </channel>
</rss>

