<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE posture for VPN doing certificate authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511165#M511037</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333px;"&gt;Hello Team,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;I know this has been asked before and I know there are ways around it but my scenario is a bit more specific so need to see if there are any options from ISE side. Please read on.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Currently doing VPN cert authentication and authorization with ASA and LDAP. Using IKEv2.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Need to implement ISE Posture.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Several restrictions such as FIPS on ISE so PAP/ASCII, MSCHAPv2 and EAP-MD5 are disabled. Also no dual factor here due to nature of security, certificate only (not that I think using a different method would help).&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;This guide show exactly what is needed, but it seems to be Window Native only:&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/webvpn-ssl-vpn/119208-config-asa-00.html?referring_site=RE&amp;amp;pos=2&amp;amp;page=http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/113692-technote-anyconnect-00.html" title="https://www.cisco.com/c/en/us/support/docs/security-vpn/webvpn-ssl-vpn/119208-config-asa-00.html?referring_site=RE&amp;amp;pos=2&amp;amp;page=http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/113692-technote-anyconnect-00.html"&gt;Configure ASA IKEv2 Remote Access with EAP-PEAP and Native Windows Client - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Any options you can think of are appreciated, we need to use an EAP method for VPN authentication because of all the protocols ISE has disabled. Apparently AnyConnect only does some proprietary protocol called AnyConnect-EAP which ISE doesn't support, is that correct? Routers seem to have a possibility also, but then again we are dealing with an ASA.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Thanks, &lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Eric.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Apr 2018 20:44:41 GMT</pubDate>
    <dc:creator>Eric Pineda</dc:creator>
    <dc:date>2018-04-04T20:44:41Z</dc:date>
    <item>
      <title>ISE posture for VPN doing certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511165#M511037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333px;"&gt;Hello Team,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;I know this has been asked before and I know there are ways around it but my scenario is a bit more specific so need to see if there are any options from ISE side. Please read on.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Currently doing VPN cert authentication and authorization with ASA and LDAP. Using IKEv2.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Need to implement ISE Posture.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Several restrictions such as FIPS on ISE so PAP/ASCII, MSCHAPv2 and EAP-MD5 are disabled. Also no dual factor here due to nature of security, certificate only (not that I think using a different method would help).&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;This guide show exactly what is needed, but it seems to be Window Native only:&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/webvpn-ssl-vpn/119208-config-asa-00.html?referring_site=RE&amp;amp;pos=2&amp;amp;page=http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/113692-technote-anyconnect-00.html" title="https://www.cisco.com/c/en/us/support/docs/security-vpn/webvpn-ssl-vpn/119208-config-asa-00.html?referring_site=RE&amp;amp;pos=2&amp;amp;page=http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/113692-technote-anyconnect-00.html"&gt;Configure ASA IKEv2 Remote Access with EAP-PEAP and Native Windows Client - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Any options you can think of are appreciated, we need to use an EAP method for VPN authentication because of all the protocols ISE has disabled. Apparently AnyConnect only does some proprietary protocol called AnyConnect-EAP which ISE doesn't support, is that correct? Routers seem to have a possibility also, but then again we are dealing with an ASA.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Thanks, &lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Eric.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2018 20:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511165#M511037</guid>
      <dc:creator>Eric Pineda</dc:creator>
      <dc:date>2018-04-04T20:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for VPN doing certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511166#M511038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With cert-based auth from VPN client to ASA, the ISE component is authorization only as authentication is terminated at ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2018 22:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511166#M511038</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-04T22:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for VPN doing certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511167#M511039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct, it would be authorization, however it would still deal with the PAP/ASCII or MSCHAPv2 from ASA to ISE?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 00:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511167#M511039</guid>
      <dc:creator>Eric Pineda</dc:creator>
      <dc:date>2018-04-05T00:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture for VPN doing certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511168#M511040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authorization is independent of Authentication and communicated via RADIUS.&amp;nbsp; It is not reliant on the authentication protocol.&amp;nbsp; Normally authorization is sent as part of a singe response, but could be a separate request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That said, to trigger an Authorization request to ISE for VPN client at this stage, it needs to send an auth request from ASA to ISE using unencrypted auth protocols.&amp;nbsp; You can configure IPsec between ASA and ISE, which may be deemed as an acceptable compensating control, but defer to your compliance team.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2018 00:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-for-vpn-doing-certificate-authentication/m-p/3511168#M511040</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-05T00:44:55Z</dc:date>
    </item>
  </channel>
</rss>

