<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE and F5 RAS Integration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425734#M511512</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig,&lt;/P&gt;&lt;P&gt;Apologies, I posted in the wrong forum as a result of trying to do this quickly.&amp;nbsp; Thanks for the answer.&amp;nbsp; In response to your question, this is F5 Remote Access so yes, VPN connectivity as opposed to LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There isn't a problem as such, the customer is however looking to leverage ISE to the maximum extent possible and would like to perform some NAC actions (not defined in detail yet) if possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Mar 2018 17:46:01 GMT</pubDate>
    <dc:creator>mgarvie</dc:creator>
    <dc:date>2018-03-16T17:46:01Z</dc:date>
    <item>
      <title>ISE and F5 RAS Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425731#M511509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking to understand what capabilities we have to integrate with F5 Remote Access with ISE providing Authentication and Authorisation services.&amp;nbsp; Customer is using ISE in the wireless network but would like to extend this to their F5 RAS environment.&amp;nbsp; Do we have any examples of this?&amp;nbsp; I am looking to understand what, if anything is possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The requirement from the customer is as follows:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;Prior to our call here are some details on our F5 RAS solution, any ideas&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;around integrating the ISE NAC capabilities would be greatly appreciated.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;Design details of the solution:&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;(Embedded image moved to file: pic48733.gif)&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; SecureID Authentication&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; The F5 system was added to customer’s RSA Authentication Manager system and a&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; RSA SecureID Authentication server called &lt;EM&gt;Customer&lt;/EM&gt;_SecureID was defined on&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; the F5 system by importing the sdconf.rec file.&amp;nbsp;&amp;nbsp;&amp;nbsp; All users are&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; initially authenticated by SecureID.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; AD Authentication&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; After the SecureID check, users are next authenticated against the customer's&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Active Directory domain.&amp;nbsp;&amp;nbsp; The F5 system binds to Active&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Directory using a service account to check credentials.&amp;nbsp;&amp;nbsp;&amp;nbsp; This is&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; necessary in order for the F5 system to allow users to change expired&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; passwords.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Client Type Check&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; The client type is determined by examining the user agent HTTP header&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; that is part of client requests.&amp;nbsp;&amp;nbsp;&amp;nbsp; If the client is detected to be an&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; F5 standalone client then functionality branches to provide&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; network-level access.&amp;nbsp;&amp;nbsp;&amp;nbsp; Anything else is assumed to be a web browser&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; requiring Citrix access.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Machine Certificate Check&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Users with F5 clients must pass an additional check to ensure that they&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; have an customer machine certificate installed.&amp;nbsp;&amp;nbsp;&amp;nbsp; The machine certificate&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; checker is a client-side component that is downloaded to end users.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; The computer certificate store is searched for entries issued by the&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; customer’s certificate authority .&amp;nbsp;&amp;nbsp;&amp;nbsp; Any matching certificates are sent to&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; the F5 system and from there checked using OSCP.&amp;nbsp;&amp;nbsp;&amp;nbsp; Users without a&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; valid certificate are presented with a warning message and disconnected.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Network Client Access&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Client-based users with valid machine certificates are granted network&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; access.&amp;nbsp;&amp;nbsp; A virtual adapter on their PC is configured with an address&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; from a pool maintained on the F5 system.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Citrix Access&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Users with any client other than a standalone client are directed to the&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; Citrix system.&amp;nbsp;&amp;nbsp;&amp;nbsp; The F5 APM connects to the Citrix XML service and,&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; using the credentials stored when the user logged on, authenticates and&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; reads their list of applications.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; The F5 APM system replaces the Citrix Storefront/Web Interface modules,&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; providing users with a menu of applications through its own user&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; interface.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; When the user clicks on an item on the applications menu, an ICA session&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&amp;nbsp;&amp;nbsp; is launched that is proxied through the F5 virtual server.&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/115966_pastedImage_2.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2018 18:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425731#M511509</guid>
      <dc:creator>mgarvie</dc:creator>
      <dc:date>2018-03-15T18:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and F5 RAS Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425732#M511510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Might work with new anyconnect agent that doesn’t require redirect ise 2.2 and higher&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best to test it out and share your findings as I don’t think anyone has done that&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2018 18:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425732#M511510</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-03-15T18:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and F5 RAS Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425733#M511511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;First let me call out that this is a public forum. Please do not post any information that is deemed customer sensitive or confidential.&amp;nbsp; You have cited a specific organization and security policy so I have edited the names used.&amp;nbsp; We have a separate partner forum used for questions that may require the inclusion of customer-sensitive data, but this question could be asked without divulging customer.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure of Posture is a requirement here, but the current solution is tightly coupled to F5 client usage.&amp;nbsp; It may be better to understand challenges with current setup as I often follow the concept of "if it is not broken, don't fix it".&amp;nbsp; ISE can certainly provide integration with RSA, AD, and machine authentication via certs.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since mentioned RAS (and assume not mixing with RSA use), is this a remote access VPN setup with access to Firepass and then to APM over VPN, or LAN connection direct to APM?&amp;nbsp;&amp;nbsp; I ask since the VPN termination and auth will happen separately from the APM validation.&amp;nbsp; For example, we have ASA to terminate VPN via certificate, RSA/OTP, and AD prior to getting network access.&amp;nbsp; Authorization can be assigned via ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming this is a LAN connection, ISE could perform some of the initial network authentication through 802.1X using certs, OTP, or AD machine/user auth.&amp;nbsp; It could also integrate via a RADIUS interface to APM (where ISE is RADIUS server) as shown &lt;A href="https://support.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-11-5-0/7.html"&gt;here&lt;/A&gt;.&amp;nbsp; Citrix can also be integrated into TS-Agent to our firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, there were discussions at one time regarding potential for F5 to integrate APM with pxGrid to use ISE session data (proof of authentication and role assignment) to more seamlessly provide secure application access, but not sure F5 has moved on that option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to return to the "what is the problem to be solved" and that will help guide whether it makes sense to offload some of the AAA functions to ISE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2018 09:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425733#M511511</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-03-16T09:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and F5 RAS Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425734#M511512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig,&lt;/P&gt;&lt;P&gt;Apologies, I posted in the wrong forum as a result of trying to do this quickly.&amp;nbsp; Thanks for the answer.&amp;nbsp; In response to your question, this is F5 Remote Access so yes, VPN connectivity as opposed to LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There isn't a problem as such, the customer is however looking to leverage ISE to the maximum extent possible and would like to perform some NAC actions (not defined in detail yet) if possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2018 17:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-f5-ras-integration/m-p/3425734#M511512</guid>
      <dc:creator>mgarvie</dc:creator>
      <dc:date>2018-03-16T17:46:01Z</dc:date>
    </item>
  </channel>
</rss>

