<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Easy Connect with AnyConnect in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481541#M517998</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason I know easy connect does not today since it uses MAB with wired and wireless but was trying to see if there was a way to combine them to help with passive user identity. The end user does not want to have any popup that requires them to enter credentials. Was thinking maybe since ASA supports COA there could be a way to leverage it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Feb 2018 16:12:10 GMT</pubDate>
    <dc:creator>gsheppar</dc:creator>
    <dc:date>2018-02-07T16:12:10Z</dc:date>
    <item>
      <title>ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481539#M517996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to leverage Easy Connect with AnyConnect VPN? The thought was to use a machine certificate for authentication with AnyConnect/ASA and then pull the machine name from the CN to do authorization against ISE. At this point Easy Connect could provide the passive identity and then we could do a CoA against the ASA to place it in a different authorization group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Graham&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 16:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481539#M517996</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2018-02-07T16:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481540#M517997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyconnect has nothing to do with easy connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why not machine certificate plus CWA portal. This is known as CWA chaining.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 16:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481540#M517997</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-02-07T16:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481541#M517998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason I know easy connect does not today since it uses MAB with wired and wireless but was trying to see if there was a way to combine them to help with passive user identity. The end user does not want to have any popup that requires them to enter credentials. Was thinking maybe since ASA supports COA there could be a way to leverage it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 16:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481541#M517998</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2018-02-07T16:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481542#M517999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No unfortunately not going to work because we need to see the user login. The only way I would think about this working would be if the anyconnect VPN tunnel with machine cert came up before the user logs into the machine. Then they logged in and WMI or AD agent event saw the login. This hasn’t been tested but might work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 16:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481542#M517999</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-02-07T16:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481543#M518000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jason sounds like something I should try test. I don't see why it would not work the same way. You say the tunnel coming up prior to the users logging in but I would assume it would work the same way as if a user that plugs in a laptop to an ethernet port. Once network or in this case corporate VPN connection is made Windows would do a WMI login to AD which ISE could then see for passive identity. Other idea if it does not work the way I am thinking would be to have a post script on AnyConnect to generate a WMI login. What you think? I might try to build this out if we think its theoretically possible. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 16:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481543#M518000</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2018-02-07T16:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481544#M518001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;AFAIK you would need to login to windows after connected to the network for it to work otherwise you are stuck at a MAB state without a WMI login. If my machine was already logged into the domain its not going to do it again just because I switched network ports. That’s what dot1x is for ☺&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it would work in theory but will rely on my counterpart &lt;A href="https://community.cisco.com//u1/38995"&gt;hslai&lt;/A&gt; on Easyconnect to respond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 16:33:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481544#M518001</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-02-07T16:33:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481545#M518002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-68158"&gt;How To: ISE and ASA Integration using CoA for Posture&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; shows RA VPN can use certificate auth against ASA and then authorize-only with ISE. That's supported for a long time and a better solution.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;What you asked might work but why complicating the use case when our teams have not vetted it.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 17:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481545#M518002</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-02-07T17:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481546#M518003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;A href="https://community.cisco.com//u1/38995"&gt;hslai&lt;/A&gt; only issue is the customer does not want to deploy user certificates or ask for credentials which is the only way that would work to get user identity. Sounds like what I am saying might work but never been tested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other way you can think of to get user identity without prompting the user for their information or leveraging a user certificate with AnyConnect? Could posture possibly provide the user identity? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 17:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481546#M518003</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2018-02-07T17:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481547#M518004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, not really. Unless the username is in a field of the computer certificate and ASA is configured to send that to ISE instead of the computer's.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 18:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481547#M518004</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-02-07T18:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Easy Connect with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481548#M518005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;A href="https://community.cisco.com//u1/38995"&gt;hslai&lt;/A&gt; I might try test out passive identity with ISE and AnyConnect CoA &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 18:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-easy-connect-with-anyconnect/m-p/3481548#M518005</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2018-02-07T18:59:48Z</dc:date>
    </item>
  </channel>
</rss>

