<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active Auth/Passive ID/pxGrid Question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424691#M518430</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE simply publishes the information it receives to pxGrid.&amp;nbsp; It is then up to the subscribers to handle the data.&amp;nbsp; For a session to be created during active authentication; ISE must have the MAC address of the endpoint.&amp;nbsp; Once it has that, it will continue to add information as it come in (IP / hostname / username, etc).&amp;nbsp; Passive ID requires a username and an IP address to build a session.&amp;nbsp; If it gets a MAC address first it will hold that information in memory until it can match it to a username and IP.&amp;nbsp; Once the required information is obtained for either active or passive auth, it will publish to pxGrid subscribers.&amp;nbsp; HTH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Jan 2018 15:05:26 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2018-01-24T15:05:26Z</dc:date>
    <item>
      <title>Active Auth/Passive ID/pxGrid Question</title>
      <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424690#M518429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wanted to check out how identity mapping should work in the following situation which is a common setup we use at customers:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;From a network perspective, many customers just want to make sure that connecting devices are managed by the company.&amp;nbsp; For domain joined devices the simplest way to ensure that is PEAP/Computer.&amp;nbsp; So in active authentication, the identity mapping would be IP to computer name.&lt;/LI&gt;&lt;LI&gt;For external systems like Stealthwatch/FMC, the desired identity mapping is IP to username.&amp;nbsp; So we either need to change the active authentication scheme or utilize Passive ID to get the IP to username mapping.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is how does ISE resolve the discrepancy between the active auth having IP to computer and passive ID having IP to username?&amp;nbsp; Or does ISE just feed all the information over pxGrid and let the connected systems figure it out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have had mixed results testing, but need to do more testing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts would be appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jan 2018 21:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424690#M518429</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-23T21:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Active Auth/Passive ID/pxGrid Question</title>
      <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424691#M518430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE simply publishes the information it receives to pxGrid.&amp;nbsp; It is then up to the subscribers to handle the data.&amp;nbsp; For a session to be created during active authentication; ISE must have the MAC address of the endpoint.&amp;nbsp; Once it has that, it will continue to add information as it come in (IP / hostname / username, etc).&amp;nbsp; Passive ID requires a username and an IP address to build a session.&amp;nbsp; If it gets a MAC address first it will hold that information in memory until it can match it to a username and IP.&amp;nbsp; Once the required information is obtained for either active or passive auth, it will publish to pxGrid subscribers.&amp;nbsp; HTH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:05:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424691#M518430</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-01-24T15:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: Active Auth/Passive ID/pxGrid Question</title>
      <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424692#M518431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;right and from another user "&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 10pt; font-family: 'Avenir Medium';"&gt;ISE sends whatever the data it has in the Endpoint ID field of the session table. Its typically one ID, (could be Active directory user or computer account name), will be two IDs in case of Easy connect (Mac address, user-id). The partner system, like Stealthwatch would have 3 entries in an Easy Connect session, the endpoint’s mac address, mac-&amp;amp;-user-id and user-id alone mapped to the IP address, however the most current id to IP address mapping will be marked “current”.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 10pt; font-family: 'Avenir Medium';"&gt;That's my observation with ISE and Stealthwatch integration with Easy Connect."&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN style="font-size: 10pt; font-family: 'Avenir Medium';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: 'Avenir Medium'; font-size: 10pt;"&gt;If you're getting inconsistency might be a bug, i also asked others to take a &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: 'Avenir Medium';"&gt;look &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424692#M518431</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-01-24T15:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: Active Auth/Passive ID/pxGrid Question</title>
      <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424693#M518432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When testing with FMC &amp;amp; Stealthwatch, please note the version numbers and release notes&amp;nbsp; FMC had some issues when using passive identity, when a user loved on to AD, the mapping was correct. After 802.1X re-auth occurred, the previous user mapping was overwritten by the machine mapping, an the identity rules on the FMC no longer worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-email-small" href="mailto:jeppich@cisco.com"&gt;jeppich@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 17:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424693#M518432</guid>
      <dc:creator>jeppich</dc:creator>
      <dc:date>2018-01-24T17:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: Active Auth/Passive ID/pxGrid Question</title>
      <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424694#M518433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is one of my main concerns.  The 802.1x reauth messing up the identity mappings in FMC/Stealthwatch.  Sounds like you have confirmed this to be a valid concern.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that fixed in newer version of FMC?  Is Stealthwatch abled handle the 802.1x reauth even okay?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 18:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424694#M518433</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-24T18:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Active Auth/Passive ID/pxGrid Question</title>
      <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424695#M518434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me back with you on the status and versions of FMC and look in Stealthwatch,&amp;nbsp; I'm on travel this week and next week, so my responses may be delayed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-email-small" href="mailto:jeppich@cisco.com"&gt;jeppich@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 18:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3424695#M518434</guid>
      <dc:creator>jeppich</dc:creator>
      <dc:date>2018-01-24T18:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: Active Auth/Passive ID/pxGrid Question</title>
      <link>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3933277#M518435</link>
      <description>&lt;P&gt;Just enabled PX-GRID and Stealthwatch as a subcriber. We are doing dot1.x authentication and MAB on certain devices. Information for dot1.x devices are not&amp;nbsp; being seen in Stealthwatch. Running SW 7.1.1. Any thought?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 17:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/active-auth-passive-id-pxgrid-question/m-p/3933277#M518435</guid>
      <dc:creator>raymondmf</dc:creator>
      <dc:date>2019-10-01T17:41:45Z</dc:date>
    </item>
  </channel>
</rss>

