<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.x enable password authentication behavior in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534730#M519251</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks,&amp;nbsp; hslai.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Password policies (lifetime)&amp;nbsp;&amp;nbsp; can be different for normal user group and admin group,&amp;nbsp; but it&amp;nbsp; is same policy for login password and enable password for a particular user.&amp;nbsp; right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. My customer has hundreds of internal user migrated from ACS 5.X.&amp;nbsp; these internal user don't have enable password .&amp;nbsp; They may have issue when accessing old ASA after migration to ISE ,&amp;nbsp;&amp;nbsp; What's best approach for this issue&amp;nbsp; other than adding enable password manually on ISE ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Dec 2017 10:55:46 GMT</pubDate>
    <dc:creator>Qingguo Zhang</dc:creator>
    <dc:date>2017-12-11T10:55:46Z</dc:date>
    <item>
      <title>ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534725#M519246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;My customer is doing configuration migration from ACS 5.x to ISE 2.2&amp;nbsp; ,&amp;nbsp;&amp;nbsp;&amp;nbsp; Most config are&amp;nbsp; TACACS/Radius based device admin .&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;We found different behavior between ACS 5.4 and ISE&amp;nbsp; 2.2 doing Tacacs enable authentication&amp;nbsp; ,&amp;nbsp; Testing NAD is&amp;nbsp; ASA&amp;nbsp; and don’t enable exec auto-enable. Authorization will grant privilege 15 for internal user.&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;OL start="1" style="color: #000000; font-family: -webkit-standard; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;LI&gt;In ACS 5.x,&amp;nbsp;&amp;nbsp; After user pass login user/pass authentication,&amp;nbsp;&amp;nbsp; it can pass enable with same password of login . we don’t configure enable password and leave it as default In user identity database,&amp;nbsp; .&lt;/LI&gt;&lt;LI&gt;In ISE 2.2 ,&amp;nbsp; It cannot pass enable authentication with same password of login.&amp;nbsp;&amp;nbsp;&amp;nbsp; It can pass authentication only after we add enable password in user database.&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin: 0 0 0 36pt; font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;The following is the log of failure in ISE:&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;301029021/50,CPMSessionID=375737936010.124.112.22831277Authentication3757379360,user=00test002,&lt;SPAN style="color: red;"&gt;Neither EnablePassword nor UserPassword returned by IDStore&lt;/SPAN&gt; for 00test002,EnableAuthenticator.cpp:150&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;It seems ISE cannot use the login password as default enable password ,&amp;nbsp;&amp;nbsp; you have to configure enable password when using enable authentication.&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;Is it expected behavior is ISE 2.x&amp;nbsp;&amp;nbsp; ?&amp;nbsp; if so how to fix it on ISE side during migration from ACS ,&amp;nbsp;&amp;nbsp; there are hundreds of internal user for my customer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 08:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534725#M519246</guid>
      <dc:creator>Qingguo Zhang</dc:creator>
      <dc:date>2017-12-08T08:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534726#M519247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG __jive_id="114024" alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/114024_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;This work fine on ISE 2.2 with tacacs configuration.And the passwords that i show are same for login and enable.&lt;/P&gt;&lt;P&gt;I can show you simply tacacs configuration&amp;nbsp; on&amp;nbsp; ise side.Here you are.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/114026_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;Network team are internal members assined to this group.&lt;/P&gt;&lt;P&gt;Next step Policy Elements for tacacs ,Add new Tacacs command set and tick Permit any command that is not listed bellow.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jive-image image-3" src="https://community.cisco.com/legacyfs/online/fusion/114027_pastedImage_1.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;Next step is tacacs profile ,add new profile and give priv&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jive-image image-4" src="https://community.cisco.com/legacyfs/online/fusion/114029_pastedImage_3.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;As i told before this is the simply method.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 09:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534726#M519247</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-12-08T09:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534727#M519248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My Question is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I don't configure enable password for user,&amp;nbsp;&amp;nbsp; can ISE support enable authentication using login password ?&amp;nbsp; this is working in ACS 5.X.&amp;nbsp; not working in ISE 2.X in my testing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is it expected behavior on ISE&amp;nbsp; ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 15:31:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534727#M519248</guid>
      <dc:creator>Qingguo Zhang</dc:creator>
      <dc:date>2017-12-08T15:31:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534728#M519249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No i think answer is No. And what is the problem if passwords are same?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 15:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534728#M519249</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-12-08T15:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534729#M519250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is the expected in ISE. ISE explicitly separates enable passwords from the login ones.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 17:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534729#M519250</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-08T17:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534730#M519251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks,&amp;nbsp; hslai.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Password policies (lifetime)&amp;nbsp;&amp;nbsp; can be different for normal user group and admin group,&amp;nbsp; but it&amp;nbsp; is same policy for login password and enable password for a particular user.&amp;nbsp; right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. My customer has hundreds of internal user migrated from ACS 5.X.&amp;nbsp; these internal user don't have enable password .&amp;nbsp; They may have issue when accessing old ASA after migration to ISE ,&amp;nbsp;&amp;nbsp; What's best approach for this issue&amp;nbsp; other than adding enable password manually on ISE ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 10:55:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534730#M519251</guid>
      <dc:creator>Qingguo Zhang</dc:creator>
      <dc:date>2017-12-11T10:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534731#M519252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Yes.&lt;/P&gt;&lt;P&gt;2. Any reason not using the auto-enable option for EXEC authorization, which added in ASA 9.2(1)? Otherwise, we need an enhancement open for such migration. It should also be possible to export the internal users in CSV, duplicate the data in password column to those in the enable password column and then import the updated CSV file back to ISE.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 12:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534731#M519252</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-11T12:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534732#M519253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Hslai&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 14:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534732#M519253</guid>
      <dc:creator>Qingguo Zhang</dc:creator>
      <dc:date>2017-12-13T14:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534733#M519254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi hslai&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, This is subsequent question to add enable password.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;After e&lt;SPAN style="font-size: 13.3333px;"&gt;xporting existing users to CSV file.&amp;nbsp; w&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;e want to copy the login password to enable password,&amp;nbsp; but login password is encryped text . &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;but enable password has to be a cleartext&amp;nbsp; when importing updated excel back to ISE.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is it possible to decrypt login password or enable password can be encrypted when importing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Qingguo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2017 05:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534733#M519254</guid>
      <dc:creator>Qingguo Zhang</dc:creator>
      <dc:date>2017-12-20T05:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.x enable password authentication behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534734#M519255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please ignore the question.&amp;nbsp; testing result is OK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2017 09:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-x-enable-password-authentication-behavior/m-p/3534734#M519255</guid>
      <dc:creator>Qingguo Zhang</dc:creator>
      <dc:date>2017-12-20T09:19:46Z</dc:date>
    </item>
  </channel>
</rss>

