<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.3 || ISE-PIC with Domain Computers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-3-ise-pic-with-domain-computers/m-p/3603214#M521325</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Passive ID validates user login events.&amp;nbsp; If customer wishes to validate PC is member of domain, then recommend machine auth via 802.1X PEAP or EAP-TLS with machine cert.&amp;nbsp; Another method to validate AD membership (albeit not as secure as 802.1X) is to use AD Probe from Profiler which can efficiently determine AD membership based on hostname (learned from DNS, DHCP, or prior machine auth), or NMAP probe with SMB discovery option enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Sep 2017 11:07:17 GMT</pubDate>
    <dc:creator>Craig Hyps</dc:creator>
    <dc:date>2017-09-26T11:07:17Z</dc:date>
    <item>
      <title>ISE 2.3 || ISE-PIC with Domain Computers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-ise-pic-with-domain-computers/m-p/3603213#M521324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Customer is asking the following use-case &lt;SPAN style="font-size: 10pt;"&gt;based on AD group and passive ID&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Deny policy for the PC without Domain.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Permit policy for Domain User and Computer.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;My understanding is that we don't support the Domain Computers in PassiveID... is that correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Please advise.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2017 09:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-ise-pic-with-domain-computers/m-p/3603213#M521324</guid>
      <dc:creator>musultan</dc:creator>
      <dc:date>2017-09-26T09:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 || ISE-PIC with Domain Computers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-ise-pic-with-domain-computers/m-p/3603214#M521325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Passive ID validates user login events.&amp;nbsp; If customer wishes to validate PC is member of domain, then recommend machine auth via 802.1X PEAP or EAP-TLS with machine cert.&amp;nbsp; Another method to validate AD membership (albeit not as secure as 802.1X) is to use AD Probe from Profiler which can efficiently determine AD membership based on hostname (learned from DNS, DHCP, or prior machine auth), or NMAP probe with SMB discovery option enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2017 11:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-ise-pic-with-domain-computers/m-p/3603214#M521325</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-26T11:07:17Z</dc:date>
    </item>
  </channel>
</rss>

