<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN certificate auth using ISE? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513190#M524998</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a few caveats you will run into when setting this up if this is your first time doing this.&amp;nbsp; My standard VPN now for customers is this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tunnel Group-&amp;nbsp; Employee&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group URL- www.mycompany.com/employee&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication- Cert + AAA&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Profile- Mach Cert + Cert store override + Nice Name for Group URL (Employee VPN), automatic software updates, backup server config if needed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Tunnel Group-&amp;nbsp; Vendor&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group URL- www.mycompany.com/vendor&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication- Cert + AAA&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Profile- Nice Name for Group URL (Vendor VPN), no software updates, backup server config if needed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ISE,&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;I setup a Policy set for Employee VPN and one for Vendor VPN keying off the tunnel group name as Craig stated above.&amp;nbsp; I usually don't use the other conditions as no other device is going to be setting that Tunnel Group parameter.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The trick here is you HAVE to download the employee client profile (XML) file and distribute that out to your employees ahead of time, i.e. use SCCM to push the file to the AnyConnect profiles directory.&amp;nbsp; The reason for this is the AnyConnect client on its own cannot look into the computer cert store.&amp;nbsp; It needs to be told to look there by the XML file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So we usually push the file out, have users test with it then send a communication out to employees to have them start using "Employee VPN" in their drop down.&amp;nbsp; Then after a while we monitor who is still using the old tunnel group and contact them directly eventually shutting off the legacy tunnel group.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 May 2017 14:24:52 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2017-05-11T14:24:52Z</dc:date>
    <item>
      <title>VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513185#M524993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys, I'm sure I read about this but my Google-fu is letting me down....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, trying to authenticate VPN users using machine certificates (Cisco ASA VPN termination point) using ISE. That way we limit VPN access to machines on the domain. &lt;SPAN style="font-size: 10pt;"&gt;The idea is similar to machine authentication using EAP-TLS, but over VPN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know you can't do EAP-TLS over VPN, but how is this achieved with ISE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 May 2017 00:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513185#M524993</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-05-10T00:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513186#M524994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Typical VPN connection will terminate certificate auth at ASA, not ISE.&amp;nbsp; In other words, ISE cannot authenticate the VPN users via certificate as it is never presented with a RADIUS auth request based on cert.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use secondary auth to verify identity based on extracted cert info, or straight user auth. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For cert only auth, you could use ISE for authorization only.&amp;nbsp; You can lock down via tunnel group and then match RADIUS requests based on extended ASA VPN attributes (VPN-3000 disctionary...VSA ID: 3076/146).&amp;nbsp; This would indicate user validated using machine cert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 May 2017 18:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513186#M524994</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-05-10T18:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513187#M524995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adding to Craig, it's possible to perform EAP auth if using IKEv2 as the RA VPN protocol. See &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/113692-technote-anyconnect-00.html"&gt;AnyConnect Over IKEv2 to ASA with AAA and Certificate Authentication - Cisco&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security-vpn/webvpn-ssl-vpn/119208-config-asa-00.html?referring_site=RE&amp;amp;pos=2&amp;amp;page=http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/113692-technote-anyconnect-00.html"&gt;Configure ASA IKEv2 Remote Access with EAP-PEAP and Native Windows Client&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 May 2017 19:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513187#M524995</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-05-10T19:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513188#M524996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide a reference to this solution:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;"You can lock down via tunnel group and then match RADIUS requests based on extended ASA VPN attributes (VPN-3000 disctionary...VSA ID: 3076/146).&amp;nbsp; This would indicate user validated using machine cert."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;I couldn't find anything.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 May 2017 23:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513188#M524996</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-05-10T23:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513189#M524997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The VPN Group config is probably more of an ASA question, but essentially you can dictate which auth methods apply to which tunnel group (Connection Profile).&amp;nbsp; To authenticate to TG "Employee", for example, you can set the authentication to cert auth.&amp;nbsp; Employees would select TG via drop down, or crafted URL that matches TG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The attribute I previously mentioned would be matched in Authorization condition to grant Employee access:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="88" src="https://community.cisco.com/legacyfs/online/fusion/107146_pastedImage_1.png" style="width: 589.032px; height: 88px;" width="589" /&gt;&lt;/P&gt;&lt;P&gt;Example below shows how to match on specific NDG based on VPN devices, or NAS-Port-Type.&amp;nbsp; It also shows use of the RADIUS Attribute to match on TG name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 May 2017 01:46:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513189#M524997</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-05-11T01:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513190#M524998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a few caveats you will run into when setting this up if this is your first time doing this.&amp;nbsp; My standard VPN now for customers is this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tunnel Group-&amp;nbsp; Employee&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group URL- www.mycompany.com/employee&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication- Cert + AAA&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Profile- Mach Cert + Cert store override + Nice Name for Group URL (Employee VPN), automatic software updates, backup server config if needed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Tunnel Group-&amp;nbsp; Vendor&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Group URL- www.mycompany.com/vendor&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication- Cert + AAA&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Profile- Nice Name for Group URL (Vendor VPN), no software updates, backup server config if needed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ISE,&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;I setup a Policy set for Employee VPN and one for Vendor VPN keying off the tunnel group name as Craig stated above.&amp;nbsp; I usually don't use the other conditions as no other device is going to be setting that Tunnel Group parameter.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The trick here is you HAVE to download the employee client profile (XML) file and distribute that out to your employees ahead of time, i.e. use SCCM to push the file to the AnyConnect profiles directory.&amp;nbsp; The reason for this is the AnyConnect client on its own cannot look into the computer cert store.&amp;nbsp; It needs to be told to look there by the XML file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So we usually push the file out, have users test with it then send a communication out to employees to have them start using "Employee VPN" in their drop down.&amp;nbsp; Then after a while we monitor who is still using the old tunnel group and contact them directly eventually shutting off the legacy tunnel group.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 May 2017 14:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513190#M524998</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-05-11T14:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513191#M524999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using additional conditions like NDG will allow control over where policy is applied in case want to roll out and test to select VPN gateways.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 May 2017 15:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3513191#M524999</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-05-11T15:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3791849#M525000</link>
      <description>&lt;P&gt;Hi Craig. It's been a while since your last post, however I'm hoping you can help us.&lt;/P&gt;
&lt;P&gt;We have a scenario where we'd like to authenticate end user devices using machine based certificates. This is working fine on the ASA side - end user devices with valid certificates signed by our CA are authenticating without an issue - however we'd like to use ISE for authorisation, in particular for the dACLs.&lt;/P&gt;
&lt;P&gt;We're finding it difficult to use a policy set (ISE v2.4) for this purpose, as the username is sent as "INVALID" when the ASA sends the AAA request to ISE - ie; authentication fails (probably due to certificate authentication being used instead of CHAP) - even though the authentication rule within the policy set is&amp;nbsp;configured&amp;nbsp;to "continue" if the username is not found - ie; we're using the authentication rule to match against the tunnel group to identify the correct dACL. Is there a trick we can use to "fool" ISE into accepting the authentication and then processing the authorisation? Given the end user device has been authenticated using machine based certificates, I'd say it is still a relatively secure approach.&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;Chris.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 06:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3791849#M525000</guid>
      <dc:creator>Christopher Liesfield</dc:creator>
      <dc:date>2019-01-31T06:26:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3825743#M525002</link>
      <description>&lt;P&gt;Christopher,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should define an AAA server group in ASA and set the Connection Profile/Tunnel Group to use it for authorization only. AuthC is performed by ASA, ISE is not involved. Then an AuthZ request is sent to ISE, no AuthC is performed in this RADIUS session. This is implemented by Authorize-Only RADIUS request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;aaa-server ISERAD-authz protocol radius&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;nbsp; authorize-only&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;tunnel-group EMP type remote-access&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;tunnel-group EMP general-attributes&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt; authorization-server-group ISERAD-authz&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;authorization-required&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;nbsp; username-from-certificate UPN&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;tunnel-group&amp;nbsp;EMP webvpn-attributes&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;nbsp;authentication certificate&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The Username attribute will be contained in the RADIUS request and it should be the machine name. You should check and set in ASA which certificate field is suitable for computer name lookup in AD. I guess UPN or CN. It can be used by AD group membership conditions in ISE policy.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 17:15:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3825743#M525002</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2019-03-25T17:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3927429#M525004</link>
      <description>&lt;P&gt;Dear Peter,&lt;/P&gt;&lt;P&gt;But how about authentication configuration on ISE side ? If we still configure authentication with option "If username not found" -&amp;gt; Continue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To summarize: I need only authorization from ISE, because ASA authenticate my client based on certificate.&lt;/P&gt;&lt;P&gt;Question is: What I must configure in section about authentication in ISE 2.4 ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 07:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3927429#M525004</guid>
      <dc:creator>mikiNet</dc:creator>
      <dc:date>2019-09-20T07:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3930661#M525006</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Authentication Policy does not really matter in this case actually as the RADIUS request contains &lt;STRONG&gt;Authorize-only&lt;/STRONG&gt; attribute. Our AuthC policy contains a single line:&lt;/P&gt;&lt;P&gt;Default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auth Fail: REJECT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User not Found: REJECT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Process fail: DROP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No CONTINUE is needed.&lt;/P&gt;&lt;P&gt;If you have authentication failure logs the RADIUS &amp;nbsp;request may not be az AuthZ-only request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="c02.png" style="width: 470px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/45665i0E259CDD1707FAE0/image-size/large?v=v2&amp;amp;px=999" role="button" title="c02.png" alt="c02.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 07:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/3930661#M525006</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2019-09-26T07:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4059959#M559426</link>
      <description>&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to get this working using AnyConnect, FTD and ISE 2.4.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the username is sent to ISE for authorization, using the machine name attribute from the certificate, ISE is not matching my authz profile because it can't find the "user". It appears it is trying to look up a user rather than machine, which is failing. See output below. Any ideas if I can resolve this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The same ISE is successfully authenticating and authorising machines based on machine certificates using 802.1x for wireless.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;H3&gt;&lt;SPAN&gt;Steps&lt;/SPAN&gt;&lt;/H3&gt;&lt;TABLE border="0" cellpadding="3"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11017&lt;/TD&gt;&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15049&lt;/TD&gt;&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15008&lt;/TD&gt;&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - DEVICE.Location&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - DEVICE.Device Type&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.NAS-Port-Type&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24715&lt;/TD&gt;&lt;TD&gt;ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15036&lt;/TD&gt;&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24432&lt;/TD&gt;&lt;TD&gt;Looking up user in Active Directory - TEST_AD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24325&lt;/TD&gt;&lt;TD&gt;Resolving identity - MACHINE.test.local&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24313&lt;/TD&gt;&lt;TD&gt;Search for matching accounts at join point - test.local&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24359&lt;/TD&gt;&lt;TD&gt;Incoming identity was not rewritten - MACHINE.test.local&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24318&lt;/TD&gt;&lt;TD&gt;No matching account found in forest - test.local&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24322&lt;/TD&gt;&lt;TD&gt;Identity resolution detected no matching account&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24352&lt;/TD&gt;&lt;TD&gt;Identity resolution failed - ERROR_NO_SUCH_USER&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24412&lt;/TD&gt;&lt;TD&gt;User not found in Active Directory - TEST_AD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - test.ExternalGroups (2 times)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15016&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile - DenyAccess&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15039&lt;/TD&gt;&lt;TD&gt;Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11003&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Russ&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 14:08:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4059959#M559426</guid>
      <dc:creator>russ.carter</dc:creator>
      <dc:date>2020-04-06T14:08:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4068802#M559728</link>
      <description>&lt;P&gt;It should work if the certificate subject contains the Distinguished Name of the computer, e. g.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CN=machine,OU=Computers,DC=test,DC=local&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;instead of &lt;STRONG&gt;machine.test.local&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2020 17:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4068802#M559728</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2020-04-18T17:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4190741#M564082</link>
      <description>&lt;P&gt;I had problems with FQDN and hostname too:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="i01.jpg" style="width: 363px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/89509i6BDE6F6DC5F2E345/image-size/medium?v=v2&amp;amp;px=400" role="button" title="i01.jpg" alt="i01.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then a rewrite rule helped:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="i02.jpg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/89510i6516E616B5B32E4D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="i02.jpg" alt="i02.jpg" /&gt;&lt;/span&gt;CSCvu42244 bug might be relevant too.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 13:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4190741#M564082</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2020-11-30T13:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4819493#M581345</link>
      <description>&lt;P&gt;Hello Gentleman,&lt;/P&gt;&lt;P&gt;I have the same task.. In our current environmant we have Cisco ASA anyconnect VPN. User gets authenticated via Username and RSA secure ID token. We have anyconnect VPN client in our environment and that will be continue to be used. We now have requirement to enable Username+Password authentication via Cisco ISE along with RSA secure ID token, as well if user machine is having machine certificate then only it is allowed to authorize to connect to VPN. Can anyone help me and provide me step by step instructions. Any help would be much appreciated. Thanks in Advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 22:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4819493#M581345</guid>
      <dc:creator>metafore</dc:creator>
      <dc:date>2023-04-21T22:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4848593#M582082</link>
      <description>&lt;P&gt;It is a complex task.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco Secure Client will not use Machine certificate unless you create a &lt;STRONG&gt;client profile&lt;/STRONG&gt; allowing machine certificates and place that XML on the client &lt;STRONG&gt;before&lt;/STRONG&gt; connecting to ASA.&lt;/P&gt;
&lt;P&gt;You need certificate+AAA combined &lt;STRONG&gt;authentication&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PeterKoltl_0-1685968543910.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/186493iE5252FC5FBFA0CE0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="PeterKoltl_0-1685968543910.png" alt="PeterKoltl_0-1685968543910.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In RSA-RADIUS AAA group you should define RSA server which checks both AD-username/AD-password and the token code.&lt;/P&gt;
&lt;P&gt;If you need Cisco ISE control (like AD group check), add ISE as an &lt;STRONG&gt;authorization&lt;/STRONG&gt; server to the Connection Profile (it must be defined as &lt;EM&gt;Authorize-only&lt;/EM&gt; so that ISE does not check password):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PeterKoltl_1-1685968755912.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/186494iCAFFBE25974FB775/image-size/medium?v=v2&amp;amp;px=400" role="button" title="PeterKoltl_1-1685968755912.png" alt="PeterKoltl_1-1685968755912.png" /&gt;&lt;/span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PeterKoltl_2-1685968827991.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/186495i90B1340B453BE447/image-size/medium?v=v2&amp;amp;px=400" role="button" title="PeterKoltl_2-1685968827991.png" alt="PeterKoltl_2-1685968827991.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I hope that helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 12:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4848593#M582082</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2023-06-05T12:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4854208#M582220</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285490"&gt;@Peter Koltl&lt;/a&gt;&amp;nbsp;. I applied AAA+Certificate auth along with secondary authentication method selected to RSA server which basically only checks for token code along with no secondary username configured. ISE as primary AAA username and password integrated with AD, with authorization profile matching to radius class attributes 25 (ASA group policy name).I installed public certificate with cn defined as fqdn of VPN name user access to ( bind to public interface IP of ASA). I had to enable auto cert and no user controllable in preference part 2 of xml client profile to avoid certificate pop up when user tries to connect to profile and push it ahead of a time on user machine to make it work. Thanks anyways its all sorted out....Thanks again for the help.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 00:20:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4854208#M582220</guid>
      <dc:creator>metafore</dc:creator>
      <dc:date>2023-06-14T00:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificate auth using ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4854313#M582225</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1392041"&gt;@metafore&lt;/a&gt;&amp;nbsp; for the feedback, best possible news!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 07:04:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-certificate-auth-using-ise/m-p/4854313#M582225</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2023-06-14T07:04:34Z</dc:date>
    </item>
  </channel>
</rss>

