<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identify corporate Macbook for VPN access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426003#M535739</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Like you send, certs can be exported if user is admin.&amp;nbsp; I don't think a smart card would help in this scenario either because CAC / smartcard is usually integrated via USB which could also be ported to a non-company owned asset.&amp;nbsp; The best solution, as Paul brought up, would be the use of an MDM solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 May 2017 14:48:36 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2017-05-30T14:48:36Z</dc:date>
    <item>
      <title>Identify corporate Macbook for VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426001#M535737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive-quote" style="color: #000000; font-family: -webkit-standard;"&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="WordSection1" style="font-family: Helvetica; font-size: 12px;"&gt;&lt;DIV style="font-size: 12pt; font-family: Calibri;"&gt;&lt;BLOCKQUOTE class="jive-quote" style="color: #000000; font-family: -webkit-standard;"&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="WordSection1" style="font-family: Helvetica; font-size: 12px;"&gt;&lt;DIV style="font-size: 12pt; font-family: Calibri;"&gt;&lt;STRONG style="color: #1f497d; font-size: 11pt;"&gt;How can we use ISE to ensure that only a company provided MAC Laptop would be allowed to join the network via VPN, and reject non-corporate MACbook?&lt;/STRONG&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;DIV style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;Customer concerns is&amp;nbsp; the admin rights can allow the certificate to be extracted and used on non-corporate devices.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="font-size: 12pt; font-family: Calibri;"&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;This is whole end-to-end cisco solution we need to do POC (ISE + anyconncect + ASA).&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;I would like to propose two solution for customer reference, please let me know if it is feasible or there is any detailed pros/cons.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0 0 0 36pt; font-size: 12pt; font-family: Calibri; text-indent: -18pt;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;&lt;SPAN&gt;1)&lt;SPAN style="font-size: 7pt; font-family: 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;Double cert auth ( cert + smartcard/token) ,&amp;nbsp; this will need integration with smartcard/token vendor.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0 0 0 36pt; font-size: 12pt; font-family: Calibri; text-indent: -18pt;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;&lt;SPAN&gt;2)&lt;SPAN style="font-size: 7pt; font-family: 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;Cert auth +&amp;nbsp; Mac address/BIOS serial&amp;nbsp; posture check&amp;nbsp; ,&amp;nbsp; based on hostscan it will input Mac address/serial number to ASA/ISE in advance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt; color: #1f497d;"&gt;Any comments is appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 May 2017 13:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426001#M535737</guid>
      <dc:creator>Qingguo Zhang</dc:creator>
      <dc:date>2017-05-30T13:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: Identify corporate Macbook for VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426002#M535738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are they using an MDM like JAMF to manage the Macs?&amp;nbsp; If so, then you could explore an integration between ISE and JAMF to verify the Mac is registered.&amp;nbsp; I am not a JAMF expert but I know this seems to be the defacto MDM many customers use for Mac management.&amp;nbsp; I see ISE referenced in their 9.99 release notes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://docs.jamf.com/9.99.0/casper-suite/release-notes/What's_New_in_This_Release.html"&gt;http://docs.jamf.com/9.99.0/casper-suite/release-notes/What's_New_in_This_Release.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 May 2017 14:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426002#M535738</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-05-30T14:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Identify corporate Macbook for VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426003#M535739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Like you send, certs can be exported if user is admin.&amp;nbsp; I don't think a smart card would help in this scenario either because CAC / smartcard is usually integrated via USB which could also be ported to a non-company owned asset.&amp;nbsp; The best solution, as Paul brought up, would be the use of an MDM solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 May 2017 14:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426003#M535739</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2017-05-30T14:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Identify corporate Macbook for VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426004#M535740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the information, I'm currently in a situation as what Qingguo is encountering and the customer is asking if JAMF is the recommended solution with regards to MDM, would we be able to elaborate to them just what is the policy JAMF is using to identify corporate macbooks without cert and how does Cisco ISE utilizes that to verify if the Mac is registered as a corporate device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, they would like to know if there's any way ISE is able to prevent users from upgrading to the latest MAC OS released by Apple and if not, what is the likelyhood that a MAC OS upgrade might break the ISE agent's compatibility support matrix. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jun 2017 08:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426004#M535740</guid>
      <dc:creator>Jimi</dc:creator>
      <dc:date>2017-06-15T08:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identify corporate Macbook for VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426005#M535741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am by no means an MAC OS person so I may not be able to answer all the questions here but here is what I know from my experience.  JAMF seems to be a very popular management solution for Macs.  In their 9.99 release notes they added support for ISE MDM API v2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://docs.jamf.com/9.99.0/casper-suite/release-notes/What's_New_in_This_Release.html&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never done a JAMF to Cisco ISE MDM integration so I am not sure what details you can get from that integration.  I am not sure if OS version is a piece of information you get or not.  You may be able to get OS version from the posture module, but I haven’t tried it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The key reason JAMF has been used in my installs is to configure the Macs to present PEAP AD computer credentials as a means to authenticate the Macs.  In most cases I do PEAP computer authentication as the means to ensure the attaching device is a managed asset.  This is a trivial task on Windows devices.  You can configure the Macs to do the exact same thing, but it is not a trivial task.  There are methods to do it manually or using Apples OSX server MDM (can’t remember the name), but JAMF makes the process easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the end of the day if you get PEAP computer auth working on the Macs you are treating them identically to the Windows domain joined devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jun 2017 12:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426005#M535741</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-06-15T12:52:03Z</dc:date>
    </item>
    <item>
      <title>Re: Identify corporate Macbook for VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426006#M535742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no way for ise or posture to block OS upgrades from taking place&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jun 2017 13:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426006#M535742</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-06-15T13:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Identify corporate Macbook for VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426007#M535743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your responses Paul and Jason!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 05:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identify-corporate-macbook-for-vpn-access/m-p/3426007#M535743</guid>
      <dc:creator>Jimi</dc:creator>
      <dc:date>2017-06-20T05:05:15Z</dc:date>
    </item>
  </channel>
</rss>

