<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.1 with Duo 2 Factory in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583456#M537445</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See &lt;A href="https://community.cisco.com/docs/DOC-77176"&gt;Using DUO with ISE 2.3 and ACS 5.X  for 2FA Cisco Network Admin Access&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Apr 2018 02:38:04 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-04-25T02:38:04Z</dc:date>
    <item>
      <title>ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583448#M537437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do we know if ISE works with Duo's 2 Factory solution.&amp;nbsp; I did see a reference on there site where they stated they support ISE but no integration guides.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2016 22:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583448#M537437</guid>
      <dc:creator>Eric Zuvic</dc:creator>
      <dc:date>2016-09-27T22:51:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583449#M537438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone attempted this yet?&amp;nbsp; As Eric stated above, Duo states and their website that it is compatible with ISE but I have yet to find a guide to show all the integration works. I have a customer that is interested in doing this and need to know if anyone out there has configure this yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2017 03:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583449#M537438</guid>
      <dc:creator>Alex Martin</dc:creator>
      <dc:date>2017-01-12T03:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583450#M537439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm looking for the same thing and reached out to support. They 'said' they will open a case and send the documentation guide. I'll update if received. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2017 16:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583450#M537439</guid>
      <dc:creator>Jacob Gibb</dc:creator>
      <dc:date>2017-01-12T16:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583451#M537440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm testing right now with a customers ISE 2.0 using Duo and TACACS.&amp;nbsp; I was not involved with the setup of Duo.&amp;nbsp; I am somewhat successful.&amp;nbsp; Here is what I found out so far.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When Duo is setup, there is a configuration file created in the Program files folder (c:\program files (x86)\Duo Security Authentication Proxy\conf\authproxy.cfg).&amp;nbsp; This file contains the radius shared secret as well as the IP addresses that were (I'm assuming here) created when Duo was setup.&amp;nbsp; In ISE, you need to add Duo as a RADIUS Token in Administration &amp;gt; Identity Management &amp;gt; External Identity Sources. Use the shared secret found in the authproxy.cfg file to configure the connection to the Duo server when you create a new RADIUS Token Identity Source.&amp;nbsp; In my testing, I've left everything pretty much default with the exception of the server timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, I've only tested with TACACS, but it appears to just use RADIUS to communicate back and forth.&amp;nbsp; The test I setup was with a 5505 WLC and it works (sometimes).&amp;nbsp; I am not sure if there is some kind of timeout going on, but it seems like if I get the request from Duo and hit it straight away, it works, but if I wait more than a second or two after I get the Push notification from Duo on my phone, then the Authentication passes, but it never proceeds to Authorization.&amp;nbsp; Could just need some more tweaking on timeout values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll update when I've tested more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2017 17:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583451#M537440</guid>
      <dc:creator>Alex Martin</dc:creator>
      <dc:date>2017-01-12T17:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583452#M537441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I heard back from DUO support and essentially it looks like they are still requiring the DUO proxy to be installed but ISE is the NAD in this case not the ASA? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="5" style="padding: 3.75pt; width: 550px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: white; padding: 3.75pt 3.75pt 3.75pt 3.75pt;" valign="top"&gt;&lt;P&gt;&lt;/P&gt;&lt;H1&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;ISE Duo Integration Steps&lt;/SPAN&gt;&lt;/H1&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;&lt;A href="https://signup.duosecurity.com/" target="_blank"&gt;Sign up for a Duo account&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Log in to the &lt;A href="https://admin.duosecurity.com/" target="_blank"&gt;Duo Admin Panel&lt;/A&gt; and navigate to &lt;STRONG&gt;Applications&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Click &lt;STRONG&gt;Protect an Application&lt;/STRONG&gt; and locate &lt;STRONG&gt;RADIUS&lt;/STRONG&gt; in the applications list. Click &lt;STRONG&gt;Protect this Application&lt;/STRONG&gt; to get your integration key, secret key, and API hostname. See &lt;A href="https://www.duosecurity.com/docs/getting_started" target="_blank"&gt;Getting Started&lt;/A&gt; for help.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Install the Duo Authentication Proxy.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Configure the Proxy:&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;[ad_client]&lt;BR /&gt; host=1.2.3.4&lt;BR /&gt; service_account_username=duoservice&lt;BR /&gt; service_account_password=password1&lt;BR /&gt; search_dn=cn=Users,dc=example,dc=com&lt;BR /&gt; &lt;BR /&gt; [radius_server_auto]&lt;BR /&gt; ikey=DIXXXXXXXXXXXXXXXXXX&lt;BR /&gt; skey=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&lt;BR /&gt; api_host=api-XXXXXXXX.duosecurity.com&lt;BR /&gt; radius_ip_1=&amp;lt;IP Address of the ISE&amp;gt;&lt;BR /&gt; radius_secret_1=thisisalsoaradiussecret&lt;BR /&gt; client=ad_client&lt;BR /&gt; port=1812&lt;BR /&gt; failmode=safe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Start the AuthProxy: net start DuoAuthProxy&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Login to Cisco ISE.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;8.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Go to &lt;STRONG&gt;Administrators &amp;gt; External Identity Sources &amp;gt; RADIUS Token&lt;/STRONG&gt; and select &lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;9.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Select &lt;STRONG&gt;Connection&lt;/STRONG&gt; and then&amp;nbsp; enter in IP Address of the AuthProxy Server, and Shared Secret of the AuthProxy server.&amp;nbsp; Change the server timeout to 60 seconds and select &lt;STRONG&gt;Save&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;10. &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;Now change your Authentication Policy to use the External Identity Source you created for Duo.&amp;nbsp; This is done under &lt;STRONG&gt;Policy &amp;gt; Authentication&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;H1&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;&lt;BR /&gt; ISE Troubleshooting&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;In the web interface, choose &lt;STRONG&gt;Operations &amp;gt; RADIUS LiveLog&lt;/STRONG&gt;.&amp;nbsp; This will show you all the RADIUS Authentications for the past 24 hours.&amp;nbsp; Clicking on the magnifying glass will take you to the authentication details for a request you are troubleshooting.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt;&lt;BR /&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2017 18:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583452#M537441</guid>
      <dc:creator>Jacob Gibb</dc:creator>
      <dc:date>2017-01-12T18:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583453#M537442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are also trying to get this working. We want to use local ISE user/groups. We have the Duo proxy added as External Radius Token...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the proxy setup and I can get a Duo push but can't get the ISE authentication part working. &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Would love to know if anyone else has had it work. We are going to open a ticket with Tac and see if they will be of any help. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2017 22:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583453#M537442</guid>
      <dc:creator>BrianEschen</dc:creator>
      <dc:date>2017-02-14T22:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583454#M537443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like to give this a try, did you get this to work and do I need the ad_client?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Nov 2017 20:49:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583454#M537443</guid>
      <dc:creator>Richard Lucht</dc:creator>
      <dc:date>2017-11-30T20:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583455#M537444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you get this working?&amp;nbsp; I am trying to use DUO as a multi factor for access to network devices.&amp;nbsp; I am having trouble getting ISE and the Auth proxy to communicate properly.&amp;nbsp; I can see info in the log of the authproxy when I test and failures on ISE.&amp;nbsp; Something about either a bad password or wrong key.&amp;nbsp; the key matches everywhere and i know the password is correct.&amp;nbsp; In Duo I get this error "[RadiusClient (UDP)] dropping packet from 10.200.1.30:1812 - response packet has invalid authenticator"&amp;nbsp; Duo says it has to do with my ISE configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 17:02:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583455#M537444</guid>
      <dc:creator>Richard Lucht</dc:creator>
      <dc:date>2017-12-11T17:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583456#M537445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See &lt;A href="https://community.cisco.com/docs/DOC-77176"&gt;Using DUO with ISE 2.3 and ACS 5.X  for 2FA Cisco Network Admin Access&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2018 02:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3583456#M537445</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-04-25T02:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 with Duo 2 Factory</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3921369#M537446</link>
      <description>&lt;P&gt;we used ISE as a radius server, but with Active Directory as our external ID source. Now I need to "insert" DUO in the mix for 2 factor.&lt;/P&gt;&lt;P&gt;when you set this up, does it still allow you to use the Authorization profiles from ISE to set Radius attributes?&amp;nbsp;&lt;/P&gt;&lt;P&gt;things like:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;CVPN3000/ASA/PIX7x-IPSec-Group-Policy = &amp;lt;AD_Group&amp;gt;&lt;/P&gt;&lt;P&gt;Framed-IP&amp;nbsp;&lt;/P&gt;&lt;P&gt;etc?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 20:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-with-duo-2-factory/m-p/3921369#M537446</guid>
      <dc:creator>don.click1</dc:creator>
      <dc:date>2019-09-09T20:40:04Z</dc:date>
    </item>
  </channel>
</rss>

