<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434319#M537803</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi howon,&lt;/P&gt;&lt;P&gt;The AnyConnect doesn't prompt me the "trust certification" message, and I see the access reject on my swicth:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot from 2016-08-31 18:32:55.png" class="image-1 jive-image" src="/legacyfs/online/fusion/99835_Screenshot from 2016-08-31 18:32:55.png" style="height: 449px; width: 620px;" /&gt; &lt;/P&gt;&lt;P&gt;What I need to do to force him to prompt this message?&lt;/P&gt;&lt;P&gt;my live log:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot from 2016-08-31 18:34:38.png" class="jive-image image-2" height="192" src="/legacyfs/online/fusion/99836_Screenshot from 2016-08-31 18:34:38.png" style="height: 192px; width: 850.286px;" width="850" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 31 Aug 2016 15:18:48 GMT</pubDate>
    <dc:creator>guy.zwerdling</dc:creator>
    <dc:date>2016-08-31T15:18:48Z</dc:date>
    <item>
      <title>AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434311#M537751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;I have AnyConnect on some PC in my lab and I setup new wired network named "test" with 802.1x EAP-FAST with using password for authentication,&lt;/P&gt;&lt;P&gt;If I try to connect using "test" network it doesn't&lt;SPAN class="st"&gt; asks for the username and password, and it just&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="st"&gt;Did I missed something? that I need to configure?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="st"&gt;The service Wired AutoConfig in disable state.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="st"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="st"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="st"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2016 17:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434311#M537751</guid>
      <dc:creator>guy.zwerdling</dc:creator>
      <dc:date>2016-08-29T17:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434312#M537759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guy, I will need more information about the issue to provide better answer. But for the supplicant like AC NAM to present login window, there needs to be a switch that is enabled with 802.1x on the interface. Have you configured that part already?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2016 17:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434312#M537759</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-08-29T17:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434313#M537772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi howon&lt;/P&gt;&lt;P&gt;The interface configure as follow:&lt;/P&gt;&lt;P&gt;interface FastEthernet2/0/7&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order mab dot1x&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication periodic&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2016 18:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434313#M537772</guid>
      <dc:creator>guy.zwerdling</dc:creator>
      <dc:date>2016-08-29T18:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434314#M537782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, interface configuration looks good. Was this working before possibly with native supplicant? Are you seeing any events on the switch regarding the authentication requests?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2016 18:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434314#M537782</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-08-29T18:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434315#M537792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With native supplicate it work great!&lt;/P&gt;&lt;P&gt;I restart the PC and the switch and now the AnyConnect prompt me the username and password and I typed the user "bob" but on the switch I see (in debug radius) that the username is "anonymous"... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2016 03:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434315#M537792</guid>
      <dc:creator>guy.zwerdling</dc:creator>
      <dc:date>2016-08-30T03:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434316#M537795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so it looks like you are getting prompted now. What you are seeing is expected for tunneled EAP methods such as PEAP, EAP-TTLS, and EAP-FAST. It is typical for supplicant to use anonymous for outer identity and use real username for internal identity. Now that the supplicant and the switch looks to be working, what do you see on the ISE live log?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2016 03:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434316#M537795</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-08-30T03:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434317#M537797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="Screenshot from 2016-08-30 12:20:43.png" class="image-1 jive-image" src="/legacyfs/online/fusion/99781_Screenshot from 2016-08-30 12:20:43.png" style="height: 632px; width: 620px;" /&gt;11001&amp;nbsp;&amp;nbsp;&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11017&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS created a new session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15049&amp;nbsp;&amp;nbsp;&amp;nbsp; Evaluating Policy Group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15008&amp;nbsp;&amp;nbsp;&amp;nbsp; Evaluating Service Selection Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15048&amp;nbsp;&amp;nbsp;&amp;nbsp; Queried PIP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15004&amp;nbsp;&amp;nbsp;&amp;nbsp; Matched rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11507&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted EAP-Response/Identity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12500&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared EAP-Request proposing EAP-TLS with challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11006&amp;nbsp;&amp;nbsp;&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11001&amp;nbsp;&amp;nbsp;&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11018&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12101&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted EAP-Response/NAK requesting to use EAP-FAST instead&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12100&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared EAP-Request proposing EAP-FAST with challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11006&amp;nbsp;&amp;nbsp;&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11001&amp;nbsp;&amp;nbsp;&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11018&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12102&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response and accepting EAP-FAST as negotiated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12800&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted first TLS record; TLS handshake started&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12805&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted TLS ClientHello message&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12806&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared TLS ServerHello message&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12807&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared TLS Certificate message&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12810&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared TLS ServerDone message&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12105&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11006&amp;nbsp;&amp;nbsp;&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11001&amp;nbsp;&amp;nbsp;&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11018&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12104&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12105&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11006&amp;nbsp;&amp;nbsp;&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11001&amp;nbsp;&amp;nbsp;&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11018&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12104&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12105&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11006&amp;nbsp;&amp;nbsp;&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11001&amp;nbsp;&amp;nbsp;&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11018&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12104&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12815&amp;nbsp;&amp;nbsp;&amp;nbsp; Extracted TLS Alert message&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12153&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP-FAST failed SSL/TLS handshake because the client rejected the ISE local-certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11504&amp;nbsp;&amp;nbsp;&amp;nbsp; Prepared EAP-Failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11003&amp;nbsp;&amp;nbsp;&amp;nbsp; Returned RADIUS Access-Reject&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5434&amp;nbsp;&amp;nbsp;&amp;nbsp; Endpoint conducted several failed authentications of the same scenario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2016 08:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434317#M537797</guid>
      <dc:creator>guy.zwerdling</dc:creator>
      <dc:date>2016-08-30T08:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434318#M537800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to your log, the client is rejecting the ISE certificate. Have you installed ISE server certificate to the AC NAM? Other option is to trust any Root CA for the purpose of testing. Please see AnyConnect guide for more information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5 class="topictitle5" style="margin-top: 20px; margin-bottom: 8px; font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 1.6rem; color: #39393b;"&gt;Configure Trusted Server Validation Rules&lt;/H5&gt;&lt;P&gt;&lt;A name="ID-1424-0000033e__context_A6BDF3387194494FBAC138017A485ACC" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000340" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;When the Validate Server Identity option is configured for the EAP method, the Certificate panel is enabled to allow you to configure validation rules for certificate server or authority. The outcome of the validation determines whether the certificate server or the authority is trusted. &lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000341" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;To define certificate server validation rules, follow these steps: &lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;Procedure&lt;/STRONG&gt;&lt;/P&gt;&lt;HR noshade="noshade" /&gt;&lt;TABLE border="0" cellpadding="3" cellspacing="0" class="stepTable" style="margin: 6px 0; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" width="90%"&gt;&lt;TBODY style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TR style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TD align="left" style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;Step 1&lt;/STRONG&gt;&amp;nbsp; &lt;/TD&gt;&lt;TD style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;A name="ID-1424-0000033e__step_716AF7448BCA4DDEB6D788505E574FA9" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;&lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000342" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;When the optional settings appear for the &lt;SPAN class="uicontrol" style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: bold;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000344" style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; color: #0075b4;"&gt;&lt;/A&gt;Certificate Field&lt;/SPAN&gt; and the &lt;SPAN class="uicontrol" style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: bold;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000346" style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; color: #0075b4;"&gt;&lt;/A&gt;Match&lt;/SPAN&gt; columns, click the drop-down arrows and select the desired settings. &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TD align="left" style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;Step 2&lt;/STRONG&gt;&amp;nbsp; &lt;/TD&gt;&lt;TD style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;A name="ID-1424-0000033e__step_72261AC8181E4FAF9B43528F180BAEB0" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;&lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000347" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;Enter a value in the Value field. &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TD align="left" style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;Step 3&lt;/STRONG&gt;&amp;nbsp; &lt;/TD&gt;&lt;TD style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;A name="ID-1424-0000033e__step_B98D0F1C065A41F3BD36323ABCC24880" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;&lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000349" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;Under Rule, click &lt;SPAN class="uicontrol" style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: bold;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-0000034b" style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; color: #0075b4;"&gt;&lt;/A&gt;Add&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TD align="left" style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;Step 4&lt;/STRONG&gt;&amp;nbsp; &lt;/TD&gt;&lt;TD style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;" valign="top"&gt;&lt;A name="ID-1424-0000033e__step_EB542D34FAC44F0994A04BBAB9D24DD5" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;&lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-0000034c" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;In the Certificate Trusted Authority pane, choose one of the following options: &lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;A name="ID-1424-0000033e__choice_B9EBC8591D0C4E00853FC26B433E5AB1" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;&lt;SPAN style="margin-top: 6px; margin-bottom: 6px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-0000034e" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;Trust Any Root Certificate Authority (CA) Installed on the OS—If chosen, only the local machine or certificate stores are considered for the server’s certificate chain validation. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A name="ID-1424-0000033e__choice_EA31FACFAC2F4AD58A4EAF8894FB9E08" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;&lt;SPAN style="margin-top: 6px; margin-bottom: 6px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000350" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;Include Root Certificate Authority (CA) Certificates. &lt;/SPAN&gt;&lt;TABLE class="olh_note" style="margin: 6px 0; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TBODY style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TR style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;TD class="td_faq" style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;Note&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class="td_faq" style="padding: 0 5px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;SPAN style="margin-top: 6px; margin-bottom: 6px; font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000352" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #0075b4;"&gt;&lt;/A&gt;If you choose Include Root Certificate Authority (CA) Certificates, you must click &lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit;"&gt;&lt;A name="ID-1424-0000033e__ID-1424-00000354" style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; color: #0075b4;"&gt;&lt;/A&gt;Add&lt;/STRONG&gt; to import the CA certificate into the configuration. If the certificate being used is being exported from the Windows certificate store, use the "Base 64 encoded X.509 (.cer)" option.&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P class="pN3_Note3" style="margin-top: 12px; margin-bottom: 12px; font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 14px; text-indent: -35px; color: #525252; margin-left: 35px !important;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect42/administration/guide/b_AnyConnect_Administrator_Guide_4-2/configure_nam.html" title="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect42/administration/guide/b_AnyConnect_Administrator_Guide_4-2/configure_nam.html"&gt;Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.2 - Configure Network Access Manager [Cisco AnyC…&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2016 15:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434318#M537800</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-08-30T15:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434319#M537803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi howon,&lt;/P&gt;&lt;P&gt;The AnyConnect doesn't prompt me the "trust certification" message, and I see the access reject on my swicth:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot from 2016-08-31 18:32:55.png" class="image-1 jive-image" src="/legacyfs/online/fusion/99835_Screenshot from 2016-08-31 18:32:55.png" style="height: 449px; width: 620px;" /&gt; &lt;/P&gt;&lt;P&gt;What I need to do to force him to prompt this message?&lt;/P&gt;&lt;P&gt;my live log:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot from 2016-08-31 18:34:38.png" class="jive-image image-2" height="192" src="/legacyfs/online/fusion/99836_Screenshot from 2016-08-31 18:34:38.png" style="height: 192px; width: 850.286px;" width="850" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2016 15:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434319#M537803</guid>
      <dc:creator>guy.zwerdling</dc:creator>
      <dc:date>2016-08-31T15:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434320#M537806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guy, since you are manually configuring the access profile for the user, you need to follow the instructions in the previous post to add the certificate or make AC-NAM bypass the certificate verification.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2016 20:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434320#M537806</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-08-31T20:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434321#M537809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, it work great with naive supplicates, It is typical for applicant to use anonymous for outer identity and use real username for internal identity.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jun 2017 07:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect/m-p/3434321#M537809</guid>
      <dc:creator>lissacoffey</dc:creator>
      <dc:date>2017-06-07T07:37:42Z</dc:date>
    </item>
  </channel>
</rss>

