<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need of checking computer is part of domain in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991220#M541016</link>
    <description>You can accomplish what you are looking for a few different ways. A couple of questions for you:&lt;BR /&gt;Do you have ISE integrated with AD?&lt;BR /&gt;Do you have an internal PKI?&lt;BR /&gt;Are you planning on using the native supplicant?&lt;BR /&gt;Some options include:&lt;BR /&gt;Utilizing ISE policy to map to AD security groups to validate the comp object (host) exists. Deploying native supplicant configs via GPO to accomplish the use of machine auth via eap-tls &amp;amp; certificate auto-enrollment if you wish. If using AnyConnect client as your supplicant you could also deploy ISE posture module to perform system checks to ensure the host is a member of the domain via registry check and other viable options. Note that you will probably wont to incorporate OCSP checks to verify that the internal machine certs are valid as well during the eap-tls session. HTH!</description>
    <pubDate>Fri, 29 Nov 2019 17:00:30 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2019-11-29T17:00:30Z</dc:date>
    <item>
      <title>Need of checking computer is part of domain</title>
      <link>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991171#M541004</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In one of the requirements, we would like to restrict personal devices to access corporate networks over 802.1x wired or wireless using MSCHAP. We can add machine authentication on top of it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I simply use EAP-TLS to eliminate machine authentication? Only the devices having the certificate will be able to connect and no personal device would be able to login to the corporate network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope my logic is correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Munish Dhiman&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 14:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991171#M541004</guid>
      <dc:creator>munish.dhiman1</dc:creator>
      <dc:date>2019-11-29T14:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: Need of checking computer is part of domain</title>
      <link>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991220#M541016</link>
      <description>You can accomplish what you are looking for a few different ways. A couple of questions for you:&lt;BR /&gt;Do you have ISE integrated with AD?&lt;BR /&gt;Do you have an internal PKI?&lt;BR /&gt;Are you planning on using the native supplicant?&lt;BR /&gt;Some options include:&lt;BR /&gt;Utilizing ISE policy to map to AD security groups to validate the comp object (host) exists. Deploying native supplicant configs via GPO to accomplish the use of machine auth via eap-tls &amp;amp; certificate auto-enrollment if you wish. If using AnyConnect client as your supplicant you could also deploy ISE posture module to perform system checks to ensure the host is a member of the domain via registry check and other viable options. Note that you will probably wont to incorporate OCSP checks to verify that the internal machine certs are valid as well during the eap-tls session. HTH!</description>
      <pubDate>Fri, 29 Nov 2019 17:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991220#M541016</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-11-29T17:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: Need of checking computer is part of domain</title>
      <link>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991280#M541036</link>
      <description>Hi Mike,&lt;BR /&gt;Do you have ISE integrated with AD? Yes&lt;BR /&gt;Do you have an internal PKI? Yes&lt;BR /&gt;Are you planning on using the native supplicant? Anyconnect Posture module and VPN&lt;BR /&gt;&lt;BR /&gt;I like the posture registry check, would you suggest any configuration parameter? And does it work fine in production environments?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;MD&lt;BR /&gt;</description>
      <pubDate>Fri, 29 Nov 2019 19:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991280#M541036</guid>
      <dc:creator>munish.dhiman1</dc:creator>
      <dc:date>2019-11-29T19:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: Need of checking computer is part of domain</title>
      <link>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991285#M541065</link>
      <description>In regard to 8021x I assume you meant to include that you will run NAM as well. In my experience using the native supplicant is easier especially if just trying to accomplish comp authc via eap-tls. However, NAM introduces some additional capabilities such as eap-chaining. For the posture check I run several checks, but the one I mentioned is in production for all VPN access, and it works like a charm. My domain reg check condition looks like this:&lt;BR /&gt;RegCheck_Domain&lt;BR /&gt;Win10 ALL&lt;BR /&gt;reg type = RegistryValue&lt;BR /&gt;reg root key: HKLM&lt;BR /&gt;sub key: SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\History\&lt;BR /&gt;value name: MachineDomain&lt;BR /&gt;datatype = string&lt;BR /&gt;value operator EQUALS&lt;BR /&gt;value data: &amp;lt;YOURDomain&amp;gt;&lt;BR /&gt;I recommend utilizing AD sec group mapping in your authz conditions as well as another layer. HTH!</description>
      <pubDate>Fri, 29 Nov 2019 19:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-of-checking-computer-is-part-of-domain/m-p/3991285#M541065</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-11-29T19:21:46Z</dc:date>
    </item>
  </channel>
</rss>

