<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Migration from windows native supplicant+NAC agent to Anyconnect agent in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3825742#M541643</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Customer wants to migrate from windows native supplicant(802.1x authentication) + NAC agent (for posture) to Anyconnect agent (NAM + ISE Posture module).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They want recommended option (with less effort &amp;amp; support intervention) for migration. I can think of below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Deploy Anyconnect agent with configured NAM and ISE posture module (with "uninstall NAC agent" option enabled)&lt;/LI&gt;
&lt;LI&gt;This will enable NAM module takes precedence over windows native network adaptor settings (802.1x configuration)&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;And will remove NAC agent and install ISE posture module&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This way, user system will able to authenticate and get postured using Anyconnect agent in one step migration process.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if this works and also any risk.&lt;/P&gt;</description>
    <pubDate>Mon, 25 Mar 2019 17:15:52 GMT</pubDate>
    <dc:creator>dngore</dc:creator>
    <dc:date>2019-03-25T17:15:52Z</dc:date>
    <item>
      <title>Migration from windows native supplicant+NAC agent to Anyconnect agent</title>
      <link>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3825742#M541643</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Customer wants to migrate from windows native supplicant(802.1x authentication) + NAC agent (for posture) to Anyconnect agent (NAM + ISE Posture module).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They want recommended option (with less effort &amp;amp; support intervention) for migration. I can think of below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Deploy Anyconnect agent with configured NAM and ISE posture module (with "uninstall NAC agent" option enabled)&lt;/LI&gt;
&lt;LI&gt;This will enable NAM module takes precedence over windows native network adaptor settings (802.1x configuration)&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;And will remove NAC agent and install ISE posture module&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This way, user system will able to authenticate and get postured using Anyconnect agent in one step migration process.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if this works and also any risk.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 17:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3825742#M541643</guid>
      <dc:creator>dngore</dc:creator>
      <dc:date>2019-03-25T17:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from windows native supplicant+NAC agent to Anyconnect agent</title>
      <link>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3825756#M541644</link>
      <description>I recently went through the process of testing out NAM with no posture module to utilize eap-chaining so we could drive network policy based on the user &amp;amp; computer. Some things you may want to consider:&lt;BR /&gt;&lt;BR /&gt;How often will the customer require re-authentication? Without the use of PACs re-authentication and no user present can present issues such as 8021x process termination and fallback to mab. The fix I used was via profiling based on AD-Host-Exists to true. This will allow MACs to be stored in an endpoint group that could be authorized as you wish if the dot1x process is terminated.&lt;BR /&gt;&lt;BR /&gt;Will you be using smart cards? Will your customer require the ability to perform a "switch user" on a single workstation? If so, here is the fix:&lt;BR /&gt;&lt;BR /&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{B12744B8-5BB7-463a-B85E-BB7627E73002}&lt;BR /&gt;&lt;BR /&gt;To configure single or multiple user logon, add a DWORD named EnforceSingleLogon (this should already be there), and give it a value of 1 or 0.&lt;BR /&gt;&lt;BR /&gt;1 restricts logon to a single user.&lt;BR /&gt;&lt;BR /&gt;0 allows multiple users to be logged on.&lt;BR /&gt;&lt;BR /&gt;I have noticed that on a system reboot, or complete user logoff that eap-chaining works beautifully and gives you the ability to drive policy based on eap-chaining result. If the customer has users who lock their box and you use a short re-auth timer I strongly recommend a lot of testing.&lt;BR /&gt;&lt;BR /&gt;HTH!</description>
      <pubDate>Mon, 25 Mar 2019 17:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3825756#M541644</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-25T17:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from windows native supplicant+NAC agent to Anyconnect agent</title>
      <link>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3826119#M541646</link>
      <description>&lt;P&gt;Thanks for your inputs Mike.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just wanted to confirm my approach of migration. By installing Anyconnect agent (NAM+ISE Posture module) on system will over-ride native supplicant configuration and remove NAC agent in one step.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need not to remove first native supplicant configuration &amp;amp; NAC agent and then deploy Anyconnect agent. It will be automatically take care by deploying Anyconnect agent. Is it correct understanding?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 09:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3826119#M541646</guid>
      <dc:creator>dngore</dc:creator>
      <dc:date>2019-03-26T09:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from windows native supplicant+NAC agent to Anyconnect agent</title>
      <link>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3826260#M541647</link>
      <description>Your understanding is correct. When I was testing both I actually left the native supplicant configs for rollback purposes so if you needed to uninstall NAM/Anyconnect you could still 8021x authenticate via the native supplicant. Just keep in mind that as soon as you install NAM and reboot your host will use NAM to manage your adatper/s.</description>
      <pubDate>Tue, 26 Mar 2019 13:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/migration-from-windows-native-supplicant-nac-agent-to-anyconnect/m-p/3826260#M541647</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-26T13:36:56Z</dc:date>
    </item>
  </channel>
</rss>

