<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.1 AD Connector Port 389 TCP in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-1-ad-connector-port-389-tcp/m-p/3324068#M546419</link>
    <description>&lt;P&gt;Hi Volker,&lt;/P&gt;
&lt;P&gt;Yes, from what I can see you can enable secure LDAPS. Make sure on ISE you have valid certificates issued by the Internal PKI that the AD DC trusts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Create a new LDAP connection, specify the DC and port 636&lt;/P&gt;
&lt;P&gt;- Specify the Admin DN - E.g "CN=SVCAcct,CN=Users,DC=LAB,DC=NET" and password&lt;/P&gt;
&lt;P&gt;- Enable Secure Authentication&lt;/P&gt;
&lt;P&gt;- Select the Trusted Root Certificate (LDAP Server Root CA)&lt;/P&gt;
&lt;P&gt;- Add Subject/Group Search Base&lt;/P&gt;
&lt;P&gt;- Import groups&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I took a tcpdump and confirmed the traffic was sent via 636 and encrypted. When you import the groups, that is when you'll know the connection is working and verify it is encrypted.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Feb 2018 12:15:18 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-02-02T12:15:18Z</dc:date>
    <item>
      <title>ISE 2.1 AD Connector Port 389 TCP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-ad-connector-port-389-tcp/m-p/3324020#M546417</link>
      <description>&lt;P&gt;Hi togehter,&lt;/P&gt;
&lt;P&gt;we have an ISE installation with integration to an AD (join) as external identtity store.&lt;/P&gt;
&lt;P&gt;When we sniffer the connection from ISE to the DC we can see that there is Port 389 for ldap in use.&lt;/P&gt;
&lt;P&gt;The customer wants to remove all unsecure protocols in his network.&lt;/P&gt;
&lt;P&gt;Is there a psossibiltiy to use the port 636 (ldaps) instead of 389 ?&lt;/P&gt;
&lt;P&gt;We didnt find a way to configure ldaps in the AD connection menu in the external identity store section. (Not in ldap connection menue !!!)&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-ad-connector-port-389-tcp/m-p/3324020#M546417</guid>
      <dc:creator>Volker Fries</dc:creator>
      <dc:date>2020-02-21T18:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 AD Connector Port 389 TCP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-ad-connector-port-389-tcp/m-p/3324068#M546419</link>
      <description>&lt;P&gt;Hi Volker,&lt;/P&gt;
&lt;P&gt;Yes, from what I can see you can enable secure LDAPS. Make sure on ISE you have valid certificates issued by the Internal PKI that the AD DC trusts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Create a new LDAP connection, specify the DC and port 636&lt;/P&gt;
&lt;P&gt;- Specify the Admin DN - E.g "CN=SVCAcct,CN=Users,DC=LAB,DC=NET" and password&lt;/P&gt;
&lt;P&gt;- Enable Secure Authentication&lt;/P&gt;
&lt;P&gt;- Select the Trusted Root Certificate (LDAP Server Root CA)&lt;/P&gt;
&lt;P&gt;- Add Subject/Group Search Base&lt;/P&gt;
&lt;P&gt;- Import groups&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I took a tcpdump and confirmed the traffic was sent via 636 and encrypted. When you import the groups, that is when you'll know the connection is working and verify it is encrypted.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 12:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-ad-connector-port-389-tcp/m-p/3324068#M546419</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-02T12:15:18Z</dc:date>
    </item>
  </channel>
</rss>

