<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SPAN session for every authenticating domain controller in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/span-session-for-every-authenticating-domain-controller/m-p/3501120#M557568</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;With Kerberos SPAN, wouldn’t we have to have a SPAN session for every authenticating domain controller in the environment?&amp;nbsp; Since there can only be two ISE-PIC nodes, that seems to eliminate that option (if my assumption’s correct).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Also, if we were to stand up a member server with the agent on it, does it need to be set up as an Event Log Collector and all the domain controllers configured with Event Log Forwarding to the member server?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Brian Crocker&amp;nbsp; &lt;A href="https://community.cisco.com//u1/340627" target="_blank"&gt;bricrock&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:31:52 GMT</pubDate>
    <dc:creator>benugent</dc:creator>
    <dc:date>2020-02-21T18:31:52Z</dc:date>
    <item>
      <title>SPAN session for every authenticating domain controller</title>
      <link>https://community.cisco.com/t5/network-access-control/span-session-for-every-authenticating-domain-controller/m-p/3501120#M557568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;With Kerberos SPAN, wouldn’t we have to have a SPAN session for every authenticating domain controller in the environment?&amp;nbsp; Since there can only be two ISE-PIC nodes, that seems to eliminate that option (if my assumption’s correct).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Also, if we were to stand up a member server with the agent on it, does it need to be set up as an Event Log Collector and all the domain controllers configured with Event Log Forwarding to the member server?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Brian Crocker&amp;nbsp; &lt;A href="https://community.cisco.com//u1/340627" target="_blank"&gt;bricrock&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:31:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/span-session-for-every-authenticating-domain-controller/m-p/3501120#M557568</guid>
      <dc:creator>benugent</dc:creator>
      <dc:date>2020-02-21T18:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: Is there anyone watching this space still that could answer Brian's question:</title>
      <link>https://community.cisco.com/t5/network-access-control/span-session-for-every-authenticating-domain-controller/m-p/3501121#M557588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct that log forwarding would have to be setup to send logon messages to the member server running the agent.&amp;nbsp; You can do this with group policy.&amp;nbsp; &lt;A href="https://blogs.technet.microsoft.com/wincat/2008/08/11/quick-and-dirty-large-scale-eventing-for-windows/"&gt;Here&lt;/A&gt; is an article on how to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIC Kerberos SPAN is looking for specific events and I'm pretty sure that is regardless of authenticating domain controller.&amp;nbsp; The only requisites you need to enable Kerberos SPAN is to ensure the PassiveID service is running (which is by default in PIC) and to select the interface you are going to use to monitor for logon events.&amp;nbsp; If we need to discuss further, we can set up a meeting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2017 15:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/span-session-for-every-authenticating-domain-controller/m-p/3501121#M557588</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2017-02-13T15:08:02Z</dc:date>
    </item>
  </channel>
</rss>

