<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570441#M557843</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I get what you are after now.&amp;nbsp; ISE-PIC is looking for logon events from AD.&amp;nbsp; These are detected via Kerberos SPAN, WMI monitoring or the PIC agent.&amp;nbsp; If it finds them, it will create a session in the directory to then be shared over pxGrid.&amp;nbsp; At one point in my lab, I had a instance of ISE-PIC (2.2) and ISE (2.2).&amp;nbsp; ISE was doing 802.1X authentications against AD.&amp;nbsp; I never saw any 802.1X auths against AD show up as passive session in PIC.&amp;nbsp; There could be a couple reasons for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. The endpoints doing 802.1X were not Windows endpoints&lt;/P&gt;&lt;P&gt;2. The authentication against AD creates a security event in AD that PIC does look for&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The best recommendation I can give you is to test it in a lab environment.&amp;nbsp; Configure PIC to monitor AD using one of the supported probes, then have a windows endpoint participate in 802.1X against that same instance of AD using ISE and see what PIC finds.&amp;nbsp; Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Aug 2017 16:24:18 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2017-08-08T16:24:18Z</dc:date>
    <item>
      <title>Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570438#M557840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;Hi Team, &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;I have followed the configuration guide for the pxGrid integration between Firepower Management Centre (using v6.2.0.2) and ISE v2.2 as stated in this doc:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-68292" style="color: #954f72; text-decoration: underline;" target="_blank"&gt;https://communities.cisco.com/docs/DOC-68292&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;I have also configured ISE for the Passive identity service, using direct AD integration with the automatic WMI configuration as outlined here:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/pic_admin_guide/PIC_admin/PIC_admin_chapter_01011.html" style="color: #954f72; text-decoration: underline;" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/pic_admin_guide/PIC_admin/PIC_admin_chapter_01011.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;Besides a few minor issues I had to fix along the way, all appears to be configured as it should and no further errors show up anywhere.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;What I am trying to understand is this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;It seems that in FMC I can only see passive authentications under the Analysis/User Activity whenever an enduser logs into the domain with their AD credentials.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;I tested the same user PC for 802.1x authentication against another ISE instance (which is also integrated with AD in the backend) and was under the impression that I should see those authentications also in the FMC – but that seems not the case.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;Is this normal or am I doing anything wrong here? I have not configured any TrustSec policies at the moment as its used in the integration guide as sample, but I don’t think that’s mandatory for what I am trying to do.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;So my question is – should FMC also see passive authentications from any machine that’s doing 802.1x authentication against AD or is it really just showing a user logging into the domain? I’m not sure if I missed to configure anything or if that’s just how it works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;Any advice would be appreciated&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Arial; color: #000000;"&gt;&lt;SPAN style="font-size: 14pt; font-family: Calibri;"&gt;Thanks&lt;BR /&gt;Thomas&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570438#M557840</guid>
      <dc:creator>tlenzenh</dc:creator>
      <dc:date>2020-02-21T18:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570439#M557841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're actually talking about two different types of authentications.&amp;nbsp; 802.1X is active authentication.&amp;nbsp; Users authenticating against AD is passive authentication.&amp;nbsp; I can't speak to FMC functionality but you should see any authentication ISE (or ISE-PIC for passive) sees in the session directory.&amp;nbsp; You also should not need to configure TrustSec as that is a separate topic in pxGrid.&amp;nbsp; I suggest reaching out to the FMC team to validate what topics it subscribes to in pxGrid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Aug 2017 15:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570439#M557841</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2017-08-07T15:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570440#M557842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim, &lt;/P&gt;&lt;P&gt;thanks for the reply. Yeah you are correct that from the ISE-PIC instance the authentication is seen as passive auth and reported as such in FMC. I guess what I am not clear about is whether 802.1x based authentications against AD (served by another ISE instance, not the ISE-PIC VM instance) is also seen as passive authentication (by the ISE-PIC instance) or if those types of AD authentications will never show up reported anywhere in ISE-PIC or FMC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean if I have an 802.1x authentication via ISE instance A going against AD, I was under the impression that from ISE-PIC instance's perspective it is still a passive auth because its AD reporting the auth to ISE-PIC.&lt;/P&gt;&lt;P&gt;But from what I have seen in FMC, such authentications never show up. We can only see if a user actually logs into the domain with their PC. So ultimately I just want to understand what AD actually reports to ISE-PIC in both cases - is it just user domain logins or also any other form of AD authentication (i.e. coming from other ISE or radius server instances doing 802.1x)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if that was a bit convoluted but I think you get my question.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Aug 2017 00:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570440#M557842</guid>
      <dc:creator>tlenzenh</dc:creator>
      <dc:date>2017-08-08T00:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570441#M557843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I get what you are after now.&amp;nbsp; ISE-PIC is looking for logon events from AD.&amp;nbsp; These are detected via Kerberos SPAN, WMI monitoring or the PIC agent.&amp;nbsp; If it finds them, it will create a session in the directory to then be shared over pxGrid.&amp;nbsp; At one point in my lab, I had a instance of ISE-PIC (2.2) and ISE (2.2).&amp;nbsp; ISE was doing 802.1X authentications against AD.&amp;nbsp; I never saw any 802.1X auths against AD show up as passive session in PIC.&amp;nbsp; There could be a couple reasons for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. The endpoints doing 802.1X were not Windows endpoints&lt;/P&gt;&lt;P&gt;2. The authentication against AD creates a security event in AD that PIC does look for&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The best recommendation I can give you is to test it in a lab environment.&amp;nbsp; Configure PIC to monitor AD using one of the supported probes, then have a windows endpoint participate in 802.1X against that same instance of AD using ISE and see what PIC finds.&amp;nbsp; Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Aug 2017 16:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570441#M557843</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2017-08-08T16:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570442#M557844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim, &lt;/P&gt;&lt;P&gt;thanks for the feedback. In fact I did test this exactly that way in my lab (the 802.1x auth endpoint was a windows 7 machine) and those were my findings, hence why posting the question. Sounds like you had the same experience. I don't know enough about this WMI thing and how the internals of AD and ISE-PIC work but at this stage I can only assume thats how it works and ISE-PIC won't report any of the 802.1x based authentications against AD. Whether thats because AD doesn't report it via WMI in the same way as domain logons or because ISE-PIC doesn't report it - I don't know. &lt;/P&gt;&lt;P&gt;By the way - one thing I was wondering - is there a report or log within ISE-PIC where I can get the passive login info as well or is that passed on to pxGrid and I can only get that info in Stealthwatch or FMC?&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 01:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570442#M557844</guid>
      <dc:creator>tlenzenh</dc:creator>
      <dc:date>2017-08-09T01:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570443#M557845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a report for current active sessions that should give you what you're after.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 15:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570443#M557845</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2017-08-09T15:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570444#M557846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got same question from customers, did you finally get answer? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;DL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Sep 2017 11:38:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570444#M557846</guid>
      <dc:creator>yongwli</dc:creator>
      <dc:date>2017-09-20T11:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570445#M557847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To clarify, you would likely never deploy ISE-PIC and ISE for the same network.&amp;nbsp; ISE includes ALL of the Passive ID functionality in ISE-PIC plus all of the other AAA features (RADIUS/T+ auth), profiling, guest, posture, etc. based on licenses installed.&amp;nbsp; ISE-PIC is positioned for customers that are not yet interested in the larger feature sets and just want Passive ID features.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE-PIC does not provide active authentication of ANY type (MAB, 1X, CWA, etc).&amp;nbsp; Therefore, ISE-PIC will only see authentications learned from EXTERNAL auth sources, not from itself.&amp;nbsp;&amp;nbsp; ISE on the other hand can collect and publish login events over pxGrid for BOTH Passive ID logins (external, passive auth) and RADIUS logins (active auth). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, even if ISE authenticates a user against AD, LDAP, SQL, etc, it is still ISE which is controlling the authentication.&amp;nbsp; This is different from an AD login where the ISE/ISE-PIC server play no part in the auth event itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tim is absolutely correct, but there was confusion on another thread where this post is referenced and I felt this additional clarity was needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers, Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Sep 2017 13:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570445#M557847</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-20T13:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570446#M557848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Sep 2017 16:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/query-on-passive-id-with-fmc-6-2-and-pxgrid-integration-to-ise-2/m-p/3570446#M557848</guid>
      <dc:creator>yongwli</dc:creator>
      <dc:date>2017-09-20T16:54:58Z</dc:date>
    </item>
  </channel>
</rss>

