<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [ISE and anyconnect] ISE version and MFA with ipsec anyconnect tunnels and firepower in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4034553#M558272</link>
    <description>&lt;P&gt;Thank you Greg and hslai (and sorry for my late response).&lt;/P&gt;&lt;P&gt;Ok for ISE version 2.6.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For second user authentication, I would like to try avoid the use of a proxy between ISE and external authentication source.&lt;/P&gt;&lt;P&gt;Our cloud provider allows radius or https requests to get push mobile. Proxy radius is used to encapsulate radius request in https flow (more reliable than direct radius request on Internet). That's why I think to SAML.&lt;/P&gt;&lt;P&gt;But according to your answers, I need a proxy.&lt;/P&gt;&lt;P&gt;I am still not familiar with ISE authentications mechanisms.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Feb 2020 09:29:53 GMT</pubDate>
    <dc:creator>Kris Tof</dc:creator>
    <dc:date>2020-02-24T09:29:53Z</dc:date>
    <item>
      <title>[ISE and anyconnect] ISE version and MFA with ipsec anyconnect tunnels and firepower</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4029881#M453880</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;I plan to deploy an architecture as follow :&lt;BR /&gt;Anyconnect client&amp;lt;====IPSEC tunnel====&amp;gt; firepower with ASDM&amp;lt;=&amp;gt; ISE + external authentication provider&lt;BR /&gt;I am relatively new on ISE and I am trying to understand all interactions between components.&lt;/P&gt;&lt;P&gt;The solution should handle theses multiple authentications :&lt;BR /&gt;- machine certificate&lt;BR /&gt;- user certificate or credential&lt;BR /&gt;- external identity provider for second user authentication (ex: OTP)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;1)My first (pre)question is about ISE version. Which is the recommended version to deploy for a fresh new install ?&lt;BR /&gt;Version 2.7 has been released since Q4 2019. There are a lot of changes and specially&amp;nbsp; MnT database optimizations. But this version is relatively new.&lt;/P&gt;&lt;P&gt;2) Regarding authentication, I understand that machine certificate is normally used for tunnel establishment. The Firepower then forwards user authentication to ISE. ISE can contact an AD&amp;nbsp; or Radius for first user authentication.&lt;BR /&gt;I look at the use case &lt;A href="https://duo.com/docs/cisco-ipsec" target="_self"&gt;IPSEC with duo.&lt;/A&gt; A DUO (or another identity provider) authentication proxy seems mandatory to handle second authentication. Regarding ISE capabilities, I would like to not use an authentication proxy for second authentication.&lt;/P&gt;&lt;P&gt;I have seen in ISE 2.6 admin guide that we can define an SAML IdP as external&amp;nbsp; identity source.&lt;BR /&gt;Does ISE can handle SAML requests for second authentication in a use case with anyconnect client IPSEC tunnel and firepower as IPSEC termination ?&lt;BR /&gt;And if so, could you describe the authentications steps ? (user portal needed? which component asks external IdP? (firepower, ise,..?)&lt;/P&gt;&lt;P&gt;K.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2020 16:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4029881#M453880</guid>
      <dc:creator>Kris Tof</dc:creator>
      <dc:date>2020-02-14T16:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: [ISE and anyconnect] ISE version and MFA with ipsec anyconnect tunnels and firepower</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4030636#M453882</link>
      <description>&lt;P&gt;1. ISE 2.6 is currently the Cisco Suggested release based on software quality, stability and longevity. ISE 2.7 would only be recommended if you require a new feature implemented in that version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. As noted in the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/b_ise_admin_guide_26/b_ise_admin_guide_26_chapter_01110.html?bookSearch=true#concept_6878301F1F7C460585A4A267ECF77723" target="_self"&gt;ISE Admin Guide&lt;/A&gt;, SAML IdP is only supported for portal-based authentication for the following ISE Portals:&lt;/P&gt;
&lt;UL id="concept_6878301F1F7C460585A4A267ECF77723__ul_fr5_5kh_zdb" class="ul"&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_839ADA4C83C1468AAF109B6F7866DC88" class="li"&gt;
&lt;P class="p"&gt;Guest portal (sponsored and self-registered)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_42F92355DB5E4A50A16D038A9ECEF4D7" class="li"&gt;
&lt;P class="p"&gt;Sponsor portal&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_E91BD286F67E4ADEA1D0DD57BA31129E" class="li"&gt;
&lt;P class="p"&gt;My Devices portal&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_2AD664BB37B847D7AFB479EB1A50090A" class="li"&gt;
&lt;P class="p"&gt;Certificate Provisioning portal&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Greg&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2020 03:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4030636#M453882</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-02-17T03:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: [ISE and anyconnect] ISE version and MFA with ipsec anyconnect tunnels and firepower</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4033475#M558202</link>
      <description>&lt;P&gt;Adding to Greg's...&lt;/P&gt;
&lt;P&gt;Duo is mainly cloud-based so auth proxy required to get OTP authenticated. Thus, you may opt for an on-prem OTP provider, instead.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 04:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4033475#M558202</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-02-21T04:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: [ISE and anyconnect] ISE version and MFA with ipsec anyconnect tunnels and firepower</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4034553#M558272</link>
      <description>&lt;P&gt;Thank you Greg and hslai (and sorry for my late response).&lt;/P&gt;&lt;P&gt;Ok for ISE version 2.6.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For second user authentication, I would like to try avoid the use of a proxy between ISE and external authentication source.&lt;/P&gt;&lt;P&gt;Our cloud provider allows radius or https requests to get push mobile. Proxy radius is used to encapsulate radius request in https flow (more reliable than direct radius request on Internet). That's why I think to SAML.&lt;/P&gt;&lt;P&gt;But according to your answers, I need a proxy.&lt;/P&gt;&lt;P&gt;I am still not familiar with ISE authentications mechanisms.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 09:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-anyconnect-ise-version-and-mfa-with-ipsec-anyconnect/m-p/4034553#M558272</guid>
      <dc:creator>Kris Tof</dc:creator>
      <dc:date>2020-02-24T09:29:53Z</dc:date>
    </item>
  </channel>
</rss>

