<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I try to use AnyConnect as in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090174#M560587</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using anyconnect client 4.7 without NAM and posture is working fine.&amp;nbsp;&lt;BR /&gt;you can also install NAM if you want and you can allow/deny network settings in profile. It’s easy.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;let me know if you need any help.&lt;/P&gt;</description>
    <pubDate>Thu, 21 May 2020 17:57:58 GMT</pubDate>
    <dc:creator>MALi-786</dc:creator>
    <dc:date>2020-05-21T17:57:58Z</dc:date>
    <item>
      <title>Anyconnect NAM vs windows native client</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811696#M41248</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I would like to get your expert opinion on anyconnect NAM vs windows native client&lt;/P&gt;
&lt;P&gt;We are planning to deploy CISCO ISE with anyconnect NAM as the supplicant. Proposed method of authentication is EAP-FAST with both machine and user authentication. A custom ACL will be applied to each port after successful authentication.&lt;/P&gt;
&lt;P&gt;However there is another option which seems to be much simpler than the above, which is to use the windows native supplicant. I understand that windows client does not have same features as anyconnect but following is what I am planning to configure.&lt;/P&gt;
&lt;P&gt;• Use the windows client to authenticate only the machine using EAP-TLS&lt;BR /&gt;(Each windows machine has a certificate issued by internal CA)&lt;BR /&gt;• Offload the user authentication to the next generation firewall that we already have&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Offloading user access control to firewall is much more secure as the switch is not a proper security device. Also, I notice that its much more easier to get the native client working than the anyconnect.&lt;BR /&gt;It may be due to native client and the OS understand each other well.&lt;/P&gt;
&lt;P&gt;However one of my concerns is that CISCO strongly recommends to use the anyconnect client due its rich feature set and convenience in troubleshooting. But in our network, we dont really need the features like EAP-chaining, MACsec.&lt;/P&gt;
&lt;P&gt;What are your thoughts on this? &lt;BR /&gt;I am interested to know about the native client behavior in production networks ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811696#M41248</guid>
      <dc:creator>wkw.domain1</dc:creator>
      <dc:date>2019-03-11T06:20:36Z</dc:date>
    </item>
    <item>
      <title>I have done many ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811697#M41249</link>
      <description>&lt;P&gt;I have done many ISE deployments and designs and only a handful of them used the AnyConnect NAM over the native supplicant. Here are the issues with it:&lt;/P&gt;
&lt;P&gt;1. It is one more piece of software that you need push and keep updated to your workforce machines&lt;/P&gt;
&lt;P&gt;2. Bugs. I have seen a fair share of bugs related to the supplicant causing issues&lt;/P&gt;
&lt;P&gt;3. Cost. With AnyConnect 4 the cost of the client is no longer free&lt;/P&gt;
&lt;P&gt;4. The client is not available for OSX (Not-Cisco's fault but still something to keep in mind)&lt;/P&gt;
&lt;P&gt;With that being said, if you do want to use EAP-TEAP aka EAP-Chaining then the only option that you have is to use the AnyConnect supplicant.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2015 22:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811697#M41249</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-12-23T22:31:47Z</dc:date>
    </item>
    <item>
      <title>I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811698#M41250</link>
      <description>&lt;P&gt;I try to use AnyConnect as the supplicant more often than not with my ISE deployments.&lt;/P&gt;
&lt;P&gt;Besides the supplicant functionality (Network Access Module) that allows for EAP chaining, it also enforces that a client must be exclusively connected to a single network. It requires a client use one of the configured networks if it is available. Overall it lets you lock down things a bit more. Yes there are other ways to do all of that; but you're more on your own if you want to roll that way.&lt;/P&gt;
&lt;P&gt;Enforcing policy on your firewall is fine for as far as it goes but what about policy within your network? Having the user identity of the current session enables a lot more granularity and dynamic authorization. It also opens the door for you to be able to do things like Trustsec Security Group Tags (SGTs).&lt;/P&gt;
&lt;P&gt;And then there's the ISE Posture Module... (and the brand new Network Visibility Module)&lt;/P&gt;</description>
      <pubDate>Thu, 24 Dec 2015 16:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811698#M41250</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-24T16:45:36Z</dc:date>
    </item>
    <item>
      <title>Hi Neno and Marvin,</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811699#M41251</link>
      <description>&lt;P&gt;Hi Neno and Marvin,&lt;/P&gt;
&lt;P&gt;Thanks both for your informative responses. Really appreciate it.&lt;/P&gt;
&lt;P&gt;Few reasons I am inclined towards the windows client are;&lt;BR /&gt;• We don’t really need EAP-chaining in our environment&lt;BR /&gt;Because we’ve got a Next Gen firewall with User-ID enabled which inspects the traffic within the corporate network as well. So the firewall will restrict access from client to server based on user ID if required.&lt;BR /&gt;• Frequent drive mapping errors at logon&lt;BR /&gt;We noticed that windows is unable to connect to network drives at the the logon (shows the pop up message “could not connect to all the drives”). This was not observed with with the native client at all. I think the reason is that the native client is tightly integrated with the OS so windows know exactly when to connect network drives. However this could be a timing thing in anyconnect&lt;BR /&gt;• Issues with remote desktop access when user authentication is enabled&lt;BR /&gt;• Having to spend time on routine version updates&lt;/P&gt;
&lt;P&gt;Marvin,&lt;BR /&gt;One thing I am not clear is your remark about enforcing the client to be connected to a single network. Can you please clarify this and provide any reference documents ?&lt;/P&gt;
&lt;P&gt;Once again thanks for your valuable feedback.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 00:31:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811699#M41251</guid>
      <dc:creator>wkw.domain1</dc:creator>
      <dc:date>2015-12-30T00:31:35Z</dc:date>
    </item>
    <item>
      <title>Clarifying as you requested:</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811700#M41252</link>
      <description>&lt;P&gt;Clarifying as you requested:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;"&lt;SPAN&gt;Network Access Manager overrides Windows network management. Therefore, after installing the Network Access Manager, you cannot use the network status icon to connect to networks&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;(&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect42/b_AnyConnect_Administrator_Guide_4-2/configure_nam.html"&gt;source&lt;/A&gt;)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;"The AnyConnect Network Access Manager provides superior connectivity features. Administrators can control which networks or resources that endpoints can connect to."&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;(&lt;A href="http://www.cisco.com/c/dam/en/us/products/collateral/security/anyconnect-secure-mobility-client/at_a_glance_c45-578609.pdf"&gt;source&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 00:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811700#M41252</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-30T00:48:32Z</dc:date>
    </item>
    <item>
      <title>The Cisco NAM Supplicant /</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811701#M41253</link>
      <description>&lt;P&gt;The Cisco NAM Supplicant / Posture module is for machines that do not use any other types of CND suites. We found that ActivClient 6.2 and 7 interferes with the NAM client when using EAP-TLS CAC authentication. No Certificate Error Can be reproduced. Also, NAM client does not like multiple CAC readers with CAC's in the reader.&amp;nbsp;My vote - EAP-Chaining is nice...but use the Windows supplicant when possible if you are running CND suites like McAfee HIPS/VSE and ActivClient.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just remember to lookout for Windows patches breaking DOT1x.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 19:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/2811701#M41253</guid>
      <dc:creator>netwerk</dc:creator>
      <dc:date>2016-03-09T19:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4062659#M559503</link>
      <description>&lt;P&gt;Sorry to reply in an old post but this topic seems relevant today.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you think the situation is still the same in 2020 regarding the benefits of Anyconnect NAM vs windows native supplicant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am doing a small deployment and probably will use the native supplicant as anyconnect NAM requires licensing from what I read.&amp;nbsp; However I am wondering regarding ISE posture -&amp;nbsp; is the NAM module required for Posture? Also if I want to do 802.1x machine authentication for users connecting via anyconnect is it possible to be done with the windows native supplicant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 11:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4062659#M559503</guid>
      <dc:creator>kaizen</dc:creator>
      <dc:date>2020-04-09T11:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4062841#M559505</link>
      <description>&lt;P&gt;ISE Posture doesn't require NAM.&lt;/P&gt;
&lt;P&gt;You can use the native supplicant for machine certificate authentication. Also for user authentication (certificate or username). You just cannot do both at once, AKA EAP-chaining (currently - Microsoft is supposed to be releasing EAP-TEAP support soon). So you have to trust one or the other for a given authentication session.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 15:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4062841#M559505</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-04-09T15:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090133#M560585</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding your statement "&lt;SPAN&gt;ISE Posture doesn't require NAM." do you happen to have any official link or document to refer to this ?? i actually need to show it to higher management in my company as final decision on either to install NAM or go with windows native client, will be theirs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;also once we install NAM , there is no way to stop it from controlling windows network manager ?? or can this be achieved with tweaking windows registry&amp;nbsp;??&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Your prompt response will be highly appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 17:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090133#M560585</guid>
      <dc:creator>MohammadQasimMurad56785</dc:creator>
      <dc:date>2020-05-21T17:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090174#M560587</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using anyconnect client 4.7 without NAM and posture is working fine.&amp;nbsp;&lt;BR /&gt;you can also install NAM if you want and you can allow/deny network settings in profile. It’s easy.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;let me know if you need any help.&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 17:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090174#M560587</guid>
      <dc:creator>MALi-786</dc:creator>
      <dc:date>2020-05-21T17:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090202#M560588</link>
      <description>Hi, some of our end users will not be using Anyconnect VPN , so will need to push only NAM for them,which is not the ideal case, so it is certain that we can use posture assessment without NAM ?</description>
      <pubDate>Thu, 21 May 2020 18:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090202#M560588</guid>
      <dc:creator>MohammadQasimMurad56785</dc:creator>
      <dc:date>2020-05-21T18:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090305#M560593</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you don’t want to use anyconnect nor NAM so I don’t think posture will work anyway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think for such cases you can use machine and user authentication only.&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 20:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090305#M560593</guid>
      <dc:creator>MALi-786</dc:creator>
      <dc:date>2020-05-21T20:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090372#M560600</link>
      <description>without NAM, it will be user OR machine authentication ? right ?&lt;BR /&gt;user AND machine authentication will require NAM ??</description>
      <pubDate>Thu, 21 May 2020 21:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090372#M560600</guid>
      <dc:creator>MohammadQasimMurad56785</dc:creator>
      <dc:date>2020-05-21T21:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090403#M560603</link>
      <description>For now, ISE 2.7 introduces the support for EAP-TEAP, and Microsoft will introduce public windows 10 support for EAP-TEAP at the end of this month (expected 2xxx update release). EAP-TEAP supports both user + machine auth in the same way NAM has until now with EAP chaining functionality.  &lt;BR /&gt;&lt;BR /&gt;But back to the question you had here, posture without AnyConnect and NAM is possible. But the posture module is the most robust solution we have. &lt;BR /&gt;This document outlines the ISE posture types, agent and agentless. &lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/b_ise_admin_guide_26/b_ise_admin_guide_26_chapter_010110.html#Posture_Types" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/b_ise_admin_guide_26/b_ise_admin_guide_26_chapter_010110.html#Posture_Types&lt;/A&gt;</description>
      <pubDate>Thu, 21 May 2020 23:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090403#M560603</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-05-21T23:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090604#M560617</link>
      <description>&lt;P&gt;As noted in the link that &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt; provided, the temporal agent is available for ISE Posture checking and enforcement without requiring NAM. It's not as full-featured; but it does work fine within the parameters it supports.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 10:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4090604#M560617</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-22T10:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect NAM vs windows native client</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4124794#M561909</link>
      <description>&lt;P&gt;IMO AnyConnect is the better option of the two.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Disadvantage of AnyConnect NAM pushing out the software and maintaining the configuration.xml files is a big knowledge curve for the entire IT from SCCM admins to Service Desk. There can be extreme one off in random issues if AnyConnect was installed while Antivirus/malware services are running. However BP says to have AV/AM turned off. I typically have to make 2 registry edits to have RDP behave the same prior to AnyConnect. You cannot use the native windows network which is usually a common issues with users, but there is a 3rd registry edit you can do to hide this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Disadvantages of win10 native suppliant machine authentication does not provide the security requirements due to the fact it only happens when a user is not logged into the machine. Most users, more so for desktops, do not log off/restart their machines at the end of the day. For laptops when going from Wired to Wireless or vice versa Single Sign on does not work. Microsoft breaks this way more than cisco breaks AnyConnect. Also Microsoft introduces more vulnerabilities requiring patching than Cisco AC NAM which leads to the reason they break this more. No fault to Microsoft because they are dealing with an entire OS while Cisco AC NAM is just an application doing a specific job. There are more one off issues that arise due to certain models coupled with patches. You are limited to what authentication frameworks you can use. It requires you to configure the Wired and Wireless separately.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benefits of Windows 10 native supplicant are that it's easier to convince a customer to go this route. You do not have to install an application. Lastly users are more familiar with it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benefits of AC NAM added security through the use of corporate wireless. You can configured both wired and wireless settings through one configuration.xml file. Eap chaining is the only true user and machine auth out there where machine auth happens every time. Single-sign on works perfectly from wired to wireless. You can control what format the username and hostname comes in as. With DART installed you have all the Shoot files you'll ever need to diagnose a problem. Though the use of configuration.xml files you maintain a change version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Small AC NAM benefits are you can order all your wireless networks in terms of preference, you can update the settings without having to forget the network or fail a login. It displays your IP address on the NAM window which is great for service desk when working with a user. Lastly NAM has logs in its settings that are great for basic troubleshooting. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2020 07:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4124794#M561909</guid>
      <dc:creator>BrianODonnell35525</dc:creator>
      <dc:date>2020-07-24T07:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: I try to use AnyConnect as</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4125893#M561937</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/467745"&gt;@kaizen&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;...However I am wondering regarding ISE posture -&amp;nbsp; is the NAM module required for Posture? Also if I want to do 802.1x machine authentication for users connecting via anyconnect is it possible to be done with the windows native supplicant?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Here actually what I meant is if it is possible to do machine authentication (by checking membership of the AD domain) with the Posture module when connecting with Anyconnect VPN. Apparently at the moment it is not possible. I found a forum thread for a registry check but it seems not very secure. I suppose if a machine authentication is required Anyconnect vpn with certificate authentication is the right option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 07:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4125893#M561937</guid>
      <dc:creator>kaizen</dc:creator>
      <dc:date>2020-07-27T07:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect NAM vs windows native client</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4693429#M577382</link>
      <description>&lt;P&gt;You can automate the config.xml files distribution and anyconnect updates from the ASA. Also integrate windows radius server with the ASA to automate and link everything.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 03:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/4693429#M577382</guid>
      <dc:creator>paul_dmitri</dc:creator>
      <dc:date>2022-09-26T03:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect NAM vs windows native client</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/5143819#M590580</link>
      <description>&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;SPAN class="jCAhz JxVs2d ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;In this material there is a simple comparison, but it can help to understand the main differences.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz JxVs2d ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;But recently, with the improvement of OSs, there are few differences.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/BRKSEC-2430.pdf" target="_blank"&gt;https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/BRKSEC-2430.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2024/pdf/BRKSEC-2660.pdf" target="_blank"&gt;https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2024/pdf/BRKSEC-2660.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 20:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-nam-vs-windows-native-client/m-p/5143819#M590580</guid>
      <dc:creator>felipe.bsilva</dc:creator>
      <dc:date>2024-07-11T20:51:36Z</dc:date>
    </item>
  </channel>
</rss>

