<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Authentication using Certificates Only, with ISE Posturing in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109319#M561412</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to setup a remote VPN solution using Anyconnect 4.8 with ISE for Posturing Only...we do not want ISE to authenticate the connection, just to run a Posture scan on the client and allow/reject based on a posturing policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We will be using “User” certificate authentication to Cisco ASA only. We do not want the client to prompt for username/password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once authenticated to the ASA, we need ISE to run a posture scan, basic requirements for now, we are just checking to see if a file exists on C drive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Steps Taken:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we use “certificate” &amp;amp; “aaa” in the Tunnel-group configuration on the ASA, we are prompted for a username/password, and this works without any issues authenticating firstly against the CA certificate on the ASA, and then with username/password against a local account in ISE - so works, but we don't want 2FA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we use “certificate” only authentication and send through the "username-from-certificate", then a user must be configured in ISE's local identity store for posturing to work. If a user is NOT present locally in ISE, then the posture assessment goes straight to “Compliant” – even though the machine is not in a compliant state (missing file on C drive)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under the Authentication Policy in ISE, we have Use “Internal Users”, “If Auth Fail” set to continue, and “If user not found” set to Reject, however the connection is still allowed even if the user is not found, yet posturing does not take place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Authorization policy only has two outcomes, posture-status "Compliant" or "not-Compliant".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In monitoring it goes directly to "compliant" but the posture scan never takes place. To the end user it shows the system as compliant and network access is allowed, when in reality, CoA never happened, so the full access dACL never gets applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone please advise if this is a supported configuration, and if so advise on the configuration steps required for this to work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried searching the forums and found similar issues, but not exactly how I need it to work as above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jun 2020 14:01:38 GMT</pubDate>
    <dc:creator>marc.walker</dc:creator>
    <dc:date>2020-06-25T14:01:38Z</dc:date>
    <item>
      <title>VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109319#M561412</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to setup a remote VPN solution using Anyconnect 4.8 with ISE for Posturing Only...we do not want ISE to authenticate the connection, just to run a Posture scan on the client and allow/reject based on a posturing policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We will be using “User” certificate authentication to Cisco ASA only. We do not want the client to prompt for username/password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once authenticated to the ASA, we need ISE to run a posture scan, basic requirements for now, we are just checking to see if a file exists on C drive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Steps Taken:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we use “certificate” &amp;amp; “aaa” in the Tunnel-group configuration on the ASA, we are prompted for a username/password, and this works without any issues authenticating firstly against the CA certificate on the ASA, and then with username/password against a local account in ISE - so works, but we don't want 2FA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we use “certificate” only authentication and send through the "username-from-certificate", then a user must be configured in ISE's local identity store for posturing to work. If a user is NOT present locally in ISE, then the posture assessment goes straight to “Compliant” – even though the machine is not in a compliant state (missing file on C drive)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under the Authentication Policy in ISE, we have Use “Internal Users”, “If Auth Fail” set to continue, and “If user not found” set to Reject, however the connection is still allowed even if the user is not found, yet posturing does not take place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Authorization policy only has two outcomes, posture-status "Compliant" or "not-Compliant".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In monitoring it goes directly to "compliant" but the posture scan never takes place. To the end user it shows the system as compliant and network access is allowed, when in reality, CoA never happened, so the full access dACL never gets applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone please advise if this is a supported configuration, and if so advise on the configuration steps required for this to work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried searching the forums and found similar issues, but not exactly how I need it to work as above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 14:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109319#M561412</guid>
      <dc:creator>marc.walker</dc:creator>
      <dc:date>2020-06-25T14:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109346#M561413</link>
      <description>&lt;P&gt;Can anyone please advise if this is a supported configuration, and if so advise on the configuration steps required for this to work?&lt;BR /&gt;-You can absolutely accomplish what you want to do. I currently have a customer that does CAC auth against the ASAs, and relies only on ISE/AD for authorization and ISE posturing. In the connection profile we set it up to extract certificate UPN to pass that to ISE that is then mapped to AD sec groups. I think the tricky part for your config will be mapping the users to internal ISE accounts. Any chance you have the ability to integrate with AD? Also, there should be three states: Unknown, Compliant, or Non-Compliant. The "unknown" state is where you would setup ISE portal redirection to begin the client provisioning/posture assessment which then authorizes the client to the respective network based on Compliant or Non-compliant result, which then throws a new dacl to the ASA/user session. I would recommend looking at these two sources as they have helped me in the past on this topic and they should give you a better understanding of the overall process: &lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-documents/ise-posture-prescriptive-deployment-guide/ta-p/3680273&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://labminutes.com/video/sec" target="_blank" rel="noopener"&gt;http://labminutes.com/video/sec&lt;/A&gt;&lt;BR /&gt;Good luck &amp;amp; HTH!&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 14:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109346#M561413</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-06-25T14:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109742#M561418</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the certificate mapping working. However the username UPN needs to be configured as a local account in ISE, if the account is not there, or there is a typo, then posturing never kicks in and the end user Anyconnect client goes straight to "Compliant", which actually is not true as the scan never takes place. From ISE side it also shows the session as compliant, but never actually did any scanning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the username is configured in ISE correctly, then everything works OK. When I connect I get the popup "System Scan" window telling me action is required (attached). Unfortunately we have no option to integrate into AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="system scan.jpg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77732i39319D2762CAB7FA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="system scan.jpg" alt="system scan.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the problem I have is that ISE does not take any notice of the Authentication step "If User not found" = Reject, and for some reason thinks the default session PostureStatus is "Compliant" - when in reality it never performed a scan to find out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="authentication policy.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77729iD463C07D7A81D56D/image-size/large?v=v2&amp;amp;px=999" role="button" title="authentication policy.jpg" alt="authentication policy.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="authorisation policy.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77730i1D332629572D5F75/image-size/large?v=v2&amp;amp;px=999" role="button" title="authorisation policy.jpg" alt="authorisation policy.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attached a few screenshots of my authentication and authorization policies. As you can see its pretty basic. We either want the client to be compliant (after doing a scan), or we want to reject the connection completely. We do not have any need for remediation or client provisioning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate any help you can give.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 08:51:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109742#M561418</guid>
      <dc:creator>marc.walker</dc:creator>
      <dc:date>2020-06-26T08:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109869#M561432</link>
      <description>So the problem I have is that ISE does not take any notice of the Authentication step "If User not found" = Reject, and for some reason thinks the default session PostureStatus is "Compliant" - when in reality it never performed a scan to find out.&lt;BR /&gt;-Flip 'If Auth Fail' to Reject.  This should fix that problem.  Take a peek at this guide as it will assist you further: &lt;A href="https://community.cisco.com/t5/security-documents/ise-authentication-and-authorization-policy-reference/ta-p/3850472" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-authentication-and-authorization-policy-reference/ta-p/3850472&lt;/A&gt;&lt;BR /&gt;Lastly, if you use labminutes and the posture guide it will assist you with properly deploying this solution.  HTH!</description>
      <pubDate>Fri, 26 Jun 2020 12:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4109869#M561432</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-06-26T12:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110775#M561456</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry this does not resolve the problem. Flipping "If Auth Fail" to Reject just rejects the whole session, as expected, as no password information is being sent in the Radius request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have looked at the Labminutes guides, as with many other guides. None of them relate to what I am trying to achieve. My problem is not that I cant get posturing to work using normal username/password or 2FA... my problem is that I only need ISE to do posturing, not Authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication is being done on the ASA using certificates. I just need ISE to Authorize the session based on "Compliant" or "Non-Compliant" - so far the scanning process only starts "IF" I have a user configured locally in ISE that matches the UPN sent from the certificate. If the user is not found, the end client does NOT do a posture scan, and the client moves to showing a green tick and the words "Compliant" - this is not true.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2020 11:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110775#M561456</guid>
      <dc:creator>marc.walker</dc:creator>
      <dc:date>2020-06-29T11:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110789#M561457</link>
      <description>&lt;P&gt;You can rely on ISE for authorization and posture assessment only. In the connection profile set the authentication method to certificate only. Then under Advanced-&amp;gt;Auhtorization specify the authz server group (ISE), check the user must exist in DB, and properly configure username mapping from certificate. In this configuration the UPN will get stripped from Cert after CAC auth against ASA, passed to ISE for authz only, and your detailed radius live log for each session will depict authorize only.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="authz_asa_conn.PNG" style="width: 326px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77863i9149288D20DC3E7C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="authz_asa_conn.PNG" alt="authz_asa_conn.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2020 12:56:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110789#M561457</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-06-29T12:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110793#M561458</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/198944"&gt;@marc.walker&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've not tried this scenario, but what about configuring ASA aaa for "authorize-only", so authentication is skipped in ISE.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/aaa-radius.html" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/aaa-radius.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2020 12:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110793#M561458</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-06-29T12:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110843#M561460</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have already tried this, it doesn't work. Its how I currently have everything configured now:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group GROUP2 type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group GROUP2general-attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;authorization-server-group ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;authorization-required &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; This is the tick box in your ASDM screenshot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I use "authorize-only" under the aaa-server then its the same result, goes straight to "Compliant" but never performed a scan. Live logs shows the Posture Status as "Compliant", when truth is its not.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2020 14:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110843#M561460</guid>
      <dc:creator>marc.walker</dc:creator>
      <dc:date>2020-06-29T14:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110845#M561461</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you, but this doesn't work either. It gives the same result in that the client never performs a Posture scan and ends up going straight to a "Compliant" state, even though the file on C drive is missing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2020 14:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110845#M561461</guid>
      <dc:creator>marc.walker</dc:creator>
      <dc:date>2020-06-29T14:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110869#M561462</link>
      <description>&lt;P&gt;This is because your ISE authz policies are not properly setup (shown/determined from post above). We also cannot see your CPP policies. That ASA config will work to accomplish what you need from an ISE authz only and posture functionality perspective. I now recommend working on ensuring you have properly configured the ISE portion of the solution via the guides shared. Posture status can have three results (unknown, compliant, non-compliant). At the start, Unknown is first &amp;amp; should be where you redirect users, and begin the posture assessment. You need an authz policy to support this, which would reference the following condition:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="vpn_unknown.PNG" style="width: 375px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77877i40136C7D82DF8DEF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vpn_unknown.PNG" alt="vpn_unknown.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Then the authz profile that gets assigned to this policy should have your web redirect setup to steer client to proper CPP and assign redirect acl to session.&amp;nbsp; Then once client goes through posture assessment and ISE deems client as (non-compliant or compliant) the session status changes and grants respective network access.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I strongly suggest watching videos on labminutes as it will assist you with the ISE config.&amp;nbsp; HTH!&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2020 14:58:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4110869#M561462</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-06-29T14:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Authentication using Certificates Only, with ISE Posturing</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4111307#M561475</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Success!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Separated the Authz policy as per below and sent the Unknown and Non-compliant to a blank Authorization Profile.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Auth Policy.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77964iED0D1D3FC5BEED0E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Auth Policy.png" alt="Auth Policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Shown below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Auth Profile.png" style="width: 555px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77965i424CC536A5A28C55/image-size/large?v=v2&amp;amp;px=999" role="button" title="Auth Profile.png" alt="Auth Profile.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Strangely, this has also now kicked in the "If User not Found" to work as expected too. I get the expected error below as soon as I hit Connect, when a user has not been configured locally:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="auth failed error.png" style="width: 220px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77967i5902DD39A5921B29/image-size/large?v=v2&amp;amp;px=999" role="button" title="auth failed error.png" alt="auth failed error.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like I said, I have watched the videos and gone through all configuration steps that would be aligned with a standard setup. I think I was more focused on why a username matching locally the Posture scanning starts, and when not, it doesn't. It also doesn't explain why in Live logs the connection is seen as "Compliant" - when a scan never took place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Separating the Authz policy was the missing link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help, its much appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 11:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-using-certificates-only-with-ise-posturing/m-p/4111307#M561475</guid>
      <dc:creator>marc.walker</dc:creator>
      <dc:date>2020-06-30T11:30:49Z</dc:date>
    </item>
  </channel>
</rss>

