<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RA VPN (Any connect) password change using ISE and Active Directory in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4303246#M565948</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/338251"&gt;@Philip Badhams&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;yes,&amp;nbsp;&lt;STRONG&gt;ISE&lt;/STRONG&gt; is required to integrated with &lt;STRONG&gt;AD&lt;/STRONG&gt;&amp;nbsp;in &lt;STRONG&gt;External Identity Sources &amp;gt; Active Directory&lt;/STRONG&gt;... on the link that you provided search for &lt;STRONG&gt;Cisco ISE&lt;/STRONG&gt;, take a look at the &lt;U&gt;screenshot&lt;/U&gt; related to &lt;STRONG&gt;RADIUS &amp;gt; Live Logs&lt;/STRONG&gt;, look at the &lt;STRONG&gt;Steps&lt;/STRONG&gt;, &lt;EM&gt;24402 User Authentication against Active Directory succeeded&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps !!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 08 Mar 2021 15:16:46 GMT</pubDate>
    <dc:creator>Marcelo Morais</dc:creator>
    <dc:date>2021-03-08T15:16:46Z</dc:date>
    <item>
      <title>RA VPN (Any connect) password change using ISE and Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4303119#M565939</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I am trying to understand if it is possible to send password expiry notifications / reset password for RA VPN Users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current setup uses 2FA as follows:&lt;/P&gt;&lt;P&gt;1) User connects to FTD Outside Interface&lt;/P&gt;&lt;P&gt;2) The FTD passes the request via RADIUS to ISE&lt;/P&gt;&lt;P&gt;3) ISE, (which is integrated into Active Directry) queries the account via LDAP&lt;/P&gt;&lt;P&gt;4) ISE returns the result to the FTD&lt;/P&gt;&lt;P&gt;5) The FTD connects to the 2FA server and prompt the user for a token code.&lt;/P&gt;&lt;P&gt;6) The user is granted access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My thinking is is not currently possible in the above setup as the FTD / FMC, does not talk directly to AD, instead it communicates via ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been trying to follow the below configuration to test the theory&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/213905-configure-anyconnect-vpn-on-ftd-using-ci.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/213905-configure-anyconnect-vpn-on-ftd-using-ci.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I cannot tell from the above guide is wether or not the ISE is required to integrate with Active Directory (as an external identity source) for it to work? The guide only shows setting up the realm in the FMC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any clarification would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 12:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4303119#M565939</guid>
      <dc:creator>Philip Badhams</dc:creator>
      <dc:date>2021-03-08T12:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: RA VPN (Any connect) password change using ISE and Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4303246#M565948</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/338251"&gt;@Philip Badhams&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;yes,&amp;nbsp;&lt;STRONG&gt;ISE&lt;/STRONG&gt; is required to integrated with &lt;STRONG&gt;AD&lt;/STRONG&gt;&amp;nbsp;in &lt;STRONG&gt;External Identity Sources &amp;gt; Active Directory&lt;/STRONG&gt;... on the link that you provided search for &lt;STRONG&gt;Cisco ISE&lt;/STRONG&gt;, take a look at the &lt;U&gt;screenshot&lt;/U&gt; related to &lt;STRONG&gt;RADIUS &amp;gt; Live Logs&lt;/STRONG&gt;, look at the &lt;STRONG&gt;Steps&lt;/STRONG&gt;, &lt;EM&gt;24402 User Authentication against Active Directory succeeded&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps !!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 15:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4303246#M565948</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-03-08T15:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: RA VPN (Any connect) password change using ISE and Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4307438#M566143</link>
      <description>&lt;P&gt;Is there a reason why both FMC and ISE need to be connected to AD in the scenario? I cannot see where the FMC talks directly to AD. All the authentication requests appear to go from the FMC to ISE and then to AD.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 11:54:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4307438#M566143</guid>
      <dc:creator>Philip Badhams</dc:creator>
      <dc:date>2021-03-15T11:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: RA VPN (Any connect) password change using ISE and Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4308610#M566200</link>
      <description>&lt;P&gt;&lt;A id="link_28" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/338251" target="_self"&gt;&lt;SPAN class=""&gt;Philip Badhams&lt;/SPAN&gt;&lt;/A&gt;, I've not used FMC/FTD for RA-VPN yet but I believe it not required to integrate with AD if you are not using any objects from AD in the policies in FMC.&lt;/P&gt;
&lt;P&gt;If you want to support password changes for AD users, then the VPN head-end needs using MSCHAPv2 to connect to ISE.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 03:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ra-vpn-any-connect-password-change-using-ise-and-active/m-p/4308610#M566200</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-03-17T03:11:46Z</dc:date>
    </item>
  </channel>
</rss>

