<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LogOn Event for VPN Users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/logon-event-for-vpn-users/m-p/4440554#M568758</link>
    <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I looked at this tube you shared&amp;nbsp; ( ISE Configuration for VPN ) , here radius authentication is with ISE but in my scenario it is not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in my scenario , FMC is managing firewall where I am thinking to implement ISE as Passive Identity Solution , when ASA is doing radius authentication from another radius server not the ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hence was asking If I can use ISE/ISE-PIC for my below issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"normally use AD based rule in Firewall Rule , but for VPN Users not able to use any Firewall Rule using AD Group. This does not seem like work. And I use User Agent in FMC to get the IP to Username Mapping Info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is , if use ISE instead of "User Agent" does this behavior will change for VPN user ?&amp;nbsp; Will I be able to use AD Based Rule in FMC if I use ISE as Passive Identity Solution for VPN Subnet&amp;nbsp; ?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jul 2021 17:43:10 GMT</pubDate>
    <dc:creator>MSJ1</dc:creator>
    <dc:date>2021-07-28T17:43:10Z</dc:date>
    <item>
      <title>LogOn Event for VPN Users</title>
      <link>https://community.cisco.com/t5/network-access-control/logon-event-for-vpn-users/m-p/4439213#M568720</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I knew that when a Cisco AnyConnect VPN user connects , for that user there is no VPN Logon Event is created in AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I normally use AD based rule in Firewall Rule , but for VPN Users not able to use any Firewall Rule using AD Group. This does not seem like work. And I use User Agent in FMC to get the IP to Username Mapping Info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is , if use ISE instead of "User Agent" does this behavior will change for VPN user&amp;nbsp; ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking to know some user experience , who is aware of this problem and resolved the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any reference documentation, for this issue will be much appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 01:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logon-event-for-vpn-users/m-p/4439213#M568720</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2021-07-27T01:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: LogOn Event for VPN Users</title>
      <link>https://community.cisco.com/t5/network-access-control/logon-event-for-vpn-users/m-p/4439318#M568721</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1146335"&gt;@MSJ1&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;please take a look at: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/ise_active_directory_integration/b_ISE_AD_integration_2x.html" target="_blank" rel="noopener"&gt;AD Integration with Cisco ISE 2.x&lt;/A&gt;. and &lt;A href="https://www.youtube.com/watch?v=SbzICd-kQoY" target="_blank" rel="noopener"&gt;ISE Configuration for VPN&lt;/A&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 03:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logon-event-for-vpn-users/m-p/4439318#M568721</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-07-27T03:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: LogOn Event for VPN Users</title>
      <link>https://community.cisco.com/t5/network-access-control/logon-event-for-vpn-users/m-p/4440554#M568758</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I looked at this tube you shared&amp;nbsp; ( ISE Configuration for VPN ) , here radius authentication is with ISE but in my scenario it is not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in my scenario , FMC is managing firewall where I am thinking to implement ISE as Passive Identity Solution , when ASA is doing radius authentication from another radius server not the ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hence was asking If I can use ISE/ISE-PIC for my below issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"normally use AD based rule in Firewall Rule , but for VPN Users not able to use any Firewall Rule using AD Group. This does not seem like work. And I use User Agent in FMC to get the IP to Username Mapping Info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is , if use ISE instead of "User Agent" does this behavior will change for VPN user ?&amp;nbsp; Will I be able to use AD Based Rule in FMC if I use ISE as Passive Identity Solution for VPN Subnet&amp;nbsp; ?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 17:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logon-event-for-vpn-users/m-p/4440554#M568758</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2021-07-28T17:43:10Z</dc:date>
    </item>
  </channel>
</rss>

