<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to do Posture with a 3rd Party VPN solution in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485255#M570376</link>
    <description>&lt;P&gt;trying to do this: Its for VPN User&lt;BR /&gt;&lt;SPAN&gt;User -&amp;gt; Fortiagate -&amp;gt; Fortiauthenticator (Synced with AD for MFA).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Now we have added ISE between this flow.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;User -&amp;gt; Fortigate - &amp;gt; Cisco ISE (Synced with AD and Fortiauthenticator Configured as Radius Token) -&amp;gt; Fortiauthenticator (Synced with AD and used for MFA)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Authentication is working fine.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Oct 2021 12:41:36 GMT</pubDate>
    <dc:creator>maf_1</dc:creator>
    <dc:date>2021-10-13T12:41:36Z</dc:date>
    <item>
      <title>How to do Posture with a 3rd Party VPN solution</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4059436#M559415</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;for a customer with a 3rd party VPN solution in place, are there suggestions in how ISE may be able to provide more than just AAA capabilities?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our customer would like for ISE to be able to check for a registry key, AV installed &amp;amp; Windows update for VPN clients before allowing them on dedicated trusted VLAN inside the VPN concentrator.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking for pointers in how we might approach this (we're unlikely to migrate them to ASA/Firepower in the short term).&lt;/P&gt;
&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 17:31:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4059436#M559415</guid>
      <dc:creator>bodonogh</dc:creator>
      <dc:date>2020-04-05T17:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to do Posture with a 3rd Party VPN solution</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4059590#M559416</link>
      <description>&lt;P&gt;Posture functionality depends on CoA and&amp;nbsp; url-redirection capabilities. Due to lack of support of CoA functionality and url-redirect in 3rd party vpn devices, posture functionality isn't supported. Make sure vpn devices&amp;nbsp; does support this&amp;nbsp; in order to move forward&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 05:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4059590#M559416</guid>
      <dc:creator>pavagupt</dc:creator>
      <dc:date>2020-04-06T05:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to do Posture with a 3rd Party VPN solution</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485104#M570368</link>
      <description>&lt;P&gt;Foritgate Supports CoA. and it does some sort of URL redirection. What's the possibility in this case?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 08:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485104#M570368</guid>
      <dc:creator>maf_1</dc:creator>
      <dc:date>2021-10-13T08:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to do Posture with a 3rd Party VPN solution</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485216#M570373</link>
      <description>&lt;P&gt;in that case, as per earlier thread customer could make use of registry keys, AV installed and windows updates with the help of posture checks before allowing access to VPN users.&lt;/P&gt;
&lt;P&gt;Basically, Once the user gets authenticated over VPN -- &amp;gt; gets postured using the posture policies in ISE -- &amp;gt; PSN raises CoA to give authorization as per compliance or non-compliance authz policies.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 11:23:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485216#M570373</guid>
      <dc:creator>pavagupt</dc:creator>
      <dc:date>2021-10-13T11:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to do Posture with a 3rd Party VPN solution</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485248#M570374</link>
      <description>&lt;P&gt;that's how it should be theoretically, but what needs to be done on ISE in this regard?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:26:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485248#M570374</guid>
      <dc:creator>maf_1</dc:creator>
      <dc:date>2021-10-13T12:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to do Posture with a 3rd Party VPN solution</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485252#M570375</link>
      <description>&lt;P&gt;i am assuming you are talking about configuring Fortigate VPN under ISE. if so, you have to add Foritgate VPN as a Network Access device. Refer "ISE third party vendor support" section under &lt;A href="http://cs.co/ise-guides" target="_blank"&gt;http://cs.co/ise-guides&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you can create posture/authz policies in ISE as per customer requirement so as to posture VPN endpoints.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485252#M570375</guid>
      <dc:creator>pavagupt</dc:creator>
      <dc:date>2021-10-13T12:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to do Posture with a 3rd Party VPN solution</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485255#M570376</link>
      <description>&lt;P&gt;trying to do this: Its for VPN User&lt;BR /&gt;&lt;SPAN&gt;User -&amp;gt; Fortiagate -&amp;gt; Fortiauthenticator (Synced with AD for MFA).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Now we have added ISE between this flow.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;User -&amp;gt; Fortigate - &amp;gt; Cisco ISE (Synced with AD and Fortiauthenticator Configured as Radius Token) -&amp;gt; Fortiauthenticator (Synced with AD and used for MFA)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Authentication is working fine.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:41:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-do-posture-with-a-3rd-party-vpn-solution/m-p/4485255#M570376</guid>
      <dc:creator>maf_1</dc:creator>
      <dc:date>2021-10-13T12:41:36Z</dc:date>
    </item>
  </channel>
</rss>

