<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 3.0, LDAP integration and access to network devices. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4568818#M573421</link>
    <description>&lt;P&gt;Even though I've done this policy, I can't connect to network devices via SSH by user from this group. And as you see, there are no hits.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145932iA123C906B797D462/image-size/large?v=v2&amp;amp;px=999" role="button" title="policy2.PNG" alt="policy2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Mar 2022 13:50:05 GMT</pubDate>
    <dc:creator>fomin.v87</dc:creator>
    <dc:date>2022-03-11T13:50:05Z</dc:date>
    <item>
      <title>Cisco ISE 3.0, LDAP integration and access to network devices.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4568689#M573418</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I need to configure authorization and authentication for particular AD groups on Cisco Nexus devices. Now I've configured LDAP integration and I can retrieve groups from AD, but I can't find the way how users from this grops could be allowed for access to network devices.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose that I need to configure Device Admin Policy Sets, but I don't know the right way to do this. Now only Cisco ISE local users which was created in Identities &amp;gt;&amp;gt; Network Access Users section can be authozired and can authenticate to network devices, on Cisco switches I've configured tacacs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145922iDB631EC125A6B77C/image-size/large?v=v2&amp;amp;px=999" role="button" title="policy1.PNG" alt="policy1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 10:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4568689#M573418</guid>
      <dc:creator>fomin.v87</dc:creator>
      <dc:date>2022-03-11T10:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0, LDAP integration and access to network devices.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4568741#M573420</link>
      <description>&lt;P&gt;Add an Authorization rule with the conditions being that the authenticated users is a member of the desired group and the result being allowed access at the desired level.&lt;/P&gt;
&lt;P&gt;More details can be found here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;...specifically this section:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId--1599341345" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId--1599341345&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 12:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4568741#M573420</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-03-11T12:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0, LDAP integration and access to network devices.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4568818#M573421</link>
      <description>&lt;P&gt;Even though I've done this policy, I can't connect to network devices via SSH by user from this group. And as you see, there are no hits.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145932iA123C906B797D462/image-size/large?v=v2&amp;amp;px=999" role="button" title="policy2.PNG" alt="policy2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 13:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4568818#M573421</guid>
      <dc:creator>fomin.v87</dc:creator>
      <dc:date>2022-03-11T13:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0, LDAP integration and access to network devices.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4572627#M573527</link>
      <description>&lt;P&gt;It seems that ISE doesn't try to check LDAP identity source based on logs, maybe you know something about this issue?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ldap.PNG" style="width: 858px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/146369i6C17D9E94C323A8D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ldap.PNG" alt="ldap.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see this is reports, when I try to connect to Cisco Device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="report.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/146368iA612E4099023F262/image-size/large?v=v2&amp;amp;px=999" role="button" title="report.PNG" alt="report.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And I didn't see trying to look in LDAP identity source mgmt.sbcp.ru&lt;/P&gt;&lt;PRE&gt;13013	Received TACACS+ Authentication START Request
 	15049	Evaluating Policy Group
 	15008	Evaluating Service Selection Policy
 	15048	Queried PIP - DEVICE.Device Type
 	15041	Evaluating Identity Policy
 	22072	Selected identity source sequence - All_User_ID_Stores
 	15013	Selected Identity Source - Internal Users
 	24210	Looking up User in Internal Users IDStore
 	24216	The user is not found in the internal users identity store
 	15013	Selected Identity Source - All_AD_Join_Points
 	13045	TACACS+ will use the password prompt from global TACACS+ configuration
 	13015	Returned TACACS+ Authentication Reply
 	13014	Received TACACS+ Authentication CONTINUE Request
 	15041	Evaluating Identity Policy
 	22072	Selected identity source sequence - All_User_ID_Stores
 	15013	Selected Identity Source - Internal Users
 	24210	Looking up User in Internal Users IDStore
 	24216	The user is not found in the internal users identity store
 	15013	Selected Identity Source - All_AD_Join_Points
 	24430	Authenticating user against Active Directory - All_AD_Join_Points
 	24325	Resolving identity - INVALID
 	24313	Search for matching accounts at join point - msk.sbcp.ru
 	24366	Skipping unjoined domain - msk.sbcp.ru
 	24322	Identity resolution detected no matching account
 	24352	Identity resolution failed - ERROR_NO_SUCH_USER
 	24412	User not found in Active Directory - All_AD_Join_Points
 	15013	Selected Identity Source - Guest Users
 	24631	Looking up User in Internal Guests IDStore
 	24633	The user is not found in the internal guests identity store
 	15013	Selected Identity Source - Internal Users
 	24210	Looking up User in Internal Users IDStore
 	24216	The user is not found in the internal users identity store
 	15013	Selected Identity Source - All_AD_Join_Points
 	24430	Authenticating user against Active Directory - All_AD_Join_Points
 	24325	Resolving identity - INVALID
 	24313	Search for matching accounts at join point - msk.sbcp.ru
 	24366	Skipping unjoined domain - msk.sbcp.ru
 	24322	Identity resolution detected no matching account
 	24352	Identity resolution failed - ERROR_NO_SUCH_USER
 	24412	User not found in Active Directory - All_AD_Join_Points
 	15013	Selected Identity Source - Guest Users
 	24631	Looking up User in Internal Guests IDStore
 	24633	The user is not found in the internal guests identity store
 	22016	Identity sequence completed iterating the IDStores
 	22056	Subject not found in the applicable identity store(s)
 	22058	The advanced option that is configured for an unknown user is used
 	22061	The 'Reject' advanced option is configured in case of a failed authentication request
 	13015	Returned TACACS+ Authentication Reply&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 13:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4572627#M573527</guid>
      <dc:creator>fomin.v87</dc:creator>
      <dc:date>2022-03-17T13:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0, LDAP integration and access to network devices.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4572689#M573528</link>
      <description>&lt;P&gt;Ok, I realize that I should create Authentication policy with my LDAP "mgmt.sbcp.ru"&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/146371i44D933D6275B481F/image-size/large?v=v2&amp;amp;px=999" role="button" title="policy.PNG" alt="policy.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But when I try to save policy, the error has occurred.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="error.PNG" style="width: 652px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/146372i4623AEEAE5983A2F/image-size/large?v=v2&amp;amp;px=999" role="button" title="error.PNG" alt="error.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What condition shoud I use in this policy?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 14:49:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4572689#M573528</guid>
      <dc:creator>fomin.v87</dc:creator>
      <dc:date>2022-03-17T14:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0, LDAP integration and access to network devices.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4573450#M573539</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1325242"&gt;@fomin.v87&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;you need to configure at least one &lt;STRONG&gt;Condition&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 09:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4573450#M573539</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-03-18T09:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0, LDAP integration and access to network devices.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4574761#M573564</link>
      <description>&lt;P&gt;With Device Admin (TACACS+), I typically use separate Device Admin Policy Sets for each distinct device type (switches/routers, WLCs, Firewalls, etc), so there is not much value in creating a unique AuthC Policy with a simple condition like 'Network Access - Protocol = TACACS+'&lt;/P&gt;
&lt;P&gt;Instead, I typically just use the Default AuthC Policy and configure my Identity Source there.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-03-21 at 10.27.14 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/146957i1B3F7EE9BF0C9EBA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2022-03-21 at 10.27.14 am.png" alt="Screen Shot 2022-03-21 at 10.27.14 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Mar 2022 23:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-ldap-integration-and-access-to-network-devices/m-p/4574761#M573564</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-03-20T23:28:05Z</dc:date>
    </item>
  </channel>
</rss>

