<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC Integration with ISE pxGrid with machine based authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4767246#M579572</link>
    <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;Any update on this behaviour? I'm having a similar issue. I think it's more along the lines discussed in this thread.&lt;/P&gt;&lt;P&gt;Brief info on the setup:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Windows desktops authenticate using the device auth cert to ISE&lt;/LI&gt;&lt;LI&gt;Passive ID using to get the User to IP mappings from AD&lt;/LI&gt;&lt;LI&gt;The same information is passed to FMC through the PxGrid&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In the FMC, we can see the User to IP mapping for clients with Device Auth. However, an identity-based policy not working for users with device auth. why can FMC not execute an identity-based rule when the User to IP mapping details are available?&lt;/P&gt;&lt;P&gt;Users with PEAP auth do work fine with the identity-based rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Feb 2023 06:27:24 GMT</pubDate>
    <dc:creator>~Saj~</dc:creator>
    <dc:date>2023-02-02T06:27:24Z</dc:date>
    <item>
      <title>FMC Integration with ISE pxGrid with machine based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4471815#M569881</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Is there anyone that can point me in the right direction of how to create access policies on FMC based on information from pxGrid, when ISE is using machine-based authentication? From what I learnt, since machine authentication logs the user as host/userid, this information is not usable by FMC.&lt;/P&gt;&lt;P&gt;ISE 3.0, FMC 6.7.&lt;/P&gt;&lt;P&gt;Any suggestion will be appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 06:06:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4471815#M569881</guid>
      <dc:creator>ele203026</dc:creator>
      <dc:date>2021-09-23T06:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Integration with ISE pxGrid with machine based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4472102#M569890</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm checking on the details of machine authentication information being shared via pxGrid but it sounds like the problem is a limitation with FMC itself.&amp;nbsp; You'll need to reach out to the FMC team on how / when that use case is supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;-Tim&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 14:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4472102#M569890</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2021-09-23T14:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Integration with ISE pxGrid with machine based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4472107#M569891</link>
      <description>&lt;P&gt;thanks Tim,&lt;/P&gt;&lt;P&gt;Does this mean Im limited to PEAP authentication only when using ISE active authentication? Or do you know of any other option?&lt;/P&gt;&lt;P&gt;What do you mean by reach out to the FMC team? Through an official Tac case?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 14:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4472107#M569891</guid>
      <dc:creator>ele203026</dc:creator>
      <dc:date>2021-09-23T14:38:18Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Integration with ISE pxGrid with machine based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4472205#M569903</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/305975"&gt;@ele203026&lt;/a&gt; I don't have my lab open to check and I also can't recall ever using computers in a Access Control rule, but I know the IP/Computername binding is received by the FMC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see no reason why you could not create an Access Control rule based on the AD group the computer account is a member of or assign an SGT in ISE and use the source SGT in the Access Control rule.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 16:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4472205#M569903</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-23T16:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Integration with ISE pxGrid with machine based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4473972#M569934</link>
      <description>&lt;P&gt;Thanks for your response, Rob.&lt;/P&gt;&lt;P&gt;Using the computer ID in the ISE access rule will defeat the ability to log activities based on the user name. I might be limited to using SGT here. What I'm shying from is having to break down the domain computer/authenticated user rule on ise to multiple domain computer/ad-groups, to assign different SGTs per AD group, so I can create AD group based controls on FMC.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Sep 2021 20:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4473972#M569934</guid>
      <dc:creator>ele203026</dc:creator>
      <dc:date>2021-09-25T20:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: FMC Integration with ISE pxGrid with machine based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4767246#M579572</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;Any update on this behaviour? I'm having a similar issue. I think it's more along the lines discussed in this thread.&lt;/P&gt;&lt;P&gt;Brief info on the setup:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Windows desktops authenticate using the device auth cert to ISE&lt;/LI&gt;&lt;LI&gt;Passive ID using to get the User to IP mappings from AD&lt;/LI&gt;&lt;LI&gt;The same information is passed to FMC through the PxGrid&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In the FMC, we can see the User to IP mapping for clients with Device Auth. However, an identity-based policy not working for users with device auth. why can FMC not execute an identity-based rule when the User to IP mapping details are available?&lt;/P&gt;&lt;P&gt;Users with PEAP auth do work fine with the identity-based rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 06:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fmc-integration-with-ise-pxgrid-with-machine-based/m-p/4767246#M579572</guid>
      <dc:creator>~Saj~</dc:creator>
      <dc:date>2023-02-02T06:27:24Z</dc:date>
    </item>
  </channel>
</rss>

