<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CDA Alternative in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4792163#M580410</link>
    <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Here is a solution to integrate new ISE versions with CDA: &lt;A href="https://www.isecdabroker.com" target="_self"&gt;https://www.isecdabroker.com&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;It really works!&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Sun, 12 Mar 2023 18:18:24 GMT</pubDate>
    <dc:creator>Maksim Tikunov</dc:creator>
    <dc:date>2023-03-12T18:18:24Z</dc:date>
    <item>
      <title>CDA Alternative</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3087866#M25743</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was planning to configure the Cisco Context Directory Agent (CDA) so we can use AD Groups in the ASA Firewall access rules, but our Active Directory servers will be upgraded to 2016 this year and CDA does not support this OS Version. It doesn't look like Cisco are planning to add support for 2016 so what are the alternatives?&lt;/P&gt;
&lt;P&gt;I'm running Cisco ISE ver 2.1 with a Base License . Can this be configured to collect the relevant user to IP mapping, and used in place of an AD Server? I'm&amp;nbsp;pretty new to the ISE world so help would be greatly appreciated&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3087866#M25743</guid>
      <dc:creator>harrison.gareth</dc:creator>
      <dc:date>2019-03-11T07:51:53Z</dc:date>
    </item>
    <item>
      <title>Yes you can use ISE for this.</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3087867#M25744</link>
      <description>&lt;P&gt;Yes you can use ISE for this. In fact Cisco has productized that subset of features in "ISE-PIC" or Passive Identity Connector. It is also available with full ISE (base license feature) since 2.1.&lt;/P&gt;
&lt;P&gt;The PIC feature uses WMI to query your Windows server and is described in more detail here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/pic_admin_guide/PIC_admin/PIC_admin_chapter_00.html?referring_site=RE&amp;amp;pos=1&amp;amp;page=http://www.cisco.com/c/en/us/td/docs/security/ise/2-2/pic_admin_guide/PIC_admin/PIC_admin_chapter_01011.html&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 15:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3087867#M25744</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-18T15:34:58Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3087868#M25745</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When i try to add an AD Controller under PassiveID the supported OS versions does not include Server 2016 so it looks like i'll need to upgrade to 2.2 first&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your help&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 01:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3087868#M25745</guid>
      <dc:creator>harrison.gareth</dc:creator>
      <dc:date>2017-07-19T01:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Alternative</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3854154#M25746</link>
      <description>&lt;P&gt;They released an update to CDA to support 2016 if you're still using it...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2019 19:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/3854154#M25746</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-05-10T19:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: Yes you can use ISE for this.</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4529819#M572137</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;We are using ISE 2.7 and still have CDA for one specific AD group. thia CDA is configured as an agent on one of the ASA 5555's.&lt;/P&gt;&lt;P&gt;we are trying to get rid of the CDA and I was thinking to use ISE's passive ID instead but Cisco told me I need firepower (FMC) for that.&lt;/P&gt;&lt;P&gt;Do i really need FMC to replace CDA? can I do it on ISE only without firepower?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 21:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4529819#M572137</guid>
      <dc:creator>alexeradze</dc:creator>
      <dc:date>2022-01-11T21:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: Yes you can use ISE for this.</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4529906#M572142</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/191155" target="_blank"&gt;@alexeradze&lt;/A&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;please take a look at the &lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/bulletin-c25-2428601.html" target="_blank" rel="noopener nofollow noreferrer"&gt;EoS &amp;amp; EoL Announcement for the CDA&lt;/A&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;"&lt;EM&gt;...&lt;/EM&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&lt;EM&gt;&lt;STRONG&gt;Product Migration Options&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&lt;EM&gt;While there is no direct migration path from &lt;STRONG&gt;CDA&lt;/STRONG&gt; to another identity provider for the &lt;STRONG&gt;ASA&lt;/STRONG&gt; platform, &lt;STRONG&gt;Cisco Firepower Management Center (FMC)&lt;/STRONG&gt; utilizes &lt;STRONG&gt;Cisco Identity Services Engine (ISE)&lt;/STRONG&gt; and/or &lt;STRONG&gt;ISE-PIC (Passive Identity Connector)&lt;/STRONG&gt; to provide &lt;U&gt;user identity information&lt;/U&gt; via &lt;STRONG&gt;Cisco Platform Exchange Grid (PxGrid)&lt;/STRONG&gt;.&amp;nbsp;Customers who rely on &lt;U&gt;user-based information&lt;/U&gt; for firewall policies can migrate from &lt;STRONG&gt;ASA&lt;/STRONG&gt; to &lt;STRONG&gt;Firepower&lt;/STRONG&gt; and utilize that integration for user-based firewall policy enforcement across the entire Cisco security product portfolio.&lt;/EM&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&lt;EM&gt;...&lt;/EM&gt;"&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 07:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4529906#M572142</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-03-10T07:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Yes you can use ISE for this.</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4529909#M572143</link>
      <description>&lt;P&gt;Hi Marcelo&lt;/P&gt;&lt;P&gt;that is the whole idea not to use firepower.&lt;/P&gt;&lt;P&gt;the existing setup is using windows AD, an ASA and the CDA.&lt;/P&gt;&lt;P&gt;i am looking for a solution to replace cda with ISE which we are already using for VPN and more. So it will be windows AD, the same ASA and ISE instead of CDA&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 00:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4529909#M572143</guid>
      <dc:creator>alexeradze</dc:creator>
      <dc:date>2022-01-12T00:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: CDA Alternative</title>
      <link>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4792163#M580410</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Here is a solution to integrate new ISE versions with CDA: &lt;A href="https://www.isecdabroker.com" target="_self"&gt;https://www.isecdabroker.com&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;It really works!&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 12 Mar 2023 18:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cda-alternative/m-p/4792163#M580410</guid>
      <dc:creator>Maksim Tikunov</dc:creator>
      <dc:date>2023-03-12T18:18:24Z</dc:date>
    </item>
  </channel>
</rss>

