<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Emulate Smart Card in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022550#M587552</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1588027"&gt;@ryanbess&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess you want to grab the authentication from&amp;nbsp;&lt;SPAN&gt;PIV/CAC card, so Anyconnect NAM will give you that with smartcards just look into here&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect41/administration/guide/b_AnyConnect_Administrator_Guide_4-1/configure_nam.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect41/administration/guide/b_AnyConnect_Administrator_Guide_4-1/configure_nam.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2024 08:40:25 GMT</pubDate>
    <dc:creator>Ruben Cocheno</dc:creator>
    <dc:date>2024-02-22T08:40:25Z</dc:date>
    <item>
      <title>Emulate Smart Card</title>
      <link>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022319#M587541</link>
      <description>&lt;P&gt;Trying to lab some things up.&amp;nbsp; Does anyone have a recommendation for software that emulates a PIV/CAC card?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 01:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022319#M587541</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-02-22T01:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Emulate Smart Card</title>
      <link>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022321#M587542</link>
      <description>&lt;P&gt;I have never heard of this - just did a google search. But I am unclear what you're trying to emulate. I don't know how this solution is implemented, but like most MFA token-based solutions, they tend to run as a RADIUS service. If that is the case with PIV/CAC solution, then you could spin up another ISE VM, and have that act as your PIV/CAC server. Create some network access user identities there. Then, in your main ISE, configure a remote RADIUS server that uses the other ISE as a "RADIUS Token server" for token authentication. I have done this before to simulate RSA token servers.&amp;nbsp; Of course, you don't have a real token that has a dynamic password/code - but that is not what you're testing - the password would simply be a fixed password that exists in your fake PIV/CAC password. What you're testing is the ISE RADIUS functionality.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 02:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022321#M587542</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-22T02:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Emulate Smart Card</title>
      <link>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022324#M587543</link>
      <description>&lt;P&gt;Hey arne&lt;/P&gt;&lt;P&gt;im trying to mock-up what I posted on the teap question. &amp;nbsp;I need to support piv and username password for user logins. &amp;nbsp;Looks like the nam module may have this functionality&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 02:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022324#M587543</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-02-22T02:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Emulate Smart Card</title>
      <link>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022327#M587544</link>
      <description>&lt;P&gt;Oh right - if you want to simulate EAP-TEAP (or any TEAP method) then wpa_supplicant is also an excellent option.&lt;/P&gt;
&lt;P&gt;Have a l&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-security-ecosystem-integration-guides/ta-p/4782363#radius-simulation" target="_self"&gt;ook here&lt;/A&gt; at some options&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 02:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022327#M587544</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-22T02:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: Emulate Smart Card</title>
      <link>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022550#M587552</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1588027"&gt;@ryanbess&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess you want to grab the authentication from&amp;nbsp;&lt;SPAN&gt;PIV/CAC card, so Anyconnect NAM will give you that with smartcards just look into here&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect41/administration/guide/b_AnyConnect_Administrator_Guide_4-1/configure_nam.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect41/administration/guide/b_AnyConnect_Administrator_Guide_4-1/configure_nam.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 08:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5022550#M587552</guid>
      <dc:creator>Ruben Cocheno</dc:creator>
      <dc:date>2024-02-22T08:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: Emulate Smart Card</title>
      <link>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5023127#M587597</link>
      <description>&lt;P&gt;ultimately I'm trying to lab up a few scenarios in my virtual lab.&amp;nbsp; One thing i want to see what happens if i configure the windows supplicant to do PEAP with the authentication method "Secured password (EAP-MSCHAP V2).&amp;nbsp; I get what would happen from the computer side, the computers credentials would be sent to ISE.&amp;nbsp; But what would happen if the user authenticated via PIV?&amp;nbsp; I get the computer would unlock but what would the supplicant do for the user authentication?&amp;nbsp; Would it still send the cert, would it send a cached credential, or would it do nothing.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2024 00:24:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/emulate-smart-card/m-p/5023127#M587597</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-02-23T00:24:01Z</dc:date>
    </item>
  </channel>
</rss>

