<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA control for inside network in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8587#M933</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Most firewalls support outbound authentication with AAA.  We use the PIX and Cisco Secure ACS for outbound authentication.  Works well.  It might be a little trickier with controlling outbound VPN since the PIX doesn&amp;#146;t have anyway to proxy the authentication for that but you can use http, ftp or telnet to authenticate the user first, then open the VPN ports/protocols. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Jun 2001 19:16:49 GMT</pubDate>
    <dc:creator>mmellet</dc:creator>
    <dc:date>2001-06-21T19:16:49Z</dc:date>
    <item>
      <title>AAA control for inside network</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8586#M930</link>
      <description>&lt;P&gt;I knew that AAA can be easily set to control VPN connection from outsite.  How about controlling traffic from inside to outside?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8586#M930</guid>
      <dc:creator>j.joe</dc:creator>
      <dc:date>2020-02-21T17:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: AAA control for inside network</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8587#M933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Most firewalls support outbound authentication with AAA.  We use the PIX and Cisco Secure ACS for outbound authentication.  Works well.  It might be a little trickier with controlling outbound VPN since the PIX doesn&amp;#146;t have anyway to proxy the authentication for that but you can use http, ftp or telnet to authenticate the user first, then open the VPN ports/protocols. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2001 19:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8587#M933</guid>
      <dc:creator>mmellet</dc:creator>
      <dc:date>2001-06-21T19:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: AAA control for inside network</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8588#M936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As your message mentioned, PIX support outbound authentication with AAA.  Should it be done to all outbound traffic including VPN outbound?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, can PIX support outbound authentication with Microsoft Radius?  Must user authenticate on screen instead of passing workstations' login information when outbound connection is going to make?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2001 17:46:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8588#M936</guid>
      <dc:creator>j.joe</dc:creator>
      <dc:date>2001-06-22T17:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: AAA control for inside network</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8589#M938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to authenticate outbound VPN on the PIX then you&amp;#146;ll have to authenticate everything outbound and use http, telnet or ftp to authenticate your outbound traffic.  Once authenticated, all ports and protocols will open and the user can setup and use VPN.   You can build AAA exception statements for specific hosts like mail servers and/or administrators.  I&amp;#146;m not familiar with Microsoft&amp;#146;s RADIUS but I would guess it&amp;#146;s standard RADIUS, which is supported by the PIX.  You might look at Cisco Secure ACS.  It integrates with the Microsoft domain authentication database smoothly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2001 19:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-control-for-inside-network/m-p/8589#M938</guid>
      <dc:creator>mmellet</dc:creator>
      <dc:date>2001-06-25T19:44:48Z</dc:date>
    </item>
  </channel>
</rss>

