<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I've gotten this back from in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792060#M1032928</link>
    <description>&lt;P&gt;I've gotten this back from TAC:&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Engineering has informed me that your configuration is a limitation we&lt;BR /&gt;have at this point and will have to be addressed in a future release.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So I guess that is that. I am shocked that this is an issue in today's world, and extremely disappointed that we didn't identify this prior to committing to a 3-year subscription.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Jan 2016 15:32:16 GMT</pubDate>
    <dc:creator>rgnelson</dc:creator>
    <dc:date>2016-01-11T15:32:16Z</dc:date>
    <item>
      <title>Passive Authentication not working in FireSight</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792055#M1032922</link>
      <description>&lt;P&gt;We just cannot get Firesight to be user aware at all. I can match logon events from the DC, to the SF User Agent to traffic being processed through the SFR module, and have it either hit my unknown/Anon user rule, or be denied based on no identity. I have just not been able to make this work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are using the Firesight Management Center for vMware, 6.0. SFR module in 5515-X:&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;SFR# show module sfr details&lt;BR /&gt;Getting details from the Service Module, please wait...&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Card Type: FirePOWER Services Software Module&lt;BR /&gt;Model: ASA5515&lt;BR /&gt;Hardware version: N/A&lt;BR /&gt;Serial Number: &amp;lt;clip&amp;gt;&lt;BR /&gt;Firmware version: N/A&lt;BR /&gt;Software version: 6.0.0-1005&lt;BR /&gt;MAC Address Range:&amp;nbsp;&amp;lt;clip&amp;gt;&lt;BR /&gt;App. name: ASA FirePOWER&lt;BR /&gt;App. Status: Up&lt;BR /&gt;App. Status Desc: Normal Operation&lt;BR /&gt;App. version: 6.0.0-1005&lt;BR /&gt;Data Plane Status: Up&lt;BR /&gt;Console session: Ready&lt;BR /&gt;Status: Up&lt;BR /&gt;DC addr: &lt;SPAN&gt;&amp;lt;clip&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;Mgmt IP addr: &lt;SPAN&gt;&amp;lt;clip&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;Mgmt Network mask: &lt;SPAN&gt;&amp;lt;clip&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;Mgmt Gateway: &lt;SPAN&gt;&amp;lt;clip&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;Mgmt web ports: 443&lt;BR /&gt;Mgmt TLS enabled: true&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Firepower User Agent for Active Directory v2.3 b10 is installed on Win2K12R2. AD servers are configured, real-time events are enabled each DC status is Green." The Firesight appliance is configured in same, status is also 'Green'&lt;/P&gt;
&lt;P&gt;I believe output from debug logging shows events are reported to Firesight appliance.&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;"12/15/2015 5:25:45 PM","debug","[2329] - Real Time Event Received - 12/15/2015 5:25:45 PM,&amp;lt;username&amp;gt;,&amp;lt;IP&amp;gt;,interactive"&lt;BR /&gt;"12/15/2015 5:25:45 PM","debug","[2203] - Reported 1 events (&amp;lt;dc fqdn&amp;gt;&amp;nbsp;-&amp;gt; &amp;lt;firesight fqdn&amp;gt;)."&lt;/P&gt;
&lt;P&gt;User Agent has been run as both a minimum rights user and as a domain admin for testing purposes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Integration -&amp;gt; Identity Sources have the User Agents configured. Have tried both FQDN and IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the Firesight Management Center a realm has been configured. I've selected 10 groups to include, I have not excluded any groups. When Download users is clicked, it downloads 10 groups, and an appropriate amount of users.&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;LDAP Download 1s &lt;BR /&gt;Download users/groups from Active Directory. &lt;BR /&gt;LDAP download successful: 10 groups, 235 users downloaded&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P&gt;The Identity Policy is configured for Passive Auth, and set to use the configured Realm. The Access Control Policy has the Identity Policy selected, and the rules have AD groups from the Realm sync. There are not so many options selected in the rules that traffic will not match, just some URL categories and the users's Groups.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Reviewing traffic in Analysis -&amp;gt; Connection Events, the only value in 'Initiator User' is Unknown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rules without users&amp;nbsp;specified will have traffic match and 'work'&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Analysis -&amp;gt; User Activity lists some users, mostly with "No Authentication" &amp;nbsp;as the Auth type.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;System Users are set to use External Authentication to the same AD GC's&amp;nbsp;as configured in the Realm config. This works.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;TIA folks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792055#M1032922</guid>
      <dc:creator>rgnelson</dc:creator>
      <dc:date>2019-03-12T12:50:45Z</dc:date>
    </item>
    <item>
      <title>I started a TAC case, and</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792056#M1032924</link>
      <description>&lt;P&gt;I started a TAC case, and have more info. There is a bug, also a workaround, but it won't work in a multi-domain or subdomain environment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCux39125" target="_blank" title="https://tools.cisco.com/bugsearch/bug/CSCux39125"&gt;https://tools.cisco.com/bugsearch/bug/CSCux39125&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The UA reports exactly what it scrapes out of the Security Event log to Firesight, which is NETBIOS DOMAIN NAME\sAMAccountName&lt;/P&gt;
&lt;P&gt;Firesight&amp;nbsp;is trying to match the UA data with the value set here:&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;System &amp;gt; Integration &amp;gt; Realms &amp;gt; Pencil Icon &amp;gt; Realm Configuration &amp;nbsp;&amp;gt; AD Primary Domain&lt;/P&gt;
&lt;P&gt;If the primary domain is set to fqdn as the example shows, Firesight isn't intelligent enough to make the match (or is broken, the bug ID is unclear).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the whole AD forest is a single flat domain, changing the AD primary domain in realm config to NETBIOS name works.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In our case, we have a forest root domain used for administrative purposes, and several sub-domains where the users and their resources are defined. The workaround fixes the issue for one sub-domain, but thoroughly breaks it for any other. Part of this is because of the way the identity policy and access control rules are configured.&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;Identity policy doesn't allow multiple rules with unique realms to be active. Configuring a subsequent passive auth rule pops a warning the new rule its preemted by the above rule.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Configuring multiple identity policies also doesn't work, as only a single Access Control Policy is allowed per targeted device, and only a single Identity policy is allowed per Access Control Policy. &lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So we're still stuck.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 18:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792056#M1032924</guid>
      <dc:creator>rgnelson</dc:creator>
      <dc:date>2015-12-17T18:43:00Z</dc:date>
    </item>
    <item>
      <title>Yeah I am running into the</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792057#M1032925</link>
      <description>&lt;P&gt;Yeah I am running into the same issue, the workaround however for me is not working. &amp;nbsp;I have tried several different ways to get this to work, no luck. &amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just get 'unknown' for my authentication. &amp;nbsp;I am going to open a tac case as well and will update you with what I find out, but it appears my issue is related. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;My current version's I am working with:&lt;/P&gt;
&lt;P&gt;Firepower Management Center: &amp;nbsp;6&lt;/P&gt;
&lt;P&gt;ASA's: &amp;nbsp;5515x's 9.5.2&lt;/P&gt;
&lt;P&gt;Sensors: &amp;nbsp;6.0.0-1005&lt;/P&gt;
&lt;P&gt;User Agent: &amp;nbsp;2.3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2016 20:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792057#M1032925</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2016-01-04T20:39:25Z</dc:date>
    </item>
    <item>
      <title>I have the same problem.</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792058#M1032926</link>
      <description>&lt;P&gt;I have the same problem.&lt;/P&gt;
&lt;P&gt;For me worked to put netbiosdomain.domain-name&lt;/P&gt;
&lt;P&gt;Examle:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;netbiosdomain: domain&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;domain-name: domain.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Username: fireuser@domain.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Enter into: System &amp;gt; Integration &amp;gt; Realms &amp;gt; Pencil Icon &amp;gt; Realm Configuration &amp;nbsp;&amp;gt; AD Primary Domain&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;AD Primary Domain: domain.domain.com&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Directory Username: fireuser&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 07:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792058#M1032926</guid>
      <dc:creator>marinogr</dc:creator>
      <dc:date>2016-01-05T07:54:20Z</dc:date>
    </item>
    <item>
      <title>I've just run into a simliar</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792059#M1032927</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've just run into a simliar issue where all my users were unknown in FMC; my domain is set to fqdn in the Realm Configuration. User identification was working 100% but I had to re-image the SFR and when I re-set it up I&amp;nbsp;made some minor changes to the config but it took quite some time to identify the issue.&lt;/P&gt;
&lt;P&gt;During setup I configured DNS search domains which included the fqdn for my AD domain; once I removed the AD fqdn in the DNS search&amp;nbsp;config on the SFR users started getting identified via their LDAP name on the FMC connection events.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I suggest you check your DNS search domain config on the SFR and&amp;nbsp;leave it blank.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 15:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792059#M1032927</guid>
      <dc:creator>craig-allen</dc:creator>
      <dc:date>2016-01-08T15:25:31Z</dc:date>
    </item>
    <item>
      <title>I've gotten this back from</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792060#M1032928</link>
      <description>&lt;P&gt;I've gotten this back from TAC:&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Engineering has informed me that your configuration is a limitation we&lt;BR /&gt;have at this point and will have to be addressed in a future release.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So I guess that is that. I am shocked that this is an issue in today's world, and extremely disappointed that we didn't identify this prior to committing to a 3-year subscription.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2016 15:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792060#M1032928</guid>
      <dc:creator>rgnelson</dc:creator>
      <dc:date>2016-01-11T15:32:16Z</dc:date>
    </item>
    <item>
      <title>Hey everyone, getting back</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792061#M1032929</link>
      <description>&lt;P&gt;Hey everyone, getting back here with my issue. &amp;nbsp;I found my issue, the operating system that I installed the user agent on, had TCP port 3306 closed. &amp;nbsp;My mistake, once I opened that it started working. &amp;nbsp;Also, don't forget TCP 135 needs to be open as well on the same system. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2016 18:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792061#M1032929</guid>
      <dc:creator>tellis002</dc:creator>
      <dc:date>2016-01-11T18:03:42Z</dc:date>
    </item>
    <item>
      <title>I had the same issue. After</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792062#M1032930</link>
      <description>&lt;P&gt;I had the same issue.&amp;nbsp;After spending hours checking and rechecking all of the following:&lt;/P&gt;
&lt;P&gt;AD-User agent was operating correctly and all the required ports were open,&lt;/P&gt;
&lt;P&gt;The realm was configured correctly&amp;nbsp;using either&amp;nbsp;the long domain name&amp;nbsp;or the &amp;nbsp;NetBIOS name&lt;/P&gt;
&lt;P&gt;The Identity policy was correctly setup and&lt;/P&gt;
&lt;P&gt;The identity policy was assigned to the appropriate policy in access control advanced settings&lt;/P&gt;
&lt;P&gt;on spec I recreated my realm using the copy realm button.&amp;nbsp; I checked that this copy was able to still download the directory groups and users.&amp;nbsp; So the only difference was the name.&lt;/P&gt;
&lt;P&gt;I also created a new realm using passive authentication but this time selecting the realm copy.&lt;/P&gt;
&lt;P&gt;I replaced the original identity policy in the access control policy with the new one and once deployed it started working???&lt;/P&gt;
&lt;P&gt;I changed back to the original identity &amp;nbsp;policy and it stopped working again and again got the no authentication required.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had a colleague confirm that there were no differences between the realms and identity policies but for one reason&amp;nbsp; or another the new one works.&lt;/P&gt;
&lt;P&gt;No real logic to this but something to try if you are desperate to get it up and running quickly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;T&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 20:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792062#M1032930</guid>
      <dc:creator>thilton68</dc:creator>
      <dc:date>2016-02-15T20:20:10Z</dc:date>
    </item>
    <item>
      <title>Cisco says the Bug is fixed</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792063#M1032931</link>
      <description>&lt;P&gt;Cisco says the Bug is fixed (status:Fixed)&amp;nbsp;but sadly it still happening with me.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We will have to migrate this solution to another manufacturer, like blue coat or checkpoint, we're still evaluating the options.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2016 16:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792063#M1032931</guid>
      <dc:creator>lmsistemas</dc:creator>
      <dc:date>2016-06-06T16:56:46Z</dc:date>
    </item>
    <item>
      <title>Hello Team,</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792064#M1032932</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;There are several customers who uses the passive authentication method. It had few issues with older versions. So first of all make sure that you are in the latest and stable software version . To validate and investigate further, please contact the Cisco TAC. If you confirm that the issue is not resolved with the version as promised Cisco TAC can help you with a solution.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 05:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792064#M1032932</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-06-07T05:44:57Z</dc:date>
    </item>
    <item>
      <title>I ran to the same issue https</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792065#M1032933</link>
      <description>&lt;P&gt;I ran to the same issue&amp;nbsp;&lt;STRONG&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCux39125&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;and I have switched the Domain name under Realm configuration to NETBIOS name and it worked right away. &amp;nbsp;Here is the catch :&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;Turns out my customer NETBIOS name was a different character from (Domain).com , easiest way to figure out go to Active Directory Users and Groups , right click on the domain and click on&amp;nbsp;properties , under PRE-Windows 2003 Name : you will see the real NETBIOS name.&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;Put the same name for AD Agent Domain and Realm config Domain and it should start working with a save and download user.&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;Thanks&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;Ehsan&amp;nbsp;&lt;/B&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2016 19:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792065#M1032933</guid>
      <dc:creator>Ehsanreza Haghzare</dc:creator>
      <dc:date>2016-07-13T19:17:30Z</dc:date>
    </item>
    <item>
      <title>Request Cisco TAC to</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792066#M1032934</link>
      <description>&lt;P&gt;Request Cisco TAC to escalated the case to p1 all of you since too many customer are complaining on this issue. &amp;nbsp; It requires urgency.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2016 19:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792066#M1032934</guid>
      <dc:creator>Ed Padilla Jr</dc:creator>
      <dc:date>2016-07-15T19:04:39Z</dc:date>
    </item>
    <item>
      <title>I have the similar problem</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792067#M1032935</link>
      <description>&lt;P&gt;I have the similar problem.&lt;BR /&gt;&lt;BR /&gt;When I create Rule for any user (without Users) to block some URL pages (Gambling, Cheating...) - this works.&lt;BR /&gt;When I change this Rule to hit for user or group form AD, the Rule is skipped and continue with "Default Action".&lt;BR /&gt;&lt;BR /&gt;Where is the problem?&lt;BR /&gt;&lt;BR /&gt;User Agent is operating correctly and all the required ports are open.&lt;BR /&gt;CFUA Tools: "Able to connect to read security logs. Polling OK. Listener Successfully Attached. "&lt;BR /&gt;&lt;BR /&gt;Integration -&amp;gt; Identity Sources -&amp;gt; User Agents - Have tried FQDN and IP. &lt;BR /&gt;&lt;BR /&gt;The Identity policy is correctly setup and is assigned in access control advanced settings.&lt;BR /&gt;The Identity Policy is configured for Passive Auth, and set to use the configured Realm.&lt;BR /&gt;The Realm is correctly setup - have tried FQDN, NetBIOS - LDAP download successful: 1 groups, 77 users downloaded&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Firepower User Agent for Active Directory 2.3 b10&lt;BR /&gt;ASA 5516 9.6.1(5)&lt;BR /&gt;ASDM 7.6.1&lt;BR /&gt;FirePOWER 6.0.1 (29)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2016 09:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792067#M1032935</guid>
      <dc:creator>Ivan K.</dc:creator>
      <dc:date>2016-09-13T09:14:35Z</dc:date>
    </item>
    <item>
      <title>You might probably hitting</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792068#M1032936</link>
      <description>&lt;P&gt;You might&amp;nbsp;probably hitting the same issue as I , &amp;nbsp; here is my suggestion :&lt;/P&gt;
&lt;P&gt;1-Re-configure Realm to use (Pre-Windows 2000 NetBios Name) of Domain &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2- Stop/Wipe out AD User Agents and build the config from scratch , this time put the same NetBios name as Domain name when you adding the config back on the Agent&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3- Start the agent service&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2016 15:56:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792068#M1032936</guid>
      <dc:creator>Ehsanreza Haghzare</dc:creator>
      <dc:date>2016-09-13T15:56:01Z</dc:date>
    </item>
    <item>
      <title>still not working</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792069#M1032937</link>
      <description>&lt;P&gt;still not working&lt;/P&gt;
&lt;P&gt;I tried rewrite all FQDN to NetBIOS, reinstall AD agent and configure with NetBIOS name, delete Realm, Identity Policy Rule, Access Control Rule... and configure all from beginning but without success. New rule works as the old one. Without AD Users block page correctly, with AD Users is the Rule skipped and restricked page is displayed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2016 17:00:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792069#M1032937</guid>
      <dc:creator>Ivan K.</dc:creator>
      <dc:date>2016-09-13T17:00:53Z</dc:date>
    </item>
    <item>
      <title>From Agent to FirePOWER:sudo</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792070#M1032938</link>
      <description>&lt;H6 class="prettyprint"&gt;From Agent to FirePOWER:&lt;BR /&gt;sudo tcpdump -i eth0 -n port 3306 -&amp;gt; OK&lt;BR /&gt;&lt;BR /&gt;From FirePOWER to AD with Agent&lt;BR /&gt;sudo tcpdump -i eth0 -n port 389 -&amp;gt; OK&lt;BR /&gt;&lt;BR /&gt;.... Passive Authentication / Access Rule with AD user still not working&lt;BR /&gt;&lt;BR /&gt;Any Idea?&lt;BR /&gt;&lt;BR /&gt;&lt;/H6&gt;</description>
      <pubDate>Wed, 14 Sep 2016 13:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792070#M1032938</guid>
      <dc:creator>Ivan K.</dc:creator>
      <dc:date>2016-09-14T13:12:13Z</dc:date>
    </item>
    <item>
      <title>Hi Everyone,</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792071#M1032939</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I know this Post is a year old, but just wanted to update a possible solution for Realm configuration with Multiple domains. &amp;nbsp;In Global catalog AD server, the port thats used to getUser/Group information from the parent and child domain is 3268 and not the default 389. LDAP over 389 only pulls the parent domain information.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So under the firepower REALM configuration , while adding the active directory, use port 3268 along with the IP address, instead of 389. This way the firepower pulls&amp;nbsp;the entire forest user/group information.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Akhil&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792071#M1032939</guid>
      <dc:creator>Akhil.Balachandran</dc:creator>
      <dc:date>2017-05-03T13:55:25Z</dc:date>
    </item>
    <item>
      <title>Good note Akhil, Its been a</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792072#M1032940</link>
      <description>&lt;P&gt;Good note&amp;nbsp;&lt;SPAN&gt;Akhil, Its been a long time, and I cannot recall if that was tested. I do know we are aware of the Global Catalog ports and use them in many other integrations - Cisco and otherwise. I do have a Firepower refresh cycle coming up and will revisit&amp;nbsp;this at that deployment. If I find success, I will be sure to update this conversation.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Also, for others, please note that 3269 is the secure port connection to the Global Catalog, analogous to LDAP 636.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 14:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/2792072#M1032940</guid>
      <dc:creator>rgnelson</dc:creator>
      <dc:date>2017-05-03T14:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Passive Authentication not working in FireSight</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/3348995#M1032941</link>
      <description>&lt;P&gt;We have implemented FMC and FP version 6.2.2 and got same issue. FMC not displayed any passive authenticated users in list. with check all cisco guides and testings we failed to find the issue. TAC case solved the issue. issue was in AD configuration. we need to enable log in and logout auditing in group policy to detect users who are login and login out. hope some one will find this helpful.&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 07:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/3348995#M1032941</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-03-15T07:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Passive Authentication not working in FireSight</title>
      <link>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/3356018#M1032942</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;We had a similar issue. Everything was correctly configured (realm/identity policy/user agent). But there was still a problem with the user agent : it was not filling up the ip map (wccih contains users login mapped to their IP address).&lt;/P&gt;
&lt;P&gt;You might want to check the content of this map. To populate the map in order for you to see it, go to your program files directory, where the user agent is stored (usually something like ...\Program Files (x86)\Cisco Systems, Inc\Cisco Firepower User Agent for Active Directory). You should find an application called Tools. Run the app and go the "User Map" folder, check IPV4 addresses and click "Export current User / IP address map" button. That will populate a csv file containing the list of connected users.&lt;/P&gt;
&lt;P&gt;If the file is emplty, try to relaunch the User Agent. That worked for us.&lt;/P&gt;
&lt;P&gt;Hope that it will guide someone toward the correct direction &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 15:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passive-authentication-not-working-in-firesight/m-p/3356018#M1032942</guid>
      <dc:creator>ndespature</dc:creator>
      <dc:date>2018-03-27T15:57:36Z</dc:date>
    </item>
  </channel>
</rss>

