<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FMC internal users in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-internal-users/m-p/4104791#M1071124</link>
    <description>&lt;P&gt;I have FTD 1010 and mange it using FMC.&lt;/P&gt;&lt;P&gt;I want to add internal users to attach them to access policy to apply different web and app filter?&lt;/P&gt;&lt;P&gt;and i dont have AD or LDAB server&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jun 2020 11:21:09 GMT</pubDate>
    <dc:creator>hossammahmoud1470</dc:creator>
    <dc:date>2020-06-17T11:21:09Z</dc:date>
    <item>
      <title>FMC internal users</title>
      <link>https://community.cisco.com/t5/network-security/fmc-internal-users/m-p/4104791#M1071124</link>
      <description>&lt;P&gt;I have FTD 1010 and mange it using FMC.&lt;/P&gt;&lt;P&gt;I want to add internal users to attach them to access policy to apply different web and app filter?&lt;/P&gt;&lt;P&gt;and i dont have AD or LDAB server&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 11:21:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-internal-users/m-p/4104791#M1071124</guid>
      <dc:creator>hossammahmoud1470</dc:creator>
      <dc:date>2020-06-17T11:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: FMC internal users</title>
      <link>https://community.cisco.com/t5/network-security/fmc-internal-users/m-p/4104856#M1071131</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, the FMC does not support a manual upload of users as it needs to be able to communicate with a user database and an identity source. In order to use users in the Access Control Policy rules, these things need to happen:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) FMC needs to be connected to a AD or LDAP server in order to download the users (via Realm settings)&lt;/P&gt;&lt;P&gt;2) The FMC then needs to be connected to an "Identity Source", such as ISE or User Agent in order to get the user to IP mappings.&lt;/P&gt;&lt;P&gt;3) FMC then syncs what it knows about the user to IP mappings with the managed devices (in this case, the 1010) so that it can enforce policy rules based on user&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more information, please see the section of the FMC Configuration Guide called "Discovery and Identity" starting here - &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/create_and_manage_realms.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/create_and_manage_realms.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 13:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-internal-users/m-p/4104856#M1071131</guid>
      <dc:creator>JohnLong3</dc:creator>
      <dc:date>2020-06-17T13:40:46Z</dc:date>
    </item>
  </channel>
</rss>

