<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic User-to-IP mapping on FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4456697#M1083210</link>
    <description>&lt;P&gt;We have FTD-A as a VPN firewall that authenticates remote users against LDAP and assigns IP addresses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we are trying to achieve is a user-based policy applied on FTD-B, but we are having problems identifying users when they are connected to VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to push User-to-IP mapping from FTD-A to FTD-B? Both are managed by the same FMC.&lt;/P&gt;</description>
    <pubDate>Mon, 30 Aug 2021 04:22:14 GMT</pubDate>
    <dc:creator>Turbo727</dc:creator>
    <dc:date>2021-08-30T04:22:14Z</dc:date>
    <item>
      <title>User-to-IP mapping on FMC</title>
      <link>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4456697#M1083210</link>
      <description>&lt;P&gt;We have FTD-A as a VPN firewall that authenticates remote users against LDAP and assigns IP addresses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we are trying to achieve is a user-based policy applied on FTD-B, but we are having problems identifying users when they are connected to VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to push User-to-IP mapping from FTD-A to FTD-B? Both are managed by the same FMC.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Aug 2021 04:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4456697#M1083210</guid>
      <dc:creator>Turbo727</dc:creator>
      <dc:date>2021-08-30T04:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: User-to-IP mapping on FMC</title>
      <link>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4456771#M1083212</link>
      <description>&lt;P&gt;Are your FTD-A and B in HA?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Aug 2021 08:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4456771#M1083212</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2021-08-30T08:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: User-to-IP mapping on FMC</title>
      <link>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4456772#M1083213</link>
      <description>No. They are different firewalls.&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Aug 2021 08:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4456772#M1083213</guid>
      <dc:creator>Turbo727</dc:creator>
      <dc:date>2021-08-30T08:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: User-to-IP mapping on FMC</title>
      <link>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4457104#M1083219</link>
      <description>&lt;P&gt;I dont think that's a possibility as they are treated as separate device.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Aug 2021 18:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4457104#M1083219</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2021-08-30T18:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: User-to-IP mapping on FMC</title>
      <link>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4457141#M1083220</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/289617"&gt;@Turbo727&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You won't be able to do this, without intermediate device.&lt;/P&gt;&lt;P&gt;What you need in between is ISE for this purpose. For VPN use-case, it would serve as RADIUS server, responsible for authentication and authorization, while collecting User-to-IP mapping at the same time. For FTD-B use-case, it would serve as identity source (role called Passive Identity, please see more &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/pic_admin_guide/PIC_admin/PIC_admin_chapter_00.html" target="_self"&gt;here&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Mon, 30 Aug 2021 19:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-to-ip-mapping-on-fmc/m-p/4457141#M1083220</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-08-30T19:39:41Z</dc:date>
    </item>
  </channel>
</rss>

