<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Monitoring with AD on Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4665700#M1092486</link>
    <description>&lt;P&gt;That is what I thought but having an issue when joining FP to ISE keeps erroring / rejecting the cert for some reason. Will give it another attempt today.&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 08 Aug 2022 12:51:44 GMT</pubDate>
    <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
    <dc:date>2022-08-08T12:51:44Z</dc:date>
    <item>
      <title>User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638646#M1091260</link>
      <description>&lt;P&gt;I have been attempting to set up user monitoring on our Cisco Firepower device so we can see usernames instead of IP addresses under monitoring. It works with the VPN connection but not for internal traffic. What could I be overlooking or does this require additional features? It seems straight forward I added an Identity rule Active Auth with NTLM type, placed a user available on an inside to outside rule both facing the Windows AD server that allows connections to VPN.&lt;/P&gt;&lt;P&gt;Thanks &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 20:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638646#M1091260</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-06-24T20:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638648#M1091261</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; sounds like you intend to do active authentication using a captive portal? Have you've created a Realm, identity policy and referenced the identity policy in the Access Control Policy?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 20:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638648#M1091261</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-24T20:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638651#M1091262</link>
      <description>&lt;P&gt;I have created the ID Realm it is how VPN users confirm ID when logging in. Maybe I am referencing it incorrectly but in ACL I selected under the Users Tab the server, logging beginning and end of connection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 20:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638651#M1091262</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-06-24T20:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638661#M1091264</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; here is the guide &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/control_users_with_captive_portal.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/control_users_with_captive_portal.html&lt;/A&gt; that has all the steps to configure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have ISE or ISE-PIC, this uses passive authentication and more transparent and would not require the user to actively authenticate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 20:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638661#M1091264</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-24T20:37:45Z</dc:date>
    </item>
    <item>
      <title>Re: User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638667#M1091265</link>
      <description>&lt;P&gt;I unfortunately do not have ISE for the time being.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 20:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4638667#M1091265</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-06-24T20:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4664581#M1092459</link>
      <description>&lt;P&gt;Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;So I am trying to set up ISE with our firepower but having problems with joining the Firepower device. We keep encountering certificate errors. Does it matter if the cert comes from ISE or FTD device? Also is FMC required to join ISE?&lt;/P&gt;&lt;P&gt;I already have ISE joined to the AD just trying to join the FTD now so we can test.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2022 19:27:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4664581#M1092459</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-08-05T19:27:55Z</dc:date>
    </item>
    <item>
      <title>Re: User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4664755#M1092466</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1236841"&gt;@00u18jg7x27DHjRMh5d7&lt;/a&gt; no it doesn't matter where the certificates come from, as long as both ISE and FMC trust the certificates. Commonly you would use either ISE CA to sign the pxGrid certificiates or an internal CA (Windows) - &lt;A href="https://integratingit.wordpress.com/2018/08/25/cisco-ise-pxgrid-integration-with-firepower/" target="_self"&gt;example here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Aug 2022 06:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4664755#M1092466</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-06T06:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: User Monitoring with AD on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4665700#M1092486</link>
      <description>&lt;P&gt;That is what I thought but having an issue when joining FP to ISE keeps erroring / rejecting the cert for some reason. Will give it another attempt today.&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 12:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-monitoring-with-ad-on-firepower/m-p/4665700#M1092486</guid>
      <dc:creator>00u18jg7x27DHjRMh5d7</dc:creator>
      <dc:date>2022-08-08T12:51:44Z</dc:date>
    </item>
  </channel>
</rss>

