<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: user-ip mapping for lan connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843975#M1100935</link>
    <description>&lt;P&gt;yes, thanks for your quick reply. We do have a ftd with fmc. And also are planning for the ISE. But, I'm intresting for how the switch and wireless controller provide the latest user-ip mapping to ISE?&amp;nbsp;Which config or technology will use? especially when user manually change the IP, how could the ISE find the change right after the change?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 27 May 2023 15:41:02 GMT</pubDate>
    <dc:creator>chengl031</dc:creator>
    <dc:date>2023-05-27T15:41:02Z</dc:date>
    <item>
      <title>user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843973#M1100933</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We need to audit the network traffic and also apply some rule based on user or groups. Is there a way that a switch or a wireless controller can provide a user to ip mapping table? this need to be "auth-level", the data need to be unique and fresh. for example a user manually set a static ip (ignore dhcp) or change ip after successful dhcp, the firewall need to know immediately if the change. maybe something like trap in snmp.&lt;/P&gt;&lt;P&gt;Until now I know the switch have a function called device-tracking, is it a good choice for the above situation? do we have some other way? what about in wireless? Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 15:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843973#M1100933</guid>
      <dc:creator>chengl031</dc:creator>
      <dc:date>2023-05-27T15:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843974#M1100934</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1140379"&gt;@chengl031&lt;/a&gt; you would need to use 802.1X with ISE, which can authenticate wired, wireless and VPN users. These IP/user bindings can then be transmitted to the FTD firewall using pxGrid feature. You can then create firewall rules based on user or group information.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/identity-overview.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/identity-overview.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 15:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843974#M1100934</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-27T15:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843975#M1100935</link>
      <description>&lt;P&gt;yes, thanks for your quick reply. We do have a ftd with fmc. And also are planning for the ISE. But, I'm intresting for how the switch and wireless controller provide the latest user-ip mapping to ISE?&amp;nbsp;Which config or technology will use? especially when user manually change the IP, how could the ISE find the change right after the change?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 15:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843975#M1100935</guid>
      <dc:creator>chengl031</dc:creator>
      <dc:date>2023-05-27T15:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843978#M1100936</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;To control machine at that level it would be better some solution that directly interact with the machine itself like CrowdStrike for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 15:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843978#M1100936</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-05-27T15:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843980#M1100937</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1140379"&gt;@chengl031&lt;/a&gt; the client devices are configured with 802.1X, the username is sent to the ISE to authenticate. As part of that process the IP device tracking feature configured on the switches sends the IP/MAC mapping to ISE in the RADIUS accounting packet. Thus ISE has the IP/User mapping, which is sent to the Firewall via the FMC.&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 15:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843980#M1100937</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-27T15:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843984#M1100938</link>
      <description>&lt;P&gt;Is there a interval between switch send accounting packet to ISE? will it a time gap when user change their IP after&amp;nbsp;&lt;SPAN&gt;authenticate? Like a TOCTOU attack, the user already changed to a new ip but FTD still hold a old version of mapping. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And also if some user change their ip and duplicate with other, what action will the switch and ISE take? Like a spoof ip attack&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 16:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843984#M1100938</guid>
      <dc:creator>chengl031</dc:creator>
      <dc:date>2023-05-27T16:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843985#M1100939</link>
      <description>&lt;P&gt;thanks, you mean I need direct control to the client OS? such as do not give user a local admin privilege in windows to prevent the unexpected ip change? No good way to deal this in network scope?&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 16:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843985#M1100939</guid>
      <dc:creator>chengl031</dc:creator>
      <dc:date>2023-05-27T16:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843989#M1100941</link>
      <description>&lt;P&gt;I used to work in a company and they use this solution I mentioned and the control they have over the machine was extremelly high. To the point that they could know about any network change on the machine. It is not about user privilege but monitoring and control.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Check the tool out and you can see. But, they also have ISE with NAC and everything,&amp;nbsp; of course.&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 16:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843989#M1100941</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-05-27T16:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843990#M1100942</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1140379"&gt;@chengl031&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;If the IP address was changed on the device, reauthentication will occur and ISE will know of the IP address as part of that process. ISE will send that updated information to the FMC straight away.&lt;/P&gt;
&lt;P&gt;Regardless, if they did change their IP address they could only change to an IP address in the same VLAN they are connected to, else they will not be able to route over the network.&lt;/P&gt;
&lt;P&gt;If you authenticate the users that implies the user is trusted. If you manage the computers they are connecting from, then restrict the ability to assign a static IP address.&lt;/P&gt;
&lt;P&gt;Dynamic ARP inspection (which relies on DHCP snooping) could be used to ensure the user has a valid IP/MAC binding on the switch, via DHCP. If the user were able to assign a static IP address, there would be no binding and thus connection dropped.&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 16:37:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843990#M1100942</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-27T16:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843991#M1100943</link>
      <description>&lt;P&gt;thanks again, i'll take a look for that solution&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 16:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843991#M1100943</guid>
      <dc:creator>chengl031</dc:creator>
      <dc:date>2023-05-27T16:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: user-ip mapping for lan connection</title>
      <link>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843996#M1100944</link>
      <description>&lt;P&gt;Really? I think in the default configuration the lan authentication only on layer 2, i tried to change ip in a wireless with wpa2-enterprise authentication method and success. Please tell me if i miss something or this behaviour need to an additional config.&lt;/P&gt;&lt;P&gt;i want to try figure out in network scope first, if not then i'll think about some solution by agent or tools on client. A very important requirement is traffic audit. so vlan scope is too large and cannot relate to a single user. And also you know FTD is a NGFW, we also want to use some layer 7 access control policy, such as define a rules based on AD user group. these also need a user-ip mapping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 16:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/user-ip-mapping-for-lan-connection/m-p/4843996#M1100944</guid>
      <dc:creator>chengl031</dc:creator>
      <dc:date>2023-05-27T16:42:21Z</dc:date>
    </item>
  </channel>
</rss>

