<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco 3140 with User Identity in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865746#M1102210</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I'm currently deploying a couple of Cisco 3140 firewalls that I need to setup to use user identity so that I can configure access polices using AD users/groups. When I looked at this previously, this used an agent on AD however this has since changed.&lt;/P&gt;&lt;P&gt;We have an ISE implementation, however our devices currently only authenticate using machine cert, not user, so ISE has no visibility of the user to match against AD. We are looking at deploying user certs, however this will take time.&lt;/P&gt;&lt;P&gt;I have looked at the various guides and I think that I can integrate ISE with AD using WMI to pull Windows security events that can then be published to FMC/FTD via pxGrid. Is this a common recommended approach if I cant get user info from network authentication events?&lt;/P&gt;</description>
    <pubDate>Sat, 01 Jul 2023 18:21:18 GMT</pubDate>
    <dc:creator>packet2020</dc:creator>
    <dc:date>2023-07-01T18:21:18Z</dc:date>
    <item>
      <title>Cisco 3140 with User Identity</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865746#M1102210</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I'm currently deploying a couple of Cisco 3140 firewalls that I need to setup to use user identity so that I can configure access polices using AD users/groups. When I looked at this previously, this used an agent on AD however this has since changed.&lt;/P&gt;&lt;P&gt;We have an ISE implementation, however our devices currently only authenticate using machine cert, not user, so ISE has no visibility of the user to match against AD. We are looking at deploying user certs, however this will take time.&lt;/P&gt;&lt;P&gt;I have looked at the various guides and I think that I can integrate ISE with AD using WMI to pull Windows security events that can then be published to FMC/FTD via pxGrid. Is this a common recommended approach if I cant get user info from network authentication events?&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jul 2023 18:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865746#M1102210</guid>
      <dc:creator>packet2020</dc:creator>
      <dc:date>2023-07-01T18:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3140 with User Identity</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865815#M1102219</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1304848"&gt;@packet2020&lt;/a&gt; yes you could use ISE PassiveID to learn user login/logoff events from AD which can be sent to the FMC/FTD. I've used PassiveID before (a long time ago), in my experience its not as common as deploying 802.1X.&lt;/P&gt;
&lt;P&gt;Relevant guides:-&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-easy-connect/ta-p/3638861" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-easy-connect/ta-p/3638861&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://integratingit.wordpress.com/2019/10/26/ftd-user-identity/" target="_blank"&gt;https://integratingit.wordpress.com/2019/10/26/ftd-user-identity/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://integratingit.wordpress.com/2018/08/25/cisco-ise-pxgrid-integration-with-firepower/" target="_blank"&gt;https://integratingit.wordpress.com/2018/08/25/cisco-ise-pxgrid-integration-with-firepower/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2023 07:15:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865815#M1102219</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-07-02T07:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3140 with User Identity</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865888#M1102229</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;Thanks for the reply. I will take a look a enabling Passive ID in the short term whist we look at rolling out user certificates for 802.1X&lt;/P&gt;&lt;P&gt;One question regarding User Identity and 802.1X EAP-TLS authentication - I assume that FMC will simply derive the username of the session from the username that is presented in the certificate Subject Common Name or SAN field? This behavior is understood when using PEAP-MSCHAP for authentication, however there are no documents that clearly describe how user identity works if EAP-TLS is used for 802.1X authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2023 13:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865888#M1102229</guid>
      <dc:creator>packet2020</dc:creator>
      <dc:date>2023-07-02T13:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3140 with User Identity</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865890#M1102230</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1304848"&gt;@packet2020&lt;/a&gt; its ISE that will derive the username from the certificate, use a "Certificate Authentication Profile" (CAP) and select which certificate attribute (i.e. Subject - Common Name or whatever you select) is used for the username. Example - &lt;A href="https://integratingit.wordpress.com/2022/04/17/ise-certificate-authentication/" target="_blank"&gt;https://integratingit.wordpress.com/2022/04/17/ise-certificate-authentication/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Once authentication ISE will create a username/IP binding, this binding is sent to the FMC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2023 13:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4865890#M1102230</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-07-02T13:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3140 with User Identity</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4866022#M1102236</link>
      <description>&lt;P&gt;One thing I would keep in mind is that with Microsoft patch&amp;nbsp;KB5014692 WMI won't work for the passive ID anymore. I had to move customers deployments from WMI to the passive ID agent for that reason.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2023 22:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4866022#M1102236</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-02T22:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3140 with User Identity</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4866509#M1102252</link>
      <description>&lt;P&gt;Like &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt; suggested, you have the options of:&lt;/P&gt;
&lt;P&gt;a. pulling the username from their certificte via the CAP and/or&lt;/P&gt;
&lt;P&gt;b. Using PassiveID. Use with with the Agent option (not WMI) and it works fine with even the latest Windows server versions. WMI has always been troublesome and, even when you get it to work, Microsoft seems to find something new about it that's vulnerable and breaks it for you on some random Patch Tuesday. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can use both options and have more complete coverage of your endpoints' associated user identities.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 12:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3140-with-user-identity/m-p/4866509#M1102252</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-07-03T12:51:16Z</dc:date>
    </item>
  </channel>
</rss>

