<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE RADIUS ssh access to both FMC and FTD using groups in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/5119811#M1113104</link>
    <description>&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;Bit late to the party with this but the read only FTD access specifically... Did you define radius service-type=7 on ISE and then define an external authentication object within FMC under the security analysts(read-only) section? I am looking at creating ftd read/write and read only access. I guess I need to implement service type 6 for administrators section on FMC and type 7 in the sec analyst part?&lt;/P&gt;&lt;P&gt;Not seeing much info on this other than the official Cisco documentation which defines class type and one external authentication object for FMC and ftd.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;</description>
    <pubDate>Wed, 29 May 2024 17:00:57 GMT</pubDate>
    <dc:creator>marcbinns1987</dc:creator>
    <dc:date>2024-05-29T17:00:57Z</dc:date>
    <item>
      <title>ISE RADIUS ssh access to both FMC and FTD using groups</title>
      <link>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4471369#M1083985</link>
      <description>&lt;P&gt;I've integrated RADIUS authentication with my FMC deployment. I managed to get the FTD ssh console access to work read-write with administrators and read-only for the lower privilege reporting group by passing "Service-Type = 6" for admins and "Service-Type = 7" for read-only. However I do not have ssh access to the FMC with this system. There is a place to manually enter usernames for ssh access in the External Authentication source on the FMC but doing this breaks the dynamic group membership such that all users now have to be individually managed in the FMC authentication source configuration and there is no Read-only option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there another RADIUS attribute or attributes that the FMC would be looking for to grant ssh access?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 14:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4471369#M1083985</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2021-09-22T14:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE RADIUS ssh access to both FMC and FTD using groups</title>
      <link>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4471525#M1083986</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/14032"&gt;@Andrew White&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You define an ISE Authorisation Profile(s) using "RADIUS Class = &amp;lt;define a value&amp;gt;", such as "FMCAdmin" or "FMCRead"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the FMC, under External Authentication Objects for each RADIUS Specific Parameter role you specify the value sent by RADIUS -&amp;nbsp; "Class=FMCAdmin" under "Administrator" role and "Class=FMCRead" under the "Security Analyst (Read Only)" role.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 17:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4471525#M1083986</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-22T17:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE RADIUS ssh access to both FMC and FTD using groups</title>
      <link>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4473613#M1083987</link>
      <description>&lt;P&gt;Right, that works just fine for GUI access but it is not working for Console/SSH access to the FMC. It is working just fine for ssh access to the FTD. This leads me to believe that the issue is something specific to the FMC.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Sep 2021 21:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4473613#M1083987</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2021-09-24T21:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE RADIUS ssh access to both FMC and FTD using groups</title>
      <link>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4526307#M1086163</link>
      <description>&lt;P&gt;try this : translate the page is required.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3-%E3%83%89%E3%82%AD%E3%83%A5%E3%83%A1%E3%83%B3%E3%83%88/fmc-radius%E8%AA%8D%E8%A8%BC%E3%81%AB%E3%82%88%E3%82%8B%E7%AE%A1%E7%90%86%E3%83%A6%E3%83%BC%E3%82%B6%E3%81%AE%E8%BF%BD%E5%8A%A0/ta-p/3956036" target="_blank"&gt;https://community.cisco.com/t5/%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3-%E3%83%89%E3%82%AD%E3%83%A5%E3%83%A1%E3%83%B3%E3%83%88/fmc-radius%E8%AA%8D%E8%A8%BC%E3%81%AB%E3%82%88%E3%82%8B%E7%AE%A1%E7%90%86%E3%83%A6%E3%83%BC%E3%82%B6%E3%81%AE%E8%BF%BD%E5%8A%A0/ta-p/3956036&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 11:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/4526307#M1086163</guid>
      <dc:creator>M.Aslam Usmani</dc:creator>
      <dc:date>2022-01-04T11:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE RADIUS ssh access to both FMC and FTD using groups</title>
      <link>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/5119811#M1113104</link>
      <description>&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;Bit late to the party with this but the read only FTD access specifically... Did you define radius service-type=7 on ISE and then define an external authentication object within FMC under the security analysts(read-only) section? I am looking at creating ftd read/write and read only access. I guess I need to implement service type 6 for administrators section on FMC and type 7 in the sec analyst part?&lt;/P&gt;&lt;P&gt;Not seeing much info on this other than the official Cisco documentation which defines class type and one external authentication object for FMC and ftd.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 17:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-radius-ssh-access-to-both-fmc-and-ftd-using-groups/m-p/5119811#M1113104</guid>
      <dc:creator>marcbinns1987</dc:creator>
      <dc:date>2024-05-29T17:00:57Z</dc:date>
    </item>
  </channel>
</rss>

