<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower URL Filtering Active Directory Integration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227838#M1117768</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324561"&gt;@Keegan Santos&lt;/a&gt;&amp;nbsp;You can just install on an AD server, so it would send all AD authentication events. You don't necessarily need to install on windows AD domain joined endpoints, although you can install on a client. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/passive-identity-agent.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/passive-identity-agent.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;How are the android and iOS devices authenticating to the network? If they authenticate some how to AD and generate the necessary Windows event IDs (as per the guide already provided), then the Passive ID agent will receive those events.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Nov 2024 20:02:56 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-11-22T20:02:56Z</dc:date>
    <item>
      <title>Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227824#M1117763</link>
      <description>&lt;P&gt;We are considering purchasing a license for URL filtering to use with FirePower on an FPR1120.&amp;nbsp; I wanted to see what is required to integrate the URL filtering with active directory so that it applies certain policies to certain users and groups.&amp;nbsp; The goal for this being that some users are more or less restricted than others.&amp;nbsp; I have searched but haven't found much on this and it seems like the method of implementation has changed somewhat recently.&amp;nbsp; Is there a guide that goes over the current proper setup for this?&amp;nbsp; Also is there any extra licenses required to integrate AD with Firepower URL filtering?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 19:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227824#M1117763</guid>
      <dc:creator>Keegan Santos</dc:creator>
      <dc:date>2024-11-22T19:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227827#M1117764</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324561"&gt;@Keegan Santos&lt;/a&gt; you can use AD realm/ISE/ISE-PIC - you'd need ISE/ISE-PIC licensing.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://pseudoco.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/create_and_manage_realms.html" target="_blank"&gt;https://pseudoco.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/create_and_manage_realms.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://pseudoco.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/control_users_with_ise_ise_pic.html" target="_blank"&gt;https://pseudoco.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/control_users_with_ise_ise_pic.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;or if running the latest FMC version 7.6 you can use the Passive Identity agent&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/m_user-control-with-the-passive-identity-agent.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/m_user-control-with-the-passive-identity-agent.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 19:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227827#M1117764</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-11-22T19:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227829#M1117765</link>
      <description>&lt;P&gt;ISE-PIC is a license that is purchased for the FPR 1120 in addition to the URL filtering license?&lt;/P&gt;
&lt;P&gt;I can update it to 7.6 if necessary, but would the passive identity agent also require a ISE-PIC license?&lt;/P&gt;
&lt;P&gt;Do either of these option require a client to be deployed on the end user's device?&amp;nbsp; For devices that do not have a user authenticated to AD, such as an Android or iOS phone, how does the filtering get applied?&amp;nbsp; Can it be applied per VLAN or network?&amp;nbsp; For example if we setup a "Admin" and "User" network can different filtering policies be applied to those networks?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 19:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227829#M1117765</guid>
      <dc:creator>Keegan Santos</dc:creator>
      <dc:date>2024-11-22T19:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227831#M1117766</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324561"&gt;@Keegan Santos&lt;/a&gt; ISE-PIC is a separate license to the URL Filtering license.&lt;/P&gt;
&lt;P&gt;You do not need to use Cisco ISE with the &lt;SPAN class="ph"&gt;passive identity agent&lt;/SPAN&gt;. Passive ID agent works by sending session data (event logs) from Microsoft Active Directory (AD) to the &lt;SPAN class="ph"&gt;FMC. You create an Identity Policy to control trafffic based on AD group/user etc&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 19:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227831#M1117766</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-11-22T19:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227835#M1117767</link>
      <description>&lt;P&gt;So then based on your response an agent would be required on the computers with Passive Identity correct?&amp;nbsp; How is traffic filtering if a device doesn't have the agent installed?&amp;nbsp; Such as with an Android or iOS phone.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 19:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227835#M1117767</guid>
      <dc:creator>Keegan Santos</dc:creator>
      <dc:date>2024-11-22T19:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227838#M1117768</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324561"&gt;@Keegan Santos&lt;/a&gt;&amp;nbsp;You can just install on an AD server, so it would send all AD authentication events. You don't necessarily need to install on windows AD domain joined endpoints, although you can install on a client. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/passive-identity-agent.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/passive-identity-agent.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;How are the android and iOS devices authenticating to the network? If they authenticate some how to AD and generate the necessary Windows event IDs (as per the guide already provided), then the Passive ID agent will receive those events.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 20:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227838#M1117768</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-11-22T20:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227840#M1117769</link>
      <description>&lt;P&gt;&lt;A href="https://rayka-co.com/lesson/cisco-ftd-identity-policy-active-authentication/" target="_blank"&gt;https://rayka-co.com/lesson/cisco-ftd-identity-policy-active-authentication/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Use active authc and attach users to ACP URL filter.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 20:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227840#M1117769</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-22T20:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227842#M1117770</link>
      <description>&lt;P&gt;They authenticate with a WPA key.&amp;nbsp; Devices on the guest network don't authenticate, they connect to an open network that is restricted from accessing any network except the Internet and has its bandwidth limited.&amp;nbsp; We wouldn't restrict the guest network heavily, we would still like to restrict access to a few select categories such as adult content though.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 20:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227842#M1117770</guid>
      <dc:creator>Keegan Santos</dc:creator>
      <dc:date>2024-11-22T20:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower URL Filtering Active Directory Integration</title>
      <link>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227846#M1117771</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324561"&gt;@Keegan Santos&lt;/a&gt; you could use a captive portal to authenticate the guest users &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/identity-captive-portal.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/760/management-center-device-config-76/identity-captive-portal.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Or just apply a normal Access Control rule for the guest network(s) that restrict access to adult content.&lt;/P&gt;
&lt;P&gt;You can still apply different Access Control rules for your AD devices based on the information learnt from the ID agent (as per the above information).&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 20:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-url-filtering-active-directory-integration/m-p/5227846#M1117771</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-11-22T20:37:45Z</dc:date>
    </item>
  </channel>
</rss>

