<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Alisson ,  I think you can in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741093#M178431</link>
    <description>&lt;P&gt;Hi Alisson ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you can use the certificate matching feature under the XML profile of Anyconnect , make sure the certificate store field is selected as "all" . Also you&amp;nbsp;&amp;nbsp;can limit the devices that can connect to the VPN with DAP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See more information below.&lt;/P&gt;&lt;P&gt;XML features&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/12549161/anyconnect-xml-preferences" target="_blank"&gt;https://supportforums.cisco.com/document/12549161/anyconnect-xml-preferences&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/12550601/anyconnect-xml-settings" target="_blank"&gt;https://supportforums.cisco.com/document/12550601/anyconnect-xml-settings&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DAP files&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115947-dap-adv-functions-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115947-dap-adv-functions-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;-Randy-&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2015 04:31:59 GMT</pubDate>
    <dc:creator>rvarelac</dc:creator>
    <dc:date>2015-09-30T04:31:59Z</dc:date>
    <item>
      <title>Cisco AnyConnect: Check Computer Certificate Domain Membership</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741092#M178430</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an ASA5550, on which I have successfuly configured Anyconnect (Client version 3.1.10010) to authenticate with both Username/Password and User certificate issued by my internal CA.&lt;/P&gt;&lt;P&gt;What I'm actually trying to achieve is to allow only computer domain members to login to this VPN access. So users cannot connect to the VPN when they are in their non-corporate devices.&lt;/P&gt;&lt;P&gt;I know every domain member&amp;nbsp;computer have a&amp;nbsp;certificate issued by my internal CA.&amp;nbsp;Is it possible to use this certificate to authenticate the VPN instead of the User Cert?&lt;/P&gt;&lt;P&gt;I only have cisco Anyconnect Essentials license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Version 9.1(6)4&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp; &amp;nbsp; : Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Maximum VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 400 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Active/Active &amp;nbsp;perpetual&lt;BR /&gt;Encryption-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Encryption-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Security Contexts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;GTP/GPRS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;AnyConnect Essentials &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 5000 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 5000 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Total VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 5000 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Shared License &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Mobile &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;UC Phone Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Total UC Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Botnet Traffic Filter &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Intercompany Media Engine &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Cluster &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741092#M178430</guid>
      <dc:creator>Alisson C</dc:creator>
      <dc:date>2019-03-12T06:39:52Z</dc:date>
    </item>
    <item>
      <title>Hi Alisson ,  I think you can</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741093#M178431</link>
      <description>&lt;P&gt;Hi Alisson ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you can use the certificate matching feature under the XML profile of Anyconnect , make sure the certificate store field is selected as "all" . Also you&amp;nbsp;&amp;nbsp;can limit the devices that can connect to the VPN with DAP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See more information below.&lt;/P&gt;&lt;P&gt;XML features&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/12549161/anyconnect-xml-preferences" target="_blank"&gt;https://supportforums.cisco.com/document/12549161/anyconnect-xml-preferences&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/12550601/anyconnect-xml-settings" target="_blank"&gt;https://supportforums.cisco.com/document/12550601/anyconnect-xml-settings&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DAP files&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115947-dap-adv-functions-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115947-dap-adv-functions-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;-Randy-&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2015 04:31:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741093#M178431</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2015-09-30T04:31:59Z</dc:date>
    </item>
    <item>
      <title>Hello Randy,Thank you for</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741094#M178432</link>
      <description>&lt;P&gt;Hello Randy,&lt;/P&gt;&lt;P&gt;Thank you for your answer.&lt;/P&gt;&lt;P&gt;That is exactly what I was looking for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2015 13:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741094#M178432</guid>
      <dc:creator>Alisson C</dc:creator>
      <dc:date>2015-10-01T13:45:36Z</dc:date>
    </item>
    <item>
      <title>Its been a long time, but I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741095#M178433</link>
      <description>&lt;P&gt;Its been a long time, but I would like to update this to say that new windows (7 and 10) when using UAC in high levels still are unable to read the&amp;nbsp;machine certificates, even if the option "Certificate store override" enabled in the Cisco AnyConnect client profile.&lt;/P&gt;
&lt;P&gt;After struggling with it for weeks, i found out that the issue is related to the&amp;nbsp;users with no admin privileges not being able to read the private key on the computer identity certificate.&lt;/P&gt;
&lt;P&gt;If you add the permission, it will work.&lt;BR /&gt;Since I have to do this on about 2.5k computers, I had to use a powershell script + GPO on windows that sets the permission.&lt;/P&gt;
&lt;P&gt;After that, VPN has been working just fine.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 18:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/2741095#M178433</guid>
      <dc:creator>Alisson C</dc:creator>
      <dc:date>2016-10-28T18:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Its been a long time, but I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/3719692#M178434</link>
      <description>We will check this out. We are having a similar issue. Thanks!</description>
      <pubDate>Fri, 05 Oct 2018 01:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-check-computer-certificate-domain-membership/m-p/3719692#M178434</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2018-10-05T01:32:19Z</dc:date>
    </item>
  </channel>
</rss>

