<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA Cut-Through Proxy Authentication with User Identity in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718816#M193084</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd like to implement Cut-Through Proxy LDAP Authentication with User Identity for pc that are not&amp;nbsp;in AD domain. What about if those pc have ssh rules for example ? I guess it is not possible to intercept ssh traffic then open a listener http page to authenticate user.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:23:03 GMT</pubDate>
    <dc:creator>giuseppe parlato</dc:creator>
    <dc:date>2019-03-12T06:23:03Z</dc:date>
    <item>
      <title>Cisco ASA Cut-Through Proxy Authentication with User Identity</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718816#M193084</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd like to implement Cut-Through Proxy LDAP Authentication with User Identity for pc that are not&amp;nbsp;in AD domain. What about if those pc have ssh rules for example ? I guess it is not possible to intercept ssh traffic then open a listener http page to authenticate user.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718816#M193084</guid>
      <dc:creator>giuseppe parlato</dc:creator>
      <dc:date>2019-03-12T06:23:03Z</dc:date>
    </item>
    <item>
      <title>Hi,So your query is that you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718817#M193088</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;So your query is that you would like Cut Thru Authentication to work for the users not in LDAP where LDAP is your AAA server ?&lt;/P&gt;&lt;P&gt;I don't think this should be possible as the user identity would not be known to the ASA device to apply the rules.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 14:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718817#M193088</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-08-11T14:11:51Z</dc:date>
    </item>
    <item>
      <title>No sorry let me clarify, I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718818#M193093</link>
      <description>&lt;P&gt;No sorry let me clarify, I was just wondering if there is any other way to catch traffic other then http/https for cut-through proxy autentication. I suppose the answer is no.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2015 08:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718818#M193093</guid>
      <dc:creator>giuseppe parlato</dc:creator>
      <dc:date>2015-08-12T08:19:23Z</dc:date>
    </item>
    <item>
      <title>Hi,Actually you can.You can</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718819#M193096</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Actually you can.&lt;/P&gt;&lt;P&gt;You can refer this for more information:-&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113363-asa-cut-through-config-00.html&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/70992-tacacs-radius-config.html&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2015 09:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cut-through-proxy-authentication-with-user-identity/m-p/2718819#M193096</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-08-12T09:10:47Z</dc:date>
    </item>
  </channel>
</rss>

