<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD remote access VPN with ISE posture in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3848892#M31714</link>
    <description>&lt;P&gt;that is correct FTD does support CoA since 6.3 , which means you should be able to set this up just as you would on ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See the following guide as example for FTD&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is an older version for Posture setup with ISE but can be used as a guide line for FTD&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 May 2019 07:48:48 GMT</pubDate>
    <dc:creator>ldanny</dc:creator>
    <dc:date>2019-05-02T07:48:48Z</dc:date>
    <item>
      <title>FTD remote access VPN with ISE posture</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3848834#M31713</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where can I find ISE component compatibility with FTD which is not included in the below document.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/compatibility/b_ise_sdt_24.html#ciscoremoteaccess" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/compatibility/b_ise_sdt_24.html#ciscoremoteaccess&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can see DACL and COA are supported from FTD6.3. But I still not sure if ISE posture solution for FTD anyconnect VPN can work or partially work.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3848834#M31713</guid>
      <dc:creator>xili5</dc:creator>
      <dc:date>2020-02-21T17:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD remote access VPN with ISE posture</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3848892#M31714</link>
      <description>&lt;P&gt;that is correct FTD does support CoA since 6.3 , which means you should be able to set this up just as you would on ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See the following guide as example for FTD&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is an older version for Posture setup with ISE but can be used as a guide line for FTD&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 07:48:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3848892#M31714</guid>
      <dc:creator>ldanny</dc:creator>
      <dc:date>2019-05-02T07:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTD remote access VPN with ISE posture</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3849117#M31715</link>
      <description>&lt;P&gt;Hi Danny,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The document is about ASA AnyConnect VPN with ISE posture and FTD AnyConnect VPN without ISE posture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have FTD AnyConnect VPN with ISE posture document? Does FTD support redirect URL to ensure client provisioning working? If so, how to define redirect ACL, which ACL action mean redirect, permit or deny?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 14:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3849117#M31715</guid>
      <dc:creator>xili5</dc:creator>
      <dc:date>2019-05-02T14:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTD remote access VPN with ISE posture</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3850354#M31716</link>
      <description>&lt;P&gt;Moving this topic to &lt;A href="https://community.cisco.com/t5/firepower/bd-p/discussions-firepower" target="_blank" rel="noopener"&gt;FirePOWER&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This is actually among&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/relnotes/firepower-release-notes-640/features.html#id_84381" target="_blank" rel="noopener"&gt;New Features in Firepower Device Manager/FTD Version 6.4.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border-collapse: collapse; width: 100%;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%;"&gt;Support for RADIUS servers and Change of Authorization in remote access VPN.&lt;/TD&gt;
&lt;TD style="width: 50%;"&gt;You can now use RADIUS servers for authenticating, authorizing, and accounting remote access VPN (RA VPN) users. You can also configure Change of Authentication (CoA), also known as dynamic authorization, to alter a user’s authorization after authentication when you use a Cisco ISE RADIUS server.&lt;BR /&gt;We added attributes to the RADIUS server and server group objects, and made it possible to select a RADIUS server group within an RA VPN connection profile.&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;ISE configurations are identical to that for ASA, as Danny pointed out.&lt;/P&gt;
&lt;P&gt;As FTD 6.4 released after the most recent ISE releases, it's not yet vetted by ISE teams. Please ask FirePower team for this info.&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2019 00:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-with-ise-posture/m-p/3850354#M31716</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-05T00:21:24Z</dc:date>
    </item>
  </channel>
</rss>

