<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Implement Identity Policy for Anyconnect users in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3298680#M926270</link>
    <description>&lt;P&gt;Hello Friends,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm stuck in a problem where need your suggestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have ASA 5555X (9.6.(3)8) with Sourcefire services (6.2.2) running in HA. I have implemented Passive authentication and Active authentication as a fallback of Passive for all my internal users and its working seamless.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The same thing I want to implement for Anyconnect users but unable to determine the best approach.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I enable Passive authentication for Anyconnect user then there would be a mismatch of user &amp;amp; IP as VPN users are mean to get frequently connected and disconnected and ASA will provide different IPs (depends on ASA available IP) and I don't want my user to put credential again on the captive portal every time. SSO should be there.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 14:58:54 GMT</pubDate>
    <dc:creator>pankajkumar2</dc:creator>
    <dc:date>2020-02-21T14:58:54Z</dc:date>
    <item>
      <title>Implement Identity Policy for Anyconnect users</title>
      <link>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3298680#M926270</link>
      <description>&lt;P&gt;Hello Friends,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm stuck in a problem where need your suggestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have ASA 5555X (9.6.(3)8) with Sourcefire services (6.2.2) running in HA. I have implemented Passive authentication and Active authentication as a fallback of Passive for all my internal users and its working seamless.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The same thing I want to implement for Anyconnect users but unable to determine the best approach.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I enable Passive authentication for Anyconnect user then there would be a mismatch of user &amp;amp; IP as VPN users are mean to get frequently connected and disconnected and ASA will provide different IPs (depends on ASA available IP) and I don't want my user to put credential again on the captive portal every time. SSO should be there.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3298680#M926270</guid>
      <dc:creator>pankajkumar2</dc:creator>
      <dc:date>2020-02-21T14:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: Implement Identity Policy for Anyconnect users</title>
      <link>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3298709#M926271</link>
      <description>&lt;P&gt;What's the authentication server for your VPN users?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it were ISE, you should be able to use that as an identity source in FMC.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 15:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3298709#M926271</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-19T15:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Implement Identity Policy for Anyconnect users</title>
      <link>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3299090#M926272</link>
      <description>&lt;P&gt;Thanks Marvin for your response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are using Microsoft AD as an authentication source for VPN user and not using ISE as of now.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2017 04:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3299090#M926272</guid>
      <dc:creator>pankajkumar2</dc:creator>
      <dc:date>2017-12-20T04:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: Implement Identity Policy for Anyconnect users</title>
      <link>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3299376#M926273</link>
      <description>&lt;P&gt;OK, unfortunately with AD directly as the AAA server, you won't get the mapping of user-IP address even if you use the Firepower User Agent.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just confirmed in my lab that User Agent does not map those authentications as they are not logins in the AD sense of a user logging into a workstation. Rather they are a basic LDAP authentication of a username against the AD database. As such, the User Agent doesn't capture the WMI logon event that uses.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2017 12:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3299376#M926273</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-20T12:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: Implement Identity Policy for Anyconnect users</title>
      <link>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3303744#M926274</link>
      <description>Thanks Marvin for your support.&lt;BR /&gt;But in that case, what is the best possible solution for us? &lt;BR /&gt;As I understood, Passive authentication will not work here &amp;amp; if I decide to use Active authentication, I think that will also not work properly. &lt;BR /&gt;Let me explain, let's take an example:-&lt;BR /&gt;User1 has connected over VPN and got IP1 --&amp;gt; He accessed Internet post successful authentication on Captive portal&lt;BR /&gt;Now User1 has disconnected from VPN after some time but his Internet session still remains active on FMC &amp;amp; SFR&lt;BR /&gt;Now, User2 has tried connecting VPN and got the same IP from ASA --&amp;gt; As FMC/SFR is already having a session associated with that IP, it will simply allow the internet connection without asking any authentication which is a kind of identity breach, user will be able to access that type of Internet content for which that user is not allowed.&lt;BR /&gt;&lt;BR /&gt;Please help with practical solution.</description>
      <pubDate>Fri, 29 Dec 2017 07:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3303744#M926274</guid>
      <dc:creator>pankajkumar2</dc:creator>
      <dc:date>2017-12-29T07:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Implement Identity Policy for Anyconnect users</title>
      <link>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3303878#M926275</link>
      <description>&lt;P&gt;Adding ISE to the mix would establish an authoritative source of identity to IP mapping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Short of that I don’t think you can do it with the ASA, Firepower and AD.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Dec 2017 12:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implement-identity-policy-for-anyconnect-users/m-p/3303878#M926275</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-29T12:50:20Z</dc:date>
    </item>
  </channel>
</rss>

