<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASDM access-list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3385914#M958939</link>
    <description>&lt;P&gt;thanks for the reply,&lt;/P&gt;
&lt;P&gt;so what I understand is ISE-PIC is different software than a cisco ISE ??&lt;/P&gt;
&lt;P&gt;As instructed the replacement is trust sec does ISE supports trust sec with fortigate devices if they are been deployed as a datacenter firewalls.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Sat, 19 May 2018 14:16:44 GMT</pubDate>
    <dc:creator>adamgibs7</dc:creator>
    <dc:date>2018-05-19T14:16:44Z</dc:date>
    <item>
      <title>ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3380717#M958904</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been seeing the user option in ASDM gui as per the attached , how I can utilize that, for example it will act as a source and destination with a particular user grant him access or else block him, do we have any single sign on option like fortigate so that users are authenticated while windows login.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:44:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3380717#M958904</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2020-02-21T15:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3380727#M958908</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I think &lt;A href="https://supportforums.cisco.com/t5/security-documents/asa-idfw-identity-firewall-step-by-step-configuration/ta-p/3127806" target="_self"&gt;this&lt;/A&gt; is exactly what you are looking for, this uses the ASA AD Agent, however I don't think the AD agent is supported any &lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/eol_C51-728518.html" target="_self"&gt;longer&lt;/A&gt;. You could achieve the same result by integrating with ISE, sending trustsec tags from ISE to ASA using SXP and then create a rule from source TrustSec SGT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 14:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3380727#M958908</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-09T14:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3381651#M958911</link>
      <description>&lt;P&gt;Dear RJI&lt;/P&gt;
&lt;P&gt;thanks for the reply,&lt;/P&gt;
&lt;P&gt;If anybody don't have ISE then will it work with CDA.??&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 07:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3381651#M958911</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-11T07:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3381670#M958912</link>
      <description>As mentioned CDA is phased out. Would you really aim to work with an obsolete software that basically controls your network access and your business flow?&lt;BR /&gt;Do you already have it bought (CDA)?&lt;BR /&gt;&lt;BR /&gt;How many users you have behind this firewall: 100+, 500+?</description>
      <pubDate>Fri, 11 May 2018 08:15:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3381670#M958912</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-11T08:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3381793#M958918</link>
      <description>&lt;P&gt;from the links provided what I understand is AD user agent is different than the context directory Agent, and context directory agent are still supported please correct me if I m wrong.&lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 12:41:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3381793#M958918</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-11T12:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3383750#M958927</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;Any update experts, the thoughts are correct ??? the CDA is just updated in 2017&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 19:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3383750#M958927</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-15T19:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3383766#M958935</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I can't find much information regarding this, but I did find this &lt;A href="https://supportforums.cisco.com/t5/cloud-web-security/cda-support-for-windows-server-2016/td-p/2971244" target="_self"&gt;post&lt;/A&gt; which indicates CDA is dead and potentially ISE PIC will replace it. So CDA might not officially be EOL but it may well be soon.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 19:38:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3383766#M958935</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-15T19:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3385914#M958939</link>
      <description>&lt;P&gt;thanks for the reply,&lt;/P&gt;
&lt;P&gt;so what I understand is ISE-PIC is different software than a cisco ISE ??&lt;/P&gt;
&lt;P&gt;As instructed the replacement is trust sec does ISE supports trust sec with fortigate devices if they are been deployed as a datacenter firewalls.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sat, 19 May 2018 14:16:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3385914#M958939</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-19T14:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3387253#M958943</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;please correct me if im wrong. also please answer the below query.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 22 May 2018 19:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3387253#M958943</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-22T19:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3387298#M958950</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/pic_admin_guide/PIC_admin/PIC_admin_chapter_00.pdf" target="_self"&gt;This&lt;/A&gt; document describes the difference between ISE and ISE-PIC, it's basically a cut down version of ISE. Refer to the document as it clearly list what functionality is or is not supported in PIC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No I do not believe you can use pxgrid with fortinet.&lt;/P&gt;</description>
      <pubDate>Tue, 22 May 2018 21:28:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3387298#M958950</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-22T21:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access-list</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3387934#M958953</link>
      <description>&lt;P&gt;thanks RJI, +5 to you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;fortigate firewall has FSSO in build on the OS of the fortigate, we don't have to install a ISE-PIC stuff, cisco has made very complicate things for the very simple feature, In fortigate when we create a access-list we see the object group, services, and users as well. it is very simple to configure access policies with users in &amp;nbsp;fortigate firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 23 May 2018 19:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-list/m-p/3387934#M958953</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-05-23T19:42:25Z</dc:date>
    </item>
  </channel>
</rss>

