Trying to get LDAP / Active Directory integration so we can use different policies for different AD users and groups. Lets for example say in Active Directory I have the following structure:
Group=accounting (both above members belong to group)
Group=Information Technology (both above members belong to group).
In the above scenereo if I do a group test for email@example.com and group accounting, it always comes back that they are not a member of the group. In ADUC in that group under the e-mail field its spelled out like firstname.lastname@example.org. So I tried this syntax in the group test but I still get that they are not a member of the group.
Failure: Action: match negative. Reason: unknown error (assumed not a member of the group).
How do you sucessfully query for groups in this case?
Ha, you my friend saved the day yet again. I really owe you a beverage.
Thanks so much, my new mail policy is working correctly (as I tested moving myself in and out of the AD group I am looking at). I see it caches it for 900 seconds (which is tunable), but for testing I did use the clear LDAP cache.
Not only does this work with my mail flow policy, I could see other future possibilities down the road with the LDAP integration since now we can check / test on it and perform an action based on it. I also tightened up the directory harvest protection a bit.
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...