Network Access Control

Cisco Access Control Server (ACS), Identity Services Engine (ISE), Zero Trust Workplace
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.

Labels

Forum Posts

I have successfully configured a VPN 3005 using the internal database to authenticate remote users. My end-user population is growing so I want to be able to authenticate remote users against our NT domain. I have tried unsuccessfully to configure ...

asafayan by Level 4
  • 2026 Views
  • 1 replies
  • 0 Helpful votes

Dear Tech,We are having Cisco Secure 2.6 and it is using Windows NT Database, We have Pix firewall 5.1, Cisco Secure is configured for single session in group settings that are mapped to Windows NT Groups, initially it worked fine and denying multi s...

kefah by Level 1
  • 2452 Views
  • 4 replies
  • 0 Helpful votes

I'm using VPN 3030 Concentrator and Cisco ACS 2.6 NT as radius server.I found that the CiscoSecure cannot authenticate Win98/ME VPN clients if the WindowsNT domain name is entered on the clients PC. The following error message was appeared on the cl...

rman by Level 1
  • 2094 Views
  • 1 replies
  • 0 Helpful votes

Has anyone done this before? I am trying to set up a VPN for off-site cable/dsl users so that they can gain access to our on-site resources. I haven't been able to come across anything regarding user authentication and NIS+, so I am unsure if the C...

We are testing with ACS 2.6 server for LEAP authentication for AP340 series Access points and WLAN clients and configured to authenticate against NT user database (using external database). As recommended for dynamic WEP Keys we have set the Option 2...

suresh.v by Level 1
  • 2169 Views
  • 2 replies
  • 0 Helpful votes

This is the scenario: 2 networks, one whith servers plus firewall, other with users and firewall to access to servers. We pretend something like give a card or key to the user to access to remote servers and when is gone (out), key or card return to ...

s.sousa by Level 1
  • 2116 Views
  • 1 replies
  • 0 Helpful votes

i am doing a site-to-site vpn experiment with two router.one is 3660(Ra).another is provided by other(Rb).if Ra initiates the negotiation, a new isakmp sa can be got but authentication fails.otherwise Rb is the initiator, the isakmp sa negotiation ca...

On our routers we can perform user command accounting. For example, we can get a log of the commands users enter in the routers from our ACS box.I haven't been successful in doing the same on the PIX. Instead, I've gotten all IP and and layer-4 Por...

bnidacoc by Level 1
  • 2354 Views
  • 7 replies
  • 0 Helpful votes