06-21-2017 10:50 AM - edited 03-11-2019 12:48 AM
Hi,
I have Cisco ISE 2.2.0 installed and running for a bunch of things and everything works perfectly except Palo Alto remote access VPN user validation with the GlobalProtect client.
This works perfectly with the Microsoft NPS Radius, but there is no way to reproduce the conditions and authorization profile to work with Cisco ISE.
Does anyone have the necessary parameters or can someone help me?
Best regards.
Solved! Go to Solution.
06-22-2017 04:05 AM
Hi Rahul,
I just tried it and it works perfectly, I had to create a new Radius Vendor called PaloAlto_Vendor and a new Network Device Profile called PaloAltoNetworks to which I added this dictionary.
Then I have associated the 2 PA-500s created in Network Devices with their Profile Name PaloAltoNetworks.
And finally I created an Authorization Profile called Permit_VPN where I added the VSA1 and VSA2 with the parameters of the image.
I hope this is clear, if anyone needs more data or help I will be happy to help.
Best regards.
06-21-2017 02:38 PM
I have not integrated them both together, but if you are able to get it working with NPS, the same principles should hold true for ISE. What exactly is failing when you have ISE as the AAA server?
06-21-2017 03:05 PM
Hi Rahul,
In NPS there are created 2 attributes with a specific vendor the 25461, I attach images of how they are created.
I just found Palo Alto website a document, I attached image, to create a new Vendor in Cisco ISE for this manufacturer and the parameters to be defined, but the VSA1 and VSA2 do not seem to match those used by the NPS .
VSA 1 = PaloAlto-Admin-Role
VSA 2 = PaloAlto-Admin-Access-Domain
They look more like access to management than VPN access.
Best regards
06-21-2017 03:49 PM
I am not sure if I understood your issue. But it looks like you are on the right track. You have the Palo Alto VSA Dictionary and Attributes on the ISE. Now all you have to do is to have this Attribute mapped to a value (in your case SE-Admin-Access and SANLUCAR) in the Authorization profile. See attached.
06-21-2017 04:07 PM
Correct, is what I have configured tomorrow I try with the client and I tell you if it works
Thanks
06-22-2017 04:05 AM
Hi Rahul,
I just tried it and it works perfectly, I had to create a new Radius Vendor called PaloAlto_Vendor and a new Network Device Profile called PaloAltoNetworks to which I added this dictionary.
Then I have associated the 2 PA-500s created in Network Devices with their Profile Name PaloAltoNetworks.
And finally I created an Authorization Profile called Permit_VPN where I added the VSA1 and VSA2 with the parameters of the image.
I hope this is clear, if anyone needs more data or help I will be happy to help.
Best regards.
06-22-2017 04:12 AM
Glad to heat that it is working for you. Thanks for reverting back with this information.
08-15-2019 02:13 AM
hi Alberto
I wondered if you had managed to integrate the Posture assessment capabilities of the ISE into the Solution you have implemented with global Protect.
Also have you had any issues with the solution since you implemented it ?
Andy
I
06-12-2020 10:09 PM
So VSA1 and VSA2, where in globalprotect, as that is not in the client anywhere
02-27-2021 02:21 AM
Have anyone got Globalprotect agent working with Cisco ISE posture module. ie when Remote VPN user connects via Globalprotect ISE posture module kicks and send info to Cisco ISE.
03-09-2021 07:43 PM
ISE Posture is a module in AnyConnect. You would need to use AnyConnect as your VPN agent.
03-12-2021 08:55 PM
You are right, but how to implement Cisco ISE posture for Remote VPN users who are already using PA Globalprotect.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide