05-26-2018 12:47 PM - edited 02-21-2020 10:57 AM
Dears,
I have a general question here for the design.
I have a Network devices in DR and branches, My ISE server is in INSIDE network do it is a best practice to get their authentication traffic (TACACS+) to the ISE in inside network.
Also I have a VPN corporate users I want to authenticate them it will be a best practice to authenticate them on the AD by their domain password or I shld create a username in the local database of ISE.
Thanks
Solved! Go to Solution.
05-26-2018 09:11 PM
Your remote network access devices would typically reach the AAA server (ISE in your case) via a VPN (or possibly MPLS private WAN) connection.
If you don't have any such connection then you would allow the incoming TACACS or RADIUS traffic (depending on which you use), originated from those devices only, in through your main office firewall.
05-26-2018 02:57 PM
05-26-2018 09:11 PM
Your remote network access devices would typically reach the AAA server (ISE in your case) via a VPN (or possibly MPLS private WAN) connection.
If you don't have any such connection then you would allow the incoming TACACS or RADIUS traffic (depending on which you use), originated from those devices only, in through your main office firewall.
05-27-2018 01:47 PM
Dears
thanks for the reply
Your remote network access devices would typically reach the AAA server (ISE in your case) via a VPN (or possibly MPLS private WAN) connection
I didn't understood the above lines
They were 2 separate question in my previous post
Thanks
05-27-2018 08:25 PM
The best way for remote branches and DR sites to get their TACACS+ traffic back is via a site-site VPN.
For remote access VPN users, they should authenticate to AD via the VPN device. Their authentication traffic is tunneled via SSL (or IKEv2 IPsec) to the VPN device (ASA or router) and then it proxies to ISE (or directly to your domain controller) to complete the authentication and authorization for the session. there is no "security hole" being exposed via this method as all traffic on the public network is encrypted.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide