eun_internal_group Identification Profile Information
Does anyone have any information on eun_internal_group Identification Profile? Can't find any info on it.
Trying to troubleshoot an issue with Identifty profiles in WSA where the identity Profile is being matched on that.
If it wasnt matching any of the profiles I had created it should match on DefaultIdentification profile. But with this particular trace its showing up as matching on eun_internal_group Identification Profile and being blocked.
I have tried creating a new profile for unauthenticated users at the top of the profiles list going to the site in question and it still not matching and showing up as matching identification profile eun_internal_group.
eun_internal_group is actually a internal built in identification in the WSA to itself. This nomally occurs when it is trying to redirect the traffic to itself such as for the appliance to display its internal notification page or block page.
Does you identity has End-User Acknowledgement enabled and is it been configured correctly?
In order to dig this deeper, would require the accesslogs, configuration of Identity and EUN or configuration file and possible remote tunnel access to the appliance service level. Since these are sensitive information, would recommend to open a Cisco TAC case for the engineer to assist you in the troubleshooting.
I can see in the logs that an unauthenticated user is being denied from accessing the pac file which is hosted on the WSA.
When i ran a trace I can see it blocked with identification profile: eun_internal_group and access policy Global access policy.
I've tried adding the http://WSAHostname/pacfilename,pac to the no authentication group so anyone should be able to get to it. Also tried creating a new identity and policy at the top of the policies to allow anyone to get to that location.
The trace doesnt pick up the changes I have done. Just blocks it.
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to leverage Microsoft Single Sign-On for multiple ISE Portals (for example Sponsor and Guest/BYOD Portals).
At the time of this writing, ISE cann...
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to create a BYOD Flow to provide Wireless network access using an employee’s Azure AD credentials.
The table below shows the whole Cisco Security solutions + Splunk integrations add-ons. Kindly let me know if I have missed some add-ons or if there are any new updates. Thank you!
Hope this will be helpful for everyone who is looking for Splunk in...
A python based script to generate report if there are disabled rules under an Access Control Policy and an option to delete those rules in bulk.
Step 1 Download the script on PCStep 2 Make sure python3 is installed on PC and have reach...
A python based script to generate report if there are double logging on FMC ACP (logging at beginning and end), having rule action "Allow" or "Trust". (Option1 )
Also, the logging at the begging will be disabled if logging is detected for both beginning ...