09-19-2017 09:17 AM
Hi Team,
Can we link FMC(firepower) connections to user that not exist in AD but in ISE? IE. Guest users or users not logon AD but use AD username/password for EAP auth.
Thanks
DL
Solved! Go to Solution.
09-20-2017 06:09 AM
I responded to that post to help clarify. Both George and Tim (other post) are correct. Do not confuse the limitations of ISE-PIC with full blown ISE. ISE can publish login info for both Passive ID and active auth from guests and users that login via AD credentials.
Note that use of AD credentials for network login does not equate to an AD login event. For example, I can login using PEAP with AD credentials without triggering an AD login event. AD login is what occurs when you enter credentials at CTRL-ALT-DEL, or perform specific access request to AD then entails AD login privileges. Therefore, do not expect Passive ID event to be present if simply using AD credentials for network logon.
RADIUS auth is considered Active auth. Passive ID is Passive auth.
ISE supports both. ISE-PIC supports passive only.
On a side note, it is possible for ISE to combine both active auth with passive auth, for example, assign access based on successful 802.1X machine auth via ISE + successful user AD login outside of ISE. I call this Easy Connect Chaining, or EZC Chaining.
/Craig
09-19-2017 05:06 PM
Yes you can. You can do this with pxGrid integration and ISE. It will require Plus licenses in ISE.
George
09-20-2017 04:36 AM
find a post after I post this discussion, it seems the answer is no. Don't know which one is correct.
Re: Query on passive ID with FMC 6.2 and pxGrid integration to ISE 2.2
09-20-2017 06:09 AM
I responded to that post to help clarify. Both George and Tim (other post) are correct. Do not confuse the limitations of ISE-PIC with full blown ISE. ISE can publish login info for both Passive ID and active auth from guests and users that login via AD credentials.
Note that use of AD credentials for network login does not equate to an AD login event. For example, I can login using PEAP with AD credentials without triggering an AD login event. AD login is what occurs when you enter credentials at CTRL-ALT-DEL, or perform specific access request to AD then entails AD login privileges. Therefore, do not expect Passive ID event to be present if simply using AD credentials for network logon.
RADIUS auth is considered Active auth. Passive ID is Passive auth.
ISE supports both. ISE-PIC supports passive only.
On a side note, it is possible for ISE to combine both active auth with passive auth, for example, assign access based on successful 802.1X machine auth via ISE + successful user AD login outside of ISE. I call this Easy Connect Chaining, or EZC Chaining.
/Craig
09-20-2017 09:54 AM
understood, very clear, many thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide