<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Machine authentication with Remote VPN (AnyConnect) - Cisco Firewall				            </title>
            <link>https://www.hacktheforum.com/cisco-firewall/machine-authentication-with-remote-vpn-anyconnect/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sat, 18 Apr 2026 08:58:14 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>RE: Machine authentication with Remote VPN (AnyConnect)</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/machine-authentication-with-remote-vpn-anyconnect/#post-158</link>
                        <pubDate>Tue, 23 Apr 2024 14:19:20 +0000</pubDate>
                        <description><![CDATA[To configure machine authentication in Cisco ISE (Identity Services Engine), follow these steps:1. Log in to the Cisco ISE admin portal.2. Go to &quot;Administration&quot; &gt; &quot;Identity Management&quot; &amp;...]]></description>
                        <content:encoded><![CDATA[<p>To configure machine authentication in Cisco ISE (Identity Services Engine), follow these steps:<br /><br />1. Log in to the Cisco ISE admin portal.<br />2. Go to "Administration" &gt; "Identity Management" &gt; "Identity Sources".<br />3. Click "Add" and select "Active Directory" (or your desired identity source).<br />4. Configure the identity source settings (e.g., domain, username, password).<br />5. Go to "Policy" &gt; "Authentication" &gt; "Machine Authentication".<br />6. Click "Add" and select the desired authentication protocol (e.g., EAP-TLS, PEAP).<br />7. Configure the authentication settings (e.g., certificate requirements, authentication order).<br />8. Go to "Policy" &gt; "Authorization" &gt; "Machine Authorization".<br />9. Click "Add" and select the desired authorization policy (e.g., permit or deny access).<br />10. Configure the authorization settings (e.g., conditions, permissions).<br />11. Go to "Administration" &gt; "Network Resources" &gt; "Network Devices".<br />12. Click "Add" and select the device type (e.g., switch, router).<br />13. Configure the device settings (e.g., IP address, authentication protocol).<br />14. Save and apply the changes.<br /><br />This configuration enables machine authentication in Cisco ISE, allowing devices to authenticate and authorize access to the network.<br /><br /></p>
<p> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/machine-authentication-with-remote-vpn-anyconnect/#post-158</guid>
                    </item>
				                    <item>
                        <title>Machine authentication with Remote VPN (AnyConnect)</title>
                        <link>https://www.hacktheforum.com/cisco-firewall/machine-authentication-with-remote-vpn-anyconnect/#post-133</link>
                        <pubDate>Thu, 11 Apr 2024 13:07:17 +0000</pubDate>
                        <description><![CDATA[Anyconnect clients establish VPN tunnels to firewall and are authenticated using an  AD . For AD, the ASA sends the authentication request to ISE which is integrated with AD. Clients are ass...]]></description>
                        <content:encoded><![CDATA[<p><span>Anyconnect clients establish VPN tunnels to firewall and are authenticated using an  AD . For AD, the ASA sends the authentication request to ISE which is integrated with AD. Clients are associated to different group-policies depending on which AD group they belong to.</span></p>
<p> </p>
<p><span>We would like to add machine authentication to this, is is possible to additionally check that the client machine is also present and active in AD?</span></p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cisco-firewall/">Cisco Firewall</category>                        <dc:creator>Ivan Lon</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cisco-firewall/machine-authentication-with-remote-vpn-anyconnect/#post-133</guid>
                    </item>
							        </channel>
        </rss>
		