<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE SGT user/machine priority, precedence in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205643#M38817</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You mean SGT, not AD groups?&lt;/P&gt;&lt;P&gt;However, since the SGTs are associated with users by AD group membership basis on ISE, it seems to be more feasible to rely on AD based ID collector, if that is more reliable. Will see...&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;gyula&lt;/P&gt;</description>
    <pubDate>Sat, 10 Feb 2024 09:45:32 GMT</pubDate>
    <dc:creator>jonagy</dc:creator>
    <dc:date>2024-02-10T09:45:32Z</dc:date>
    <item>
      <title>ISE SGT user/machine priority, precedence</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205603#M38809</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My primary issue:&lt;/P&gt;&lt;P&gt;1. normally windows workstation without logged in user is authenticated and authorized as machine. When user logs in, the pdp role update occurs, where both, user and machine role appear in the same event, and the machine seems "stronger". In other words, some user logins, the previous machine SGT role remains in effect, and this is bogus.&lt;/P&gt;&lt;P&gt;I wish to have machine auth (SGT) be in effect for workstations when no logged in users present, but when an user successfully logs in, the user's SGT/role takes precedence, and matches against Access Role object as source SGT.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;USER_SIMPLE_600&amp;nbsp; -- user auth by ISE dot1x&lt;/P&gt;&lt;P&gt;SIMPLE_MAB_400 -- machine auth by ISE MAB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@lab-cp-gw1:0]# pdp monit ip 172.30.110.82

Session:  596210f0
Session UUID:  {85646C20-D324-7581-6728-65E6284D99D5}
Ip:  172.30.110.82
Machine:  
 sdatestpc@seclab.local {ddfde611}
   Groups: All Machines;SIMPLE_MAB_400
   Roles: SGT_SIMPLE_MAB_400
   Client Type: Identity Collector (Cisco ISE)
   Authentication Method: Trust
   Distinguished Name: CN=SDATESTPC,CN=Computers,DC=seclab,DC=local
   Connect Time: Fri Feb  9 16:23:43 2024
   Next Reauthentication: Sat Feb 10 04:24:30 2024
   Next Connectivity Check: -
   Next Ldap Fetch: Fri Feb  9 20:31:20 2024

Users:  
 user600@seclab.local {1a2ee685}
   LogUsername: user600 (user600)
   Groups: All Users;USER_SIMPLE_600
   Roles: SGT_SIMPLE_MAB_400;SGT_USER_SIMPLE_600
   Client Type: Identity Collector (Cisco ISE)
   Authentication Method: Trust
   Distinguished Name: CN=user600,OU=Seclab Users,DC=seclab,DC=local
   Connect Time: Fri Feb  9 16:24:00 2024
   Next Reauthentication: Sat Feb 10 04:24:30 2024
   Next Connectivity Check: -
   Next Ldap Fetch: Fri Feb  9 21:38:01 2024

Packet Tagging Status:  Not Active
Published Gateways:  Local&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as a result here, the src IP 172.30.110.82 would match on "SIMPLE_MAB_400" rule, instead of "USER_SIMPLE_600"&lt;/P&gt;&lt;P&gt;There are separate Access Role objects, with corresponding "Identity Tag" objects for 400 and 600.&lt;/P&gt;&lt;P&gt;With other users (like "USER_SIMPLE_200") this works as expected, but not with the 600. I checked, and confirmed several times, no difference between users, only the tag number (SGT 200&amp;lt;400&amp;lt;600). No other difference. (incl. AD groups, ISE authorization, testing on the same switch port)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&lt;/P&gt;&lt;P&gt;On the other hand, would it be possible to rely only on SGT, without LDAP query? (like, working only with radius, i.e. ISE local identities, and LDAP is not available)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gyula&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 20:56:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205603#M38809</guid>
      <dc:creator>jonagy</dc:creator>
      <dc:date>2024-02-09T20:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SGT user/machine priority, precedence</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205636#M38816</link>
      <description>&lt;P&gt;The only way to retrieve groups is via LDAP or via SAML Assertion.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 02:08:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205636#M38816</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-02-10T02:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SGT user/machine priority, precedence</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205643#M38817</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You mean SGT, not AD groups?&lt;/P&gt;&lt;P&gt;However, since the SGTs are associated with users by AD group membership basis on ISE, it seems to be more feasible to rely on AD based ID collector, if that is more reliable. Will see...&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;gyula&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 09:45:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205643#M38817</guid>
      <dc:creator>jonagy</dc:creator>
      <dc:date>2024-02-10T09:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SGT user/machine priority, precedence</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205957#M38871</link>
      <description>&lt;P&gt;You can define the relevant groups in Cisco ISE as Identity Tags, which can be used in the policy.&lt;BR /&gt;See: &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Configuring-Identity-Awareness-Using-Identity-Tags-in-Access-Role-Matching.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Configuring-Identity-Awareness-Using-Identity-Tags-in-Access-Role-Matching.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 15:24:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISE-SGT-user-machine-priority-precedence/m-p/205957#M38871</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-02-13T15:24:13Z</dc:date>
    </item>
  </channel>
</rss>

