<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Guest Activity Report in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093449#M177053</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We will start test whit this reports for next few days, but I receive from a couple of questions from the customer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to set the firewall sending syslog messages to another repository and then set the ISE to retrieve data from it in order to precess and generate this report?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I saw in the ISE, the logging categories and guest as one of them... Is it here where I should set what is requested?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where in the ISE file structure is recorded the syslog messages? Is it possible to make a backup for this data and process in the ISE later? ... Imagine an user is catched accessing a forbiden URL, and the manager likes to know if this action had happen before? How long will the ISE kept old data and if it is the case, what should be backed up to kept old data for further analysis?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Jun 2013 19:48:33 GMT</pubDate>
    <dc:creator>descalante2007</dc:creator>
    <dc:date>2013-06-26T19:48:33Z</dc:date>
    <item>
      <title>ISE Guest Activity Report</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093447#M176925</link>
      <description>&lt;P&gt;In accord with the user guide, ISE should be able to report what URLs a guest had visited. For this functionality to work "&lt;SPAN style="font-size: 10pt;"&gt;you must &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;enable guest access syslogging configuration on the NAD that inspects guest traffic in your Cisco ISE &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;network".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I do that if my guest users only have access through wireless? I mean what should I config in the WLC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093447#M176925</guid>
      <dc:creator>descalante2007</dc:creator>
      <dc:date>2019-03-11T03:01:23Z</dc:date>
    </item>
    <item>
      <title>ISE Guest Activity Report</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093448#M176972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may need to look at your firewall config, and use a policy map to perform url filtering. Here is a nac guest server solution that will help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6128/products_configuration_example09186a0080ac2fda.shtml#asac"&gt;http://www.cisco.com/en/US/products/ps6128/products_configuration_example09186a0080ac2fda.shtml#asac&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 22:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093448#M176972</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-28T22:03:00Z</dc:date>
    </item>
    <item>
      <title>ISE Guest Activity Report</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093449#M177053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We will start test whit this reports for next few days, but I receive from a couple of questions from the customer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to set the firewall sending syslog messages to another repository and then set the ISE to retrieve data from it in order to precess and generate this report?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I saw in the ISE, the logging categories and guest as one of them... Is it here where I should set what is requested?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where in the ISE file structure is recorded the syslog messages? Is it possible to make a backup for this data and process in the ISE later? ... Imagine an user is catched accessing a forbiden URL, and the manager likes to know if this action had happen before? How long will the ISE kept old data and if it is the case, what should be backed up to kept old data for further analysis?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jun 2013 19:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093449#M177053</guid>
      <dc:creator>descalante2007</dc:creator>
      <dc:date>2013-06-26T19:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Activity Report</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093450#M177130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please find the attachment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jun 2013 12:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093450#M177130</guid>
      <dc:creator>manjeets</dc:creator>
      <dc:date>2013-06-27T12:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Activity Report</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093451#M177176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the document. I find it very usable although unfortunately didn't answer my questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to send syslog messages to another syslog server instead of ISE, and the configure the ISE to get the data from that third device?. I think it is not, but can I be missing a trick or an alternative solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where in the ISE server are the syslog messages recorded and how can I know how much disk space is being used in order to do backups before the disk began to be exhausted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jun 2013 15:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093451#M177176</guid>
      <dc:creator>descalante2007</dc:creator>
      <dc:date>2013-06-27T15:52:53Z</dc:date>
    </item>
    <item>
      <title>In Cisco ISE, system logs are</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093452#M177231</link>
      <description>&lt;P&gt;&lt;SPAN style="color: Black; font-style: normal; font-weight: normal"&gt;In Cisco ISE, s&lt;/SPAN&gt;ystem logs are collected&lt;SPAN style="color: Black; font-style: normal; font-weight: normal"&gt; at locations called logging targets.&lt;/SPAN&gt; &lt;SPAN style="color: Black; font-style: normal; font-weight: normal"&gt;Ta&lt;/SPAN&gt;rgets refer to the IP addresses of the servers that collect and store logs.&lt;/P&gt;&lt;P&gt;ISE has the following default targets, which are dynamically configured in the loopback addresses of the local system: &lt;A name="wp1060166" style="text-decoration: none;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;LogCollector—Default syslog target for the Log Collector.&lt;BR /&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;ProfilerRadiusProbe—Default syslog target for the Profiler Radius Probe&lt;SPAN style="color: Black; font-style: normal; font-weight: normal"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;You can generate and store logs locally, or you can &lt;SPAN style="color: Black; font-style: normal; font-weight: normal"&gt;use the FTP facility to transfer t&lt;/SPAN&gt;hem to an external server.&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;Please check the following link,&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_logging.html#wp1076091&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2014 23:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-activity-report/m-p/2093452#M177231</guid>
      <dc:creator>Anas Naqvi</dc:creator>
      <dc:date>2014-03-27T23:39:24Z</dc:date>
    </item>
  </channel>
</rss>

