<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Posture Agent deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posture-agent-deployment/m-p/3931100#M456828</link>
    <description>&lt;P&gt;&lt;SPAN&gt;This questions comes from a long time Identity Services Engine customer that is now enabling Posture and wants to deploy different versions of Anyconnect and posture modules from the same ASA.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The posture module&amp;nbsp; is configured to be deployed via group policy in the ASA, but it only does so for the main AnyConnect version deployed in production. When someone connects to the ASA with a higher version of the main client, the posture modules aren’t being deployed by the ASA.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can this be accomplished?&lt;BR /&gt;&lt;SPAN&gt;We can easily update the modules via ISE once the client has already been deployed but ISE doesn’t seem to have the ability to force the ASA to deploy the module when it is not present. ISE can also allow the client to download the entire AnyConnect+Module package (via client provisioning portal) but it gets a little troublesome because you cannot update the client while currently connected to the ASA and running the package often requires admin rights on the machine (which some of our clients do not have). The module deployment via the ASA overcomes these limitations in a pretty seamless fashion, the only issue is when users connect with a higher version of the AnyConnect client.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 26 Sep 2019 21:28:42 GMT</pubDate>
    <dc:creator>tiryan</dc:creator>
    <dc:date>2019-09-26T21:28:42Z</dc:date>
    <item>
      <title>ISE Posture Agent deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-agent-deployment/m-p/3931100#M456828</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This questions comes from a long time Identity Services Engine customer that is now enabling Posture and wants to deploy different versions of Anyconnect and posture modules from the same ASA.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The posture module&amp;nbsp; is configured to be deployed via group policy in the ASA, but it only does so for the main AnyConnect version deployed in production. When someone connects to the ASA with a higher version of the main client, the posture modules aren’t being deployed by the ASA.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can this be accomplished?&lt;BR /&gt;&lt;SPAN&gt;We can easily update the modules via ISE once the client has already been deployed but ISE doesn’t seem to have the ability to force the ASA to deploy the module when it is not present. ISE can also allow the client to download the entire AnyConnect+Module package (via client provisioning portal) but it gets a little troublesome because you cannot update the client while currently connected to the ASA and running the package often requires admin rights on the machine (which some of our clients do not have). The module deployment via the ASA overcomes these limitations in a pretty seamless fashion, the only issue is when users connect with a higher version of the AnyConnect client.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 21:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-agent-deployment/m-p/3931100#M456828</guid>
      <dc:creator>tiryan</dc:creator>
      <dc:date>2019-09-26T21:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture Agent deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-agent-deployment/m-p/3931977#M456829</link>
      <description>&lt;P&gt;When using ISE with ASA, we need to put the same version of AnyConnect on them both.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/using-vpn-to-push-anyconnect-client-upgrade/td-p/2041165" target="_self"&gt;Using VPN to push AnyConnect client upgrade&lt;/A&gt;&amp;nbsp; might be of interest to you.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Sep 2019 02:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-agent-deployment/m-p/3931977#M456829</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-09-29T02:48:13Z</dc:date>
    </item>
  </channel>
</rss>

