<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Matching AuthZ rule before NMAP scan in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/matching-authz-rule-before-nmap-scan/m-p/3897995#M471051</link>
    <description>&lt;P&gt;Please ensure the ISE deployment has the latest patch, profiling CoA enabled on ISE (see &lt;A href="https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456#toc-hId-994197860" target="_self"&gt;ISE Global Profiling Settings&lt;/A&gt;), CoA enabled on the network devices, and, of course, authorization configured for the change.&lt;/P&gt;</description>
    <pubDate>Fri, 26 Jul 2019 03:06:06 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2019-07-26T03:06:06Z</dc:date>
    <item>
      <title>Matching AuthZ rule before NMAP scan</title>
      <link>https://community.cisco.com/t5/network-access-control/matching-authz-rule-before-nmap-scan/m-p/3897875#M471043</link>
      <description>&lt;P&gt;I have some devices that are hitting my default (open) rule that I want to hit an earlier rule. The problem is that I am not getting enough attributes from them until I have the profile perform an NMAP scan. But the device has already performed auth at this point. Once it finishes the NMAP scan, there may be enough information to put it in the right Authorization rule. How do I force reauth after NMAP has completed?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 20:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/matching-authz-rule-before-nmap-scan/m-p/3897875#M471043</guid>
      <dc:creator>Josh Morris</dc:creator>
      <dc:date>2019-07-25T20:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: Matching AuthZ rule before NMAP scan</title>
      <link>https://community.cisco.com/t5/network-access-control/matching-authz-rule-before-nmap-scan/m-p/3897995#M471051</link>
      <description>&lt;P&gt;Please ensure the ISE deployment has the latest patch, profiling CoA enabled on ISE (see &lt;A href="https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456#toc-hId-994197860" target="_self"&gt;ISE Global Profiling Settings&lt;/A&gt;), CoA enabled on the network devices, and, of course, authorization configured for the change.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 03:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/matching-authz-rule-before-nmap-scan/m-p/3897995#M471051</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-26T03:06:06Z</dc:date>
    </item>
  </channel>
</rss>

