<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Device-Sensor and Automated-Tester Behavior in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/device-sensor-and-automated-tester-behavior/m-p/3889800#M471506</link>
    <description>It should not behave that way. The command should only restrict automate tester from sending probes on 1813/1646. Seems like a bug to me.&lt;BR /&gt;</description>
    <pubDate>Sun, 14 Jul 2019 07:40:51 GMT</pubDate>
    <dc:creator>Surendra</dc:creator>
    <dc:date>2019-07-14T07:40:51Z</dc:date>
    <item>
      <title>Device-Sensor and Automated-Tester Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/device-sensor-and-automated-tester-behavior/m-p/3889776#M471505</link>
      <description>&lt;P&gt;I've been developing and testing some new IBNS 2.0 configurations on a 3850 with 16.6.6/16.9.3a and came across some odd behavior/interaction with device sensor and the automated tester.&amp;nbsp; I have a TAC case open on this (SR# 687085849), and I am trying to determine if this is the expected behavior or a bug. I have asked TAC but have not heard back, so anyone know if it should behave this way?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I have found is that when "automate-tester username NAD-Tester ignore-acct-port probe-on" is added to the radius server configuration, learned device sensor attributes that appear in the cache do not get forwarded to ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I use "automate-tester username NAD-Tester probe-on", removing the "ignore-acct-port", then device sensor attributes show up in ISE, doesn't seem like it should act this way.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Radius server example where device sensor data is not sent&lt;/STRONG&gt;&lt;BR /&gt;radius server ISE-VIP-A&lt;BR /&gt;address ipv4 10.1.1.1 auth-port 1812 acct-port 1813&lt;BR /&gt;pac key xxxxxxxxxxx&lt;BR /&gt;automate-tester username NAD-Tester&amp;nbsp;ignore-acct-port probe-on&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Radius server example where device sensor data is forwarded as expected&lt;/STRONG&gt;&lt;BR /&gt;radius server ISE-VIP-A&lt;BR /&gt;address ipv4 10.1.1.1 auth-port 1812 acct-port 1813&lt;BR /&gt;pac key xxxxxxxxxxx&lt;BR /&gt;automate-tester username NAD-Tester probe-on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is the same as configured in the ISE Secure Wired Access Prescriptive Deployment Guide, so quite a few deployments could have this issue and not even realize their profiling is hindered.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2019 00:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-sensor-and-automated-tester-behavior/m-p/3889776#M471505</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-07-14T00:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Device-Sensor and Automated-Tester Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/device-sensor-and-automated-tester-behavior/m-p/3889800#M471506</link>
      <description>It should not behave that way. The command should only restrict automate tester from sending probes on 1813/1646. Seems like a bug to me.&lt;BR /&gt;</description>
      <pubDate>Sun, 14 Jul 2019 07:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-sensor-and-automated-tester-behavior/m-p/3889800#M471506</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-07-14T07:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Device-Sensor and Automated-Tester Behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/device-sensor-and-automated-tester-behavior/m-p/3889937#M471508</link>
      <description>That agrees with how I feel the command/feature should work. I'll continue to work the TAC case and follow up when complete.</description>
      <pubDate>Sun, 14 Jul 2019 19:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-sensor-and-automated-tester-behavior/m-p/3889937#M471508</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-07-14T19:27:58Z</dc:date>
    </item>
  </channel>
</rss>

