<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Posture and CoA Error in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831513#M474302</link>
    <description>&lt;P&gt;BNA-VPN-TEST-01# show vpn-sessiondb detail anyconnect&lt;/P&gt;&lt;P&gt;Session Type: AnyConnect Detailed&lt;/P&gt;&lt;P&gt;Username : stevenwilliams Index : 7842&lt;BR /&gt;Assigned IP : 10.199.199.12 Public IP : *&lt;BR /&gt;Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel&lt;BR /&gt;License : AnyConnect Premium&lt;BR /&gt;Encryption : AnyConnect-Parent: (1)none SSL-Tunnel: (1)AES256 DTLS-Tunnel: (1)3DES&lt;BR /&gt;Hashing : AnyConnect-Parent: (1)none SSL-Tunnel: (1)SHA256 DTLS-Tunnel: (1)SHA1&lt;BR /&gt;Bytes Tx : 175919 Bytes Rx : 163209&lt;BR /&gt;Pkts Tx : 664 Pkts Rx : 985&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;Group Policy : SSLVPN Tunnel Group : DefaultWEBVPNGroup&lt;BR /&gt;Login Time : 10:04:33 CST Wed Apr 3 2019&lt;BR /&gt;Duration : 0h:01m:36s&lt;BR /&gt;Inactivity : 0h:00m:00s&lt;BR /&gt;VLAN Mapping : N/A VLAN : none&lt;BR /&gt;Audt Sess ID : 0a3500fb01ea20005ca4cb81&lt;BR /&gt;Security Grp : none&lt;/P&gt;&lt;P&gt;AnyConnect-Parent Tunnels: 1&lt;BR /&gt;SSL-Tunnel Tunnels: 1&lt;BR /&gt;DTLS-Tunnel Tunnels: 1&lt;/P&gt;&lt;P&gt;AnyConnect-Parent:&lt;BR /&gt;Tunnel ID : 7842.1&lt;BR /&gt;Public IP : *&lt;BR /&gt;Encryption : none Hashing : none&lt;BR /&gt;TCP Src Port : 10780 TCP Dst Port : 443&lt;BR /&gt;Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 5 Minutes Idle TO Left : 3 Minutes&lt;BR /&gt;Client OS : win&lt;BR /&gt;Client OS Ver: 10.0.17134&lt;BR /&gt;Client Type : AnyConnect&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049&lt;BR /&gt;Bytes Tx : 8052 Bytes Rx : 0&lt;BR /&gt;Pkts Tx : 6 Pkts Rx : 0&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;SSL-Tunnel:&lt;BR /&gt;Tunnel ID : 7842.2&lt;BR /&gt;Assigned IP : 10.199.199.12 Public IP : *&lt;BR /&gt;Encryption : AES256 Hashing : SHA256&lt;BR /&gt;Ciphersuite : DHE-RSA-AES256-SHA256&lt;BR /&gt;Encapsulation: TLSv1.2 TCP Src Port : 10783&lt;BR /&gt;TCP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 5 Minutes Idle TO Left : 3 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : SSL VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049&lt;BR /&gt;Bytes Tx : 8404 Bytes Rx : 424&lt;BR /&gt;Pkts Tx : 9 Pkts Rx : 6&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;DTLS-Tunnel:&lt;BR /&gt;Tunnel ID : 7842.3&lt;BR /&gt;Assigned IP : 10.199.199.12 Public IP : *&lt;BR /&gt;Encryption : 3DES Hashing : SHA1&lt;BR /&gt;Ciphersuite : DES-CBC3-SHA&lt;BR /&gt;Encapsulation: DTLSv1.0 UDP Src Port : 9424&lt;BR /&gt;UDP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 5 Minutes Idle TO Left : 5 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : DTLS VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049&lt;BR /&gt;Bytes Tx : 161835 Bytes Rx : 164630&lt;BR /&gt;Pkts Tx : 661 Pkts Rx : 994&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;ISE Posture:&lt;BR /&gt;Redirect URL : &lt;A href="https://BNAPINFISE001.eftdomain.net:8443/portal/gateway?sessionId=0a3500fb01ea20005ca4cb81&amp;amp;portal=0d2e" target="_blank"&gt;https://BNAPINFISE001.eftdomain.net:8443/portal/gateway?sessionId=0a3500fb01ea20005ca4cb81&amp;amp;portal=0d2e&lt;/A&gt;...&lt;BR /&gt;Redirect ACL : ISE_POSTURE_REDIRECT&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;BNA-VPN-TEST-01# show log&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt;Facility: 21&lt;BR /&gt;Timestamp logging: disabled&lt;BR /&gt;Hide Username logging: enabled&lt;BR /&gt;Standby logging: disabled&lt;BR /&gt;Debug-trace logging: disabled&lt;BR /&gt;Console logging: disabled&lt;BR /&gt;Monitor logging: level warnings, 45562 messages logged&lt;BR /&gt;Buffer logging: level informational, 3344774 messages logged&lt;BR /&gt;Trap logging: level informational, facility 21, 6377800 messages logged&lt;BR /&gt;Logging to INSIDE 10.20.0.102, UDP TX:1862789 errors: 30 dropped: 235&lt;BR /&gt;Global TCP syslog stats::&lt;BR /&gt;NOT_PUTABLE: 0, ALL_CHANNEL_DOWN: 0&lt;BR /&gt;CHANNEL_FLAP_CNT: 0, SYSLOG_PKT_LOSS: 0&lt;BR /&gt;PARTIAL_REWRITE_CNT: 0&lt;BR /&gt;Permit-hostdown logging: disabled&lt;BR /&gt;History logging: disabled&lt;BR /&gt;Device ID: disabled&lt;BR /&gt;Mail logging: disabled&lt;BR /&gt;ASDM logging: level debugging, 8235696 messages logged&lt;BR /&gt;lliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341232 for outside:10.199.199.12/56013(LOCAL\stevenwilliams) to outside:13.107.4.52/80 duration 0:00:00 bytes 300 TCP FINs from outside (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341233 for outside:10.199.199.12/49673 (10.199.199.12/49673)(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 (10.20.42.41/161) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/49673 to INSIDE:10.20.42.41/161 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341233 for outside:10.199.199.12/49673(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 duration 0:00:00 bytes 0 (stevenwilliams)&lt;BR /&gt;%ASA-6-305012: Teardown dynamic TCP translation from outside:10.199.199.12/54934(LOCAL\stevenwilliams) to outside:*/54934 duration 0:00:31&lt;BR /&gt;%ASA-6-305012: Teardown dynamic TCP translation from outside:10.199.199.12/54935(LOCAL\stevenwilliams) to outside:*/54935 duration 0:00:31&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341234 for outside:10.199.199.12/56010 (*/56010)(LOCAL\stevenwilliams) to outside:65.199.248.12/443 (65.199.248.12/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56010 to outside:65.199.248.12/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341234 for outside:10.199.199.12/56010(LOCAL\stevenwilliams) to outside:65.199.248.12/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341235 for outside:10.199.199.12/53267 (10.199.199.12/53267)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-305011: Built dynamic TCP translation from outside:10.199.199.12/56015(LOCAL\stevenwilliams) to outside:*/56015&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341236 for outside:10.199.199.12/56015 (*/56015)(LOCAL\stevenwilliams) to outside:8.253.185.120/80 (8.253.185.120/80) (stevenwilliams)&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341237 for outside:10.199.199.12/56016 (10.199.199.12/56016)(LOCAL\stevenwilliams) to INSIDE:10.20.0.85/8443 (10.20.0.85/8443) (stevenwilliams)&lt;BR /&gt;%ASA-6-305011: Built dynamic TCP translation from outside:10.199.199.12/56017(LOCAL\stevenwilliams) to outside:*/56017&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341238 for outside:10.199.199.12/56017 (*/56017)(LOCAL\stevenwilliams) to outside:52.114.132.21/443 (52.114.132.21/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56017 to outside:52.114.132.21/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341238 for outside:10.199.199.12/56017(LOCAL\stevenwilliams) to outside:52.114.132.21/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56011 to INSIDE:10.20.0.94/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341239 for outside:10.199.199.12/56011 (10.199.199.12/56011)(LOCAL\stevenwilliams) to INSIDE:10.20.0.94/443 (10.20.0.94/443) (stevenwilliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341239 for outside:10.199.199.12/56011(LOCAL\stevenwilliams) to INSIDE:10.20.0.94/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341237 for outside:10.199.199.12/56016(LOCAL\stevenwilliams) to INSIDE:10.20.0.85/8443 duration 0:00:00 bytes 1691 TCP FINs from outside (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341235 for outside:10.199.199.12/53267(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 205 (stevenwilliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341236 for outside:10.199.199.12/56015(LOCAL\stevenwilliams) to outside:8.253.185.120/80 duration 0:00:00 bytes 300 TCP FINs from outside (stevenwilliams)&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341240 for outside:10.199.199.12/56017 (*/56017)(LOCAL\stevenwilliams) to outside:52.114.132.21/443 (52.114.132.21/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56017 to outside:52.114.132.21/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341240 for outside:10.199.199.12/56017(LOCAL\stevenwilliams) to outside:52.114.132.21/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341241 for outside:10.199.199.12/49673 (10.199.199.12/49673)(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 (10.20.42.41/161) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/49673 to INSIDE:10.20.42.41/161 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341241 for outside:10.199.199.12/49673(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 duration 0:00:00 bytes 0 (stevenwilliams)&lt;BR /&gt;%ASA-6-305011: Built dynamic TCP translation from outside:10.199.199.12/56018(LOCAL\stevenwilliams) to outside:*/56018&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341242 for outside:10.199.199.12/56018 (*/56018)(LOCAL\stevenwilliams) to outside:23.55.210.189/443 (23.55.210.189/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56018 to outside:23.55.210.189/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341242 for outside:10.199.199.12/56018(LOCAL\stevenwilliams) to outside:23.55.210.189/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341243 for outside:10.199.199.12/49512 (10.199.199.12/49512)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341244 for outside:10.199.199.12/59420 (10.199.199.12/59420)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341245 for outside:10.199.199.12/63488 (10.199.199.12/63488)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341246 for outside:10.199.199.12/51261 (10.199.199.12/51261)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341247 for outside:10.199.199.12/61446 (10.199.199.12/61446)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341248 for outside:10.199.199.12/65519 (10.199.199.12/65519)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341249 for outside:10.199.199.12/63895 (10.199.199.12/63895)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341243 for outside:10.199.199.12/49512(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 139 (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341244 for outside:10.199.199.12/59420(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 132 (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341245 for outside:10.199.199.12/63488(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 134 (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341246 for outside:10.199.199.12/51261(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 140 (stevenwilliams)&lt;BR /&gt;%ASA-6-302013: Built outbound TCP connection 1341250 for Management:10.20.0.85/49 (10.20.0.85/49) to identity:10.20.63.74/61529 (10.20.63.74/61529)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341247 for outside:10.199.199.12/61446(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 141 (stevenwilliams)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Apr 2019 15:13:32 GMT</pubDate>
    <dc:creator>Steven Williams</dc:creator>
    <dc:date>2019-04-03T15:13:32Z</dc:date>
    <item>
      <title>ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831050#M474224</link>
      <description>&lt;P&gt;I am having some issue with my VPN posture process, and I can't seem to figure it out. Its telling me there is a CoA error but I know CoA is working because I have another policy with ISE working with the ASA device just fine which is using CoA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the issue is possibly with an ACL after the posture scan is completed. The client grabs the posture unknown dACL and gets redirected but never gets the final dACL i need it to get.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-04-02 at 7.57.37 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/33446i4EC69684D0DCE89F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-04-02 at 7.57.37 PM.png" alt="Screen Shot 2019-04-02 at 7.57.37 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The redirect on the ASA says deny DHCP, DNS, ISE Servers, internet port 80/443 and then permit ip any after that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-04-02 at 8.05.29 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/33447iE9C8811EEB057AEC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-04-02 at 8.05.29 PM.png" alt="Screen Shot 2019-04-02 at 8.05.29 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA ACL:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list ISE_POSTURE_REDIRECT extended deny udp any eq bootpc any eq bootps&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny udp any any eq domain&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny ip any host 10.20.0.85&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny ip any host 10.81.3.25&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended permit ip any any&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa-server BNA_ISE protocol radius&lt;BR /&gt;authorize-only&lt;BR /&gt;interim-accounting-update periodic 3&lt;BR /&gt;merge-dacl before-avpair&lt;BR /&gt;dynamic-authorization&lt;BR /&gt;aaa-server BNA_ISE (Management) host 10.20.0.85&lt;BR /&gt;retry-interval 3&lt;BR /&gt;timeout 30&lt;BR /&gt;key *****&lt;BR /&gt;no mschapv2-capable&lt;BR /&gt;aaa-server BNA_ISE (Management) host 10.81.3.25&lt;BR /&gt;retry-interval 3&lt;BR /&gt;timeout 30&lt;BR /&gt;key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-04-02 at 8.07.58 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/33449i8B6B565F2E4444B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-04-02 at 8.07.58 PM.png" alt="Screen Shot 2019-04-02 at 8.07.58 PM.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-04-02 at 8.08.32 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/33448i41A5EDADDBD1E20A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-04-02 at 8.08.32 PM.png" alt="Screen Shot 2019-04-02 at 8.08.32 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it looks like it gets though the unknown posture assessment and then just fails when it needs to give out the dACL for the access permitted for that user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Suggestions?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 01:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831050#M474224</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-04-03T01:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831081#M474232</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;The issue you're getting is when your device become compliant, right?&lt;BR /&gt;&lt;BR /&gt;Can you share your policy and dACL you're trying to push?&lt;BR /&gt;&lt;BR /&gt;Did you configure the auto detect convert acl format when it is received on the asa?&lt;BR /&gt;&lt;BR /&gt;Have you ran a debug to see what the asa is receiving or telling to ise?</description>
      <pubDate>Wed, 03 Apr 2019 03:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831081#M474232</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-04-03T03:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831352#M474298</link>
      <description>What is auto detect convert?&lt;BR /&gt;&lt;BR /&gt;What debugs should I run to see this?</description>
      <pubDate>Wed, 03 Apr 2019 11:24:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831352#M474298</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-04-03T11:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831411#M474299</link>
      <description>So the logic of the Redirect ACL on your ASA is actually backwards. What I mean by this is identified below:&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny udp any eq bootpc any eq bootps (permit)&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny udp any any eq domain (permit)&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny ip any host 10.20.0.85 (permit)&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny ip any host 10.81.3.25 (permit)&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended permit ip any any (deny)&lt;BR /&gt;access-list ISE_POSTURE_REDIRECT extended deny ip any any (permit; dont need; redundant)&lt;BR /&gt;&lt;BR /&gt;For your compliant authz result dacl you need to have the same ACL on your ASA. For example:&lt;BR /&gt;&lt;BR /&gt;User passes scan; ISE authz result is permit any; The dacl name is AnyConnect_Compliant; On your ASA ACL manager create an ACL with same name "AnyConnect_Compliant" permit ip any any; Also, ensure that port 1700 is not blocked in the path.</description>
      <pubDate>Wed, 03 Apr 2019 13:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831411#M474299</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-04-03T13:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831487#M474300</link>
      <description>&lt;P&gt;When the user passes scan the dACL that is given is based on their AD group membership and they are given the access they need on the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the dACL looks like this that the user needs to get once the posture scan is done and client is "compliant"&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;remark IT User Access&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 10.199.199.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 10.81.0.0 255.255.0.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 10.20.0.0 255.255.0.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 192.168.1.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 192.168.7.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 192.168.242.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 192.168.254.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 172.16.3.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 192.168.21.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;remark Lab Access&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 10.0.1.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 10.0.10.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 10.0.100.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any 192.168.13.0 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;remark Deny Internal Segments&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;deny ip any 192.168.0.0 255.255.0.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;deny ip any 10.0.0.0 255.0.0.0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;deny ip any 172.16.0.0 255.240.0.0&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;remark Allow INET&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;permit ip any any&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the policy set:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-04-03 at 9.22.25 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/33482iC2079641565B1AF1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-04-03 at 9.22.25 AM.png" alt="Screen Shot 2019-04-03 at 9.22.25 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 14:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831487#M474300</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-04-03T14:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831496#M474301</link>
      <description>&lt;P&gt;&lt;FONT face="book antiqua,palatino"&gt;Also this is what my logs are saying....10.20.0.85 is ISE and 10.199.199.* is VPN client IP address.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:59:05.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:59:05&lt;/SPAN&gt; &lt;SPAN class="t"&gt;bna-asacore-01.eftdomain.net&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;02&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2019&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:59:07:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/8443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60526&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;FIN&lt;/SPAN&gt; &lt;SPAN class="t"&gt;PSH&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ACK&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;YELLOW_PROD&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="bna-asacore-01.eftdomain.net" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;bna-asacore-01.eftdomain.net&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:59:05.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:59:05&lt;/SPAN&gt; &lt;SPAN class="t"&gt;bna-asacore-01.eftdomain.net&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;02&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2019&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:59:06:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/8443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60520&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;FIN&lt;/SPAN&gt; &lt;SPAN class="t"&gt;PSH&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ACK&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;YELLOW_PROD&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="bna-asacore-01.eftdomain.net" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;bna-asacore-01.eftdomain.net&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:58:21.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:58:21&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60527&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/8443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;RST&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;outside&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:58:08.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:58:08&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60523&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/8443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;RST&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;outside&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:58:08.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:58:08&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60522&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/8443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ACK&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;outside&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:57:41.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:41&lt;/SPAN&gt; &lt;SPAN class="t"&gt;bna-asacore-01.eftdomain.net&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;02&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2019&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:42:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60429&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;FIN&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ACK&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;YELLOW_PROD&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="bna-asacore-01.eftdomain.net" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;bna-asacore-01.eftdomain.net&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:57:41.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:41&lt;/SPAN&gt; &lt;SPAN class="t"&gt;bna-asacore-01.eftdomain.net&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;02&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2019&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:42:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60429&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ACK&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;YELLOW_PROD&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="bna-asacore-01.eftdomain.net" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;bna-asacore-01.eftdomain.net&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:57:41.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:41&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60426&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;RST&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;outside&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:57:41.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:41&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60428&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;RST&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;outside&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:57:00.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:00&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60343&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;RST&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;outside&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:57:00.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:00&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60337&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;RST&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;outside&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="formated-time"&gt;&lt;SPAN&gt;4/2/19&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;7:57:00.000 PM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="json-event  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="t"&gt;Apr&lt;/SPAN&gt; &lt;SPAN class="t"&gt;2&lt;/SPAN&gt; &lt;SPAN class="t"&gt;19:57:00&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.53.0.251&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%ASA-6-106015:&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Deny&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;TCP&lt;/SPAN&gt; (&lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;connection&lt;/SPAN&gt;) &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;10.20.0.85/443&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;10.199.199.&lt;/SPAN&gt;12/60338&lt;/SPAN&gt; &lt;SPAN class="t"&gt;flags&lt;/SPAN&gt; &lt;SPAN class="t"&gt;FIN&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ACK&lt;/SPAN&gt; &lt;SPAN class="t"&gt;on&lt;/SPAN&gt; &lt;SPAN class="t"&gt;interface&lt;/SPAN&gt; &lt;SPAN class="t"&gt;INSIDE&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-eventsviewer-list-body-row-selectedfields"&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;host =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="10.53.0.251" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;10.53.0.251&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;source =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="udp:514" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;udp:514&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="book antiqua,palatino"&gt;&lt;SPAN class="field"&gt;sourcetype =&lt;/SPAN&gt; &lt;SPAN class="field-value"&gt;&lt;A title="cisco:asa" href="https://splunk.corp.cpicardgroup.com/en-US/app/search/search?q=search%2010.199.199.*%20AND%20Deny&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1554302546.28439#" target="_blank" rel="noopener"&gt;cisco:asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 03 Apr 2019 14:45:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831496#M474301</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-04-03T14:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831513#M474302</link>
      <description>&lt;P&gt;BNA-VPN-TEST-01# show vpn-sessiondb detail anyconnect&lt;/P&gt;&lt;P&gt;Session Type: AnyConnect Detailed&lt;/P&gt;&lt;P&gt;Username : stevenwilliams Index : 7842&lt;BR /&gt;Assigned IP : 10.199.199.12 Public IP : *&lt;BR /&gt;Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel&lt;BR /&gt;License : AnyConnect Premium&lt;BR /&gt;Encryption : AnyConnect-Parent: (1)none SSL-Tunnel: (1)AES256 DTLS-Tunnel: (1)3DES&lt;BR /&gt;Hashing : AnyConnect-Parent: (1)none SSL-Tunnel: (1)SHA256 DTLS-Tunnel: (1)SHA1&lt;BR /&gt;Bytes Tx : 175919 Bytes Rx : 163209&lt;BR /&gt;Pkts Tx : 664 Pkts Rx : 985&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;Group Policy : SSLVPN Tunnel Group : DefaultWEBVPNGroup&lt;BR /&gt;Login Time : 10:04:33 CST Wed Apr 3 2019&lt;BR /&gt;Duration : 0h:01m:36s&lt;BR /&gt;Inactivity : 0h:00m:00s&lt;BR /&gt;VLAN Mapping : N/A VLAN : none&lt;BR /&gt;Audt Sess ID : 0a3500fb01ea20005ca4cb81&lt;BR /&gt;Security Grp : none&lt;/P&gt;&lt;P&gt;AnyConnect-Parent Tunnels: 1&lt;BR /&gt;SSL-Tunnel Tunnels: 1&lt;BR /&gt;DTLS-Tunnel Tunnels: 1&lt;/P&gt;&lt;P&gt;AnyConnect-Parent:&lt;BR /&gt;Tunnel ID : 7842.1&lt;BR /&gt;Public IP : *&lt;BR /&gt;Encryption : none Hashing : none&lt;BR /&gt;TCP Src Port : 10780 TCP Dst Port : 443&lt;BR /&gt;Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 5 Minutes Idle TO Left : 3 Minutes&lt;BR /&gt;Client OS : win&lt;BR /&gt;Client OS Ver: 10.0.17134&lt;BR /&gt;Client Type : AnyConnect&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049&lt;BR /&gt;Bytes Tx : 8052 Bytes Rx : 0&lt;BR /&gt;Pkts Tx : 6 Pkts Rx : 0&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;SSL-Tunnel:&lt;BR /&gt;Tunnel ID : 7842.2&lt;BR /&gt;Assigned IP : 10.199.199.12 Public IP : *&lt;BR /&gt;Encryption : AES256 Hashing : SHA256&lt;BR /&gt;Ciphersuite : DHE-RSA-AES256-SHA256&lt;BR /&gt;Encapsulation: TLSv1.2 TCP Src Port : 10783&lt;BR /&gt;TCP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 5 Minutes Idle TO Left : 3 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : SSL VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049&lt;BR /&gt;Bytes Tx : 8404 Bytes Rx : 424&lt;BR /&gt;Pkts Tx : 9 Pkts Rx : 6&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;DTLS-Tunnel:&lt;BR /&gt;Tunnel ID : 7842.3&lt;BR /&gt;Assigned IP : 10.199.199.12 Public IP : *&lt;BR /&gt;Encryption : 3DES Hashing : SHA1&lt;BR /&gt;Ciphersuite : DES-CBC3-SHA&lt;BR /&gt;Encapsulation: DTLSv1.0 UDP Src Port : 9424&lt;BR /&gt;UDP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 5 Minutes Idle TO Left : 5 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : DTLS VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049&lt;BR /&gt;Bytes Tx : 161835 Bytes Rx : 164630&lt;BR /&gt;Pkts Tx : 661 Pkts Rx : 994&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;ISE Posture:&lt;BR /&gt;Redirect URL : &lt;A href="https://BNAPINFISE001.eftdomain.net:8443/portal/gateway?sessionId=0a3500fb01ea20005ca4cb81&amp;amp;portal=0d2e" target="_blank"&gt;https://BNAPINFISE001.eftdomain.net:8443/portal/gateway?sessionId=0a3500fb01ea20005ca4cb81&amp;amp;portal=0d2e&lt;/A&gt;...&lt;BR /&gt;Redirect ACL : ISE_POSTURE_REDIRECT&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;BNA-VPN-TEST-01# show log&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt;Facility: 21&lt;BR /&gt;Timestamp logging: disabled&lt;BR /&gt;Hide Username logging: enabled&lt;BR /&gt;Standby logging: disabled&lt;BR /&gt;Debug-trace logging: disabled&lt;BR /&gt;Console logging: disabled&lt;BR /&gt;Monitor logging: level warnings, 45562 messages logged&lt;BR /&gt;Buffer logging: level informational, 3344774 messages logged&lt;BR /&gt;Trap logging: level informational, facility 21, 6377800 messages logged&lt;BR /&gt;Logging to INSIDE 10.20.0.102, UDP TX:1862789 errors: 30 dropped: 235&lt;BR /&gt;Global TCP syslog stats::&lt;BR /&gt;NOT_PUTABLE: 0, ALL_CHANNEL_DOWN: 0&lt;BR /&gt;CHANNEL_FLAP_CNT: 0, SYSLOG_PKT_LOSS: 0&lt;BR /&gt;PARTIAL_REWRITE_CNT: 0&lt;BR /&gt;Permit-hostdown logging: disabled&lt;BR /&gt;History logging: disabled&lt;BR /&gt;Device ID: disabled&lt;BR /&gt;Mail logging: disabled&lt;BR /&gt;ASDM logging: level debugging, 8235696 messages logged&lt;BR /&gt;lliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341232 for outside:10.199.199.12/56013(LOCAL\stevenwilliams) to outside:13.107.4.52/80 duration 0:00:00 bytes 300 TCP FINs from outside (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341233 for outside:10.199.199.12/49673 (10.199.199.12/49673)(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 (10.20.42.41/161) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/49673 to INSIDE:10.20.42.41/161 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341233 for outside:10.199.199.12/49673(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 duration 0:00:00 bytes 0 (stevenwilliams)&lt;BR /&gt;%ASA-6-305012: Teardown dynamic TCP translation from outside:10.199.199.12/54934(LOCAL\stevenwilliams) to outside:*/54934 duration 0:00:31&lt;BR /&gt;%ASA-6-305012: Teardown dynamic TCP translation from outside:10.199.199.12/54935(LOCAL\stevenwilliams) to outside:*/54935 duration 0:00:31&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341234 for outside:10.199.199.12/56010 (*/56010)(LOCAL\stevenwilliams) to outside:65.199.248.12/443 (65.199.248.12/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56010 to outside:65.199.248.12/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341234 for outside:10.199.199.12/56010(LOCAL\stevenwilliams) to outside:65.199.248.12/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341235 for outside:10.199.199.12/53267 (10.199.199.12/53267)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-305011: Built dynamic TCP translation from outside:10.199.199.12/56015(LOCAL\stevenwilliams) to outside:*/56015&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341236 for outside:10.199.199.12/56015 (*/56015)(LOCAL\stevenwilliams) to outside:8.253.185.120/80 (8.253.185.120/80) (stevenwilliams)&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341237 for outside:10.199.199.12/56016 (10.199.199.12/56016)(LOCAL\stevenwilliams) to INSIDE:10.20.0.85/8443 (10.20.0.85/8443) (stevenwilliams)&lt;BR /&gt;%ASA-6-305011: Built dynamic TCP translation from outside:10.199.199.12/56017(LOCAL\stevenwilliams) to outside:*/56017&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341238 for outside:10.199.199.12/56017 (*/56017)(LOCAL\stevenwilliams) to outside:52.114.132.21/443 (52.114.132.21/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56017 to outside:52.114.132.21/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341238 for outside:10.199.199.12/56017(LOCAL\stevenwilliams) to outside:52.114.132.21/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56011 to INSIDE:10.20.0.94/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341239 for outside:10.199.199.12/56011 (10.199.199.12/56011)(LOCAL\stevenwilliams) to INSIDE:10.20.0.94/443 (10.20.0.94/443) (stevenwilliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341239 for outside:10.199.199.12/56011(LOCAL\stevenwilliams) to INSIDE:10.20.0.94/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341237 for outside:10.199.199.12/56016(LOCAL\stevenwilliams) to INSIDE:10.20.0.85/8443 duration 0:00:00 bytes 1691 TCP FINs from outside (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341235 for outside:10.199.199.12/53267(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 205 (stevenwilliams)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341236 for outside:10.199.199.12/56015(LOCAL\stevenwilliams) to outside:8.253.185.120/80 duration 0:00:00 bytes 300 TCP FINs from outside (stevenwilliams)&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341240 for outside:10.199.199.12/56017 (*/56017)(LOCAL\stevenwilliams) to outside:52.114.132.21/443 (52.114.132.21/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56017 to outside:52.114.132.21/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341240 for outside:10.199.199.12/56017(LOCAL\stevenwilliams) to outside:52.114.132.21/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341241 for outside:10.199.199.12/49673 (10.199.199.12/49673)(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 (10.20.42.41/161) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/49673 to INSIDE:10.20.42.41/161 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341241 for outside:10.199.199.12/49673(LOCAL\stevenwilliams) to INSIDE:10.20.42.41/161 duration 0:00:00 bytes 0 (stevenwilliams)&lt;BR /&gt;%ASA-6-305011: Built dynamic TCP translation from outside:10.199.199.12/56018(LOCAL\stevenwilliams) to outside:*/56018&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 1341242 for outside:10.199.199.12/56018 (*/56018)(LOCAL\stevenwilliams) to outside:23.55.210.189/443 (23.55.210.189/443) (stevenwilliams)&lt;BR /&gt;%ASA-4-113042: Non-HTTP connection from outside:10.199.199.12/56018 to outside:23.55.210.189/443 denied by redirect filter; only HTTP connections are supported for redirection.&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 1341242 for outside:10.199.199.12/56018(LOCAL\stevenwilliams) to outside:23.55.210.189/443 duration 0:00:00 bytes 0 Flow closed by inspection (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341243 for outside:10.199.199.12/49512 (10.199.199.12/49512)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341244 for outside:10.199.199.12/59420 (10.199.199.12/59420)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341245 for outside:10.199.199.12/63488 (10.199.199.12/63488)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341246 for outside:10.199.199.12/51261 (10.199.199.12/51261)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341247 for outside:10.199.199.12/61446 (10.199.199.12/61446)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341248 for outside:10.199.199.12/65519 (10.199.199.12/65519)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302015: Built inbound UDP connection 1341249 for outside:10.199.199.12/63895 (10.199.199.12/63895)(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 (10.20.0.55/53) (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341243 for outside:10.199.199.12/49512(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 139 (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341244 for outside:10.199.199.12/59420(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 132 (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341245 for outside:10.199.199.12/63488(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 134 (stevenwilliams)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341246 for outside:10.199.199.12/51261(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 140 (stevenwilliams)&lt;BR /&gt;%ASA-6-302013: Built outbound TCP connection 1341250 for Management:10.20.0.85/49 (10.20.0.85/49) to identity:10.20.63.74/61529 (10.20.63.74/61529)&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 1341247 for outside:10.199.199.12/61446(LOCAL\stevenwilliams) to INSIDE:10.20.0.55/53 duration 0:00:00 bytes 141 (stevenwilliams)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 15:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831513#M474302</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-04-03T15:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831554#M474303</link>
      <description>Found it! It was a downstream ACL issue on my Core Firewall. The rule was set for tcp port 1700 and not udp port 1700 so now its getting the dACL.</description>
      <pubDate>Wed, 03 Apr 2019 16:06:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831554#M474303</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-04-03T16:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture and CoA Error</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831559#M474304</link>
      <description>Good job. So one of my suggested areas to check from my original comment. Glad it is working!</description>
      <pubDate>Wed, 03 Apr 2019 16:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-and-coa-error/m-p/3831559#M474304</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-04-03T16:14:48Z</dc:date>
    </item>
  </channel>
</rss>

