<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAB Authz Condition Matching Options in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819567#M484716</link>
    <description>&lt;P&gt;You should have CoA Reauth set globally for reprofile or you can set it on the profile you build.&amp;nbsp; The device should change from Unknown to the new profile you built if the AD host exists data is there.&amp;nbsp; If you don't see that field then you may not be collecting DHCP information.&amp;nbsp; The AD profiler works by collecting DHCP hostname and checking it against AD.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Mar 2019 13:59:51 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2019-03-14T13:59:51Z</dc:date>
    <item>
      <title>MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3812079#M484707</link>
      <description>&lt;P&gt;Currently I am in the process of configuring the default mab authz rule to use CWA with a guest portal for hosts that plug into my SDA fabric that dont match any other rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current issue I am facing:&lt;BR /&gt;We utilize NAM/eap-chaining to authenticate computer + user via eap-fast(eap-tls) with certs/cac cards. I have several policies setup that have different results depending on the eapchaining result. Everything works great and as planned, except when a user simply locks their host prior to going home. Per requirements we re-authenticate every 60 minutes. If users reboot their host prior to heading out the eapchaining result is machine pass with user fail. For the users that simply lock their box, NAM eventually looks for user CAC, and 8021x process fails so they fallback to mab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have attempted setting up authz conditions that are based on eapchaining result EQUALS no-chaining. This seems to work during testing for a short period of time before the endpoint abandons session and fallsback to mab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for suggestions on how I can keep the default rule redirecting unknown hosts to the portal, and also figure out a solution for the users who may simply lock their host when leaving for the day that fallback to mab. This will need to be a rule above the default obviously.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 20:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3812079#M484707</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-02-28T20:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819116#M484710</link>
      <description>&lt;P&gt;Is the goal to prevent EAP-Chaining machines from falling back to CWA? Two options I can think of:&lt;/P&gt;
&lt;P&gt;- Use longer reauth timer or none at all&lt;/P&gt;
&lt;P&gt;- Use AD profiling to profile domain joined machines to endpoint group and create a rule to provide limited access above the default rule for CWA&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 22:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819116#M484710</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-03-13T22:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819487#M484711</link>
      <description>Is the goal to prevent EAP-Chaining machines from falling back to CWA? Two options I can think of:&lt;BR /&gt;The goal would be for endpoints/users that previously authenticated via eap-chaining to not fallback to mab if user cert is not present when computer locked and re-auth kicks in. The issue I am facing is that whenever a computer is locked/unlocked but no user cert is present eap-fast inner method wants user cert first (which obv fails) and 8021x process terminates and falls to mab. You would think that machine cert would pass, user fail, and I could drive policy based on that result. Fortunately that works on reboot, or complete user session logoff. It is only when user session is still active and missing cert on re-auth that I face the fallback problem.&lt;BR /&gt;&lt;BR /&gt;- Use longer reauth timer or none at all&lt;BR /&gt;I have to use 60 min re-auth per requirements so unfortunately this is not an option.&lt;BR /&gt;&lt;BR /&gt;- Use AD profiling to profile domain joined machines to endpoint group and create a rule to provide limited access above the default rule for CWA&lt;BR /&gt;Can you provide examples of this scenario?</description>
      <pubDate>Thu, 14 Mar 2019 12:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819487#M484711</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-14T12:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819525#M484712</link>
      <description>&lt;P&gt;Mike,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming you are collecting DHCP attributes from the devices and have the AD profiler enabled you should see an attribute under the endpoint that says "AD-Host-Exists".&amp;nbsp; You can set a profiling condition of AD-Host-Exists=true and call it Hostname_Exists_In_AD and then use this in your MAB rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 12:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819525#M484712</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-14T12:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819563#M484714</link>
      <description>I am working on testing this as we speak. I see that the default AD check is set to 1 day. Any experience on tweaking the scan? Also, is CoA necessary? The only thing I can currently think of is for devices that get profiled as "unknown"? If a host has not been profiled but is determined that it is a part of AD and the proper AD join point it should automatically go to that endpoint group. OR do I need to do a CoA so that it will re-auth and hit the mab authz policy that maps to the internal group upon classification?</description>
      <pubDate>Thu, 14 Mar 2019 13:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819563#M484714</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-14T13:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819567#M484716</link>
      <description>&lt;P&gt;You should have CoA Reauth set globally for reprofile or you can set it on the profile you build.&amp;nbsp; The device should change from Unknown to the new profile you built if the AD host exists data is there.&amp;nbsp; If you don't see that field then you may not be collecting DHCP information.&amp;nbsp; The AD profiler works by collecting DHCP hostname and checking it against AD.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 13:59:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819567#M484716</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-14T13:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819660#M484718</link>
      <description>So I setup CoA reauth on the profile I built. I see several AD attributes in live log details. However, I do not see AD-Hosts-Exists. DHCP profiler is enabled. A lot of the endpoints that authenticate via 8021x or mab are already profiled (i.e.-Windows 10 Workstation, Hp-Device, etc.). The new profile is set to add hosts to a new endpoint group based on AD-Join-Point &amp;amp; AD-Host-Exists. How will this affect the already profiled devices? How do I get the already profiled devices added to the new profiled group based on the new policy and keep them profiled as for example a Win10 Workstation? I have the two conditions mentioned above certainty factor set to 15 on both with a minimum of 30. My new policy at the moment is not working as expected &amp;amp; configured. Appreciate the assistance in advance.</description>
      <pubDate>Thu, 14 Mar 2019 15:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819660#M484718</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-14T15:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819776#M484719</link>
      <description>&lt;P&gt;Whenever you build a custom profile it should supersede the Cisco defaults.&amp;nbsp; They way you do that is make your MCFs higher.&amp;nbsp; Make yours in the 100+ range.&amp;nbsp; If you want to still track OS type you can create subprofiles underneath for Windows 10, Windows 7 etc, but once you create your own the Cisco defaults won't be used for anything matching your profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you don't see AD Host Exists in AD make sure you got DHCP hostname for the endpoint.&amp;nbsp; Look at the bottom in the attributes of the endpoint for DHCP data.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 18:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3819776#M484719</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-14T18:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822134#M484720</link>
      <description>So in the live logs I see:&lt;BR /&gt;AD-Host-Resolved-Identities&lt;BR /&gt;AD-Host-Candidate-Identities&lt;BR /&gt;AD-Host-Join-Point&lt;BR /&gt;AD-Host-Resolved-DNs&lt;BR /&gt;AD-Host-DNS-Domain&lt;BR /&gt;AD-Groups-Names&lt;BR /&gt;AD-Groups-Names&lt;BR /&gt;AD-Host-NetBios-Name&lt;BR /&gt;&lt;BR /&gt;I do not see the AD-Host-Exists. TAC mentioned that I have to have an IP helper pointing to both of my PSNs in order for that probe to work as expected so I can then see the attribute. Can you provide more detail on the OS types via subprofiles please. Thanks</description>
      <pubDate>Tue, 19 Mar 2019 15:04:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822134#M484720</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-19T15:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822178#M484721</link>
      <description>&lt;P&gt;TAC always says that and you should chuckle at them when they do.&amp;nbsp; You only need IP helper forwarding to ISE if you aren't doing IOS device sensor to collect DHCP data.&amp;nbsp; If your switches support IOS device sensor you should be using that to get DHCP data to ISE.&amp;nbsp; DHCP hostname data is required for the AD profiler to work correctly.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 15:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822178#M484721</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-19T15:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822190#M484722</link>
      <description>I will respond to my case and mention that. Now that you mention the device sensor I actually saw that configured in a labminutes video as well. So currently on my test switch I have the following:&lt;BR /&gt;device-sensor filter-list dhcp list iseDHCP&lt;BR /&gt;option name host-name&lt;BR /&gt;option name parameter-request-list&lt;BR /&gt;option name class-identifier&lt;BR /&gt;device-sensor filter-spec dhcp include list iseDHCP&lt;BR /&gt;device-sensor notify all-changes&lt;BR /&gt;&lt;BR /&gt;Strange that I am getting some AD attributes as noted in a previous post, but not getting what I want. TAC did mention to enable DNS probe as well so I did. Still no dice.</description>
      <pubDate>Tue, 19 Mar 2019 15:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822190#M484722</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-19T15:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822201#M484723</link>
      <description>&lt;P&gt;DNS probe used to work for AD profiler, but that has been broken since 2.4.&amp;nbsp; The only way to get AD profiler info is to get DHCP data for the endpoint into ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure you have device sensor accounting enabled as well.&amp;nbsp; Depending on your version of code the commands will be different.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It could be this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;device-sensor notify all-changes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It could be this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-session accounting attributes filter-list list Def_Acct_List&lt;BR /&gt;&amp;nbsp;protocol cdp&lt;BR /&gt;&amp;nbsp;protocol lldp&lt;BR /&gt;&amp;nbsp;protocol dhcp&lt;BR /&gt;&amp;nbsp;protocol http&lt;BR /&gt;access-session accounting attributes filter-spec list Def_Acct_List&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-session attributes filter-list list Def_Acct_List&lt;BR /&gt;cdp&lt;BR /&gt;lldp&lt;BR /&gt;dhcp&lt;BR /&gt;http&lt;BR /&gt;access-session attributes filter-list list Def_Auth_List&lt;BR /&gt;vlan-id&lt;BR /&gt;access-session accounting attributes filter-spec include list Def_Acct_List&lt;BR /&gt;access-session authentication attributes filter-spec include list Def_Auth_List&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 16:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822201#M484723</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-19T16:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822217#M484724</link>
      <description>Test switch (cat 9300) is running Fuji 16.09.02.&lt;BR /&gt;&lt;BR /&gt;You mentioned this: If you don't see AD Host Exists in AD make sure you got DHCP hostname for the endpoint. Look at the bottom in the attributes of the endpoint for DHCP data.&lt;BR /&gt;&lt;BR /&gt;I do not see DHCP data either near the bottom of attributes in live logs. However, under context visibility I see 14 AD attributes and two DHCP attributes when looking at an endpoint.&lt;BR /&gt;&lt;BR /&gt;AD Attributes seen:&lt;BR /&gt;AD-Groups-Names&lt;BR /&gt;AD-Host-Candidate-Identities&lt;BR /&gt;AD-Host-DNS-Domain&lt;BR /&gt;AD-Host-Join-Point&lt;BR /&gt;AD-Host-NetBios-Name&lt;BR /&gt;AD-Host-Resolved-DNs&lt;BR /&gt;AD-Host-Resolved-Identities&lt;BR /&gt;AD-Last-Fetch-Time&lt;BR /&gt;AD-User-Candidate-Identities&lt;BR /&gt;AD-User-DNS-Domain&lt;BR /&gt;AD-User-Join-Point&lt;BR /&gt;AD-User-NetBios-Name&lt;BR /&gt;AD-User-Resolved-DNs&lt;BR /&gt;AD-User-Resolved-Identities&lt;BR /&gt;&lt;BR /&gt;DHCP Attributes seen:&lt;BR /&gt;dhcp-class-identifier&lt;BR /&gt;dhcp-parameter-request-list&lt;BR /&gt;host-name&lt;BR /&gt;&lt;BR /&gt;Based on what I am seeing there I believe that the device sensor is working as expected &amp;amp; configured. Still not sure why I do not see AD-Host-Exists. I am running ISE 2.3p5. Are there any known bugs?&lt;BR /&gt;</description>
      <pubDate>Tue, 19 Mar 2019 16:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822217#M484724</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-19T16:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822224#M484725</link>
      <description>So I just realized that I am actually seeing AD-Hosts-Exists on my SDA hosts where I have the proper device-sensor stuff configured. The few endpoints that I was checking are non-SDA hosts on gear that is not configured to support the AD attribute stuff. I apologize for the inconvenience.&lt;BR /&gt;&lt;BR /&gt;So let's say I enable this new profile with a 100-150 MCF to then dump MACs into a L2 group. This profile deployment will cause everyone to be re-profiled, but the non-SDA hosts will still get profiled as the current profile that they are since they will not match the AD-Hosts_Exist check since I do not have the proper switch configs deployed, correct? If so, then I should be able to slowly tweak the pre-defined Cisco profiles (i.e- Win10, Win Workstation, etc.) to be a sub profile under the new one I deploy, correct?</description>
      <pubDate>Tue, 19 Mar 2019 16:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822224#M484725</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-19T16:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822262#M484726</link>
      <description>&lt;P&gt;Once you see AD Host Exists in AD you will see:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;AD-Operating-System&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Windows 7 Professional&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Write sub profiles based on that.&amp;nbsp; Forget the Cisco default profiles.&amp;nbsp; Build your own.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 17:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822262#M484726</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-19T17:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822276#M484727</link>
      <description>Last question I have on this topic since profiling is not my sweet spot at the moment. BTW you have been extremely helpful. Am I able to automatically purge MACs that will get profiled with my new profile into the L2 endpoint group after like 30 days of inactivity? Let's say I have 1000 MACs in here, all 1000 hosts are removed in AD, and another 1000 hosts are introduced, will the endpoint group have just the 1000 new hosts or 2000 hosts? What is the easiest way to remove stale MACs? Thanks in advance.</description>
      <pubDate>Tue, 19 Mar 2019 18:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822276#M484727</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-19T18:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822295#M484728</link>
      <description>&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/15810"&gt;@paul&lt;/a&gt; Disregard my last question. I just realized that I can setup endpoint purge policies. Thanks again!</description>
      <pubDate>Tue, 19 Mar 2019 18:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822295#M484728</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-03-19T18:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authz Condition Matching Options</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822296#M484729</link>
      <description>&lt;P&gt;Just remember inactive days only works if you have properly setup reauthentication on all your wired results.&amp;nbsp; All wired results should have a wired reauthentication timer set (we usually use 65,000) and the switch needs to be setup properly to accept it:&lt;/P&gt;
&lt;P&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 19:02:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authz-condition-matching-options/m-p/3822296#M484729</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-19T19:02:36Z</dc:date>
    </item>
  </channel>
</rss>

