<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE 2.4 PLUS licensing consumption in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-4-plus-licensing-consumption/m-p/3794950#M485599</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a ISE2.4 deployment that is used for RADIUS device and Device Admin AAA. We have started to see an increase in PLUS license consumption a few months after initial deployment and we can't understand what feature would be using a PLUS license.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our policy sets are: -&lt;/P&gt;
&lt;P&gt;RADIUS policy-set&lt;/P&gt;
&lt;P&gt;Rule matches an InternalUser in a InternalUser Group and provides an Authorization profile consisting of a 'access_accept' and no common tasks but a few av-pairs such as VRF, Loopback interface, static routes etc...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We believe that Device Admin policies do not count towards a PLUS license but just in case it helps our TACACS policy is: -&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rule matches a InternalUser in a InternalUser Group and a Device in a specific Device Group then provides an Authorization consisting of a&amp;nbsp;&lt;/SPAN&gt;priv_lvl an a command-set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We also use ISE to authorize VPN users via RADIUS. However, this is only for user validation: -&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rule matches an InternalUser in a InternalUser Group and provides an Authorization profile consisting of a 'access_accept' and common tasks DACL. and&amp;nbsp;ASA-VPN.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The deployment is only running Session and Device Admin services. Profiling, Posture, BYOD and Guest services are not used and disabled where possible on&amp;nbsp;the nodes. We don't use any of the extended AnyConnect features such as Profiling or Posture compliance on the VPN endpoints.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We have the AnyConnect APEX&amp;nbsp;&lt;/SPAN&gt;licenses applied to our ASAs and reading the documentation it seems that we should not need to apply the APEX licenses to ISE if all we want to do is basic RADIUS AAA for the users username.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my questions are: -&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does the RADIUS ASA-VPN common task consume a PLUS License in ISE?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does the RADIUS DACL common task consume a PLUS License in ISE?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does the&amp;nbsp;Security&amp;nbsp;Group TAG in a RADIUS authorization profile&amp;nbsp;consume a PLUS License in ISE?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Many thanks in advance&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Feb 2019 10:54:33 GMT</pubDate>
    <dc:creator>Peter Batchelour</dc:creator>
    <dc:date>2019-02-05T10:54:33Z</dc:date>
    <item>
      <title>ISE 2.4 PLUS licensing consumption</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-plus-licensing-consumption/m-p/3794950#M485599</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a ISE2.4 deployment that is used for RADIUS device and Device Admin AAA. We have started to see an increase in PLUS license consumption a few months after initial deployment and we can't understand what feature would be using a PLUS license.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our policy sets are: -&lt;/P&gt;
&lt;P&gt;RADIUS policy-set&lt;/P&gt;
&lt;P&gt;Rule matches an InternalUser in a InternalUser Group and provides an Authorization profile consisting of a 'access_accept' and no common tasks but a few av-pairs such as VRF, Loopback interface, static routes etc...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We believe that Device Admin policies do not count towards a PLUS license but just in case it helps our TACACS policy is: -&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rule matches a InternalUser in a InternalUser Group and a Device in a specific Device Group then provides an Authorization consisting of a&amp;nbsp;&lt;/SPAN&gt;priv_lvl an a command-set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We also use ISE to authorize VPN users via RADIUS. However, this is only for user validation: -&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rule matches an InternalUser in a InternalUser Group and provides an Authorization profile consisting of a 'access_accept' and common tasks DACL. and&amp;nbsp;ASA-VPN.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The deployment is only running Session and Device Admin services. Profiling, Posture, BYOD and Guest services are not used and disabled where possible on&amp;nbsp;the nodes. We don't use any of the extended AnyConnect features such as Profiling or Posture compliance on the VPN endpoints.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We have the AnyConnect APEX&amp;nbsp;&lt;/SPAN&gt;licenses applied to our ASAs and reading the documentation it seems that we should not need to apply the APEX licenses to ISE if all we want to do is basic RADIUS AAA for the users username.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my questions are: -&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does the RADIUS ASA-VPN common task consume a PLUS License in ISE?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does the RADIUS DACL common task consume a PLUS License in ISE?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does the&amp;nbsp;Security&amp;nbsp;Group TAG in a RADIUS authorization profile&amp;nbsp;consume a PLUS License in ISE?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Many thanks in advance&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 10:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-plus-licensing-consumption/m-p/3794950#M485599</guid>
      <dc:creator>Peter Batchelour</dc:creator>
      <dc:date>2019-02-05T10:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 PLUS licensing consumption</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-plus-licensing-consumption/m-p/3794961#M485600</link>
      <description>It doesn’t appear like you have anything that would consume a plus license&lt;BR /&gt;&lt;BR /&gt;I recommend installing latest patch and if still exhibiting same before open a tac case &lt;BR /&gt;</description>
      <pubDate>Tue, 05 Feb 2019 11:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-plus-licensing-consumption/m-p/3794961#M485600</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-02-05T11:22:44Z</dc:date>
    </item>
  </channel>
</rss>

