<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Profiling data removed with RADIUS Stop received in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/profiling-data-removed-with-radius-stop-received/m-p/3708145#M493078</link>
    <description>&lt;P&gt;In a previous post on using the IP in profiles, I learned from Craig that the IP address is removed from the endpoint when a RADIUS stop is received by ISE.&amp;nbsp; So devices profiled using IPs will revert to some other profile, causing them to get reprofiled again when they reconnect.&amp;nbsp; Given the current no CoA sent on reprofile bug this makes using IP addresses in profiling a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am wondering what other data is removed when a stop is received.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Sep 2018 14:38:13 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2018-09-17T14:38:13Z</dc:date>
    <item>
      <title>Profiling data removed with RADIUS Stop received</title>
      <link>https://community.cisco.com/t5/network-access-control/profiling-data-removed-with-radius-stop-received/m-p/3708145#M493078</link>
      <description>&lt;P&gt;In a previous post on using the IP in profiles, I learned from Craig that the IP address is removed from the endpoint when a RADIUS stop is received by ISE.&amp;nbsp; So devices profiled using IPs will revert to some other profile, causing them to get reprofiled again when they reconnect.&amp;nbsp; Given the current no CoA sent on reprofile bug this makes using IP addresses in profiling a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am wondering what other data is removed when a stop is received.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 14:38:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiling-data-removed-with-radius-stop-received/m-p/3708145#M493078</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-17T14:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: Profiling data removed with RADIUS Stop received</title>
      <link>https://community.cisco.com/t5/network-access-control/profiling-data-removed-with-radius-stop-received/m-p/3708949#M493084</link>
      <description>&lt;P&gt;Paul,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Radius start and stop are in general used for licensing purpose.&lt;/P&gt;
&lt;P&gt;If it is a MAB + profiling session and if ISE receives RADIUS stop, the session is cleared and the license consumed by the endpoint will be released. If the endpoint license is released it cant consume a base/plus license unless it reauthenticates again. For that purpose we have an interim accounting update that you can turn on periodically so that if you dont receive a accounting stop for a long time, ISE will still retain the session. It will not clear the session. You can also configure reauthentication timers with session timeout and termination action attribute that will determine how the session will behave at the end of reauthentication timer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Krishnan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 16:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiling-data-removed-with-radius-stop-received/m-p/3708949#M493084</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2018-09-18T16:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: Profiling data removed with RADIUS Stop received</title>
      <link>https://community.cisco.com/t5/network-access-control/profiling-data-removed-with-radius-stop-received/m-p/3708956#M493089</link>
      <description>Krishnan,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Understood on the normal role of the RADIUS messages, but the fact that IP address information was removed from the endpoint with the RADIUS stop accounting packet comes in was news to me.  I verified this in my lab testing  This cause a device to be reprofiled if you are using the IP address as a profiling condition.   I was wondering if there are any other attributes cleared when a stop message is received.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I always set reauthentication timers on all my wired rules.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks for the feedback.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Sep 2018 16:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiling-data-removed-with-radius-stop-received/m-p/3708956#M493089</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-18T16:56:44Z</dc:date>
    </item>
  </channel>
</rss>

