<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Endpoint Visibility AuthZ Attribute not matching in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3683029#M496011</link>
    <description>&lt;P&gt;Also, good to work with TAC to know the root cause and have a defect for tracking the issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Nidhi&lt;/P&gt;</description>
    <pubDate>Tue, 07 Aug 2018 10:30:32 GMT</pubDate>
    <dc:creator>Nidhi</dc:creator>
    <dc:date>2018-08-07T10:30:32Z</dc:date>
    <item>
      <title>Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3673452#M496009</link>
      <description>&lt;P&gt;Running ISE 2.3 patch 2 the endpoint visibility data is not matching up with the current live logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More specifically the attribute I am most concerned about at this time is the "&lt;SPAN&gt;AuthorizationPolicyMatchedRule" attribute is not matching the actual AuthZ policy&amp;nbsp;that is being match when looking at the endpoint in the Live Logs or RADIUS authentication&amp;nbsp;reports.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I have also pulled the data using both ISEEAT and through the CLI with the same results.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 16:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3673452#M496009</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-07-24T16:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3681666#M496010</link>
      <description>&lt;P&gt;I do not think this is part of the significant attributes so it might not always get updated in ISE profiler.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 03:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3681666#M496010</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-08-06T03:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3683029#M496011</link>
      <description>&lt;P&gt;Also, good to work with TAC to know the root cause and have a defect for tracking the issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Nidhi&lt;/P&gt;</description>
      <pubDate>Tue, 07 Aug 2018 10:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3683029#M496011</guid>
      <dc:creator>Nidhi</dc:creator>
      <dc:date>2018-08-07T10:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3683243#M496012</link>
      <description>&lt;P&gt;There is already a bug for this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb28481/?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb28481/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I reported this in 2.1 and Hsing created a bug for me.&amp;nbsp; The bug says fixed but this is still not working correctly.&amp;nbsp; The biggest issue is we can't rely on Context Visibility to tell us the accurate last authorization profile the MAC address hit.&amp;nbsp; This is crucial in the monitor mode phase.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Aug 2018 13:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3683243#M496012</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-07T13:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3684229#M496013</link>
      <description>&lt;P&gt;I'm been working with the business unit for over a year on what sounds like the same issue.&amp;nbsp; If I understand the problem correctly there is a discontinuity between the context visibility database and a second database.&amp;nbsp; In my opinion, there is only one way to manage the deployment, that is through the radius livelogs and live sessions screens.&amp;nbsp; I feel your pain.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Aug 2018 15:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3684229#M496013</guid>
      <dc:creator>cjwolff</dc:creator>
      <dc:date>2018-08-08T15:23:25Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3684256#M496014</link>
      <description>Yes but the live logs aren't going to help you because you can't filter on Monitor-Catch-All authorization profile and expect that list to be accurate for things sitting at the Catch All rule.  Especially with CPL where all devices are MAB'd all your valid 802.1x devices will hit the Catch All rule and look like issues when they are fine.  The Live Session is better, but what if the device is currently on the network.  Ideally, we need ISE to answer the question "What was the last authorization profile the MAC address hit".  The Context Visibility is supposed to do that, but doesn't.  I have a macro I wrote in 1.1 that I use to process RADIUS data and parse out the last hit authorization profile to give accurate Catch All hits, but that is only something I (and others at my company) use.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 08 Aug 2018 16:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3684256#M496014</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-08T16:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3684992#M496016</link>
      <description>You're 100% on the mark.  What you're describing is a fundamental failure in manageability of the enterprise through ISE.  All we can keep doing is pushing the issue at all levels.</description>
      <pubDate>Thu, 09 Aug 2018 14:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3684992#M496016</guid>
      <dc:creator>cjwolff</dc:creator>
      <dc:date>2018-08-09T14:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3685006#M496018</link>
      <description>&lt;P&gt;This all revolves around the ability to find what endpoints are passing and which ones are not. Like many have stated above the difference in the two views is a huge pain point when doing monitor mode in preparation to move to enforcement mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like Paul has done, I have also had to write my own tool to parse the data.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have written a python script that takes two reports and merges them using data from both that I want to see to help with troubleshooting the devices failing for whatever reason. I use ISEEAT to pull a full endpoint report(this matches context visibility) and also a report for the last 7 days of radius authentications(this report is growing to almost an 1gig CSV file).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All of the data is in the Context Visibility report but it is not accurate so we have to resort to custom scripts to meet this need that should be accurate. I have a case open on this also and it is definitely not corrected.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 14:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3685006#M496018</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-08-09T14:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3913097#M496021</link>
      <description>&lt;P&gt;Was this fixed in the 2.4 release?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 14:13:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3913097#M496021</guid>
      <dc:creator>Willieh13</dc:creator>
      <dc:date>2019-08-23T14:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Visibility AuthZ Attribute not matching</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3913139#M496023</link>
      <description>&lt;P&gt;No this still hasn't been fixed.&amp;nbsp; Context Visibility is still unreliable as ever for certain data like the authorization policy hit.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 15:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-visibility-authz-attribute-not-matching/m-p/3913139#M496023</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-08-23T15:04:07Z</dc:date>
    </item>
  </channel>
</rss>

