<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE 2.2 AnyConnect Posturing without using redirect in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-2-anyconnect-posturing-without-using-redirect/m-p/3558450#M505497</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, I have a challenge. I have AnyConnect posture for Antivirus. My computers go to hibernate and after returning from hibernation my Office 365 connection sends me a certificate warning. I assume this is due to the redirection of TCP 80/443 to client provisioning and the ISE PSN certificate being presented instead of Office 365.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since finding out about Office 365 IP addresses would be a paramount, I thought of having AnyConnect statically look for the PSN/CPP. Has anyone done this? Any guidance on how to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Homero Ruiz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Apr 2018 18:32:07 GMT</pubDate>
    <dc:creator>hruizman</dc:creator>
    <dc:date>2018-04-25T18:32:07Z</dc:date>
    <item>
      <title>ISE 2.2 AnyConnect Posturing without using redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-anyconnect-posturing-without-using-redirect/m-p/3558450#M505497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, I have a challenge. I have AnyConnect posture for Antivirus. My computers go to hibernate and after returning from hibernation my Office 365 connection sends me a certificate warning. I assume this is due to the redirection of TCP 80/443 to client provisioning and the ISE PSN certificate being presented instead of Office 365.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since finding out about Office 365 IP addresses would be a paramount, I thought of having AnyConnect statically look for the PSN/CPP. Has anyone done this? Any guidance on how to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Homero Ruiz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2018 18:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-anyconnect-posturing-without-using-redirect/m-p/3558450#M505497</guid>
      <dc:creator>hruizman</dc:creator>
      <dc:date>2018-04-25T18:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.2 AnyConnect Posturing without using redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-anyconnect-posturing-without-using-redirect/m-p/3558451#M505498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Per &lt;A href="https://community.cisco.com/message/288826"&gt;Re: Posture 2.2-style&lt;/A&gt;, you can setup a direct link Client Provisioning Portal.&amp;nbsp; Even if redirected to PSN after connection lost, the portal cert should be trusted.&amp;nbsp; However, if redirecting HTTPS, then that would explain cert warning for the NAD itself.&amp;nbsp; Yes, ISE 2.2 Posture without redirect could be used to send request to PSN directly for redirect without NAD intervention.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2018 23:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-anyconnect-posturing-without-using-redirect/m-p/3558451#M505498</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-25T23:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.2 AnyConnect Posturing without using redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-anyconnect-posturing-without-using-redirect/m-p/3558452#M505499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The other thing I would say to as this seems to be a common issue people post on is if you aren't using the CPP portal to install anything for posturing (I never do outside of testing), then the URL redirect only needs to intercept port 80 calls to discovery methods, i.e. default gateway, enroll.cisco.com or discovery host.&amp;nbsp; You can still DACL/ACL block traffic in a preposture state but you don't need to URL redirect anything other than the discovery methods.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see too many people redirecting all HTTP/HTTPS traffic then when the OS is doing portal detection or sending out web traffic it ends up kicking up the CPP page and causing confusion.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 02:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-anyconnect-posturing-without-using-redirect/m-p/3558452#M505499</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-04-26T02:14:44Z</dc:date>
    </item>
  </channel>
</rss>

