<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE posture with distributed deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698055#M508007</link>
    <description>&lt;P&gt;DiscoveryHost needs not be one of the PSNs at all. It needs only be a site that would trigger URL redirect based on the redirect ACL.&lt;/P&gt;
&lt;P&gt;For example, I set it in my lab to point it to my AD web site.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Aug 2018 16:27:54 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-08-30T16:27:54Z</dc:date>
    <item>
      <title>ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3697081#M507909</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Quick question.&lt;/P&gt;
&lt;P&gt;At the moment I have only one ISE which I'm using it to do authentication and posture for AV over Wired, wireless and VPN.&lt;/P&gt;
&lt;P&gt;I will need to deploy a distributed environment and I'm not sure how to configure the posture piece.&lt;/P&gt;
&lt;P&gt;At the moment the posture XML file is poiting to the IP of ISE. I tried to change it to the FQDN but it didn't work.&lt;/P&gt;
&lt;P&gt;Do you have any idea how to achieve this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Albert&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 15:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3697081#M507909</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-29T15:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3697895#M507911</link>
      <description>&lt;P&gt;In case you are able to save the profile with FQDN as the DiscoveryHost, then please ensure the endpoints able to resolve the FQDN to a valid IP address during posture discovery. If deployed with Cisco Umbrella or WebSec, ensure the DNS lookup working for this query and not blocking the access to the site.&lt;/P&gt;
&lt;P&gt;In case the editor not permitting you to save the field using FQDN, please open a TAC case to investigate.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 13:26:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3697895#M507911</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-08-30T13:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3697910#M507912</link>
      <description>Hi hslai,&lt;BR /&gt;&lt;BR /&gt;Thanks for your reply.&lt;BR /&gt;I can see that the endpoint are able to resolve the FQDN of ISE, but it only works with IP.&lt;BR /&gt;When I check the logs of DART, I can see that the endpoint is trying to access to ISE using private IP on port 8905, FQDN and enrol.cisco.com:8905.&lt;BR /&gt;I'm still learning on ISE and I'm not sure where the issue is.&lt;BR /&gt;&lt;BR /&gt;I'm not using Umbrella or Websec in our lab.&lt;BR /&gt;&lt;BR /&gt;Albert&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 13:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3697910#M507912</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-30T13:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698049#M507914</link>
      <description>&lt;P&gt;Take a look at&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html" target="_blank"&gt;ISE Posture Style Comparison for Pre and Post 2.2 - Cisco&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Since you are seeing the endpoint trying to access FQDN, the one specified as DiscoveryHost in the agent profile, please follow how the attempt flows. It should go like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;http://DiscoveryHost:80&lt;/P&gt;
&lt;P&gt;-&amp;gt; Redirect to the ISE PSN that authenticates this endpoint session&lt;/P&gt;
&lt;P&gt;-&amp;gt; Able to access ISE PSN and download the posture requirements, etc.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 16:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698049#M507914</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-08-30T16:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698053#M507916</link>
      <description>And how is this going to work in a distributed environment?&lt;BR /&gt;For instance, two ISE(one primary and one secondary)&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 16:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698053#M507916</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-30T16:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698055#M508007</link>
      <description>&lt;P&gt;DiscoveryHost needs not be one of the PSNs at all. It needs only be a site that would trigger URL redirect based on the redirect ACL.&lt;/P&gt;
&lt;P&gt;For example, I set it in my lab to point it to my AD web site.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 16:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698055#M508007</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-08-30T16:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698062#M508011</link>
      <description>I'm not sure how this is going to work.&lt;BR /&gt;At the moment on the switch I don't have any URL redirection ACL; I have one only in the ASA:&lt;BR /&gt;ACL:&lt;BR /&gt;Deny ip any host (AV server)&lt;BR /&gt;Permit tcp any any eq 80&lt;BR /&gt;Permit tcp any any eq 443&lt;BR /&gt;Deny ip any any&lt;BR /&gt;&lt;BR /&gt;This is my profile for Wired posture:&lt;BR /&gt;[cid:image001.png@01D44087.F78D4420]&lt;BR /&gt;&lt;BR /&gt;This is my profile for VPN posture:&lt;BR /&gt;[cid:image002.png@01D44087.F78D4420]&lt;BR /&gt;&lt;BR /&gt;If it is wrong, can you help to design in the correct way?&lt;BR /&gt;Also I want to specify that the posture is working fine at the  moment.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 16:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698062#M508011</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-30T16:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698273#M508014</link>
      <description>&lt;P&gt;You need to ensure that posture is reported to the correct PSN that authenticated the user.&amp;nbsp; The best way to do this is get posture discovery working correctly.&amp;nbsp; In this way, it doesn't matter if you have 2 PSNs or 20.&amp;nbsp; I don't use the posture discovery host.&amp;nbsp; I like posture discovery to work with a fresh install of the posture module no customization required.&amp;nbsp; The two methods that are easy to intercept are:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Port 80 to the default gateway.&lt;/LI&gt;
&lt;LI&gt;Port 80 to enroll.cisco.com.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;My stock posture discover ACL for wired is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip access-list extended POSTURE-DISCOVERY&lt;BR /&gt; permit tcp any 10.0.0.1 0.255.255.0 eq 80&lt;BR /&gt;permit tcp any host 72.163.1.80 eq 80&lt;BR /&gt; deny ip any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This assumes the client is a 10.x.x.x network and .1 is their typical default gateway.&amp;nbsp; 72.163.1.80 is enroll.cisco.com.&amp;nbsp; This will get you to the right PSN everytime even for a fresh installed posture module with no customization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 21:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698273#M508014</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-30T21:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698275#M508018</link>
      <description>Just to specify, I believe this access list is configured in all your switches and you recall this Acl in the posture profile. Is it correct?&lt;BR /&gt;Sorry for all my questions, but I still don’t understand how this should work and I cannot find any good documentation about this.&lt;BR /&gt;&lt;BR /&gt;Thanks anyway &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 21:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698275#M508018</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-30T21:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698278#M508021</link>
      <description>Yes the ACL is part of my standard template on my switches.  In the posture unknown state you reference this ACL for the client provisioning portal redirect.  You don't care about the client provisioning portal, but that is how you apply the redirect for posture discovery.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Here is my general rule of thumb when not using the client provisioning portal to distribute the posture module (I never use the client provisioning portal):&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The redirect ACLs only job is to assist the posture module in discovery the PSN to report posture to.  Just have it redirect port 80 to the default gateway or enroll.cisco.com.  For wired you can use funky masks like I showed to accommodate both.  For wireless you can't use funky masks, so just use enroll.cisco.com and/or put in the GW of the WLC clients.  For VPN I just use enroll.cisco.com typically.  You can use a discovery host as well, but that requires you to customize the posture module on install.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you want to restrict access preposture (unknown state) then you use DACLs on wired/VPN or apply ACLs on wireless.  Don't use the redirect ACL to restrict access.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 21:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698278#M508021</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-30T21:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698305#M508023</link>
      <description>Thanks for your explanation. At the moment I’m applying a dACL to wired and VPN with posture status unequal to compliant and in this ACL I’m allowing only access to ISE, DC servers and AV server.&lt;BR /&gt;&lt;BR /&gt;If I configure enroll.cisco.com in the redirect ACL, I believe I need to allow this connection also in the dACL. Am I correct?&lt;BR /&gt;&lt;BR /&gt;Also for me it is not a problem to customize the XML file for posture, because the users can download it when they connect with Anyconnect via VPN.&lt;BR /&gt; Would you be able to explain how the discovery host customized is configured? if I don’t use the IP of ISE, what IP should I use?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 22:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698305#M508023</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-30T22:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698332#M508024</link>
      <description>&lt;P&gt;Please let me know if it sounds good to you.&lt;/P&gt;
&lt;P&gt;i will configure an xml file adding the IPs of my two ISE in the entry of call home list. In theory this setup should work in case primary ISE fails and the secondary will take its place.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 23:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698332#M508024</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-30T23:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698340#M508027</link>
      <description>Yep that is correct.  You need to allow the traffic through the DACL to get redirected.  So you can just allow the enroll.cisco.com and the default gateway if you want.&lt;BR /&gt;&lt;BR /&gt;You can pick an IP as the discovery host.  You just need the client to make a call to that IP on port 80 so you can redirect it.  It is the same concept as the enroll.cisco.com.&lt;BR /&gt;&lt;BR /&gt;I just like getting posture discovery working correctly then I don't require any special XML files to be deployed.  The call home servers are fine but they don't necessarily get you to the PSN that authenticated the user right away.  Let's say you get authenticated by PSN2 and the posture module talks to PSN1 because it is first in the Call Home list.  It will then redirect the posture module over to PSN2.  At least I am pretty sure how that feature works.  Like I said I just prefer to get posture discovery working then you get to the right PSN every time the first time.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 31 Aug 2018 00:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698340#M508027</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-31T00:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698521#M508029</link>
      <description>Hi Paul,&lt;BR /&gt;&lt;BR /&gt;Thanks for all your help.&lt;BR /&gt;I've tested now with redirection.&lt;BR /&gt;In the ACL on the ASA I've permitted tcp any any eq 80 and 443; instead on the dACL I've allowed permit tcp any any eq 80&lt;BR /&gt;My last question is: When I tested with this setup, I have always the webpage open of ISE for client provisioning.&lt;BR /&gt;Is it possible to have this setup without the opening of this webpage?&lt;BR /&gt;&lt;BR /&gt;Because when I have user call home list, I don't have the CPP.&lt;BR /&gt;Albert&lt;BR /&gt;</description>
      <pubDate>Fri, 31 Aug 2018 08:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698521#M508029</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-31T08:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698528#M508031</link>
      <description>&lt;P&gt;Also I would like to specify that the posture is working on Wired and VPN, but on wired I don't have any ACL for redirection configured on the switch and it is still working.&lt;/P&gt;
&lt;P&gt;I've checked all configuration (ISE as well) and I've deleted the IP of ISE from any call home list entry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not sure why this is happening.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 08:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698528#M508031</guid>
      <dc:creator>Tmsna</dc:creator>
      <dc:date>2018-08-31T08:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698685#M508033</link>
      <description>You need to understand how the discovery piece of posturing works to answer some of you questions.  This link has it all explained:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Post 2.2 there are two stages to posture discovery.  Stage 1 is the legacy methods that require posture redirection or require that you have reported posture before:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Probe 1 - HTTP get /auth/discovery to default gateway IP. You should remember that MAC OS devices does not have default gateway on VPN adapter. Expected result for the probe is redirect-url.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Probe 2 - HTTP GET /auth/discovery to enroll.cisco.com. This FQDN needs to be successfully resolvable by DNS server. In VPN scenario with split-tunnel, traffic to enroll.cisco.com has to be routed through the tunnel. Expected result for the probe is redirect-url.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Probe 3 - HTTP get /auth/discovery to discovery host. Discovery host value is returned from ISE during installation in AC posture profile. Expected result for the probe is redirect-url.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Probe 4 - HTTP GET /auth/status over SSL on port 8905 to previously connected PSN. This request contains information about client IPs and MACs list for session lookup on ISE side. This proble is not presneted during the first posture attempt. Connection is protected by ISE admin certificate. As a result of this probe ISE can return session ID back to the client if node where probe landed is the same node where user has been authenticated.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;So when you say your client works on wired without redirection and Call home list. That is because of #4.  You have reported posture before so you aren't running a valid new client test.  If  you want to test a fresh client then delete your posture config file and stop and start the service.  Again if I am in a Cisco environment, I prefer to use stage 1 methods with redirection to ensure the fastest possible policy server discovery.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Stage 2 was added for environment that don't support URL redirection or I guess if you don't want to configure it.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Probe 1 - During first probe AC posture module tries to establish with IP/FQDNs from "Call Home List". List of the targets for the probe has to be configured in AC posture profile on ISE side. You can define IPs/FQDNs separated by commas, with colon you can define port number for each Call Home destination. This port needs to be equal to the port on which client provisioning portal is runs. On the client side information about call home servers is located in ISEPostureCFG.xml, this file can be found in folder - C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\ISE Posture\&lt;BR /&gt;Call home target might not own the session and at this stage session owner lookup needs to happen. Posture module instructs ISE to start owner lookup by using special target URL   - /auth/ng-discovery,  request as well contains client IPs and MACs list. After this message is recieved by PSN session lookup is first done locally. If session is not found PSN initiates MNT node query. This request contains clint IPs/MACs list, as a result FQDN of the owner should be obtained from MNT. After this PSN returns owner FQDN back to the client. Next request from client is sent to session owner FQDN with auth/status in URL and list of IPs and MACs.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Probe 2 - At this stage posture module tries PSN FQDNs which are located in ConnectionData.xml. You can find this file in C:\Users\&lt;CURRENT user=""&gt;\AppData\Local\Cisco\Cisco AnyConnect Secure Mobility Client\. Posture module retrievs this file at time of first posture attempt. File contains list of ISE PSNs FQDN. Content of the list might be dynamically updated during next connection attempt. End goal of the probe is to get FQDN of current session owner. Implementation is identical to Probe 1 with the only difference in probe destination selection.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/CURRENT&gt;</description>
      <pubDate>Fri, 31 Aug 2018 12:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3698685#M508033</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-31T12:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3699043#M508036</link>
      <description>&lt;P&gt;Paul:- Thanks a lot for helping out.&lt;/P&gt;
&lt;P&gt;Albert:- In case still unable to resolve your issues after reading the doc, please open a Cisco TAC case, so TAC may help reviewing your configurations and checking the AnyConnect DART files.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Sep 2018 00:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3699043#M508036</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-09-01T00:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture with distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3903956#M508038</link>
      <description>&lt;P&gt;Hello there,&lt;/P&gt;&lt;P&gt;in case of a distributed deployment, should I create a profile for each site, with specific list of PSNs?&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;Site A = Profile A = Call home PSN1 and PSN2&lt;/P&gt;&lt;P&gt;Site B = Profile B = Call home PSN3 and PSN4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or could I have only one profile with all PSNs on Call Home list (PSN1, PSN2, PSN3 and PSN4)?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2019 16:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-with-distributed-deployment/m-p/3903956#M508038</guid>
      <dc:creator>andre.ortega</dc:creator>
      <dc:date>2019-08-06T16:42:39Z</dc:date>
    </item>
  </channel>
</rss>

