<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect Clientless SSL VPN - ISE Auth failure in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452610#M518345</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG border="0" class="image-1 jive-image" height="278" src="https://community.cisco.com/legacyfs/online/fusion/114750_pastedImage_0.png" style="max-height: 900px; max-width: 1200px;" width="1465" /&gt;&lt;/P&gt;&lt;P&gt;Very basic - I am in the dialup users group - then VPN ALLOW&lt;/P&gt;&lt;P&gt;Policy, Policy elements, Results, Authorization, Authorization Profiles, VPN ALLOW, has Access Type = ACCESS_ACCEPT, and DACL = ISE-VPN-ALLOW&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Jan 2018 21:07:26 GMT</pubDate>
    <dc:creator>newbieftd</dc:creator>
    <dc:date>2018-01-24T21:07:26Z</dc:date>
    <item>
      <title>AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452608#M518343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;When I try to connect to the ASA (9.6)/ISE (2.2) using &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://asaaddress.domian.com" rel="nofollow" target="_blank"&gt;https://asaaddress.domian.com&lt;/A&gt;&lt;SPAN&gt;, I authenticate with username (via RADIUS/AD/ISE), but access is still denied -&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Radius live log details - steps - &lt;/P&gt;&lt;TABLE border="0" cellpadding="3" class="content_table_steps" style="font-size: 12px; padding: 5px; color: #666666; font-family: Arial;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;24343&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;RPC Logon request succeeded - &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:XXXXXXX@XXXXXXX.com"&gt;XXXXXXX@XXXXXXX.com&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;24402&lt;/TD&gt;&lt;TD&gt;User authentication against Active Directory succeeded - XXXXXXX.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;22037&lt;/TD&gt;&lt;TD&gt;Authentication Passed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;24423&lt;/TD&gt;&lt;TD&gt;ISE has not been able to confirm previous successful machine authentication&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;15036&lt;/TD&gt;&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Session.EPSStatus&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;15016&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile - DenyAccess&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;15039&lt;/TD&gt;&lt;TD&gt;Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="content_table_steps_highlight"&gt;&lt;TD style="background-position: no-repeat;"&gt; &lt;/TD&gt;&lt;TD&gt;11003&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The machine was just previously authenticated on the network (Wired and wireless) - &lt;/P&gt;&lt;P&gt;Authentication is VPN-&amp;gt;Default-&amp;gt;Default, not hitting Authorization policy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 20:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452608#M518343</guid>
      <dc:creator>newbieftd</dc:creator>
      <dc:date>2018-01-24T20:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452609#M518344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are hitting an authorization profile, just one that has Access-Reject in it.&amp;nbsp; What does your VPN policy set look like?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 20:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452609#M518344</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-24T20:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452610#M518345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG border="0" class="image-1 jive-image" height="278" src="https://community.cisco.com/legacyfs/online/fusion/114750_pastedImage_0.png" style="max-height: 900px; max-width: 1200px;" width="1465" /&gt;&lt;/P&gt;&lt;P&gt;Very basic - I am in the dialup users group - then VPN ALLOW&lt;/P&gt;&lt;P&gt;Policy, Policy elements, Results, Authorization, Authorization Profiles, VPN ALLOW, has Access Type = ACCESS_ACCEPT, and DACL = ISE-VPN-ALLOW&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 21:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452610#M518345</guid>
      <dc:creator>newbieftd</dc:creator>
      <dc:date>2018-01-24T21:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452611#M518346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also - I tried changing the final VPN rule to "PermitAccess" - no difference.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 21:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452611#M518346</guid>
      <dc:creator>newbieftd</dc:creator>
      <dc:date>2018-01-24T21:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452612#M518347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Show the result details where you changed it to permit access.  That should show:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;15016   Selected Authorization Profile – PermitAccess&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 21:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452612#M518347</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-24T21:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452613#M518348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is what I thought, but the details stay exactly the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I don’t think it gets to the final rule, it authenticates, but doesn’t authorize.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 22:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452613#M518348</guid>
      <dc:creator>newbieftd</dc:creator>
      <dc:date>2018-01-24T22:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452614#M518349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this a deployment or one node?   If deployment sounds like you may have a synchronization issue with the PSN.  If you changed to PermitAccess but you see log details showing DenyAccess then I would look at sync issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jan 2018 00:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452614#M518349</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-25T00:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452615#M518350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is a deployment, these two nodes are in the same zone. I will reset and give them longer to sync. Is they a key or synchronize I’d? Something I can check?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jan 2018 00:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452615#M518350</guid>
      <dc:creator>newbieftd</dc:creator>
      <dc:date>2018-01-25T00:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452616#M518351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are the authentications going to the same node as the rule set you are looking at?  You can force sync from the deployment screen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jan 2018 00:15:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452616#M518351</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-25T00:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452617#M518352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I copied the VPN policy to VPN_copy, and changed the last rule to PermitAccess – left plenty of time to sync with no change. (access good from AnyConnect client, fails for Clientless SSL VPN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I purchased a book yesterday and it has a helpful hint to test the “AAA test” from the ASA. The test FAILS.  This seems odd since I can connect/authenticate using the AnyConnect client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the trace results of (3) connection attempts (AAA test , Clientless SSL VPN from home , AnyConnect client from home ) – seems like I should focus on getting the AAA test to work, but not sure where to start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;LI level="16" type="ol"&gt;&lt;P&gt;  Test from ASA AAA Server Groups ###################&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;Radius.User-Name=myname@mydomain.com&lt;/P&gt;&lt;P&gt;Radius.NAS-IP-Address=10.247.101.10&lt;/P&gt;&lt;P&gt;Radius.NAS-Port-Type=Virtual&lt;/P&gt;&lt;P&gt;Network Access.NetworkDeviceName=MyCompVPN&lt;/P&gt;&lt;P&gt;Network Access.AuthenticationMethod=PAP_ASCII&lt;/P&gt;&lt;P&gt;Network Access.Protocol=RADIUS&lt;/P&gt;&lt;P&gt;Radius.NAS-Port=3&lt;/P&gt;&lt;P&gt;Network Access.AD-User-Join-Point=MyDomain.COM&lt;/P&gt;&lt;P&gt;Network Access.AD-User-DNS-Domain=MyDomain.com&lt;/P&gt;&lt;P&gt;DEVICE.Network Device Profile=Cisco&lt;/P&gt;&lt;P&gt;DEVICE.Location=All Locations#MyLocation&lt;/P&gt;&lt;P&gt;DEVICE.Device Type=All Device Types#Firewalls&lt;/P&gt;&lt;P&gt;MyDomain.com.IdentityAccessRestricted=false&lt;/P&gt;&lt;P&gt;Network Access.Device IP Address=10.247.101.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;LI level="16" type="ol"&gt;&lt;P&gt;  Failed from home to Clientless WebVPN ###################&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;Radius.Calling-Station-ID=12.193.30.2&lt;/P&gt;&lt;P&gt;Radius.User-Name=myname@mydomain.com&lt;/P&gt;&lt;P&gt;Radius.NAS-IP-Address=10.247.101.10&lt;/P&gt;&lt;P&gt;Radius.NAS-Port-Type=Virtual&lt;/P&gt;&lt;P&gt;Network Access.NetworkDeviceName=MyCompVPN&lt;/P&gt;&lt;P&gt;Network Access.AuthenticationMethod=PAP_ASCII&lt;/P&gt;&lt;P&gt;Network Access.Protocol=RADIUS&lt;/P&gt;&lt;P&gt;Radius.NAS-Port=323584&lt;/P&gt;&lt;P&gt;Radius.Tunnel-Client-Endpoint=(tag=0) 12.193.30.2&lt;/P&gt;&lt;P&gt;Cisco-VPN3000.CVPN3000/ASA/PIX7x-Tunnel-Group-Name=AnyConnect&lt;/P&gt;&lt;P&gt;Normalised Radius.SSID=183.187.10.10&lt;/P&gt;&lt;P&gt;Cisco-VPN3000.CVPN3000/ASA/PIX7x-Client-Type=Clientless-SSL-VPN&lt;/P&gt;&lt;P&gt;Network Access.AD-User-Join-Point=MyDomain.COM&lt;/P&gt;&lt;P&gt;Network Access.AD-User-DNS-Domain=MyDomain.com&lt;/P&gt;&lt;P&gt;DEVICE.Network Device Profile=Cisco&lt;/P&gt;&lt;P&gt;DEVICE.Location=All Locations#MyLocation&lt;/P&gt;&lt;P&gt;DEVICE.Device Type=All Device Types#Firewalls&lt;/P&gt;&lt;P&gt;MyDomain.com.IdentityAccessRestricted=false&lt;/P&gt;&lt;P&gt;Network Access.Device IP Address=10.247.101.10&lt;/P&gt;&lt;P&gt;Radius.Called-Station-ID=183.187.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;OL&gt;&lt;LI level="16" type="ol"&gt;&lt;P&gt;  Success from home to AnyConnect Client ###################&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Radius.Calling-Station-ID=12.193.30.2&lt;/P&gt;&lt;P&gt;Radius.User-Name=myname@mydomain.com&lt;/P&gt;&lt;P&gt;Radius.NAS-IP-Address=10.247.101.10&lt;/P&gt;&lt;P&gt;Radius.NAS-Port-Type=Virtual&lt;/P&gt;&lt;P&gt;Network Access.NetworkDeviceName=MyCompVPN&lt;/P&gt;&lt;P&gt;Network Access.AuthenticationMethod=PAP_ASCII&lt;/P&gt;&lt;P&gt;Network Access.Protocol=RADIUS&lt;/P&gt;&lt;P&gt;Radius.NAS-Port=8192&lt;/P&gt;&lt;P&gt;Radius.Tunnel-Client-Endpoint=(tag=0) 12.193.30.2&lt;/P&gt;&lt;P&gt;Cisco-VPN3000.CVPN3000/ASA/PIX7x-Tunnel-Group-Name=AnyConnect&lt;/P&gt;&lt;P&gt;Normalised Radius.SSID=183.187.10.10&lt;/P&gt;&lt;P&gt;Cisco-VPN3000.CVPN3000/ASA/PIX7x-Client-Type=AnyConnect-Client-SSL-VPN&lt;/P&gt;&lt;P&gt;Network Access.AuthenticationStatus=AuthenticationPassed&lt;/P&gt;&lt;P&gt;Network Access.AD-User-Join-Point=MyDomain.COM&lt;/P&gt;&lt;P&gt;Network Access.AD-User-DNS-Domain=MyDomain.com&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/Dialup-MyLocation-Admins&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/Dialup Users&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/NetworkDeviceMGRsMyLocation&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/NetworkDeviceMGRsGlobal&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/Dialup-MyLocation-AdvancedMathematics&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/Users/Domain Users&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/IS/Groups/vCenterAdmins&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/Users/Domain Admins&lt;/P&gt;&lt;P&gt;DEVICE.Network Device Profile=Cisco&lt;/P&gt;&lt;P&gt;DEVICE.Location=All Locations#MyLocation&lt;/P&gt;&lt;P&gt;DEVICE.Device Type=All Device Types#Firewalls&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/Dialup-MyLocation-Admins&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/Dialup Users&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/NetworkDeviceMGRsMyLocation&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/NetworkDeviceMGRsGlobal&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/Groups/Dialup-MyLocation-AdvancedMathematics&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/Users/Domain Users&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/MyComp/IS/Groups/vCenterAdmins&lt;/P&gt;&lt;P&gt;MyDomain.com.ExternalGroups=MyDomain.com/Users/Domain Admins&lt;/P&gt;&lt;P&gt;MyDomain.com.IdentityAccessRestricted=false&lt;/P&gt;&lt;P&gt;Network Access.Device IP Address=10.247.101.10&lt;/P&gt;&lt;P&gt;Radius.Called-Station-ID=183.187.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-cliff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jan 2018 16:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452617#M518352</guid>
      <dc:creator>newbieftd</dc:creator>
      <dc:date>2018-01-25T16:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452618#M518356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try using the primary ISE to authenticate and see whether it makes any difference. If it does, then go to the deployment page and initiate a manual sync to the 2nd ISE node.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 01:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452618#M518356</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-01-26T01:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452619#M518357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, but no difference using primary/secondary to authenticate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-cliff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 16:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452619#M518357</guid>
      <dc:creator>newbieftd</dc:creator>
      <dc:date>2018-01-26T16:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452620#M518359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please restart the ISE services on one of the ISE nodes. If this not helping, then your policies might be a strange state and please engage Cisco TAC to investigate further.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 16:23:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452620#M518359</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-01-26T16:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Clientless SSL VPN - ISE Auth failure</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452621#M518361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would probably open a TAC case.  Most likely it is something that is easily explained, but hard to troubleshoot over the forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 16:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-clientless-ssl-vpn-ise-auth-failure/m-p/3452621#M518361</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-26T16:23:49Z</dc:date>
    </item>
  </channel>
</rss>

