<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS Suppression in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545608#M530152</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, log suppression is for RADIUS only but not for T+. No known workaround.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Apr 2017 21:09:27 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2017-04-18T21:09:27Z</dc:date>
    <item>
      <title>TACACS Suppression</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545607#M530151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand in ISE, repeated RADIUS requests can be suppressed under &lt;SPAN style="color: #000000; font-family: Calibri; font-size: 14.666666984558105px; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;Administration&amp;gt;System&amp;gt;Settings&amp;gt;Protocols&amp;gt;RADIUS.&amp;nbsp; Screenshot attached.&amp;nbsp; &lt;IMG alt="Untitled.tiff" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/106351_Untitled.tiff" style="max-width: 620px; height: auto;" /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 14.666666984558105px; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 14.666666984558105px; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;Are there plans to extend this suppression capability to TACACS?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 14.666666984558105px; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 14.666666984558105px; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;The scenario is customer runs a monthly vulnerability scan on their infrastructure devices (switches, WLCs, firewalls).&amp;nbsp; Vulnerability scan software makes repeated login attempts on the infrastructure devices, which is flooding ISE and causing adverse performance issues.&amp;nbsp; Can suppression be configured for TACACS requests as well?&amp;nbsp; If not, what is the recommended workaround?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 14.666666984558105px; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 14.666666984558105px; font-style: normal; font-weight: normal; text-align: start; text-indent: 0px;"&gt;Thanks in advance.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2017 04:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545607#M530151</guid>
      <dc:creator>Allen P Chen</dc:creator>
      <dc:date>2017-04-18T04:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS Suppression</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545608#M530152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, log suppression is for RADIUS only but not for T+. No known workaround.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2017 21:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545608#M530152</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-04-18T21:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS Suppression</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545609#M530154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Recommended workaround is to throttle their tool's usage to a more acceptable level of performance impact.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2017 21:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545609#M530154</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2017-04-18T21:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS Suppression</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545610#M530155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hsing and Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the replies.&amp;nbsp; I have already provided the customer recommendations, including limiting access to infrastructure devices to management endpoints, control plane policing for management protocols on infrastructure devices, etc.&amp;nbsp; However, as ISE is positioned as the replacement for ACS, and since there is RADIUS suppression available, I would think TACACS suppression should be a natural extension of that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the insights.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2017 21:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545610#M530155</guid>
      <dc:creator>Allen P Chen</dc:creator>
      <dc:date>2017-04-18T21:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS Suppression</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545611#M530156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll forward your request to the Product Manager!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2017 21:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3545611#M530156</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2017-04-18T21:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS Suppression</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3730068#M530157</link>
      <description>&lt;P&gt;Hello, I have a customer asking this same question and I'm wondering if there's any discussions with the BU that came of this feature request. The customer would like to suppress the service account logs that they see in their TACACS Live Logs. Currently I recommended a filter but they'd like to know if there's a way to do it without a filter. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 18:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3730068#M530157</guid>
      <dc:creator>rwehe</dc:creator>
      <dc:date>2018-10-22T18:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS Suppression</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3730164#M530158</link>
      <description>&lt;P&gt;The fix&amp;nbsp;CSCvb45390 is likely coming in next patch releases of&amp;nbsp;shipping ISE 2.x.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 20:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-suppression/m-p/3730164#M530158</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-22T20:22:46Z</dc:date>
    </item>
  </channel>
</rss>

