<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE posture issues over VPN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440385#M530563</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome, thanks so much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Mar 2017 17:28:25 GMT</pubDate>
    <dc:creator>Network Engineering</dc:creator>
    <dc:date>2017-03-28T17:28:25Z</dc:date>
    <item>
      <title>ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440380#M530558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - I got the below question from a partner. Any guidance would be great!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Summary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a client connects over VPN they are authenticated against ISE and they are initially “Posture Status: Unknown” state, this causes them to get the redirect authorisation profile. This is fine initially as it means they get provisioned etc.. on subsequent connections when they are fully provisioned though they still are “Posture Status: Unknown” on initial connection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When Windows O/S does a “Internet Availability Check” it triggers the redirect which means clients always get sent to the client provisioning portal in browser on every connection. This is not ideal as the client is already provisioned and caused a bit of confusion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need the redirect to be in place or else clients can’t be provisioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pseudo Code of Authorisation Policy &lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; If Compliant then compliant_access&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; If Non-Compliant then noncompliant_access&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; If Unknown then redirect to client provisioning&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Solution&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My solution at the moment is to have a “provisioning” profile and “production” profile on the ASA. When the client first connects and is provisioned with the client, I am also pushing profiles which change the default connection to a new VPN profile. The ISE posture module is configured with a profile which points it at ISE on subsequent connections. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use policy sets on ISE so the production VPN profile uses a different policy set. This authorisation profile on ISE still has a redirect in place for “Posture Status:Unknown” but with a “deny all” ACL so nothing is ever redirected. (If don’t have a redirect in place it screws up the ISE logging). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also uses an ASA filter to ensure limited access before posture status is updated. I tried using a DACL but this overwrites the user identity with ACL name for reporting. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My solution works, but I am concerned because seems a bit of a hack and if upgrade ISE or change anything potentially it breaks. I am surprised that only a few people seem to have encountered this problem or are living with it. The design is as per Cisco documentation for the original profile, so assume the redirection on subsequent connections is happening for anyone doing ASA posture assessment. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE 2.2 had some posture assessment enhancements but they are fairly poorly documented so not sure if they resolve this issue. Customer is using ISE 2.0, they can’t upgrade to 2.1 or 2.2 because ESXi is only 5.0 currently. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts how this can be addressed more elegantly? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2017 04:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440380#M530558</guid>
      <dc:creator>jatinps</dc:creator>
      <dc:date>2017-03-27T04:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440381#M530559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should only see this problem potentially if you are doing non-split tunneling VPNs.&amp;nbsp; For many of my customers with the layered security they are applying to the endpoints they are doing split-tunnel so Internet availability check should be a non-issue.&amp;nbsp; The posture module's main way to detect what PSN to report posture to is by doing a port 80 call to the default gateway.&amp;nbsp; So the only thing you really need to redirect is that traffic.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could block internal access, expect access to the PSNs, but allow Internet access in the posture unknown state.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2017 15:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440381#M530559</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-03-27T15:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440382#M530560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: Calibri;"&gt;Another option is to only redirect on certain sites to allow the user to provision the agent. Example: provision.yourdomain.com, your discovery host would also be provision.domain.com, this will need to be a resolvable host in your environment for redirect to work as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: Calibri;"&gt;In ISE 2.2 and anyconnect 4.4 we don’t require redirect. This may help you as well. But i see you can't move to 2.2 as of yet&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2017 16:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440382#M530560</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-03-27T16:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440383#M530561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.cisco.com//u1/147838"&gt;jakunst&lt;/A&gt;&amp;nbsp; Do you have any documentation on how ISE 2.2 and AnyConnect 4.4 can be configured not to require redirect?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 02:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440383#M530561</guid>
      <dc:creator>Network Engineering</dc:creator>
      <dc:date>2017-03-28T02:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440384#M530562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have asked the SME to reach out and reply&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 17:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440384#M530562</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-03-28T17:21:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440385#M530563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome, thanks so much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 17:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440385#M530563</guid>
      <dc:creator>Network Engineering</dc:creator>
      <dc:date>2017-03-28T17:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440386#M530564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you find out how we can configure &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;ISE 2.2 and AnyConnect 4.4 to not require redirect ?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Jun 2017 11:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440386#M530564</guid>
      <dc:creator>gunnar.liknes</dc:creator>
      <dc:date>2017-06-09T11:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE posture issues over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440387#M530565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://salesconnect.cisco.com/open.html?c=6c4d7199-cf6d-489d-b2f3-e181d0c3d1c8"&gt;GOLDLab: SEC-ISE 2.2 Update Lab&lt;/A&gt;&lt;/P&gt;&lt;P&gt;@ SalesConnect has an exercise on that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also see &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html" style="font-family: Calibri, sans-serif; font-size: 16px;"&gt;ISE posture style comparison for pre and post 2.2&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Jun 2017 14:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-issues-over-vpn/m-p/3440387#M530565</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-06-09T14:57:34Z</dc:date>
    </item>
  </channel>
</rss>

