<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logging MAC address of endpoints connecting over VPN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584047#M535581</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The test I did in my lab didn't send the MAC address either but I was using a different version of anyconnect.&amp;nbsp; I was using the latest version of AnyConnect for IOS so I'm wondering if it is version / platform specific.&amp;nbsp; I'll ask one of my AC colleagues to chime in.&amp;nbsp; If the MAC address shows up in the live log / session directory, ISE can forward that information over syslog.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 19 Jun 2017 14:53:29 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2017-06-19T14:53:29Z</dc:date>
    <item>
      <title>Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584042#M535568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Colleagues,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer would like to log the MAC addresses of the endpoints connecting over VPN into their SIEM.&lt;/P&gt;&lt;P&gt;As far as I know we can't do that. Seemingly we can't even send the MAC to ISE from ASA over the MDM-tlv attributes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any trick, e.g. getting the MAC address from Windows registry with the posture scan agent and log that out somehow, or custom DAP LUA script running on ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Istvan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Jun 2017 14:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584042#M535568</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-16T14:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584043#M535571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Istvan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not that I'm aware of and I don't think extracting the MAC using posture is going to work because of the possibility the endpoint has more than one NIC.&amp;nbsp; I don't think what you are asking for is currently possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Jun 2017 17:45:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584043#M535571</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2017-06-16T17:45:04Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584044#M535574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version of ASA, Anyconnect and ISE are you using? Anyconnect on Windows and MAC send the client MAC address to ASA. Latest version of ASA (9.3+ I think) will send that information to ASA via ACIDEX. New versions of ISE (1.4+ I think, but may be later) will log that MAC address.&lt;/P&gt;&lt;P&gt;MAC address is not made available to Anyconnect client on iOS by Apple. To keep mobile clients consistent, Android version of Anyconnect also does not send the MAC address to the ASA. So for those mobile devices, you won't get the MAC address from Anyconnect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Jun 2017 22:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584044#M535574</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2017-06-16T22:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584045#M535576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;Thank you. Please follow my post that I am adding below. I re-tested in a dcloud LAB for some reasons the MAC is now there and seemingly it has been parsed from the ASA mdm-tlv attribute.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jun 2017 14:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584045#M535576</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-19T14:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584046#M535579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim, Viktor,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have opened the dCloud Rapid Threat Containment lab where I knew that we use ASAv and AnyConnect with ISE (actually 2.0).&lt;/P&gt;&lt;P&gt;I used the same lab but a different pod before. That time no MAC address was presented in Livelog in ISE and the '&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;mdm-tlv=device-mac=...' string was not in the Cisco A/V pair in the authentication event details.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;This last time the MAC address was presented without any change.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;The questions are:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;- How can this behavior controlled?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;- Once it is there, can we send it to an upstream SIEM over syslog?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;IMG alt="Auth_details_with_MAC.jpg" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/108423_Auth_details_with_MAC.jpg" style="height: 336px; width: 620px;" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;IMG alt="Livelog_with_MAC.jpg" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/108424_Livelog_with_MAC.jpg" style="height: 336px; width: 620px;" /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jun 2017 14:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584046#M535579</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-19T14:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584047#M535581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The test I did in my lab didn't send the MAC address either but I was using a different version of anyconnect.&amp;nbsp; I was using the latest version of AnyConnect for IOS so I'm wondering if it is version / platform specific.&amp;nbsp; I'll ask one of my AC colleagues to chime in.&amp;nbsp; If the MAC address shows up in the live log / session directory, ISE can forward that information over syslog.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jun 2017 14:53:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584047#M535581</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2017-06-19T14:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584048#M535583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584048#M535583</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-19T15:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584049#M535585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Istvan,&lt;/P&gt;&lt;P&gt;I mentioned about this in my previous post. Apple blocks any Apps from accessing the MAC address, so you will never get a MAC address from Anyconnect on iOS. You will find the same for Android. Although, on Android, Anyconnect can get the MAC, the BU disabled it to keep all mobile clients consistent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 01:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584049#M535585</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2017-06-20T01:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584050#M535586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Viktor,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment the focus is Windows. And it seems - Tim's anyconnect friend hasn't confirmed yet - sending MAC address is not consistent across AnyConnect for Windows versions.&lt;/P&gt;&lt;P&gt;Hopefully Time can come up with a response from his fellow engineer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 06:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584050#M535586</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-20T06:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584051#M535587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have Hostscan enabled on the PC that's not reporting the MAC address? That may be required for Anyconnect to grab the MAC address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 12:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584051#M535587</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2017-06-20T12:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584052#M535589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Viktor,&lt;/P&gt;&lt;P&gt;This document says that HostScan is not required: &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/118944-technote-anyconnect-00.html" title="http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/118944-technote-anyconnect-00.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/118944-technote-anyconnect-00.html&lt;/A&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 13:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584052#M535589</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-20T13:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584053#M535590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the firewall, enable debug dap trace and see what attributes you're seeing there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 14:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584053#M535590</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2017-06-20T14:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584054#M535591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hostscan should not be required.&amp;nbsp;&amp;nbsp; Viktor is correct and&amp;nbsp; not all OSes will expose the MAC address to an application.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would debug the RADIUS at the ASA or could get packet capture after ASA to see the RADIUS attributes (or TCP dump at PSN).&amp;nbsp; You will see the mdm-tlvs that are being sent.&amp;nbsp; Most Windows clients expose the MAC address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Support to send MDM TLV attributes over RADIUS via ACIDEX requires ASA 9.3.2+ and AC 4.1+.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 14:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584054#M535591</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-06-20T14:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584055#M535593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Craig,&lt;/P&gt;&lt;P&gt;Thank you for Jumping in.&lt;/P&gt;&lt;P&gt;So can we say that with ASA 9.3.2 and AC 4.1 or later this is expected to work, if not there is something to troubleshoot?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 14:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584055#M535593</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-20T14:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584056#M535596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please run debug dap trace on the ASA to see what attributes anyconnect is reporting to the ASA. And as &lt;A href="https://community.cisco.com//u1/28477"&gt;chyps&lt;/A&gt; mentioned, debug radius&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 15:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584056#M535596</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2017-06-20T15:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584057#M535597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I am late to this thread and Tim did reach out.&amp;nbsp; FWIW I agree the debugs are necessary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Support info as Craig has already stated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/release/notes/asarn93.html#15664" title="http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/release/notes/asarn93.html#15664"&gt;Release Notes for the Cisco ASA Series, 9.3(x) - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/108537_pastedImage_2.png" style="max-height: 900px; max-width: 1200px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 class="sectiontitle"&gt;AnyConnect VPN Enhancements&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp; The AnyConnect Identity Extension (ACIDex) attributes have been expanded to include desktop operating systems and MAC addresses.&amp;nbsp; &lt;SPAN class="p"&gt;&lt;SPAN class="p"&gt;These attributes, previously available for mobile devices, provide identification of the client's platform to the ASA when initiating a VPN connection. The ASA can then use this information for:&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;UL&gt;&lt;LI style="margin-top: 0.5em; margin-bottom: 0.5em;"&gt;&amp;nbsp; Configuring DAP polices. For more information see&amp;nbsp; &lt;CITE&gt;Dynamic Access Policies&lt;/CITE&gt; chapter in the appropriate release of the&amp;nbsp; &lt;A href="http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/products-installation-and-configuration-guides-list.html" target="_blank"&gt;&lt;SPAN style="color: #0066cc; text-decoration: underline;"&gt;Cisco ASA 5500-X Series Next-Generation Firewalls, Configuration Guides&lt;/SPAN&gt;&lt;/A&gt;.&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;&amp;nbsp; AAA activities. Specifically when the ASA is part of an ISE controlled network, these attributes identify the endpoint to the ISE.&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/release/notes/b_Release_Notes_AnyConnect_4_0.html#reference_467195CDD71947948872259D1DB91158" title="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/release/notes/b_Release_Notes_AnyConnect_4_0.html#reference_467195CDD71947948872259D1DB91158"&gt;Release Notes for Cisco AnyConnect Secure Mobility Client, Release 4.0 - Cisco&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 18:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584057#M535597</guid>
      <dc:creator>pcarco</dc:creator>
      <dc:date>2017-06-20T18:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584058#M535598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will Viktor. Tomorrow. The LAB pods I planned to use this afternoon were all busy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 19:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584058#M535598</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-20T19:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584059#M535599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have run the debugs and the MAC address is being sent again. So we are good. The reason why it didn't work on one of the dCloud instances is still a mystery. Might be a bug in the ASAv version on that pod.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last and final question if anybody may know the response: which MAC address is selected on a Windows desktop? Active NIC's MAC, lowest or highest value?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jun 2017 20:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584059#M535599</guid>
      <dc:creator>Istvan Segyik</dc:creator>
      <dc:date>2017-06-21T20:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Logging MAC address of endpoints connecting over VPN</title>
      <link>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584060#M535600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It collects all known addresses.&amp;nbsp; I believe they are simply presented in alphabetical order.&amp;nbsp; It is NOT based on specific logic such as active connection (say the one used for VPN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jun 2017 21:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/logging-mac-address-of-endpoints-connecting-over-vpn/m-p/3584060#M535600</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-06-21T21:07:40Z</dc:date>
    </item>
  </channel>
</rss>

