<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Where does the NAC Agent tries to connect to in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546438#M540721</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It does not actually need access to the Default Gateway, it is just sending a request out that is intercepted by the Switch/Controller that is then redirected using a redirect URL to the PSN (or other specified Discovery host).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think Guest portal redirect, it may not have access to the website but it is still redirected to the portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Jan 2016 19:31:52 GMT</pubDate>
    <dc:creator>Cory Peterson</dc:creator>
    <dc:date>2016-01-28T19:31:52Z</dc:date>
    <item>
      <title>Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546428#M540700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What URL does the NAC agent tries to connect to before it get redirected?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2016 04:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546428#M540700</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-08T04:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546429#M540701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;By default, the NAC agent requests the default gateway IP address.&amp;nbsp; For example, &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://192.168.1.1/auth/discovery" rel="nofollow" target="_blank"&gt;http://192.168.1.1/auth/discovery&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp; The network access device then redirects this request one of the ISE PSN nodes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2016 17:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546429#M540701</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2016-01-11T17:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546430#M540704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can it be changed?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2016 17:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546430#M540704</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-11T17:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546431#M540705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, Dan.&amp;nbsp; I don't believe the default behavior can be changed as that is hard coded but you can specify which PSN you want it to connect to via the discovery host attribute in the client provisioning profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2016 17:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546431#M540705</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2016-01-11T17:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546432#M540712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I'll "hard code" the PSN in the client profile, when would the agent try to connect to the PSN? Would the agent wait for redirection? Or any other trigger to cause the agent to contact the PSN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2016 17:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546432#M540712</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-11T17:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546433#M540713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm pretty sure that if you set a discovery host, the NAC agent will attempt to connect to it once it detects network access.&amp;nbsp; Here is the NAC agent discovery sequence to ISE:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. http discovery probe on port 80 to default gateway if no discovery host&lt;/P&gt;&lt;P&gt;2. http discovery probe on port 80 to discovery host, if configured (via HTTP Redirect)&lt;/P&gt;&lt;P&gt;3. https discovery probe on port 8905 to discovery host, if configured&lt;/P&gt;&lt;P&gt;4. http discovery probe on port 80 to default gateway (via HTTP Redirect)&lt;/P&gt;&lt;P&gt;5. https reconnect probe on port 8905 to previously contacted ISE Policy Services node&lt;/P&gt;&lt;P&gt;6. GoTo 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2016 17:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546433#M540713</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2016-01-11T17:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546434#M540714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is a "discovery host"? Is that a PSN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2016 17:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546434#M540714</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-13T17:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546435#M540716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, a PSN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2016 17:47:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546435#M540716</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2016-01-13T17:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546436#M540718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, it needs not be a PSN. I usually recommend one other than PSN but it depends on the web redirect ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A Discovery Host is a DNS-resoluable FQDN or IP address by the client machine and by accessing it at HTTP port 80 will trigger web redirects to ISE PSN client provisioning portal along with a session ID from the network access device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2016 17:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546436#M540718</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-01-13T17:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546437#M540720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Something still bothers me...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would the client get to the default gateway if the posture dACL denies access to anything other than DCHP/DNS/ISE and/or maybe non-RFC1918 addresses?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jan 2016 15:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546437#M540720</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-28T15:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546438#M540721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It does not actually need access to the Default Gateway, it is just sending a request out that is intercepted by the Switch/Controller that is then redirected using a redirect URL to the PSN (or other specified Discovery host).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think Guest portal redirect, it may not have access to the website but it is still redirected to the portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jan 2016 19:31:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546438#M540721</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2016-01-28T19:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546439#M540722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What would be the destination IP address of the first HTTP(S) packet that the posture client sends?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Maybe I should have also asked this: What is the order of operation on incoming packet to the switch? dACL -&amp;gt; WEB_redirec_ACL or is it WEB_Redirect_acl and only if its a deny, then dACL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jan 2016 20:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546439#M540722</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-28T20:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546440#M540723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NAC agent or ISE posture module in AnyConnect will try a couple of different targets (DiscoveryHost, default gateway, previously connected ISE policy service nodes, and (AnyConnect only) enroll.cisco.com) to try discovering the current ISE policy service node that authenticating the client. The first one is likely the DiscoveryHost, but AnyConnect ISE posture does parallel probing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The redirect ACL takes precedence over the DACL (per-user/-session), that over the port ACL configured in "ip access-group &amp;lt;ACL-name&amp;gt; in" per interface. Please note that "redirect ACL" works differently, so that a permit entry will trigger potentially trigger redirect while a deny entry will allow the traffic through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jan 2016 01:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546440#M540723</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-01-30T01:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546441#M540724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So if redirect is happening then the dACL is ignored?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jan 2016 01:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546441#M540724</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-30T01:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546442#M540726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not exactly. I use an example below to explain this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use a redirect ACL to redirect certain connections. A sample redirect ACL from our ISE compliant training lab is as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;ip access-list extended ISE-URL-REDIRECT&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;deny tcp any host 10.1.129.8 eq www&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;permit tcp any any eq www&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where &lt;EM&gt;10.1.129.8&lt;/EM&gt; is a web server to provide AUP and other packages used for remediation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, what not being redirected (e.g. all non-TCP-80) will subject to DACL, so we may have a DACL like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;permit udp any eq bootpc any eq bootps&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;permit udp any any eq domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;permit icmp any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;permit tcp any host 10.1.100.21 eq 8443&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;permit tcp any host 10.1.100.21 eq 8905&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;permit udp any host 10.1.100.21 eq 8905&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;permit tcp any host 10.1.129.8 eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where &lt;EM&gt;10.1.100.21&lt;/EM&gt; is the ISE PSN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since this sample DACL does not end with "deny ip any any" so what permitted in the interface port ACL will allow through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jan 2016 01:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546442#M540726</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-01-30T01:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546443#M540729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The dACL is not ignored it is processed after the Redirect takes place. You need to be sure to allow access to the ISE nodes that are used for posture as well as any remediation servers that will be needed when posture is failed. &lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;When building the policy I have found it best to use two rules around posturing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One that is basically a remediation rule the client is put in while the posture status is NOT EQUAL TO compliant, this rule pushes down the dACL that permits access to ISE and any remediation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then a second rule that is used when the client is EQUAL TO compliant, this rule will push down a permit ip any any or what ever access policy is set for the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for the not equal to rule is that while a client is running the posture client they are usually in an "unknown" status and this catches anything but a compliant PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACLs &lt;SPAN class="j-post-author"&gt;&lt;STRONG&gt;&lt;A href="https://community.cisco.com//people/hslai"&gt;hslai&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; posted are almost identical to my base ACLs I use when starting a new ISE build.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jan 2016 01:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546443#M540729</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2016-01-30T01:39:38Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546444#M540730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure about dACL has no implicit deny?!?!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just tested it, without posture, and dACL has implicit deny. In the dACL I allowed access to only one host and any other host was denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So back to my original question: Assuming your dACL and redirect ACL are in place and assuming there is explicit deny, what would a &lt;SPAN style="text-decoration: underline;"&gt;fresh install&lt;/SPAN&gt; of NAC agent will send over the wire?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jan 2016 01:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546444#M540730</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-01-30T01:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546445#M540732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The overall ACL applied to a Cisco IOS interface has an implicit deny. That is likely what you are seeing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In &lt;A href="https://community.cisco.com/message/201702"&gt;Re: Where does the NAC Agent tries to connect to&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; mentioned /auth/discovery. Essentially, each potential targets are tested with that.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are still using NAC agent with ISE, please consider migrating to AnyConnect ISE posture. See &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/nac/appliance/eol/NAC-Agent-4-x-EOL.html" style="font-size: 10pt;" title="http://www.cisco.com/c/en/us/td/docs/security/nac/appliance/eol/NAC-Agent-4-x-EOL.html"&gt;End-of-Sale and End-of-Life Announcement for the Cisco NAC Agent Software - Cisco&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Feb 2016 00:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546445#M540732</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-02-01T00:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546446#M540733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all for your answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the end, it looks like the only way for a fresh install of AnyConnect (where ISE addresses are not known yet) to be redirected with the above dACL, is to try and access enroll.cisco.com. Otherwise, the above dACL will block any other access &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder what HTTP GET to default-gateway:80 is there for? Who would allow this on their dACL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Feb 2016 05:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546446#M540733</guid>
      <dc:creator>SHECHTER1</dc:creator>
      <dc:date>2016-02-01T05:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: Where does the NAC Agent tries to connect to</title>
      <link>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546447#M540734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; font-family: Arial;"&gt;HTTP (80/TCP) GET to default-gateway is permitted in the redirect ACL so it triggers redirect to ISE client provisioning portal and the agent extracts the host info and deduces the policy service node. Thus, it does not need allowed in DACL.&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial;"&gt;If you meant downloading the AnyConnect binary from Cisco and directly installing it to a client OS, by a fresh install, then we may pre-create a profile for AnyConnect ISE posture module to include DiscoveryHost.&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial; color: #2889c5;"&gt;&lt;SPAN style="color: #575757;"&gt;See &lt;/SPAN&gt;&lt;SPAN style="color: #336666;"&gt;&lt;STRONG&gt;Locations to Pre-Deploy the AnyConnect Profiles&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #575757;"&gt; &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect42/b_AnyConnect_Administrator_Guide_4-2/deploy-anyconnect.html#ID-1425-0000015f"&gt;&lt;SPAN style="color: #2889c5;"&gt;http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect42/b_AnyConnect_Administrator_Guide_4-2/deploy-anyconnect.html#ID-1425-0000015f&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial; color: #2889c5;"&gt;&lt;SPAN style="color: #575757;"&gt;and &lt;/SPAN&gt;&lt;SPAN style="color: #336666;"&gt;&lt;STRONG&gt;ISE Posture Profile Editor&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #575757;"&gt; &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect42/b_AnyConnect_Administrator_Guide_4-2/configure-posture.html#reference_288A1C28DF1549DB9CB171E085944379"&gt;&lt;SPAN style="color: #2889c5;"&gt;http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect42/b_AnyConnect_Administrator_Guide_4-2/configure-posture.html#reference_288A1C28DF1549DB9CB171E085944379&lt;/SPAN&gt;&lt;/A&gt; !&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Feb 2016 07:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-does-the-nac-agent-tries-to-connect-to/m-p/3546447#M540734</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-02-01T07:08:38Z</dc:date>
    </item>
  </channel>
</rss>

