<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE posture in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-posture/m-p/3184533#M556159</link>
    <description>&lt;P&gt;Yea, i understand, but the trick that did it for me was to reboot the PSN nodes. Thank you anyway for your tip Mohamed!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;</description>
    <pubDate>Fri, 15 Sep 2017 07:08:27 GMT</pubDate>
    <dc:creator>Zach_Sec</dc:creator>
    <dc:date>2017-09-15T07:08:27Z</dc:date>
    <item>
      <title>Cisco ISE posture</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-posture/m-p/3181344#M556147</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have a problem with a Posture implementation by a customer. It is a distributed deployment, with a f5 load balancer in front of the 2 PSN nodes.&lt;/P&gt;&lt;P&gt;The posture checking and CoA within the wired deployment works great, but in a WiFi scenario, not so well. We got 2 authorization rules, in which the first one checks if the posture status is set to "compliant", and if it is, it gets a specific dACL.&lt;/P&gt;&lt;P&gt;The second rule states that if there is a WiFi connection attempt to a specific SSID, a posture check should happen.&lt;/P&gt;&lt;P&gt;The posture check with the AnyConnect Posture module always wents fine saying the workstation is compliant,&amp;nbsp;but the problem is that in the RADIUS live log it says that the posture result is in state "Pending", and therefore, the first authorization rule is never being hit. Sometimes a error in the live logs pops up saying "&lt;SPAN&gt;1213 No response received from Network Access Device", and i found that that is a CoA problem. I checked that CoA is enabled on the WLC and that SNAT is not being used on f5.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any suggestions? Perhaps some configuration is missing on f5?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Maybe i should try the first advice from&amp;nbsp;&lt;A href="https://communities.cisco.com/docs/DOC-71879" target="_blank"&gt;https://communities.cisco.com/docs/DOC-71879&lt;/A&gt; ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Zach&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-posture/m-p/3181344#M556147</guid>
      <dc:creator>Zach_Sec</dc:creator>
      <dc:date>2020-02-21T18:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE posture</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-posture/m-p/3182083#M556154</link>
      <description>Hi Zach&lt;BR /&gt;If you WLC is configured with F5 VIP as the RADIUS Server for that particular SSID, then SNAT should be configured on F5 for RADIUS CoA traffic initiated by the PSNs and destined to the NADs (WLC) - Since CoA is initiated by the PSN and sent to the NAD to which the authenticated user/device is connected&lt;BR /&gt;Please note this is different than SNAT for RADIUS traffic from the NAD towards the PSN where the F5 should not source NAT the NAD IP to itself in the RADIUS AAA traffic&lt;BR /&gt;The COA has to be sent from the NAD to the Cisco ISE PSNs IP Addresses (Without SNAT) and the return traffic flow from Cisco ISE back to the NAD should be SNAT or sent directly to the NAD bypassing the Load Balancer (F5) (May be through PBR)</description>
      <pubDate>Sat, 09 Sep 2017 18:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-posture/m-p/3182083#M556154</guid>
      <dc:creator>Mohamed Abd Elnaser Mohamed Mohamed Ali</dc:creator>
      <dc:date>2017-09-09T18:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE posture</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-posture/m-p/3184533#M556159</link>
      <description>&lt;P&gt;Yea, i understand, but the trick that did it for me was to reboot the PSN nodes. Thank you anyway for your tip Mohamed!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 07:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-posture/m-p/3184533#M556159</guid>
      <dc:creator>Zach_Sec</dc:creator>
      <dc:date>2017-09-15T07:08:27Z</dc:date>
    </item>
  </channel>
</rss>

