<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect ISE posture IPv6 infinite loop (CSCvo36890) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4089656#M560560</link>
    <description>&lt;P&gt;A customer of mine ran into this.&amp;nbsp; They had to push a registry setting via GPO policy to disable the teredo adapter.&amp;nbsp; Once they did that their posturing issues (i.e. constant pop-ups and reposturing) went away.&lt;/P&gt;</description>
    <pubDate>Wed, 20 May 2020 22:43:26 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2020-05-20T22:43:26Z</dc:date>
    <item>
      <title>Anyconnect ISE posture IPv6 infinite loop (CSCvo36890)</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4089179#M560538</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During a posture deployment on Windows 10 with ISE2.4 and AC 4.7 &amp;amp; 4.8 we hit the following bug&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo36890/?rfs=iqvred" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo36890/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If we perform the Teredo disable command it gets enabled again after restart and I'm not sure what we will break if we disable it via GPO etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As the Bug report doesn't actually provides much details,I'm looking for possible mitigations and workarounds.&lt;/P&gt;&lt;P&gt;Anybody has any experience with this issue and successful resolutions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 09:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4089179#M560538</guid>
      <dc:creator>Panos Bouras</dc:creator>
      <dc:date>2020-05-20T09:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect ISE posture IPv6 infinite loop (CSCvo36890)</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4089656#M560560</link>
      <description>&lt;P&gt;A customer of mine ran into this.&amp;nbsp; They had to push a registry setting via GPO policy to disable the teredo adapter.&amp;nbsp; Once they did that their posturing issues (i.e. constant pop-ups and reposturing) went away.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 22:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4089656#M560560</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2020-05-20T22:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect ISE posture IPv6 infinite loop (CSCvo36890)</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4100089#M561063</link>
      <description>&lt;P&gt;Thank you Paul.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2020 13:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4100089#M561063</guid>
      <dc:creator>Panos Bouras</dc:creator>
      <dc:date>2020-06-09T13:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect ISE posture IPv6 infinite loop (CSCvo36890)</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4100155#M561072</link>
      <description>&lt;P&gt;We ran into similar issues. Some users also reported no policy server detected, no internet and no outlooks accessible. Disabled IPV6 on client machine resolved the issue. We opened a ticket with TAC, and they recommend we should apply this command "client-bypass-protocol enable" under the group-policy. I haven't tested the command yet.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2020 14:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4100155#M561072</guid>
      <dc:creator>Mohamed Abdi</dc:creator>
      <dc:date>2020-06-09T14:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect ISE posture IPv6 infinite loop (CSCvo36890)</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4107328#M561345</link>
      <description>Hi Mohamed,&lt;BR /&gt;&lt;BR /&gt;I believe that "client-bypass-protocol enable" applies to firewalls or at least VPN configuration. We witnessed this behavior at switch connected devices, but not during our VPN tests where the same client was terminating VPN connection to FTD 2100 6.4.0 firewalls using 4.7 Anyconnect. ISE and AD infrastructure was the same.</description>
      <pubDate>Mon, 22 Jun 2020 13:24:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-ise-posture-ipv6-infinite-loop-cscvo36890/m-p/4107328#M561345</guid>
      <dc:creator>Panos Bouras</dc:creator>
      <dc:date>2020-06-22T13:24:15Z</dc:date>
    </item>
  </channel>
</rss>

