<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disconnect anyconnect vpn if ISE posture not compliant in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4123800#M561850</link>
    <description>Does this feature exist, and how do I configure it ?&lt;BR /&gt;-AFAIK this is not possible.  You could take a peek to see if you can identify some sort of advanced attribute to reference in your non-compliant authz profile.  My question is why does this matter if you have a working solution to restrict access for non-compliant hosts?  The only thing I can quickly think of is a licensing concern? IMO you would think (if possible depending on your posture checks) you would want to allow some sort of remediation for these hosts that then allows them to re-scan to get full network access.  Lastly, I would think that a generic user would continue to attempt to get on the VPN pending disconnect.</description>
    <pubDate>Wed, 22 Jul 2020 20:06:11 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2020-07-22T20:06:11Z</dc:date>
    <item>
      <title>Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4123603#M561846</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a Firepower in ASA mode (9.14) for anyconnect VPN and cisco ISE for posture (Apex license).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to find if there is an option to force the VPN session to disconnect if the posture is not compliant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the moment when the PC is not compliant there is just the DACL pushed by the ISE to the firewall that prevents access to the network, but now I need to just disconnect the VPN if it's not compliant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this feature exist, and how do I configure it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2020 14:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4123603#M561846</guid>
      <dc:creator>xbill42</dc:creator>
      <dc:date>2020-07-22T14:53:53Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4123800#M561850</link>
      <description>Does this feature exist, and how do I configure it ?&lt;BR /&gt;-AFAIK this is not possible.  You could take a peek to see if you can identify some sort of advanced attribute to reference in your non-compliant authz profile.  My question is why does this matter if you have a working solution to restrict access for non-compliant hosts?  The only thing I can quickly think of is a licensing concern? IMO you would think (if possible depending on your posture checks) you would want to allow some sort of remediation for these hosts that then allows them to re-scan to get full network access.  Lastly, I would think that a generic user would continue to attempt to get on the VPN pending disconnect.</description>
      <pubDate>Wed, 22 Jul 2020 20:06:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4123800#M561850</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-07-22T20:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4124098#M561866</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We check for specific running process on corporate computers. If the process is not running it means that the client corporate computer is not configured properly or have a big problem (they would have to call the IT support and maybe bring their PC for checking etc...)&lt;/P&gt;&lt;P&gt;Why does it matter :&amp;nbsp;there is no point that they stays connected to the tunnel with a deny ACL that allows access to nothing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 08:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4124098#M561866</guid>
      <dc:creator>xbill42</dc:creator>
      <dc:date>2020-07-23T08:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4124162#M561870</link>
      <description>Hi,&lt;BR /&gt;I've not tried this but, create and AuthZ rule and match on Session-PostureStatus EQUALS NonCompliant and result Access-Reject.</description>
      <pubDate>Thu, 23 Jul 2020 11:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4124162#M561870</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-07-23T11:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4131997#M562187</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried the access-reject option, but this triggers an error on the anyconnect side, something like unknown interruption error : general error.&lt;/P&gt;&lt;P&gt;I've also contacted TAC for this and they responded that it is impossible to disconnect the tunnel if the posture is not compliant.&lt;/P&gt;&lt;P&gt;This is a strange "feature" but it is what it is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 13:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4131997#M562187</guid>
      <dc:creator>xbill42</dc:creator>
      <dc:date>2020-08-07T13:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4132114#M562193</link>
      <description>If TAC confirm there is no official method, you could configure the "Session-Timeout" and push that out in the AuthZ profile, this will define a short max session and disconnect once expires.</description>
      <pubDate>Fri, 07 Aug 2020 17:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4132114#M562193</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-07T17:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4134416#M562294</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Session-Timeout is not taken into account by the ASA, I don't see the max session value changed after receiving the COA.&lt;/P&gt;&lt;P&gt;The DACL is received on the other hand.&lt;/P&gt;&lt;P&gt;I'll try to push a whole group-policy with a short max session timeout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 08:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4134416#M562294</guid>
      <dc:creator>xbill42</dc:creator>
      <dc:date>2020-08-12T08:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Disconnect anyconnect vpn if ISE posture not compliant</title>
      <link>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4134630#M562300</link>
      <description>Yes it is, I've tested it. It depends on what you configured. The problem with that command is the lowest value is 1 minute, so the user would be connected for 1 minute before being disconnected.</description>
      <pubDate>Wed, 12 Aug 2020 15:08:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disconnect-anyconnect-vpn-if-ise-posture-not-compliant/m-p/4134630#M562300</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-12T15:08:12Z</dc:date>
    </item>
  </channel>
</rss>

