<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect Posturing on Virtual Machine in ESXi in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159489#M563111</link>
    <description>Hi Colby,&lt;BR /&gt;&lt;BR /&gt;Many thanks for your response. That’s the way we’re leaning with a dedicated NIC.&lt;BR /&gt;&lt;BR /&gt;Best, Leigh&lt;BR /&gt;</description>
    <pubDate>Wed, 30 Sep 2020 14:40:26 GMT</pubDate>
    <dc:creator>leighharrison</dc:creator>
    <dc:date>2020-09-30T14:40:26Z</dc:date>
    <item>
      <title>AnyConnect Posturing on Virtual Machine in ESXi</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159342#M563097</link>
      <description>&lt;P&gt;Hello Folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've got a Windows 10 VM running in ESXi that we want to be able to run posturing on and push a remediation vlan to it if it's out of compliance.&amp;nbsp; The VM sits in a host and is connected via a VDS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way of ISE pushing a COA for a VLAN to a VDS that anyone has come across?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best, Leigh&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 10:01:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159342#M563097</guid>
      <dc:creator>leighharrison</dc:creator>
      <dc:date>2020-09-30T10:01:54Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Posturing on Virtual Machine in ESXi</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159450#M563106</link>
      <description>&lt;P&gt;VMware VDS is not a supported access switch for ISE or 802.1x.&amp;nbsp; It does not support RADIUS so you cannot send down AV pairs to change VLAN or assign a dACL.&amp;nbsp; And most VMware environments will have the VDS connected to the physical infrastructure using trunk ports which should not be configured for 802.1x.&lt;/P&gt;&lt;P&gt;Now I have used VM's for testing ISE and posture and it works just fine.&amp;nbsp; The catch is that you need to have a physical NIC on the ESXi host dedicated to the VM and then that NIC plugs into a supported access switch.&amp;nbsp; Then from the switches perspective, it is just another 802.1x supplicant/client and you can do VLAN assignment on the access switch.&amp;nbsp; This scenario works fine for lab testing but is not something you would come across in production since it basically defeats the purpose of virtualization.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 13:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159450#M563106</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-09-30T13:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Posturing on Virtual Machine in ESXi</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159489#M563111</link>
      <description>Hi Colby,&lt;BR /&gt;&lt;BR /&gt;Many thanks for your response. That’s the way we’re leaning with a dedicated NIC.&lt;BR /&gt;&lt;BR /&gt;Best, Leigh&lt;BR /&gt;</description>
      <pubDate>Wed, 30 Sep 2020 14:40:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159489#M563111</guid>
      <dc:creator>leighharrison</dc:creator>
      <dc:date>2020-09-30T14:40:26Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Posturing on Virtual Machine in ESXi</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159684#M563116</link>
      <description>&lt;P&gt;Leigh - The other thing I would add is that dynamic VLAN assignment is not recommended for Windows machines.&amp;nbsp; Especially if they are part of a domain.&amp;nbsp; When you change VLAN's, that means your IP address changes also.&amp;nbsp; This can break GPO's, login scripts, drive mappings, etc.&amp;nbsp; The recommendation would be to use a remediation dACL to restrict access and then once compliant, push down a new dACL that allows full access.&amp;nbsp; In that scenario, the IP address of the client never changes, only the access they have.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 20:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159684#M563116</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-09-30T20:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Posturing on Virtual Machine in ESXi</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159739#M563118</link>
      <description>Thanks Colby, Great tip!&lt;BR /&gt;</description>
      <pubDate>Wed, 30 Sep 2020 23:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-posturing-on-virtual-machine-in-esxi/m-p/4159739#M563118</guid>
      <dc:creator>leighharrison</dc:creator>
      <dc:date>2020-09-30T23:07:26Z</dc:date>
    </item>
  </channel>
</rss>

