<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Issues deauthenticating android TV in ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/issues-deauthenticating-android-tv-in-ise/m-p/4192801#M564144</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have several Android TVs (OS Android 7.1.2 ) where 6 months after installed the TV were deauthenticated. TVs were connected by wifi but with no internet access. TVs needed to enter the credential WIFI again to work on internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TVs are connected to WLC and send radius requests to ISE (MAB).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In ISE Radius report, i can see like the day which stop internet the "endpoint profile" changes from ANDROID to UNKNOWN. it could be the trigge??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any session time for 6 months configure in ISE or WLC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any idea?&lt;/P&gt;</description>
    <pubDate>Thu, 03 Dec 2020 14:33:06 GMT</pubDate>
    <dc:creator>SupportAC</dc:creator>
    <dc:date>2020-12-03T14:33:06Z</dc:date>
    <item>
      <title>Issues deauthenticating android TV in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-deauthenticating-android-tv-in-ise/m-p/4192801#M564144</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have several Android TVs (OS Android 7.1.2 ) where 6 months after installed the TV were deauthenticated. TVs were connected by wifi but with no internet access. TVs needed to enter the credential WIFI again to work on internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TVs are connected to WLC and send radius requests to ISE (MAB).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In ISE Radius report, i can see like the day which stop internet the "endpoint profile" changes from ANDROID to UNKNOWN. it could be the trigge??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any session time for 6 months configure in ISE or WLC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any idea?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2020 14:33:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-deauthenticating-android-tv-in-ise/m-p/4192801#M564144</guid>
      <dc:creator>SupportAC</dc:creator>
      <dc:date>2020-12-03T14:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Issues deauthenticating android TV in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/issues-deauthenticating-android-tv-in-ise/m-p/4193166#M564158</link>
      <description>&lt;P&gt;A couple of things to consider: Take a peek at your global profiling coa setting to see if you have it set to reauth after an endpoint profile change (Administration-&amp;gt;System-&amp;gt;Settings-&amp;gt;Profiling).&amp;nbsp; Here are your options:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI id="ID481__li_5717B05BA9DC4C49BAACDE78AC0F8F29" class="li"&gt;
&lt;P class="p SBu1_StepBullet1-7D351ED8"&gt;&lt;STRONG id="ID481__ID492" class="ph b B_Bold-7204837A"&gt;No CoA&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(default)—You can use this option to disable the global configuration of CoA. This setting overrides any configured CoA per endpoint profiling policy. If the goal is only visibility, retain the default value as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;No CoA&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID481__li_1A25C7CCF4A8431C9B052C8B7423DB45" class="li"&gt;
&lt;P class="p SBu1_StepBullet1-7D351ED8"&gt;&lt;STRONG id="ID481__ID495" class="ph b B_Bold-7204837A"&gt;Port Bounce&lt;/STRONG&gt;—You can use this option, if the switch port exists with only one session. If the port exists with multiple sessions, then use the Reauth option. If the goal is to immediately update the access policy based on profile changes, select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG id="ID481__ID495_d575e76a1310" class="ph b B_Bold-7204837A"&gt;Port Bounce&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;option, this will ensure that any clientless endpoints is reauthorized, and IP address is refreshed, if required.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID481__li_614E65FE01C5420B98E33B6226CE6677" class="li"&gt;
&lt;P class="p SBu1_StepBullet1-7D351ED8"&gt;&lt;STRONG id="ID481__ID498" class="ph b B_Bold-7204837A"&gt;Reauth&lt;/STRONG&gt;—You can use this option to enforce reauthentication of an already authenticated endpoint when it is profiled. Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG id="ID481__ID498_d575e87a1310" class="ph b B_Bold-7204837A"&gt;Reauth&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;option, if no VLAN or address change is expected following the reauthorization of the current session.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I would recommend identifying unique attributes you can utilize to create a custom profile for your android tvs.&amp;nbsp; Make sure you set the MCF higher to ensure the tvs get properly profiled and eliminate the possibility of profile changes.&amp;nbsp; See here for assistance:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 02:19:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issues-deauthenticating-android-tv-in-ise/m-p/4193166#M564158</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-12-04T02:19:40Z</dc:date>
    </item>
  </channel>
</rss>

