<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Posturing and Split Tunnel in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4396760#M567066</link>
    <description>&lt;P&gt;Can you please share split-tunnel and redirect ACL configuration ?&lt;/P&gt;</description>
    <pubDate>Sun, 02 May 2021 19:57:16 GMT</pubDate>
    <dc:creator>muhammadatif0304</dc:creator>
    <dc:date>2021-05-02T19:57:16Z</dc:date>
    <item>
      <title>ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379264#M548921</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My posturing is working fine but i tried to enable Split tunnel from ASA it is not coming into effect&lt;/P&gt;
&lt;P&gt;I asked Cisco TAC if we can push split tunnel ACL from ISE but as per Engineer it is not supported&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My issue is i am getting 0.0.0.0/0 which will not be acceptable by Client as they need to access internet and other resources out of the tunnel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379264#M548921</guid>
      <dc:creator>CCertified85</dc:creator>
      <dc:date>2020-02-21T18:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379276#M548923</link>
      <description>Hi,&lt;BR /&gt;When the ISE Posture agent attempts to run it will attempt to communicate with the discovery host (if defined) and enroll.cisco.com (default), you will need to ensure these are tunneled through the VPN.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Mon, 07 May 2018 12:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379276#M548923</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-07T12:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379277#M548925</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What discovery Host and Enroll has the connection to Split Tunnel ?&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 13:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379277#M548925</guid>
      <dc:creator>CCertified85</dc:creator>
      <dc:date>2018-05-07T13:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379341#M548927</link>
      <description>&lt;P&gt;The ISE Posture agent needs to send probes, one of the probes if configured is a discovery host inside your network. If that is not configured then it will send one to enroll.cisco.com. &lt;SPAN&gt;This FQDN needs to be successfully resolvable by DNS server. In VPN scenario with split-tunnel, traffic to enroll.cisco.com has to be routed through the tunnel.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nslookup enroll.cisco.com&lt;BR /&gt;Non-authoritative answer:&lt;BR /&gt;Name:&amp;nbsp;&amp;nbsp;&amp;nbsp; mus.cisco.com&lt;BR /&gt;Addresses:&amp;nbsp; 2001:420:1100:ff::&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;72.163.1.80&lt;/STRONG&gt;&amp;nbsp;&amp;lt;&amp;lt;&amp;lt; this is the ip address you need to included in your split-tunnel policy to route back over the VPN. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 14:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3379341#M548927</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-07T14:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3673052#M548930</link>
      <description>&lt;P&gt;Thanks after adding this Public IP in Split tunnel my issue was resolved&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 12:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/3673052#M548930</guid>
      <dc:creator>CCertified85</dc:creator>
      <dc:date>2018-07-24T12:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4396760#M567066</link>
      <description>&lt;P&gt;Can you please share split-tunnel and redirect ACL configuration ?&lt;/P&gt;</description>
      <pubDate>Sun, 02 May 2021 19:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4396760#M567066</guid>
      <dc:creator>muhammadatif0304</dc:creator>
      <dc:date>2021-05-02T19:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4396763#M567067</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1183944"&gt;@muhammadatif0304&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;for &lt;STRONG&gt;Split-Tunnel&lt;/STRONG&gt; ... please take a look at: &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/70917-asa-split-tunnel-vpn-client.html" target="_blank" rel="noopener"&gt;ASA/PIX: Allow Split Tunneling for VPN Client on the ASA Configuration Example&lt;/A&gt;. or &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100936-asa8x-split-tunnel-anyconnect-config.html" target="_blank" rel="noopener"&gt;ASA 8.x: Allow Split Tunneling for VPN Client on the ASA Configuration Example&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;for &lt;STRONG&gt;Redirect-ACL&lt;/STRONG&gt; ... please take a look at: &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html" target="_blank" rel="noopener"&gt;ASA Version 9.2.1 VPN Posture with ISE Configuration Example&lt;/A&gt;, search for &lt;STRONG&gt;redirect-acl&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Sun, 02 May 2021 20:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4396763#M567067</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-05-02T20:19:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4396764#M567068</link>
      <description>Hi there, thanks for sharing links. I have already split-tunnel and allowed&lt;BR /&gt;enroll.cisco.com via tunnel but client provisioning portal doesn't work&lt;BR /&gt;automatically&lt;BR /&gt;&lt;BR /&gt;When i turned off split-tunnel and allow all traffic through tunnel it works&lt;BR /&gt;</description>
      <pubDate>Sun, 02 May 2021 20:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4396764#M567068</guid>
      <dc:creator>muhammadatif0304</dc:creator>
      <dc:date>2021-05-02T20:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posturing and Split Tunnel</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4781341#M580045</link>
      <description>&lt;P&gt;The following has to be done to make enroll.cisco.com activate the posture when doing split tunneling.&lt;/P&gt;&lt;P&gt;1) Add the enroll.cisco.com public IP&amp;nbsp;72.163.1.80 to the split tunnel ACL&lt;/P&gt;&lt;P&gt;2) Configure NO-NAT for the IP&amp;nbsp;72.163.1.80 as it goes from outside (ravpn) to inside (lan)&lt;/P&gt;&lt;P&gt;3) Configure a route on the INSIDE leg e.g.&amp;nbsp;route IF_INSIDE 72.163.1.80 255.255.255.255 &amp;lt;inside P2P next hop&amp;gt;&lt;/P&gt;&lt;P&gt;The above will "fool" AC client to send traffic towards the LAN but will instead get redirected and hence activate posture client.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 11:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posturing-and-split-tunnel/m-p/4781341#M580045</guid>
      <dc:creator>edwardwaithaka</dc:creator>
      <dc:date>2023-02-23T11:13:22Z</dc:date>
    </item>
  </channel>
</rss>

