<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Endpoint present in ISE via Radius probe but no additional atributes in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410208#M567615</link>
    <description>&lt;P&gt;That's correct, accounting session won't be stablished if the response is reject, so if the attributes are transferred via accounting start, those won't reach the ISE.&lt;/P&gt;</description>
    <pubDate>Fri, 28 May 2021 15:55:04 GMT</pubDate>
    <dc:creator>lrojaslo</dc:creator>
    <dc:date>2021-05-28T15:55:04Z</dc:date>
    <item>
      <title>Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4409564#M567594</link>
      <description>&lt;P&gt;We are deploying a new model of Cisco AP's and I added that model to our existing policy.&amp;nbsp; We have one deployed and I can see it as an endpoint in ISE and it shows up via Radius probe, but for some reason non of the lldp/cdp information is associated with it.&amp;nbsp; I can verify that other endpoints (phones/old ap's) are profiled correctly and have the correct attributes.&amp;nbsp; The switch is a Catalyst 9300 and debugging is different, anyone have any suggestions on how to troubleshoot?&amp;nbsp; How to see if the attributes are being sent to ISE?&amp;nbsp; We are in the early stages of our ISE deployment and even if a device fails authentication we still allow network access via the ACL on the interface.&amp;nbsp; Does a device have to pass authentication for these attributes to be available, seems like a chicken and egg scenerio.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any debugging tips or where to look would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 15:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4409564#M567594</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2021-05-27T15:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410075#M567608</link>
      <description>&lt;P&gt;CDP/LLDP attributes are not collected via regular RADIUS probe unless you have &lt;STRONG&gt;Device sensor&lt;/STRONG&gt; configured. If you don't have device sensor, then SNMP Query probe will be a good probe to collect those attributes, anyways I would recommend having device sensor configured on the switch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding debugging on 16.x codes:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;set platform software trace smd switch active R0 radius debug&amp;nbsp; &amp;nbsp;-&amp;gt;&amp;nbsp; Radius Debug&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In order to view collected info, you can either run a &lt;STRONG&gt;show logging&lt;/STRONG&gt; or&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;show platform software trace message smd switch active R0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 12:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410075#M567608</guid>
      <dc:creator>lrojaslo</dc:creator>
      <dc:date>2021-05-28T12:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410145#M567611</link>
      <description>device-sensor is enabled.&lt;BR /&gt;&lt;BR /&gt;I did a wireshark caputure and cleared all access-sessions. I watched filtered out the Radius Accounting packets and could not find one for the interface/device in question.&lt;BR /&gt;&lt;BR /&gt;I will do the debugs today to see what I can get but I assume from what you have said I should be debugging device-sensor?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Joe&lt;BR /&gt;</description>
      <pubDate>Fri, 28 May 2021 13:59:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410145#M567611</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2021-05-28T13:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410178#M567612</link>
      <description>&lt;P&gt;if it is enabled, then yes, you need to confirm device sensor is working fine "show device sensor cache mac/all".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is known issue after a switch reload where device sensor stops and requires to be re-configured to work again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If issue persists after that, you might need to open a case with TAC.&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 15:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410178#M567612</guid>
      <dc:creator>lrojaslo</dc:creator>
      <dc:date>2021-05-28T15:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410180#M567613</link>
      <description>I do see the entries for device-sensor. I do have a question, if the response from ISE is access-reject from the authorization result does this stop the radius accounting, therefore these attributes will never be sent to ISE?&lt;BR /&gt;Thanks,&lt;BR /&gt;Joe&lt;BR /&gt;</description>
      <pubDate>Fri, 28 May 2021 15:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410180#M567613</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2021-05-28T15:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410208#M567615</link>
      <description>&lt;P&gt;That's correct, accounting session won't be stablished if the response is reject, so if the attributes are transferred via accounting start, those won't reach the ISE.&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 15:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410208#M567615</guid>
      <dc:creator>lrojaslo</dc:creator>
      <dc:date>2021-05-28T15:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410215#M567616</link>
      <description>&lt;P&gt;I have found several posts that people have used a "pre_device_sensor" policy that will catch them and do an access-accept but give a dacl that denies...I am going to test with with a profile that matches Logical Profile Cisco Devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will update with the results, this is what I mentioned in the original about the chicken and the egg scenerio.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 16:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4410215#M567616</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2021-05-28T16:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint present in ISE via Radius probe but no additional atributes</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4411482#M567649</link>
      <description>&lt;P&gt;I created an authorization policy for PRE_DEVICE_SENSOR (which currently matches if the Device is Profiled as a "Cisco Device", I am sure I will need to add other conditions in the further for other endpoints) that sends back an ACCESS_ACCEPT with a specific DACL that allows dns and dhcp but denies everything else.&amp;nbsp; A clearing of the access-session or reauthentication allows for the device to be authorized appropriately after this occurs.&amp;nbsp; The process is not automated but it works...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device comes online....sends some Radius information but is denied by the default authorization profile, we do get that it is a Cisco-Device.&amp;nbsp; Created a Logical Profile that matches Cisco_Device and have the end result of this to be ACCESS_ACCEPT with the above DACL.&amp;nbsp; In order to match the new authorization profile a COA has to occur...it matches the new PRE_DEVICE_SENSOR policy and with a 20 seconds timeout but now we have all the attributes needed to profile and authorize appropriately.&amp;nbsp; Reauthenticates and matches appropriate policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps others...maybe there is a better way but without the ACCESS_ACCEPT you don't get the benefit of device sensor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Joe&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jun 2021 15:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoint-present-in-ise-via-radius-probe-but-no-additional/m-p/4411482#M567649</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2021-06-01T15:21:08Z</dc:date>
    </item>
  </channel>
</rss>

