<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ignoring some RADIUS CoA attributes in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4416453#M567793</link>
    <description>&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this situation I need to disconnect computers that are not posture compliant and assign AnyConnect Management Tunnel profile to compliant computers. How else can I do this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jun 2021 22:09:27 GMT</pubDate>
    <dc:creator>ajtm</dc:creator>
    <dc:date>2021-06-10T22:09:27Z</dc:date>
    <item>
      <title>ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414026#M567734</link>
      <description>&lt;P&gt;I'm setting up RA VPN using AnyConnect + ASA and authentication is performed on ISE.&lt;BR /&gt;Everything works fine and I'm able to assign Group Policies and DACLs using RADIUS.&lt;BR /&gt;Now I need to assign Group Policy based on ISE Posture result but ASA is ignoring Group Policy and Re-authentication Time attributes passed on RADIUS CoA. DACL value is processed without any problem!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;My goal is to assign AnyConnect client profiles (AC Management VPN Profile) and reauthentication timer based on posture result (validates on registry that user logged in using domain machine).&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 13:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414026#M567734</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2021-06-07T13:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414081#M567736</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292948"&gt;@ajtm&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does the ASA receive these RADIUS attributes? turn on ASA debugs to confirm, provide the output for review.&lt;/P&gt;
&lt;P&gt;Are you using "Advanced Attribute Settings" -&amp;gt; Class = ou=&amp;lt;GROUP-POLICY-NAME&amp;gt; in the ISE AuthZ profile?&lt;/P&gt;
&lt;P&gt;What version of ASA are you using?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 15:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414081#M567736</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-07T15:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414090#M567737</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I can see the attributes being returned running debugs on ASA. It seems they worked fine for RADIUS but not for RADIUS CoA.&lt;/P&gt;&lt;P&gt;We're testing on ASA 9.13(1).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 15:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414090#M567737</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2021-06-07T15:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414701#M567746</link>
      <description>&lt;P&gt;This is expected. ASA policy updates via CoA are limited to ACLs/DACLs, and SGT updates.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 14:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4414701#M567746</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-06-08T14:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4415096#M567751</link>
      <description>&lt;P&gt;I was not aware of that limitation.... it would be nice if we could also have group policy update.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jun 2021 00:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4415096#M567751</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2021-06-09T00:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4416422#M567783</link>
      <description>&lt;P&gt;I can hardly interpret switching the Group-policy. You can switch to another SGT or DACL but a client profile is not something you switch. The XML profile has already downloaded then a CoA is supposed to change it? The XML will not be deleted if has already been downloaded.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 21:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4416422#M567783</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2021-06-10T21:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4416453#M567793</link>
      <description>&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this situation I need to disconnect computers that are not posture compliant and assign AnyConnect Management Tunnel profile to compliant computers. How else can I do this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 22:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4416453#M567793</guid>
      <dc:creator>ajtm</dc:creator>
      <dc:date>2021-06-10T22:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4497007#M570806</link>
      <description>&lt;P&gt;Hi hslai,&amp;nbsp; I want to double-check your comment that ASA policy updates via CoA are limited to ACLs/DACLs and SGT updates.&lt;/P&gt;&lt;P&gt;I have a user that I need to assign a static IP address retrieved from their Dial-In settings in Active Directory.&amp;nbsp; I have exlcuded this IP address from ASA VPN Pool so it cannot be assigned to another user.&amp;nbsp; I actually followed the procedure found at the link below.&amp;nbsp; &lt;A href="https://integratingit.wordpress.com/2017/01/01/cisco-asa-anyconnect-vpn-with-static-client-ip-address/" target="_blank"&gt;https://integratingit.wordpress.com/2017/01/01/cisco-asa-anyconnect-vpn-with-static-client-ip-address/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see ISE sending the framed IP address attribute in the Authorization however ASA never applies this to the client.&amp;nbsp; So based on your comments, is this a limitation?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 09:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4497007#M570806</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-11-03T09:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ignoring some RADIUS CoA attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4497019#M570809</link>
      <description>&lt;P&gt;Just resolved this by enabling Use Authentication Server in my ASA and now I am getting static IP.&amp;nbsp; Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 09:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ignoring-some-radius-coa-attributes/m-p/4497019#M570809</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-11-03T09:28:06Z</dc:date>
    </item>
  </channel>
</rss>

