<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISW CWA &amp;amp; PROFILING in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/isw-cwa-amp-profiling/m-p/4424709#M568150</link>
    <description>&lt;P&gt;Hi thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I really appreciate this useful explanation, very clear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jun 2021 09:24:53 GMT</pubDate>
    <dc:creator>Rami Ibrahim</dc:creator>
    <dc:date>2021-06-28T09:24:53Z</dc:date>
    <item>
      <title>ISW CWA &amp; PROFILING</title>
      <link>https://community.cisco.com/t5/network-access-control/isw-cwa-amp-profiling/m-p/4417466#M567831</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just reading about ISE profiling I got a little bit confused , I can imagine a case where CWA is configured on ISE along with Profiling (whatever probes enabled).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I know that CWA consist of two phases and phase 1 main goal is to redirect the user to the CWA portal but phase 1 is done using MAB that is the MAB transaction should fail to continue to Authorization and Issue the redirect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;My question is what if the Guest Mobile device or laptop got profiled? it would be presented in the endpoint database and MAB should not fails then how would this work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 13 Jun 2021 12:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/isw-cwa-amp-profiling/m-p/4417466#M567831</guid>
      <dc:creator>Rami Ibrahim</dc:creator>
      <dc:date>2021-06-13T12:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISW CWA &amp; PROFILING</title>
      <link>https://community.cisco.com/t5/network-access-control/isw-cwa-amp-profiling/m-p/4424495#M568133</link>
      <description>&lt;P&gt;It all depends on your&lt;/P&gt;
&lt;P&gt;1) Authorization Rules&lt;/P&gt;
&lt;P&gt;2) Endpoint Profile configurations&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Typically you have Policy Authorization Rules that match on endpoint profiles:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/123776i149B2E789B702020/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If there is a match, ISE will assign the Authorization Result and not continue to through the policy where it would eventually match on your CWA rule &lt;EM&gt;very near the bottom&lt;/EM&gt; if not the final &lt;STRONG&gt;Default&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The endpoint profile may change based on new information after the initial assignment from HTTP, NMAP, etc. When this happens, you &lt;EM&gt;may&lt;/EM&gt; perform a RADIUS Change of Authorization (COA). The default Global setting is to do nothing.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/123778i9AE616E639075234/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have the ability to control and override this behavior per endpoint profile:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 643px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/123779iB7A2E0C67F4E5CAB/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You probably do not care about some random guest using Windows 10 Workstation... so don't change it.&lt;/P&gt;
&lt;P&gt;But if it is profiled as a printer or other specialized IOT device, you &lt;EM&gt;may&lt;/EM&gt; want to dynamically perform a COA and re-authorize it properly.&lt;/P&gt;
&lt;P&gt;Which COA you choose to perform would also depend on the endpoint type and how you have your access VLANs configured and what your network device is capable of supporting.&lt;/P&gt;
&lt;P&gt;It is typically a bad idea to change the VLAN of non-workstations because they will not know to re-DHCP. For this reason if you do a COA you &lt;EM&gt;may&lt;/EM&gt; want to do a COA with Port Bounce. It can be very endpoint-specific.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jun 2021 23:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/isw-cwa-amp-profiling/m-p/4424495#M568133</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-06-27T23:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISW CWA &amp; PROFILING</title>
      <link>https://community.cisco.com/t5/network-access-control/isw-cwa-amp-profiling/m-p/4424709#M568150</link>
      <description>&lt;P&gt;Hi thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I really appreciate this useful explanation, very clear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 09:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/isw-cwa-amp-profiling/m-p/4424709#M568150</guid>
      <dc:creator>Rami Ibrahim</dc:creator>
      <dc:date>2021-06-28T09:24:53Z</dc:date>
    </item>
  </channel>
</rss>

