<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quarantine/Un-quarantine an endpoint by REST API of ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4484777#M570354</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1257544"&gt;@zhaoz&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;In response to your question:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;I'm not sure I understand the question, but it sounds like you might be asking if it's possible to initiate a RADIUS directly between a Win10 VM and an ISE VM without a network device like a switch between them. That is not a standard feature of a client native supplicant. The supplicant talks 802.1x between the client and authenticator (e.g. switch) and the authenticator speaks RADIUS to the authentication server (ISE). There are some test software applications out there that can initiate a RADIUS request directly, but that is not the same as a true client. In my lab setup, I use the following:
&lt;UL&gt;
&lt;LI&gt;Win10 VM, connected to a separate vSwitch&lt;/LI&gt;
&lt;LI&gt;vSwitch using an isolated NIC for uplink&lt;/LI&gt;
&lt;LI&gt;Isolated NIC connected to my Cisco switch access port, configured for NAC&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Yes, the API call for 'ancendpoint/clear' will remove the endpoint from the ANC Policy. This will remove the attribute for 'Session·ANCPolicy EQUALS &amp;lt;policy name&amp;gt;' and clear the session. The client will reauthenticate (it used to issue a CoA but, in ISE 3.0, I can see the endpoint session disappear from ISE and the switch for a few seconds and then a new session is created) and be authorised based on the non-ANC policy results.&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Tue, 12 Oct 2021 21:35:12 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-10-12T21:35:12Z</dc:date>
    <item>
      <title>Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481295#M570223</link>
      <description>&lt;P&gt;hi Cisco,&lt;/P&gt;&lt;P&gt;I deployed one Cisco ISE VM(version 2.7.0) in VMware ESXi. I'm working on REST API of ISE. My requirement is to quarantine/un-quarantine the IP address of endpoints by REST API. Right now I have 2 questions:&lt;/P&gt;&lt;P&gt;1. I tried to use "/ers/config/ancendpoint/apply" to quarantine the MAC address of endpoint. The quarantine was successful. But if I only use the IP address of endpoint, I always get error code 500 and title is "&lt;/P&gt;&lt;P&gt;Session&amp;nbsp;lookup&amp;nbsp;failure". How can I quarantine one endpoint by its IP address?&lt;BR /&gt;2. I didn't find out descriptions about the REST API of un-quarantine in ISE SDK.&amp;nbsp;I also looked up massive materials online but no lucky. How can I un-quarantine one endpoint (by IP address) by REST API?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 18:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481295#M570223</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-10-06T18:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481298#M570224</link>
      <description>&lt;P&gt;Take a look here to see if this could help:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/ise-mnt-coa-api-tool/td-p/4070577" target="_blank"&gt;ISE MNT CoA API Tool - Cisco Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 18:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481298#M570224</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-10-06T18:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481484#M570228</link>
      <description>&lt;P&gt;Thanks Mike. Your resolution is related to MNT API which doesn't work for my requirements(quarantine/un-quarantine endpoints).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 23:13:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481484#M570228</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-10-06T23:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481596#M570233</link>
      <description>&lt;P&gt;If you only have one ISE node, there should not be an issue with pulling session information like there might be with a separate MnT node.&lt;/P&gt;
&lt;P&gt;Does ISE show the correct IP address in the Live Logs and Context Visibility for the specific MAC address?&lt;/P&gt;
&lt;P&gt;Are you using the latest patch for 2.7? What does the payload of your API call look like?&lt;/P&gt;
&lt;P&gt;I tested the following JSON payload in my lab with the 'ancendpoint/apply' call in ISE 3.0 p4 and it worked as expected. The API doco for this call in 2.7 is the same as 3.0, so a similar payload should work.&lt;/P&gt;
&lt;PRE&gt;{
  "OperationAdditionalData" : {
    "additionalData" : [ {
      "name" : "ipAddress",
      "value" : "192.168.140.107"
    },
{
      "name" : "policyName",
      "value" : "ANC-Quarantine"
    }]
  }
}&lt;/PRE&gt;</description>
      <pubDate>Thu, 07 Oct 2021 06:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4481596#M570233</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-07T06:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4482980#M570287</link>
      <description>&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;The version of my ISE is v2.7 patch 5 which should be the latest patch for V2.7.&lt;/P&gt;&lt;P&gt;The payload I requested is like this:&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"OperationAdditionalData"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"additionalData"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;[&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"name"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"ipAddress"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"value"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"172.16.69.201"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;},&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"name"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"policyName"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"value"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"zhenhui"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&amp;nbsp;]&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;I can see MAC and IP address of endpoints in Context Visibility. These endpoints and Cisco ISE itself have already been in the same AD.&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 466px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/133825i46EED3185E87B010/image-dimensions/466x496?v=v2" width="466" height="496" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if we come to Live Logs and Live Sessions of Radius, there are nothing inside.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 471px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/133826iDD562EAA861B7D51/image-dimensions/471x252?v=v2" width="471" height="252" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure if the empty raises the error of "&lt;SPAN&gt;Session&amp;nbsp;lookup&amp;nbsp;failure". I am totally a fresh man for Cisco ISE. Could you tell me how can I successfully to execute REST API to quarantine endpoint like 172.16.69.201 in the next step?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks so much&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Oct 2021 07:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4482980#M570287</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-10-09T07:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4483296#M570296</link>
      <description>&lt;P&gt;If you're not seeing any RADIUS live logs/sessions, this is a bigger problem than the API. I would suggest reviewing the &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank" rel="noopener"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt; to compare it to your setup and ensure you have all the necessary RADIUS configuration applied to your switch.&lt;/P&gt;
&lt;P&gt;Once ISE and the switch are correctly tracking the RADIUS sessions, the ANC Quarantine configuration is pretty simple.&lt;/P&gt;
&lt;P&gt;You create an ANC Policy (in my case, called ANC-Quarantine) with the QUARANTINE action...&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-10-11 at 9.00.01 am.png" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/133873iAEDFE288D236E06C/image-size/small?v=v2&amp;amp;px=200" role="button" title="Screen Shot 2021-10-11 at 9.00.01 am.png" alt="Screen Shot 2021-10-11 at 9.00.01 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;... create an AuthZ Profile that applies the controls you want (dACL, dVLAN, etc), and create an AuthZ policy or Global Exception rule that uses the Session·ANCPolicy EQUALS &amp;lt;policy name&amp;gt; matching condition and applies your AuthZ Profile.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-10-11 at 9.05.57 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/133874i614322FD19145C7D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-10-11 at 9.05.57 am.png" alt="Screen Shot 2021-10-11 at 9.05.57 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Oct 2021 22:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4483296#M570296</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-10T22:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4484621#M570342</link>
      <description>&lt;P&gt;Thanks Greg. I'll review this guide. First of all, I want to ask 2 basic questions:&lt;/P&gt;&lt;P&gt;1. is it possible to have Radius session just between endpoints(let's say one Windows 10 endpoint) and ISE, especially when both of endpoints and ISE are VMs? Because our team is still investigating Cisco ISE. We don't want to make the investigation process too complicated, like introduce other network components into the network topology.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. is it possible to un-quarantine endpoints by REST API in Cisco ISE? I looked up some documents on-line. Many of the documents mentioned ISE has no longer supported un-quarantine operation. Could you help me to check this point?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Oct 2021 16:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4484621#M570342</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-10-12T16:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4484777#M570354</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1257544"&gt;@zhaoz&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;In response to your question:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;I'm not sure I understand the question, but it sounds like you might be asking if it's possible to initiate a RADIUS directly between a Win10 VM and an ISE VM without a network device like a switch between them. That is not a standard feature of a client native supplicant. The supplicant talks 802.1x between the client and authenticator (e.g. switch) and the authenticator speaks RADIUS to the authentication server (ISE). There are some test software applications out there that can initiate a RADIUS request directly, but that is not the same as a true client. In my lab setup, I use the following:
&lt;UL&gt;
&lt;LI&gt;Win10 VM, connected to a separate vSwitch&lt;/LI&gt;
&lt;LI&gt;vSwitch using an isolated NIC for uplink&lt;/LI&gt;
&lt;LI&gt;Isolated NIC connected to my Cisco switch access port, configured for NAC&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Yes, the API call for 'ancendpoint/clear' will remove the endpoint from the ANC Policy. This will remove the attribute for 'Session·ANCPolicy EQUALS &amp;lt;policy name&amp;gt;' and clear the session. The client will reauthenticate (it used to issue a CoA but, in ISE 3.0, I can see the endpoint session disappear from ISE and the switch for a few seconds and then a new session is created) and be authorised based on the non-ANC policy results.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 12 Oct 2021 21:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4484777#M570354</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-12T21:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485626#M570380</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;. You have inspired me so much. I went over the deployment guide you posted. Right now there is one session in Live Sessions. Woohoo! But, the most confused thing is: IP Address is empty. Could you help me to figure out what I missed?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/134412i84ED882BE7E0AB42/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 00:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485626#M570380</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-10-14T00:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485635#M570382</link>
      <description>&lt;P&gt;Is the endpoint getting an IP address? If not, you may need to ensure you have an 'ip helper' address configured on the VLAN interface to forward to your DHCP server.&lt;/P&gt;
&lt;P&gt;If you're getting an IP on the endpoint, but ISE is not receiving the IP info from the switch you should look into your Device Sensor and IP Device Tracking configuration on the switch. Both are covered in that guide. If you're using an older switch and/or software, you might need to use different configs for those features. It would help to know what switch hardware/software you're using.&lt;/P&gt;
&lt;P&gt;IP Device Tracking is responsible for capturing the IP address of the endpoint in the switch and mapping it to the MAC address, and Device Sensor is responsible for communicating that information to ISE via RADIUS accounting.&lt;/P&gt;
&lt;P&gt;You can check what the switch knows using the following commands:&lt;/P&gt;
&lt;PRE&gt;show ip device tracking interface &amp;lt;int&amp;gt;
!
show device-sensor cache interface &amp;lt;int&amp;gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 14 Oct 2021 00:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485635#M570382</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-14T00:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485642#M570384</link>
      <description>&lt;P&gt;sorry, I forgot to mention one thing: the switch is from other vendor (Fortinet) rather than Cisco. Cause I have no authority to download the iso file of E8000v.&lt;/P&gt;&lt;P&gt;Moreover, the endpoint is getting an IP address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Device Sensor and IP Device Tracking are introduced in the guide. But they are the features only developed by Cisco. Are there some ways to have IP address of endpoint across non Cisco switch(like Fortinet switch)?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 01:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485642#M570384</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-10-14T01:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485681#M570385</link>
      <description>&lt;P&gt;You would need to use the legacy method of enabling the DHCP Probe in ISE and forwarding DHCP requests from the clients to the ISE PSNs. See the &lt;A href="https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456#toc-hId-826550277" target="_blank" rel="noopener"&gt;ISE Profiling Design Guide&lt;/A&gt; for more information.&lt;/P&gt;
&lt;P&gt;I'm not sure, however, if applying the ANC Policy will work properly with the Fortinet switch as I believe it still relies on support for Change of Authorization (CoA). ISE does not have a default Network Device Profile for Fortinet switches, so you will likely need to create a custom one as per &lt;A href="https://community.cisco.com/t5/security-documents/how-to-create-ise-network-access-device-profiles/ta-p/3631103" target="_blank" rel="noopener"&gt;this guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;You might search the Community to see if others have tested ANC with Fortinet and/or have a working Network Device Profile for Fortinet that they can share. If not, you may need to seek help from the vendor for the proper settings. If you get a working Profile, please share it with the rest of the Community via the &lt;A href="https://community.cisco.com/t5/security-documents/ise-third-party-nad-profiles-and-configs/ta-p/3648719" target="_blank" rel="noopener"&gt;ISE Third-Party NAD Profiles and Configs&lt;/A&gt; page.&lt;/P&gt;
&lt;P&gt;If you need to seek help from the Community on this, however, I would suggest starting a new one as this has strayed quite far from the original topic about the API calls.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 02:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4485681#M570385</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-14T02:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4486398#M570407</link>
      <description>&lt;P&gt;yep, fair enough. Thank you so much Greg.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 17:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4486398#M570407</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-10-14T17:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4496241#M570784</link>
      <description>&lt;P&gt;hi Greg,&lt;/P&gt;&lt;P&gt;I referenced your suggestions and got a big progress on the topic. right now IP address shows up there!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 652px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/136362i37BD72B82CEA2E76/image-dimensions/652x62?v=v2" width="652" height="62" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;However, the AVPs of Disconnect Request sent from ISE didn't included the attributes I defined in Network Device Profiles.&amp;nbsp; FortiSwitch is the 3rd party device which requires "User-Name" attribute included in CoA/Disconnect Request. This snapshot is&lt;SPAN&gt;&amp;nbsp;the packets dumped from the built-in tcpdump tool of ISE: Diagnostic Tools &amp;gt; TCP Dump, I didn't find User-Name in AVPs of Disconnect Request.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 567px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/136363iE21BA1314BD114BC/image-dimensions/567x227?v=v2" width="567" height="227" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;But actually&amp;nbsp;&lt;SPAN&gt;I created a new Network Device Profile named "FTNTWired" which includes User-Name attribute in Disconnect.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 646px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/136361i99116E2A9385AA08/image-dimensions/646x312?v=v2" width="646" height="312" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And applied this profile on Device Profile when configuring Network Devices.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 536px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/136364iFF83C1F64C367B2C/image-dimensions/536x271?v=v2" width="536" height="271" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I also created a new authorization profile named "ftnt_quarantine_profile" and applied the device profile in the box of "Network Device Profile" as well. furthermore I added Framed-IP-Address to Advanced Attributes Settings like below.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 664px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/136365iBC79214D19AF6A38/image-dimensions/664x429?v=v2" width="664" height="429" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In Authorization Policy, I set condition to ftnt_quarantine which means ANC policy is quarantine, and applied&amp;nbsp;ftnt_quarantine_profile on Results Profiles. when I sent one IP addr with ANC policy by REST API, I can see Hits was incremented by 1 like below.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/136366i870B582BBC956115/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To my understanding, "Hits" means the authorization policy is matched, right? But just like the packets showed above, neither User-Name nor Framed-IP-Address show up in AVP of Disconnect Request. Did I miss something?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 23:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4496241#M570784</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2021-11-01T23:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4605072#M574581</link>
      <description>&lt;P&gt;Hi, how are you? Could you share with me how did you configure and which tool use to put mac address in quarantien through api? postman? curl?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 12:59:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4605072#M574581</guid>
      <dc:creator>ggmeza</dc:creator>
      <dc:date>2022-05-05T12:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantine/Un-quarantine an endpoint by REST API of ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4643661#M575907</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;I used Postman to call REST API. Basically you need to configure "Auth" by username and password, and set url and json data properly. For example, if you want to quarantine endpoints by mac address, set "name" to "macAddress". Simply reference the configuration below.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 409px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/155152i9C29529ACAB42031/image-dimensions/409x304?v=v2" width="409" height="304" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The docs of Cisco are very helpful.&lt;/P&gt;&lt;P&gt;&lt;A href="https://developer.cisco.com/docs/identity-services-engine/3.0/#!anc-endpoint/apply" target="_blank" rel="noopener"&gt;ANC Endpoint - Cisco Identity Services Engine API Reference Guide, Release 3.0 - Document - Cisco DevNet&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2022 18:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/quarantine-un-quarantine-an-endpoint-by-rest-api-of-ise/m-p/4643661#M575907</guid>
      <dc:creator>zhaoz</dc:creator>
      <dc:date>2022-07-04T18:43:46Z</dc:date>
    </item>
  </channel>
</rss>

