<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE3 log display bug in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise3-log-display-bug/m-p/4593760#M574195</link>
    <description>&lt;P&gt;If you think there is a bug for anything in ISE, please call TAC and report it with the necessary documentation for reproducibility.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Apr 2022 23:24:53 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2022-04-15T23:24:53Z</dc:date>
    <item>
      <title>ISE3 log display bug</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-log-display-bug/m-p/4593473#M574175</link>
      <description>&lt;P&gt;Hello everibody!&lt;/P&gt;&lt;P&gt;We’ve found a log display bug on Cisco ISE 3 - in the Network Devices the name VC-FL-3-2 maps to the IP/Mask: 192.168.254.X/32 (the last octet is hidden for the security reason), and in the Live logs it displayed in the same way and it is correct,but in the Authentication Details for this device (VC-FL-3-2) it displayed with another IP address (NAS IPv4 - 192.168.254.Y), However actually, this IP address belongs to another device Altuf_Cat3560_l3 (see the screenshot in the attachment)&lt;/P&gt;&lt;P&gt;Could you please the information how to troubleshoot it?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2022 11:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-log-display-bug/m-p/4593473#M574175</guid>
      <dc:creator>Alex Pashko</dc:creator>
      <dc:date>2022-04-15T11:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE3 log display bug</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-log-display-bug/m-p/4593746#M574188</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1335880"&gt;@Alex Pashko&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's not a bug.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE processes every RADIUS request by looking at the UDP packet's Source IP Address - it compares the source IP address against the IP address in Network Devices and processes the Policy Set accordingly. This means that the NAS IP Address is not used by ISE for anything internally. NAS IP Address is a RADIUS attribute that is configured by the NAS and its value is meaningless to ISE.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As an example, the command below sets the NAS IP Address attribute on a Cisco switch to some arbitrary value of 1.2.3.4&lt;/P&gt;
&lt;PRE&gt;radius-server attribute 4 1.2.3.4&lt;/PRE&gt;
&lt;P&gt;And then it processes the request in ISE correctly because ISE doesn't care about this value for Policy Set logic.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nas1.PNG" style="width: 574px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/149073iA7A08451B0876FA0/image-size/large?v=v2&amp;amp;px=999" role="button" title="nas1.PNG" alt="nas1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think folks use NAS IP Address mostly when there is SNAT (Source NAT) involved and the original source IP of the NAS address is lost when a load balancer performs SNAT. By looking at the NAS IP Address you can still determine the exact source of the packet - BUT - you need to pick this attribute out during AuthN/AuthZ processing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Apr 2022 08:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-log-display-bug/m-p/4593746#M574188</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-16T08:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE3 log display bug</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-log-display-bug/m-p/4593760#M574195</link>
      <description>&lt;P&gt;If you think there is a bug for anything in ISE, please call TAC and report it with the necessary documentation for reproducibility.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2022 23:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-log-display-bug/m-p/4593760#M574195</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-04-15T23:24:53Z</dc:date>
    </item>
  </channel>
</rss>

