<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trustsec POC strange behavior, removes dynamic ACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629158#M575375</link>
    <description>Yes I see everything correctly but it seems like every 10 minutes the interface (SGT 5) will trigger some type of update and the ACL will be deleted and the device is no longer in table:&lt;BR /&gt;Here is the event:&lt;BR /&gt;Jun  9 19:07:10.623: CTS-rcl-server-events:Receieved idb for the session: [Gi1/0/8]&lt;BR /&gt;Jun  9 19:07:10.623: CTS-rcl-server-events:Vlan ID to be sent to rbm is  10, mac=a029.199f.e04f&lt;BR /&gt;Jun  9 19:07:10.623: CTS-rcl-server-events:eac bindings message handled successfully: add_ip 0.0.0.0 remove_ip 10.33.0.106 ipv6_add_count 0 ipv6_remove_count 0&lt;BR /&gt;Jun  9 19:07:10.624: CTS-ha-binding-event:CTS IP-SGT binding incremental sync entry&lt;BR /&gt;Jun  9 19:07:10.624: CTS-ha-binding-event: CTS IP-SGT binding incremental  sync not allowed&lt;BR /&gt;Jun  9 19:07:10.624: CTS-rcl-server-events:IPSGT binding sync failed&lt;BR /&gt;Jun  9 19:07:10.624: CTS-SXP-MDB:sxp_export_ipsgt_change_enhanced 10.33.0.106/32 del 0 sgt 5 source 6&lt;BR /&gt;Jun  9 19:07:10.625: CTS-l3s:cts_l3s_ipv4_acl_modified(acl DENY_ICMP-01, type 21, deleted=0)&lt;BR /&gt;Jun  9 19:07:10.625: CTS-l3s:cts_l3s_ipv4_acl_modified(acl DENY_ICMP-01, type 21, deleted=1)&lt;BR /&gt;Jun  9 19:07:10.626: CTS authz entry ev (Unknown-5): Removed session hdl(C000024) from entry.&lt;BR /&gt;Jun  9 19:07:10.627: CTS-core-ha-ev:cts_coa_end_status_sync: status(INCOMPLETE), context(0), forced(1)&lt;BR /&gt;Jun  9 19:07:10.627: CTS-core-ha-ev:&lt;BR /&gt;</description>
    <pubDate>Thu, 09 Jun 2022 19:11:19 GMT</pubDate>
    <dc:creator>joeharb</dc:creator>
    <dc:date>2022-06-09T19:11:19Z</dc:date>
    <item>
      <title>Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629098#M575369</link>
      <description>&lt;P&gt;I am doing a POC for trustsec SGT and SGACL's and noticing very odd behavior.&amp;nbsp; I am testing with a simple deny icmp SGACL, and have my machine as a static mapping and a device on the switch receiving a SGT of 5.&amp;nbsp; The SGTACL is applied from my security group (tag 3) to the SGT 5.&amp;nbsp; Looking at the switch the DENY_ICMP is not present but ISE doesn't think anything is needed to be pushed.&amp;nbsp; I do a cts refresh policy and after a few minutes the acl is present and I can't ping the destination IP address.&amp;nbsp; After some time (not sure the exact time) but I see an event from the interface of the device I am testing with and then the ACL is deleted from the switch, the only way to get it back is to do a cts refresh again.&lt;/P&gt;
&lt;P&gt;Here are the log entries: (Gi1/0/4) is the device that is being tagged with SGT 5.&lt;/P&gt;
&lt;P&gt;Jun 8 21:24:52.154: CTS-rcl-server-events:Receieved idb for the session: [Gi1/0/4]&lt;BR /&gt;Jun 8 21:24:52.154: CTS-rcl-server-events:Vlan ID to be sent to rbm is 10, mac=3448.ed72.9d49 &lt;BR /&gt;Jun 8 21:24:52.154: CTS-rcl-server-events:eac bindings message handled successfully: add_ip 0.0.0.0 remove_ip 10.33.0.112 ipv6_add_count 0 ipv6_remove_count 0&lt;BR /&gt;Jun 8 21:24:52.154: CTS-ha-binding-event:CTS IP-SGT binding incremental sync entry&lt;BR /&gt;Jun 8 21:24:52.155: CTS-ha-binding-event: CTS IP-SGT binding incremental sync not allowed&lt;BR /&gt;Jun 8 21:24:52.155: CTS-rcl-server-events:IPSGT binding sync failed&lt;BR /&gt;Jun 8 21:24:52.155: CTS-SXP-MDB:sxp_export_ipsgt_change_enhanced 10.33.0.112/32 del 0 sgt 5 source 6&lt;BR /&gt;Jun 8 21:24:52.156: CTS-l3s:cts_l3s_ipv4_acl_modified(acl DENY_ICMP-01, type 21, deleted=0)&lt;BR /&gt;Jun 8 21:24:52.156: CTS-l3s:cts_l3s_ipv4_acl_modified(acl DENY_ICMP-01, type 21, deleted=1)&lt;BR /&gt;Jun 8 21:24:52.156: CTS authz entry ev (Unknown-5): Removed session hdl(DF00000E) from entry.&lt;BR /&gt;Jun 8 21:24:52.157: CTS-core-ha-ev:cts_coa_end_status_sync: status(INCOMPLETE), context(0), forced(1)&lt;BR /&gt;Jun 8 21:24:52.157: CTS-core-ha-ev:&lt;BR /&gt;cts_coa_end_status_sync: contextp is NULL, Return False&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please advise,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Joe&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 16:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629098#M575369</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-06-09T16:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629102#M575370</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;
&lt;P&gt;After posting I wanted to make sure the ACL was still gone but it is now back and looking at the logs there was another event on the port that triggered an update:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jun 9 16:42:19.025: CTS-rcl-server-events:Receieved idb for the session: [Gi1/0/4]&lt;BR /&gt;Jun 9 16:42:19.025: CTS-rcl-server-events:Vlan retrieved using dot1x switch API is 10, mac=3448.ed72.9d49&lt;BR /&gt;Jun 9 16:42:19.026: CTS-rcl-server-events:Marshalling done, sending msg to BINOS&lt;BR /&gt;Jun 9 16:42:19.026: CTS-rcl-server-events:Update vlan tdl message is sent successfully to EPM Plugin in SMD, vlan:10&lt;BR /&gt;Jun 9 16:42:19.026: CTS-rcl-server-events:eac bindings message handled successfully: add_ip 10.33.0.112 remove_ip 0.0.0.0 ipv6_add_count 0 ipv6_remove_count 0&lt;BR /&gt;Jun 9 16:42:19.026: CTS-ha-binding-event:CTS IP-SGT binding incremental sync entry&lt;BR /&gt;Jun 9 16:42:19.026: CTS-ha-binding-event: CTS IP-SGT binding incremental sync not allowed&lt;BR /&gt;Jun 9 16:42:19.026: CTS-rcl-server-events:IPSGT binding sync failed&lt;BR /&gt;Jun 9 16:42:19.026: CTS-SXP-MDB:sxp_export_ipsgt_change_enhanced 10.33.0.112/32 add 0 sgt 5 source 6&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_is_fragmented: (Unknown-5)NOT-FRAG attr_q(0)&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_req_setup: (Unknown-5)private server(s) exist&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_req_setup: (Unknown-5)Using private server group&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_req_setup: (Unknown-5)CTS_TRANSPORT_IP_UDP&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_req_setup: (Unknown-5)AAA req(x7F49CEBCD8F0)&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_attr_add: AAA req(0x7F49CEBCD8F0)&lt;BR /&gt;Jun 9 16:42:19.027: username = #CTSREQUEST#&lt;BR /&gt;Jun 9 16:42:19.027: password = *****&lt;BR /&gt;Jun 9 16:42:19.027: AAA Context Add Attribute: (Unknown-5)attr(0005-v4v6)&lt;BR /&gt;Jun 9 16:42:19.027: cts-rbacl-source-list = 0005-v4v6&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_attr_add: AAA req(0x7F49CEBCD8F0)&lt;BR /&gt;Jun 9 16:42:19.027: AAA Context Add Attribute: (Unknown-5)attr(monitor)&lt;BR /&gt;Jun 9 16:42:19.027: cts-device-capability = monitor&lt;BR /&gt;Jun 9 16:42:19.027: cts_aaa_req_send: AAA req(0x7F49CEBCD8F0) successfully sent to AAA.&lt;BR /&gt;Jun 9 16:42:19.073: cts_aaa_callback: (Unknown-5)AAA req(0x7F49CEBCD8F0) response success&lt;BR /&gt;Jun 9 16:42:19.073: AAA CTX FRAG CLEAN: (Unknown-5)attr(0005-v4v6)&lt;BR /&gt;Jun 9 16:42:19.073: AAA CTX FRAG CLEAN: (Unknown-5)attr(monitor)&lt;BR /&gt;Jun 9 16:42:19.073: AAA attr: Unknown type (450).&lt;BR /&gt;Jun 9 16:42:19.073: AAA attr: Unknown type (274).&lt;BR /&gt;Jun 9 16:42:19.073: AAA attr: src-dst-rbacl = 0003-00-00-0005-05-00-v4-DENY_ICMP-1.&lt;BR /&gt;Jun 9 16:42:19.073: cts_aaa_is_fragmented: (Unknown-5)NOT-FRAG attr_q(0)&lt;BR /&gt;Jun 9 16:42:19.073: AAA attr: rbacl-monitor-all = OFF.&lt;BR /&gt;Jun 9 16:42:19.073: AAA attr: authorization-expiry = 86400.&lt;BR /&gt;Jun 9 16:42:19.073: cts_aaa_is_fragmented: (Unknown-5)NOT-FRAG attr_q(0)&lt;BR /&gt;Jun 9 16:42:19.073: cts_aaa_is_fragmented: (Unknown-5)NOT-FRAG attr_q(0)&lt;BR /&gt;Jun 9 16:42:19.073: cts_aaa_req_setup: (Unknown-5)private server(s) exist&lt;BR /&gt;Jun 9 16:42:19.073: cts_aaa_req_setup: (Unknown-5)Using private server group&lt;BR /&gt;Jun 9 16:42:19.073: cts_aaa_req_setup: (Unknown-5)CTS_TRANSPORT_IP_UDP&lt;BR /&gt;Jun 9 16:42:19.074: cts_aaa_req_setup: (Unknown-5)AAA req(x7F49CE349930)&lt;BR /&gt;Jun 9 16:42:19.074: cts_aaa_attr_add: AAA req(0x7F49CE349930)&lt;BR /&gt;Jun 9 16:42:19.074: username = #CTSREQUEST#&lt;BR /&gt;Jun 9 16:42:19.074: password = *****&lt;BR /&gt;Jun 9 16:42:19.074: AAA Context Add Attribute: (Unknown-5)attr(DENY_ICMP)&lt;BR /&gt;Jun 9 16:42:19.074: cts-rbacl = DENY_ICMP&lt;BR /&gt;Jun 9 16:42:19.074: cts_aaa_req_send: AAA req(0x7F49CE349930) successfully sent to AAA.&lt;BR /&gt;Jun 9 16:42:19.102: cts_aaa_callback: (Unknown-5)AAA req(0x7F49CE349930) response success&lt;BR /&gt;Jun 9 16:42:19.102: AAA CTX FRAG CLEAN: (Unknown-5)attr(DENY_ICMP)&lt;BR /&gt;Jun 9 16:42:19.102: AAA attr: Unknown type (450).&lt;BR /&gt;Jun 9 16:42:19.102: AAA attr: Unknown type (274).&lt;BR /&gt;Jun 9 16:42:19.102: AAA attr: rbacl = DENY_ICMP-1.&lt;BR /&gt;Jun 9 16:42:19.103: AAA attr: rbacl-ace = deny icmp.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there some type of timer that is causing this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Joe&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 16:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629102#M575370</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-06-09T16:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629142#M575373</link>
      <description>&lt;P&gt;So&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one device on the switch has a static SGT assignment (SGT 3)&lt;BR /&gt;one device on the switch has an SXP SGT assignment (SGT 5)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Does the SGACL download issue still happen if both devices have static SGT assignments?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the output of "show cts role-based sgt-map all"? Can you see both tagged IP addresses? (I assume SGT3 will be CLI and SGT5 SXP). If the SGT 5 device isn't listed, what is the output of "show cts sxp connections"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 18:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629142#M575373</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-06-09T18:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629158#M575375</link>
      <description>Yes I see everything correctly but it seems like every 10 minutes the interface (SGT 5) will trigger some type of update and the ACL will be deleted and the device is no longer in table:&lt;BR /&gt;Here is the event:&lt;BR /&gt;Jun  9 19:07:10.623: CTS-rcl-server-events:Receieved idb for the session: [Gi1/0/8]&lt;BR /&gt;Jun  9 19:07:10.623: CTS-rcl-server-events:Vlan ID to be sent to rbm is  10, mac=a029.199f.e04f&lt;BR /&gt;Jun  9 19:07:10.623: CTS-rcl-server-events:eac bindings message handled successfully: add_ip 0.0.0.0 remove_ip 10.33.0.106 ipv6_add_count 0 ipv6_remove_count 0&lt;BR /&gt;Jun  9 19:07:10.624: CTS-ha-binding-event:CTS IP-SGT binding incremental sync entry&lt;BR /&gt;Jun  9 19:07:10.624: CTS-ha-binding-event: CTS IP-SGT binding incremental  sync not allowed&lt;BR /&gt;Jun  9 19:07:10.624: CTS-rcl-server-events:IPSGT binding sync failed&lt;BR /&gt;Jun  9 19:07:10.624: CTS-SXP-MDB:sxp_export_ipsgt_change_enhanced 10.33.0.106/32 del 0 sgt 5 source 6&lt;BR /&gt;Jun  9 19:07:10.625: CTS-l3s:cts_l3s_ipv4_acl_modified(acl DENY_ICMP-01, type 21, deleted=0)&lt;BR /&gt;Jun  9 19:07:10.625: CTS-l3s:cts_l3s_ipv4_acl_modified(acl DENY_ICMP-01, type 21, deleted=1)&lt;BR /&gt;Jun  9 19:07:10.626: CTS authz entry ev (Unknown-5): Removed session hdl(C000024) from entry.&lt;BR /&gt;Jun  9 19:07:10.627: CTS-core-ha-ev:cts_coa_end_status_sync: status(INCOMPLETE), context(0), forced(1)&lt;BR /&gt;Jun  9 19:07:10.627: CTS-core-ha-ev:&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Jun 2022 19:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629158#M575375</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-06-09T19:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629179#M575376</link>
      <description>&lt;P&gt;Do the clients appear ok in the ip dhcp snooping binding (what is the lease time?) and ip device tracking tables?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 19:45:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629179#M575376</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-06-09T19:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629197#M575377</link>
      <description>Lease time is 21 days&lt;BR /&gt;show device-tracking database&lt;BR /&gt;Binding Table has 14 entries, 14 dynamic (limit 100000)&lt;BR /&gt;Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created&lt;BR /&gt;Preflevel flags (prlvl):&lt;BR /&gt;0001:MAC and LLA match     0002:Orig trunk            0004:Orig access&lt;BR /&gt;0008:Orig trusted trunk    0010:Orig trusted access   0020:DHCP assigned&lt;BR /&gt;0040:Cga authenticated     0080:Cert authenticated    0100:Statically assigned&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;    Network Layer Address               Link Layer Address Interface        vlan prlvl  age   state     Time left&lt;BR /&gt;ARP 10.33.1.112                             848a.8d68.a176  Gi1/0/10         20  0005  216mn STALE      77653 s&lt;BR /&gt;ARP 10.33.1.111                             848a.8d68.86ee  Gi1/0/12         20  0005  215mn STALE      74802 s&lt;BR /&gt;ARP 10.33.1.108                             001f.9e25.93e9  Gi1/0/9          20  0005    9mn STALE      87804 s&lt;BR /&gt;ARP 10.33.1.107                             848a.8d68.a349  Gi1/0/8          20  0005  212mn STALE      78060 s&lt;BR /&gt;ARP 10.33.1.106                             848a.8d68.a7cb  Gi1/0/18         20  0005  102mn STALE      84727 s&lt;BR /&gt;ARP 10.33.1.105                             00eb.d5cd.982f  Gi1/0/4          20  0005   63mn STALE      87276 s&lt;BR /&gt;ARP 10.33.1.103                             6c41.0e5f.4ef0  Gi1/0/7          20  0005   53mn STALE      86711 s&lt;BR /&gt;ARP 10.33.1.100                             848a.8d68.a17b  Gi1/0/5          20  0005   24mn STALE      88754 s&lt;BR /&gt;ARP 10.33.0.148                             488b.0a4e.9050  Gi1/0/15         10  0005    2s  REACHABLE  308 s&lt;BR /&gt;ARP 10.33.0.138                             000b.9423.5d96  Gi1/0/19         10  0005  181mn STALE      80047 s&lt;BR /&gt;ARP 10.33.0.117                             908d.6e27.5850  Gi1/0/12         10  0005 1332mn STALE      7979 s&lt;BR /&gt;ARP 10.33.0.112                             3448.ed72.9d49  Gi1/0/4          10  0005  220mn STALE      76667 s&lt;BR /&gt;ARP 10.33.0.106                             a029.199f.e04f  Gi1/0/8          10  0005   20mn STALE      88992 s&lt;BR /&gt;ARP 10.33.0.101                             f430.b972.1eca  Gi1/0/16         10  0005  145s  REACHABLE  170 s&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Jun 2022 20:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629197#M575377</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-06-09T20:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629208#M575378</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EAP-TLS.jpg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/153375iC00B74FE8AD0CAC7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="EAP-TLS.jpg" alt="EAP-TLS.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;We are using EAP-TLS for the user authentication, looking at ISE could this be an issue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_cef47d54165c7ejoeharb_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 20:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4629208#M575378</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-06-09T20:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec POC strange behavior, removes dynamic ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4632519#M575515</link>
      <description>&lt;P&gt;I am pretty sure the issue I was having was due to a bug&amp;nbsp;CSCvh70725.&amp;nbsp; I created a new device tracking policy as is recommended and have not had the issue since.&amp;nbsp; The log files were very similar to the bug.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps others,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 17:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-poc-strange-behavior-removes-dynamic-acl/m-p/4632519#M575515</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-06-15T17:30:01Z</dc:date>
    </item>
  </channel>
</rss>

