<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question about CoA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/question-about-coa/m-p/4756261#M579271</link>
    <description>&lt;P&gt;In short, yes. The Reauth action can be set directly on a profiling policy and it will override the global setting.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you set the global setting to No CoA, then endpoints will only be reauthed on profile change if the profile they match has the "Associated CoA Type" set to Reauth/Port Bounce.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Jan 2023 22:27:28 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2023-01-17T22:27:28Z</dc:date>
    <item>
      <title>Question about CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/question-about-coa/m-p/4756245#M579268</link>
      <description>&lt;P&gt;I've read through the great design guide on ISE profiling and have a question about CoA based on what I have observed with my deployment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a policy set with authorization rules that do not reference any profiles. I can see clients that match that policy being sent CoA messages because they either got profiled for the first time or changed profiles. I didn't expect to see that, given their policy set doesn't contain any profiles in the authorization rules. Is this expected behavior?&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I wanted to disable CoA globally by setting the CoA setting to "no CoA," would I still be able to use CoA for policies that do reference profiles?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 21:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-about-coa/m-p/4756245#M579268</guid>
      <dc:creator>Mark_Williams</dc:creator>
      <dc:date>2023-01-17T21:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: Question about CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/question-about-coa/m-p/4756261#M579271</link>
      <description>&lt;P&gt;In short, yes. The Reauth action can be set directly on a profiling policy and it will override the global setting.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you set the global setting to No CoA, then endpoints will only be reauthed on profile change if the profile they match has the "Associated CoA Type" set to Reauth/Port Bounce.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 22:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-about-coa/m-p/4756261#M579271</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2023-01-17T22:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: Question about CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/question-about-coa/m-p/4756264#M579272</link>
      <description>&lt;P&gt;It looks like all the CoA packets being sent are for the cause "first time profiled" and not because the change in profile would affect how an authorization rule list would be processed. Too bad I can't just disable CoA for first-time profile, If you set the global setting to No CoA, that doesn't impact guest portals, does it? I wouldn't think so because even though guest uses CoA it is not related to profiling.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 22:35:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-about-coa/m-p/4756264#M579272</guid>
      <dc:creator>Mark_Williams</dc:creator>
      <dc:date>2023-01-17T22:35:26Z</dc:date>
    </item>
  </channel>
</rss>

