<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with SXP between ASAv and ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/issue-with-sxp-between-asav-and-ise/m-p/5022010#M587507</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for pointing me in the right direction!&lt;BR /&gt;The capture showed that both ISE and ASA were mutually ignoring each other by not responding to connection requests (SYN packets -&amp;gt; wait 120 sec -&amp;gt; try again).&lt;BR /&gt;5 x ASA -&amp;gt; ISE TCP/64999 SYN&lt;BR /&gt;5 x ISE -&amp;gt; ASA TCP/64999 SYN&lt;BR /&gt;…&lt;BR /&gt;…&lt;/P&gt;&lt;P&gt;Enter weirdness,&lt;BR /&gt;I changed password type to “None” on both devices and then it worked. But how can an SXP setting take effect before a session is established? Shouldn’t that be something to convey in the session after establishment? Obviously, I have some reading to do!&lt;/P&gt;&lt;P&gt;/Anders&lt;/P&gt;</description>
    <pubDate>Wed, 21 Feb 2024 14:41:36 GMT</pubDate>
    <dc:creator>Anders Fredriksson</dc:creator>
    <dc:date>2024-02-21T14:41:36Z</dc:date>
    <item>
      <title>Issue with SXP between ASAv and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-sxp-between-asav-and-ise/m-p/5021764#M587499</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I’m experiencing an annoying problem when configuring SXP between ASA and ISE for a PoC environment. I have configured Radius and basic Trustsec and ‘everything’ works fine until SXP is configured. SXP (ASA) won’t connect regardless settings on ASA. Status is either “Pending On” or “Off”.&lt;/P&gt;&lt;P&gt;ASA debug shows this message:&lt;BR /&gt;[cts sxp message error]: trp_socket_read: socket_recv failed; fd = 4, errno = 13, err_msg = Permission denied&lt;/P&gt;&lt;P&gt;Technically, I might not need SXP as this ASA is intended for RA VPN only. If ISE return attributes ASA can use those will not change for the duration of the VPN session, or am I missing something? Does anyone have any ideas on why ASA logs a Permission Denied?&lt;/P&gt;&lt;P&gt;There is a firewall between ASA and ISE but that literally has an “allow any any” rule for now.&lt;/P&gt;&lt;P&gt;*** VERSIONS ***&lt;BR /&gt;ASAv: 9.20(2)2&lt;BR /&gt;ISE: 3.2.0.542, patch:5&lt;/P&gt;&lt;P&gt;*** ASA DEBUG ***&lt;BR /&gt;debug cts all&lt;BR /&gt;debug cts sxp all&lt;/P&gt;&lt;P&gt;[cts sxp message error]: trp_socket_read: socket_recv failed; fd = 4, errno = 13, err_msg = Permission denied&lt;/P&gt;&lt;P&gt;*** ASA CONFIGURATION ***&lt;BR /&gt;ssh 10.2.2.0 255.255.255.0 inside&lt;BR /&gt;aaa-server ISE-RADIUS protocol radius&lt;BR /&gt;interim-accounting-update periodic 24&lt;BR /&gt;dynamic-authorization&lt;BR /&gt;aaa-server ISE-RADIUS (inside) host ise-node01.mydomain.com&lt;BR /&gt;timeout 8&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;BR /&gt;radius-common-pw *****&lt;BR /&gt;aaa-server ISE-RADIUS (inside) host ise-node02.mydomain.com&lt;BR /&gt;timeout 8&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;BR /&gt;radius-common-pw *****&lt;BR /&gt;cts server-group ISE-RADIUS&lt;BR /&gt;cts sxp enable&lt;BR /&gt;cts sxp default password *****&lt;BR /&gt;cts sxp default source-ip 10.1.1.5&lt;BR /&gt;cts sxp connection peer 10.2.2.43 password default mode local listener&lt;BR /&gt;cts sxp connection peer 10.2.2.44 password default mode local listener&lt;/P&gt;&lt;P&gt;/Anders&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 09:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-sxp-between-asav-and-ise/m-p/5021764#M587499</guid>
      <dc:creator>Anders Fredriksson</dc:creator>
      <dc:date>2024-02-21T09:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SXP between ASAv and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-sxp-between-asav-and-ise/m-p/5021878#M587501</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1686919"&gt;@Anders Fredriksson&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;I assume the SXP service is enabled on the ISE PSN?&lt;/P&gt;
&lt;P&gt;Is the firewall in between ISE performing NAT, that could cause a problem.&lt;/P&gt;
&lt;P&gt;From the ASA take a packet capture of the SXP traffic to confirm communication to/from ISE (or not), filter on TCP port 64999 for SXP.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 12:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-sxp-between-asav-and-ise/m-p/5021878#M587501</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-21T12:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with SXP between ASAv and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-with-sxp-between-asav-and-ise/m-p/5022010#M587507</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for pointing me in the right direction!&lt;BR /&gt;The capture showed that both ISE and ASA were mutually ignoring each other by not responding to connection requests (SYN packets -&amp;gt; wait 120 sec -&amp;gt; try again).&lt;BR /&gt;5 x ASA -&amp;gt; ISE TCP/64999 SYN&lt;BR /&gt;5 x ISE -&amp;gt; ASA TCP/64999 SYN&lt;BR /&gt;…&lt;BR /&gt;…&lt;/P&gt;&lt;P&gt;Enter weirdness,&lt;BR /&gt;I changed password type to “None” on both devices and then it worked. But how can an SXP setting take effect before a session is established? Shouldn’t that be something to convey in the session after establishment? Obviously, I have some reading to do!&lt;/P&gt;&lt;P&gt;/Anders&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:41:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-with-sxp-between-asav-and-ise/m-p/5022010#M587507</guid>
      <dc:creator>Anders Fredriksson</dc:creator>
      <dc:date>2024-02-21T14:41:36Z</dc:date>
    </item>
  </channel>
</rss>

