<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAC_ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5237703#M593824</link>
    <description>I don’t see any RADIUS Accounting requests from the NAD. Check the NAD config and ensure you send Accounting to ISE. Without Accounting, there is no licence control mechanism.&lt;BR /&gt;</description>
    <pubDate>Tue, 17 Dec 2024 00:46:25 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-12-17T00:46:25Z</dc:date>
    <item>
      <title>NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229194#M593366</link>
      <description>&lt;P&gt;I finish to install a ISE but it is not run well&lt;/P&gt;
&lt;P&gt;i notice that licence premium are not decrement when i had some devices and users&lt;/P&gt;
&lt;P&gt;Also the dashboard is not active, no activities.&lt;/P&gt;
&lt;P&gt;Somebody can help me ? i have the tech support file also&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 19:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229194#M593366</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-11-26T19:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229199#M593368</link>
      <description>&lt;P&gt;I'd&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-ask-the-community-for-help/ta-p/3704356" target="_self"&gt; start here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;ISE licensing is highly reliant on RADIUS Accounting working on the NAD devices. Ensure that RADIUS Start/Interim/Stop requests are being sent by the NAD and received by ISE.&lt;/P&gt;
&lt;P&gt;Patch your ISE to the latest patch level.&lt;/P&gt;
&lt;P&gt;If you have Queue Link Errors then regenerate the ISE Root CA certificate.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 19:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229199#M593368</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-26T19:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229539#M593394</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I notice that catalyst received configuration from ISE.&lt;/P&gt;
&lt;P&gt;But i can not see devices&amp;nbsp; and users in the dashboard&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VM licence decrement but premium licences none&lt;/P&gt;
&lt;P&gt;See below tech support file&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2024 11:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229539#M593394</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-11-27T11:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229844#M593400</link>
      <description>&lt;P&gt;An ISE show tech-support doesn't tell you anything about how RADIUS is configured in ISE. Tech-support has low level information about the operating system and installed applications.&lt;/P&gt;
&lt;P&gt;What I did notice from the show tech-support is that you have not patched this ISE 3.3 node - please patch to latest 3.3 patch version and then let us know.&lt;/P&gt;
&lt;P&gt;You should be sending screenshots from the ISE graphical user interface.&lt;/P&gt;
&lt;P&gt;Catalyst devices don't receive configuration from ISE - NAD devices send RADIUS requests to ISE, and ISE replies.&lt;/P&gt;
&lt;P&gt;There have been occasions where unpatched ISE versions don't perform very basic tasks.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 00:20:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5229844#M593400</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-28T00:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5230214#M593430</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I downloaded ISE3.3 patch (&lt;A id="file-link" tabindex="0" role="link" href="https://download-ssc.cisco.com/files/swc/std/4_SDSP_17913726_1730282401090/1/ise-patchbundle-3.3.0.430-Patch4-24102504.SPA.x86_64.tar.gz?ip=41.138.99.147&amp;amp;dtrTag=4_SDSP_17913726_1730282401090_719322cf76e37f67873c3012a74fe567&amp;amp;userid=00u55wt6ntxj7xyIh5d7&amp;amp;ak-org=2w_ue&amp;amp;SEC=N&amp;amp;tenant-id=SDSP&amp;amp;client=NA&amp;amp;__gda__=1732819888_9940e59776b3eb28e17ddbfd61ec04ee2081f0a0cad4dd6d7d00da2bee289bd3&amp;amp;__gdb__=exp=1732816771~hmac=453df9e4d225f619c8b5bca80296229ebb24fab8fc5956134422c7ca66881f30&amp;amp;xac=4-CtV1lvSta2lyGCedF4826SbIkAnZuVjDCDsBkZt7EEUCxTpwfZ4rmrM7iIkfKtRm" target="_blank"&gt;ise-patchbundle-3.3.0.430-Patch4-24102504.SPA.x86_64.tar.gz&lt;/A&gt;) so to upload to ISE node.&lt;/P&gt;
&lt;P&gt;See below screenshot file&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 18:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5230214#M593430</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-11-28T18:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5230239#M593438</link>
      <description>&lt;P&gt;OK - have you applied the patch?&lt;/P&gt;
&lt;P&gt;I would suspect that the Monitoring persona is not working - you could try a couple of things:&lt;/P&gt;
&lt;P&gt;log into the CLI of the nodes that run the Monitoring persona and issue the command&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show application status ise&lt;/LI-CODE&gt;
&lt;P&gt;Also, if there are Queue Link Errors, then Re-generate the ISE Internal CA certificate - do it regardless. Unless you are doing BYOD, this can't hurt.&lt;/P&gt;
&lt;P&gt;And then authenticate a few devices and see if you see stuff on Dashboard.&lt;/P&gt;
&lt;P&gt;If that doesn't work, then you might want to &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-23/213610-ise-2-3-rest-sync-context-visibility.html" target="_self"&gt;Reset the Context Visibility Database too&lt;/A&gt;. It requires a precise order of execution&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 20:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5230239#M593438</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-28T20:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5230675#M593467</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;the patch is&amp;nbsp;applied and certificat re-generate but i dont notce&amp;nbsp; a good change.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Licences, Dashboard are the statut.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I want to know if licences premium are used by devices and users utilisaation?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;we have these warning:&amp;nbsp;ISE authentication inactivity and ID Map. authentication inactivity&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;See below ise&amp;nbsp; application status&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 19:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5230675#M593467</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-11-29T19:15:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5231077#M593496</link>
      <description>&lt;P&gt;I can't open RTF files - screenshots are better. it sounds like you have no RADIUS accounting coming into your ISE nodes.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 00:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5231077#M593496</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-12-02T00:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5231336#M593507</link>
      <description>&lt;P&gt;Ok i see.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So licence premium can not slow down i understand.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But how can i have radius accounting&amp;nbsp; in the node please?&lt;/P&gt;
&lt;P&gt;and i need to know if all services are done? (see screenshot)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 12:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5231336#M593507</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-12-02T12:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5231559#M593517</link>
      <description>&lt;P&gt;Please see our &lt;A href="https://cs.co/ise-wired" target="_self"&gt;&lt;STRONG&gt;ISE Deployment Guide&lt;/STRONG&gt;&lt;/A&gt; for Catalyst Switches which has our best practice switchport configuration&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 17:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5231559#M593517</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-12-02T17:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5232010#M593551</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;Thanks for the deploiement guide .&lt;/P&gt;
&lt;P&gt;Now i have log by the network device (catalyst 9200 with command : test aaa group radius test pasword new-code)&lt;/P&gt;
&lt;P&gt;Therefor no change for licences, and dashboard&lt;/P&gt;
&lt;P&gt;see screenshot attached&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 16:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5232010#M593551</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-12-03T16:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5232158#M593559</link>
      <description>&lt;P&gt;Can you please paste images into these chats, because I can't open PDFs from a public forum (nor would I want to).&lt;/P&gt;
&lt;P&gt;If you are not getting Live Logs, then the most basic next step is to verify whether your ISE node (PSN) is receiving RADIUS requests from the network device.&amp;nbsp; Start a tcpdump on the node that you are sending RADIUS requests to, then run the&amp;nbsp;&lt;BR /&gt;"test aaa" command on the network device.&amp;nbsp; Download the .pcap and filter in Wireshark (Wireshark filter is simply &lt;EM&gt;radius&lt;/EM&gt;)&lt;/P&gt;
&lt;P&gt;If you can see Access-Request, with an associated Access-Accept (or Access-Reject) then you have some valuable information about connectivity. Sometimes ISE won't display Live Logs, if the Access-Request is malformed in some way. Have a look at the details of the Access-Request.&lt;/P&gt;
&lt;P&gt;And please paste images into these chats (once you pasted them in, click on them, and click on the 'large' icon to expand the image)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 21:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5232158#M593559</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-12-03T21:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5232380#M593569</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See screenshots below&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_0-1733308122598.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/235139i2A56CF1CAA3C9328/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_0-1733308122598.png" alt="syam_0-1733308122598.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_1-1733308193475.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/235140iD860FE860C17CFC3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_1-1733308193475.png" alt="syam_1-1733308193475.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_2-1733308840504.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/235141i542BC0B99ADE1E91/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_2-1733308840504.png" alt="syam_2-1733308840504.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_3-1733308980537.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/235142i05223120BAF327E5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_3-1733308980537.png" alt="syam_3-1733308980537.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_4-1733309324935.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/235143i3D0D0C09C3D05497/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_4-1733309324935.jpeg" alt="syam_4-1733309324935.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 10:50:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5232380#M593569</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-12-04T10:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5233094#M593614</link>
      <description>&lt;P&gt;It appears that the Live Logs are working. I don't have a definite answer as to why your Dashboard looks so empty. I noticed there as a DNS resolution failure in your Alarms. Is your ISE node able to perform DNS correctly on the CLI?&amp;nbsp; And the ISE FQDN must exist in DNS - both the A record and the PTR record.&amp;nbsp; I'd be surprised if that is causing the Dashboard to fail, but look into that anyway - you don't want to see DNS failures in ISE. ISE will not work well.&lt;/P&gt;
&lt;P&gt;Dashboard issue might be related to the browser?&amp;nbsp; Are you running any blockers, or Extensions that might prevent the rendering of the web content?&amp;nbsp; Tried different browsers?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have already Regenerated the ISE Root CA Certificate (which is the thing that fixes Queue Link Errors) then the last thing I would try (before going to TAC!) is to &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-23/213610-ise-2-3-rest-sync-context-visibility.html" target="_self"&gt;Reset the ISE Context Visibility.&lt;/A&gt;&amp;nbsp; You won't lose any data. But you must follow the steps exactly.&amp;nbsp; Context Visibility is a duplicate/different database that takes data from the master Oracle DB and uses it to create the GUI data.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2024 20:16:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5233094#M593614</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-12-05T20:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5233469#M593632</link>
      <description>&lt;P&gt;Hi see below result after appling patch and reset/syc ISE Context Visibility.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;despite adding endpoint &amp;amp; devices&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_3-1733505417236.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/235324i2911099AA6A6F72E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_3-1733505417236.png" alt="syam_3-1733505417236.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_4-1733505595089.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/235325i46C938274F8F2AA9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_4-1733505595089.png" alt="syam_4-1733505595089.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2024 17:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5233469#M593632</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-12-06T17:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5233558#M593636</link>
      <description>&lt;P&gt;have you done tcpdump to see if RADIUS NAD Access-Requests are being processed and returned to the NADs? And are there any RADIUS Accounting Access Requests (Accounting Start) from the NAD and ACK's sent from ISE back to NAD?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2024 21:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5233558#M593636</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-12-06T21:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5237443#M593808</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The A record and the PTR record are now added&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Start a tcpdump on the node that you are sending RADIUS requests to, then run the&amp;nbsp;&lt;BR /&gt;"test aaa" command on the network device.&amp;nbsp; Download the .pcap and filter in Wireshark (Wireshark filter is simply&amp;nbsp;&lt;EM&gt;radius&lt;/EM&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The result in screenshot below&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_0-1734355049997.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/236003i66215F8D8EA37EFA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_0-1734355049997.jpeg" alt="syam_0-1734355049997.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_1-1734355081333.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/236004i12F3B64D3DF28CE6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_1-1734355081333.jpeg" alt="syam_1-1734355081333.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;No change for licence&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 13:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5237443#M593808</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-12-16T13:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5237703#M593824</link>
      <description>I don’t see any RADIUS Accounting requests from the NAD. Check the NAD config and ensure you send Accounting to ISE. Without Accounting, there is no licence control mechanism.&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Dec 2024 00:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5237703#M593824</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-12-17T00:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5237899#M593837</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes i do tcpdump and i have the result in the screenshot&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syam_0-1734438540034.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/236066i084B216E56871CC2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="syam_0-1734438540034.jpeg" alt="syam_0-1734438540034.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 12:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5237899#M593837</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-12-17T12:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: NAC_ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5238070#M593854</link>
      <description>&lt;P&gt;&lt;EM&gt;You can see device configuration with accounting&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;version 17.3&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service call-home&lt;BR /&gt;platform punt-keepalive disable-kernel-core&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vrf definition Mgmt-vrf&lt;BR /&gt;!&lt;BR /&gt;address-family ipv4&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;address-family ipv6&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;enable secret 9 $9$/SXYyWMrxWN3TU$glftNzRHsEHttBKGbJAWNuoESG1MReBBS/IL/8xplaE&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ise&lt;BR /&gt;server name ISEACEP&lt;BR /&gt;ip radius source-interface Vlan 22&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group ise&lt;BR /&gt;aaa authorization network default group ise&lt;BR /&gt;&lt;STRONG&gt;aaa accounting update newinfo periodic 2880&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa accounting identity default start-stop group ise&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 192.168.10.50 server-key acep&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;switch 1 provision c9200l-48p-4g&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;device-sensor filter-list dhcp list DHCP-LIST&lt;BR /&gt;option name host-name&lt;BR /&gt;option name requested-address&lt;BR /&gt;option name parameter-request-list&lt;BR /&gt;option name class-identifier&lt;BR /&gt;option name client-identifier&lt;BR /&gt;!&lt;BR /&gt;device-sensor filter-list lldp list LLDP-LIST&lt;BR /&gt;tlv name system-name&lt;BR /&gt;tlv name system-description&lt;BR /&gt;tlv name system-capabilities&lt;BR /&gt;!&lt;BR /&gt;device-sensor filter-list cdp list CDP-LIST&lt;BR /&gt;tlv name device-name&lt;BR /&gt;tlv name address-type&lt;BR /&gt;tlv name capabilities-type&lt;BR /&gt;tlv name version-type&lt;BR /&gt;tlv name platform-type&lt;BR /&gt;device-sensor filter-spec dhcp include list DHCP-LIST&lt;BR /&gt;device-sensor filter-spec lldp include list LLDP-LIST&lt;BR /&gt;device-sensor filter-spec cdp include list CDP-LIST&lt;BR /&gt;device-sensor notify all-changes&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name acep-bf.com&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;login on-success log&lt;BR /&gt;access-session attributes filter-list list Def_Acct_list&lt;BR /&gt;&lt;STRONG&gt;access-session accounting attributes filter-spec include list Def_Acct_list&lt;/STRONG&gt;&lt;BR /&gt;access-session mac-move deny&lt;BR /&gt;access-session acl default passthrough&lt;BR /&gt;no device-tracking logging theft&lt;BR /&gt;device-tracking policy IPDT_POLICY&lt;BR /&gt;no protocol udp&lt;BR /&gt;tracking enable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint SLA-TrustPoint&lt;BR /&gt;enrollment pkcs12&lt;BR /&gt;revocation-check crl&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-987440204&lt;BR /&gt;enrollment selfsigned&lt;BR /&gt;subject-name cn=IOS-Self-Signed-Certificate-987440204&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair TP-self-signed-987440204&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain SLA-TrustPoint&lt;BR /&gt;certificate ca 01&lt;BR /&gt;30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030&lt;BR /&gt;32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363&lt;BR /&gt;6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934&lt;BR /&gt;3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305&lt;BR /&gt;43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720&lt;BR /&gt;526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030&lt;BR /&gt;82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D&lt;BR /&gt;CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520&lt;BR /&gt;1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE&lt;BR /&gt;4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC&lt;BR /&gt;7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188&lt;BR /&gt;68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7&lt;BR /&gt;C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191&lt;BR /&gt;C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44&lt;BR /&gt;DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201&lt;BR /&gt;06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85&lt;BR /&gt;4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500&lt;BR /&gt;03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905&lt;BR /&gt;604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B&lt;BR /&gt;D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8&lt;BR /&gt;467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C&lt;BR /&gt;7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B&lt;BR /&gt;5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678&lt;BR /&gt;80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB&lt;BR /&gt;418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0&lt;BR /&gt;D697DF7F 28&lt;BR /&gt;quit&lt;BR /&gt;crypto pki certificate chain TP-self-signed-987440204&lt;BR /&gt;certificate self-signed 01&lt;BR /&gt;3082032E 30820216 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;BR /&gt;30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274&lt;BR /&gt;69666963 6174652D 39383734 34303230 34301E17 0D323431 31303731 38313935&lt;BR /&gt;335A170D 33343131 30373138 31393533 5A303031 2E302C06 03550403 1325494F&lt;BR /&gt;532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3938 37343430&lt;BR /&gt;32303430 82012230 0D06092A 864886F7 0D010101 05000382 010F0030 82010A02&lt;BR /&gt;82010100 A5D1A0C4 E7500C57 2E12E1D4 83D77751 1A61C84D 09C52276 F35C7511&lt;BR /&gt;513CFDFE 1833B902 3EE2B117 7F7E7C3F 3B6E0AFB A8BFF0C5 33F19A2B 90F81F78&lt;BR /&gt;7817C6D9 B3C4AF35 4E4D5332 3EC4B7FA E1FAF7DE 31D95594 7B643FAC ACDBC572&lt;BR /&gt;1C5CC780 0DFCB020 CB3A0B26 0CA3B0AB E9A26C65 D3741FBD E08F0FFE 084CCDB8&lt;BR /&gt;84993D14 D99B7C46 8EE32574 9D6DED2C F63843E0 B4B3956D FA7F3E18 CA726D80&lt;BR /&gt;3BBE9B1A CA77C6DE AB8D321E 25E1AE36 00F707C4 CA90E2CA 50E21314 613AA891&lt;BR /&gt;A3DFC7DF 1DC78898 D9FEB394 B319675E 25FE8A3B 588A36E2 E084BD75 1D6A595F&lt;BR /&gt;2EB7C1B9 0135A41A EBBC68BC 5E4DDEDA BD532146 FF61289A 0CF69D04 AACA1979&lt;BR /&gt;AF66B9FF 02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F&lt;BR /&gt;0603551D 23041830 16801444 B061720B 6A7F027C 7E435FDE E34BC20D 8B822A30&lt;BR /&gt;1D060355 1D0E0416 041444B0 61720B6A 7F027C7E 435FDEE3 4BC20D8B 822A300D&lt;BR /&gt;06092A86 4886F70D 01010505 00038201 01008B85 F9C9BC32 01B67519 BC3D08A8&lt;BR /&gt;C3068D11 47EA34E2 C8B9AE4B B584CE4E CBA6DF01 B4A10CB5 D89713D0 6F0F32C1&lt;BR /&gt;61D5D285 B4BE2853 D4829F8C 275F147C EABBAB3E 410F4887 FB8E5B68 F9629631&lt;BR /&gt;E5342184 0A599E14 48B600A4 74299BDA 9282B152 9B154EFD 7272B8FB 825CFC72&lt;BR /&gt;BC83B528 29BFBA83 8B4A5272 FF866326 37AB0081 8CF2383E 382010EB 093CFDE3&lt;BR /&gt;97E610BE 6134F4AE 0E05FBD0 29005938 73C9FB18 F50B0E27 9952CF94 8991BB13&lt;BR /&gt;F58587A5 D1A7A6FC BE82F904 DC93864D EA9FA551 65D657F9 91BBFC92 20351263&lt;BR /&gt;780F143B 565C7FD1 DBD685BC FC2A9C5E C9B26C74 32C8918F 19DD880C 0EEDA0DD&lt;BR /&gt;0A8FD16D 164C768A 34D68020 DD752A18 3402&lt;BR /&gt;quit&lt;BR /&gt;!&lt;BR /&gt;service-template DEFAULT_LINKSEC_POLICY_MUST_SECURE&lt;BR /&gt;linksec policy must-secure&lt;BR /&gt;service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE&lt;BR /&gt;linksec policy should-secure&lt;BR /&gt;service-template DEFAULT_CRITICAL_VOICE_TEMPLATE&lt;BR /&gt;voice vlan&lt;BR /&gt;service-template DEFAULT_CRITICAL_DATA_TEMPLATE&lt;BR /&gt;service-template webauth-global-inactive&lt;BR /&gt;inactivity-timer 3600&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;dot1x critical eapol&lt;BR /&gt;license boot level network-essentials addon dna-essentials&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode rapid-pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;memory free low-watermark processor 10298&lt;BR /&gt;!&lt;BR /&gt;username Netacep privilege 15 secret 9 $9$AjKgVG00.nrI8.$/6bzxbT1kIymArs0MNC6LQpL3S/D/0VOcRjA3B1R/9Y&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;mode sso&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;transceiver type all&lt;BR /&gt;monitoring&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map match-any system-cpp-police-ewlc-control&lt;BR /&gt;description EWLC Control&lt;BR /&gt;class-map match-any system-cpp-police-topology-control&lt;BR /&gt;description Topology control&lt;BR /&gt;class-map match-any system-cpp-police-sw-forward&lt;BR /&gt;description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic&lt;BR /&gt;class-map match-any system-cpp-default&lt;BR /&gt;description EWLC data, Inter FED Traffic&lt;BR /&gt;class-map match-any system-cpp-police-sys-data&lt;BR /&gt;description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed&lt;BR /&gt;class-map match-any system-cpp-police-punt-webauth&lt;BR /&gt;description Punt Webauth&lt;BR /&gt;class-map match-any system-cpp-police-l2lvx-control&lt;BR /&gt;description L2 LVX control packets&lt;BR /&gt;class-map match-any system-cpp-police-forus&lt;BR /&gt;description Forus Address resolution and Forus traffic&lt;BR /&gt;class-map match-any system-cpp-police-multicast-end-station&lt;BR /&gt;description MCAST END STATION&lt;BR /&gt;class-map match-any system-cpp-police-high-rate-app&lt;BR /&gt;description High Rate Applications&lt;BR /&gt;class-map match-any system-cpp-police-multicast&lt;BR /&gt;description MCAST Data&lt;BR /&gt;class-map match-any system-cpp-police-l2-control&lt;BR /&gt;description L2 control&lt;BR /&gt;class-map match-any system-cpp-police-dot1x-auth&lt;BR /&gt;description DOT1X Auth&lt;BR /&gt;class-map match-any system-cpp-police-data&lt;BR /&gt;description ICMP redirect, ICMP_GEN and BROADCAST&lt;BR /&gt;class-map match-any system-cpp-police-stackwise-virt-control&lt;BR /&gt;description Stackwise Virtual OOB&lt;BR /&gt;class-map match-any non-client-nrt-class&lt;BR /&gt;class-map match-any system-cpp-police-routing-control&lt;BR /&gt;description Routing control and Low Latency&lt;BR /&gt;class-map match-any system-cpp-police-protocol-snooping&lt;BR /&gt;description Protocol snooping&lt;BR /&gt;class-map match-any system-cpp-police-dhcp-snooping&lt;BR /&gt;description DHCP snooping&lt;BR /&gt;class-map match-any system-cpp-police-ios-routing&lt;BR /&gt;description L2 control, Topology control, Routing control, Low Latency&lt;BR /&gt;class-map match-any system-cpp-police-system-critical&lt;BR /&gt;description System Critical and Gold Pkt&lt;BR /&gt;class-map match-any system-cpp-police-ios-feature&lt;BR /&gt;description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed&lt;BR /&gt;!&lt;BR /&gt;policy-map system-cpp-policy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/11&lt;BR /&gt;switchport access vlan 30&lt;BR /&gt;switchport mode access&lt;BR /&gt;device-tracking attach-policy IPDT_POLICY&lt;BR /&gt;ip access-group IPV4_PRE_AUTH_ACL in&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;access-session control-direction in&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/12&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport mode access&lt;BR /&gt;device-tracking attach-policy IPDT_POLICY&lt;BR /&gt;ip access-group IPV4_AUTH_ACL in&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;access-session control-direction in&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/48&lt;BR /&gt;description TRUNK-&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1/1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1/2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1/3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1/4&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan22&lt;BR /&gt;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http secure-active-session-modules none&lt;BR /&gt;ip http active-session-modules none&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;no ip ssh server authenticate user keyboard&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL_WEBAUTH_REDIRECT&lt;BR /&gt;10 permit tcp any any eq www&lt;BR /&gt;20 permit tcp any any eq 443&lt;BR /&gt;ip access-list extended BLOCKHOLE&lt;BR /&gt;10 permit tcp any any eq www&lt;BR /&gt;20 permit tcp any any eq 443&lt;BR /&gt;ip access-list extended IPV4_CRITICAL_ACL&lt;BR /&gt;10 permit ip any any&lt;BR /&gt;ip access-list extended IPV4_PRE_AUTH_ACL&lt;BR /&gt;10 permit udp any eq bootpc any eq bootps&lt;BR /&gt;20 permit udp any any eq domain&lt;BR /&gt;30 deny ip any any&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf upper-case&lt;BR /&gt;radius-server attribute 31 send nas-port-detail mac-only&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;BR /&gt;!&lt;BR /&gt;radius server ISEACEP&lt;BR /&gt;address ipv4 192.168.10.50 auth-port 1812 acct-port 1813&lt;BR /&gt;automate-tester username test.acep ignore-acct-port probe-on&lt;BR /&gt;&lt;STRONG&gt;key acep&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;service-policy input system-cpp-policy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;stopbits 1&lt;BR /&gt;line aux 0&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;c&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 17:54:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-ise/m-p/5238070#M593854</guid>
      <dc:creator>syam</dc:creator>
      <dc:date>2024-12-17T17:54:45Z</dc:date>
    </item>
  </channel>
</rss>

