<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ise 3.3 Posture not changing quarantine VLAN after upgrade in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5254006#M594602</link>
    <description>&lt;P&gt;ok guy just to update you, the thing is wokring rigth now, how i have doubts but we have determine whats making it work.&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_10-1738112399958.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238674i678781D619C28AB5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_10-1738112399958.png" alt="vivarock12_10-1738112399958.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;por configuration&lt;/P&gt;
&lt;P&gt;VLANs&lt;/P&gt;
&lt;P&gt;The port configuration is access on vlan 1, vlan 1 does not give any DHCP ipaddres.&lt;/P&gt;
&lt;P&gt;Quarentine vlan is 1244, dhcp addressing&lt;/P&gt;
&lt;P&gt;Compliant vlan is 410. reserved DHCP addressing&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;So the flow would be PC Connects to the network &amp;gt; eap validates the 802.1x, on vlan 1 &amp;gt;&lt;/P&gt;
&lt;P&gt;posture starts and puts you on unknow, and gives you the vlan 1244, till the posture result is define (at that point the PC should do a DHCP DORA and get and DHCP ip address) &amp;gt;&lt;/P&gt;
&lt;P&gt;If the ise determine that you were POSTURE COMPLIANT, ISE send the switch a DACL and the vlan 410 (at that point the PC should do a DHCP DORA and get and DHCP reserved ip address, and the switch port shows that the correct vlan was already in the port).&lt;BR /&gt;&lt;BR /&gt;image of the last part ^&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_11-1738112416286.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238675i5FA166A069687318/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_11-1738112416286.png" alt="vivarock12_11-1738112416286.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;the trouble was that on the last part the ISE determine that the device was Compliant and send to the switch the respective DACL and the vlan, but the pc dindt start a DHCP DORA process and stuck with the ip addressing of the quarentine vlan(1244).&lt;/P&gt;
&lt;P&gt;if we did a reselection of the network on the NAM module of the anyconnect, the pc begings with the DHCP DORA and got and ip address of the posture compliant vlan (410), if we dindt do that the pc would remain stuck on quarentine vlan.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_9-1738111843298.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238673i5D4461272839E174/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_9-1738111843298.png" alt="vivarock12_9-1738111843298.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;here the strange part&amp;gt;&lt;/P&gt;
&lt;P&gt;If we created and interface vlan of the quarentine vlan (1244) on the authenticator SW, the process would automaticly put the pc on the Posture vlan (410) without any reason, the pc just does the DHCP DORA and get the reserved ip address.&lt;BR /&gt;if the interface vlan was turned off, the nam reselection was the only solution.&lt;/P&gt;
&lt;P&gt;so basically&lt;/P&gt;
&lt;H1 class="style-scope ytd-watch-metadata"&gt;It Just Works&lt;/H1&gt;
&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;firstime seeing thing, i think that itr migth have something to do why the Posture agent profile part and that interface vlan i permiting the vlan validation, for the posture module and making it try againg, not sure but just for you guys to know the conclusion.&lt;BR /&gt;!&lt;BR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;thanks the both of you.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2025 01:01:09 GMT</pubDate>
    <dc:creator>vivarock12</dc:creator>
    <dc:date>2025-01-29T01:01:09Z</dc:date>
    <item>
      <title>ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252553#M594477</link>
      <description>&lt;P&gt;after an upgrade from 2.7 to 3.3 p4 im trying to do posture, and a PC that already in the database connects and gets to compliant but for some reason is not changing the Quarantine vlan for the new one.&lt;/P&gt;
&lt;P&gt;The authorization rule sets a DACL and a new vlan(non quarentine vlan).&lt;/P&gt;
&lt;P&gt;if i run a show authent sess int gix/x/x de i can see that the DACL is getting assined on the SW(and on the ise radius logs too), but for some reasong the vlan wont change.&lt;/P&gt;
&lt;P&gt;any idea why that migth happend?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1738112604652.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238676i021621A54861D58B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_0-1738112604652.png" alt="vivarock12_0-1738112604652.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;here a config of the port at the moment were using authentication open. and the port its un trunk because of a phone that dont support voice vlan.&lt;/P&gt;
&lt;P&gt;thanks for the help&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 01:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252553#M594477</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-29T01:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252557#M594478</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt; which VLAN ID are you expecting the quarantined user to be placed in to? The command "authentication event server dead action authorize vlan 1244" will only apply if the RADIUS server is dead, it is not used for quarantine if thats what you were thinking.&lt;/P&gt;
&lt;P&gt;If you want to quarantine the endpoint in a different VLAN, then use dynamic VLAN assignment. Dynamic VLAN example - &lt;A href="https://integratingit.wordpress.com/2018/05/07/configuring-cisco-ise-dynamic-vlan-assignment/" target="_blank"&gt;https://integratingit.wordpress.com/2018/05/07/configuring-cisco-ise-dynamic-vlan-assignment/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Or just apply a DACL and restrict what the quarantined device can actually communication with.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 12:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252557#M594478</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-25T12:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252561#M594479</link>
      <description>The quarantine vlan should be the 44 and passing to vlan 128 after the compliant is completed but is not assigning the vlan 128 after the posture is compliant.&lt;BR /&gt;</description>
      <pubDate>Sat, 25 Jan 2025 12:27:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252561#M594479</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-25T12:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252562#M594480</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt; Please provide a screenshot of your relevant&amp;nbsp; ISE configuration that assigns the VLAN.&lt;/P&gt;
&lt;P&gt;Is CoA setup correctly on the switch?&lt;/P&gt;
&lt;P&gt;Provide the output of "show authentication session interface gig 1/0/41 detail" after the device is posture compliant.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 12:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252562#M594480</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-25T12:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252591#M594485</link>
      <description>&lt;P&gt;You seem to be using VLAN 44 for voice instead of as your data quarantine VLAN. But regardless of this, if you have VLAN 128 configured in the authorization profile that is associated to the Compliant authorization rule in ISE it should work. As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;suggested, please share some screenshots of ISE authorization rules and authorization profiles and also ISE live log for that session for review.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 13:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252591#M594485</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-01-25T13:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252719#M594492</link>
      <description>&lt;P&gt;sorry for the late reply:&lt;BR /&gt;the policy rule&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1737844412404.png" style="width: 1050px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238524iFFCF83B28A6CA5D4/image-dimensions/1050x470?v=v2" width="1050" height="470" role="button" title="vivarock12_0-1737844412404.png" alt="vivarock12_0-1737844412404.png" /&gt;&lt;/span&gt;it matches the wired 802.1x authentication profile&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_1-1737844553755.png" style="width: 945px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238525i2B9BE41DB9FD2D94/image-dimensions/945x78?v=v2" width="945" height="78" role="button" title="vivarock12_1-1737844553755.png" alt="vivarock12_1-1737844553755.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;this is the authorization rule it matches, as you canse it al ready is compliant.&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_2-1737844776495.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238526i3F49F43427351332/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_2-1737844776495.jpeg" alt="vivarock12_2-1737844776495.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;and the authorization result does this basicaly assing a new vlan.&lt;/P&gt;
&lt;P&gt;from what i se the OA&amp;nbsp; configure has expected, hers the sw config:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ISE-Group-RAD&lt;BR /&gt;server name ISE-2&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ ISE_GROUP-TACA&lt;BR /&gt;server name ISE-2&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default none&lt;BR /&gt;aaa authentication login VTY group radius local&lt;BR /&gt;aaa authentication login AAA group ISE_GROUP-TACA local&lt;BR /&gt;aaa authentication enable default group ISE_GROUP-TACA enable&lt;BR /&gt;aaa authentication dot1x default group ISE-Group-RAD&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default none &lt;BR /&gt;aaa authorization exec VTY group radius local &lt;BR /&gt;aaa authorization exec AAA group ISE_GROUP-TACA local &lt;BR /&gt;aaa authorization commands 0 AAA group ISE_GROUP-TACA local &lt;BR /&gt;aaa authorization commands 1 AAA group ISE_GROUP-TACA local &lt;BR /&gt;aaa authorization commands 15 AAA group ISE_GROUP-TACA local &lt;BR /&gt;aaa authorization network default group ISE-Group-RAD &lt;BR /&gt;aaa accounting dot1x ISE start-stop group ISE-Group-RAD&lt;BR /&gt;aaa accounting exec default start-stop group ISE_GROUP-TACA&lt;BR /&gt;aaa accounting commands 1 default start-stop group ISE_GROUP-TACA&lt;BR /&gt;aaa accounting commands 15 default start-stop group ISE_GROUP-TACA&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 192.168.252.242 server-key 7 SD2174QW3ASDF4603A256SD5F4333455C5C540F656E&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;switchport trunk allowed vlan 44&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 44&lt;BR /&gt;device-tracking&lt;BR /&gt;ip access-group PreAuth-ACL in&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action authorize vlan 1244&lt;BR /&gt;authentication event server alive action reinitialize &lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication violation replace&lt;BR /&gt;mab&lt;BR /&gt;snmp trap mac-notification change added&lt;BR /&gt;snmp trap mac-notification change removed&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;ip access-list extended PreAuth-ACL&lt;BR /&gt;10 permit udp any any eq domain&lt;BR /&gt;20 permit udp any eq bootpc any eq bootps&lt;BR /&gt;30 permit tcp any host 192.168.252.241&lt;BR /&gt;40 permit tcp any host 192.168.252.242&lt;BR /&gt;50 deny ip any any&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;tacacs server ISE-1&lt;BR /&gt;address ipv4 192.168.252.241&lt;BR /&gt;key 7 13546ASD65F6H656SD321FSD986421SDFWEFD21&lt;BR /&gt;tacacs server ISE-2&lt;BR /&gt;address ipv4 192.168.252.242&lt;BR /&gt;key 7 54547321SDFSD75SD1FSD79WE231SDF879465SDF&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-1&lt;BR /&gt;address ipv4 192.168.252.241 auth-port 1645 acct-port 1646&lt;BR /&gt;key 7 698749321ASDAFASDFG87ADF2GDF46D5F4GSD32F41SD3F5&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-2&lt;BR /&gt;address ipv4 192.168.252.242 auth-port 1645 acct-port 1646&lt;BR /&gt;key 7 546ASDD5A3S2D1DFS75A65AS564G65F46321DF698D321AS&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 22:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252719#M594492</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-25T22:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252721#M594493</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt; in your Authorisation Profile you have set the VLAN as 410, but you said the VLAN should be 128. So if you send the wrong VLAN ID which does not exist on the switch, it won't work.&lt;/P&gt;
&lt;P&gt;FYI, You could use a name instead of the ID numbers, the same name could be used over multiple switches but with a different ID number. That makes it more scalable.&lt;/P&gt;
&lt;P&gt;Provide the output of "show authentication session interface gig 1/0/41 detail" if you still have a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 23:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252721#M594493</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-25T23:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252744#M594494</link>
      <description>Sorry I mistaken the vlan before, tomorrow where going back to the site I'll upload the command as fast as possible, but it looks like the ise is not sending the coa to the switch.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 26 Jan 2025 01:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252744#M594494</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-26T01:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252828#M594497</link>
      <description>&lt;P&gt;Also you seem to have the CoA configured on the switch only for ISE2 but not for ISE1. You should add the CoA for ISE1 as well via the command:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa server radius dynamic-author&lt;BR /&gt;&lt;/SPAN&gt;&amp;nbsp; &amp;nbsp;&lt;SPAN&gt;client 192.168.252.241 server-key &amp;lt; your RADIUS key &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2025 12:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252828#M594497</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-01-26T12:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252830#M594498</link>
      <description>I have only upgraded the ise 2 were doing a backup restore method.&lt;BR /&gt;&lt;BR /&gt;ISE 1 is working in it's previous version still.&lt;BR /&gt;&lt;BR /&gt;Saying that should I change the ACL on the port?&lt;BR /&gt;And should I check the client provisioning portal?&lt;BR /&gt;&lt;BR /&gt;I was wondering if that might be the reason.&lt;BR /&gt;</description>
      <pubDate>Sun, 26 Jan 2025 12:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252830#M594498</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-26T12:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252836#M594499</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt; please provide the output of "show authentication session interface gig 1/0/41 detail" - from after the user is posture compliant.&lt;/P&gt;
&lt;P&gt;Enable &lt;STRONG&gt;debug radius&lt;/STRONG&gt; on the switch, authenticate and observe the output when the user is compliant, you should see &lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Tunnel-Private-Group&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; (amongst others) being sent to the switch, this will tell you if the VLAN is received by the switch. If it does not, have you confirmed in the actual ISE Live Logs the user is matching the correct rule?&lt;/P&gt;
&lt;P&gt;I assume the VLAN is actually created on the switch already?&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2025 12:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252836#M594499</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-26T12:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252854#M594502</link>
      <description>&lt;P&gt;Oh I see, thanks for clarifying that. The ACL on the port is not involved in the traffic between ISE and the switch, nor the client provisioning portal. The ACL on the port allows the connected clients to get an IP, send DNS queries, and connect to ISE on any TCP port. The client provisioning portal would be used only if the clients do not have the posture module and they need to download it from the portal.&lt;/P&gt;
&lt;P&gt;However, what we are trying to understnad here is if ISE is actually returning the right attribute to the switch, and if the switch receives it. If you believe your authorization profile is configured with the wrong VLAN 410 and that needs to be adjusted to VLAN 128, then that would most likely be the issue. If not I would&amp;nbsp;go with what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;suggested, RADIUS debug should show us what attributes ISE send back to the switch and then will take it from there.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2025 13:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5252854#M594502</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-01-26T13:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253365#M594548</link>
      <description>&lt;P&gt;SORRY FOR THE LATE REPLY.&lt;BR /&gt;rigth now were with a case with cisco and yes we have determine that for some reason the pc wont feel, see, or determine that the switch change the vlan has a hole and becasuse of that it doesnt do a new DHCP request or for the new ip address apparently.&lt;/P&gt;
&lt;P&gt;so that were we are now and were trying to change parameter on the AnyConnect Posture Profile to double check if that migth be the solution becasue we do double vlan change from a quarentine vlan (when the device in unknow) to a production vlan (whe the device posture is compliant).&lt;/P&gt;
&lt;P&gt;any other ideas?&lt;/P&gt;
&lt;P&gt;ill be updating in any case.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 18:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253365#M594548</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-27T18:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253368#M594550</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt; changing the VLAN of a device after a device already has an IP address can cause issues with clients not requesting an IP address. I generally avoid changing VLAN, applying a DACL to a non-compliant device to restrict access would be better.&lt;/P&gt;
&lt;P&gt;Again, please provide the output of "show authentication session interface gig 1/0/41 detail" - from after the user is posture compliant. The output would confirm whether the switch has or has not received the new VLAN, which might indicate to us the client has not requested the new IP address.&lt;/P&gt;
&lt;P&gt;Did you run the debug as suggested above? ....does that confirms the VLAN is sent to the endpoint. Provide the output&lt;/P&gt;
&lt;P&gt;You may have done this with TAC already, but this is not TAC so we cannot assist if you don't provide us with the outputs to figure out where the problem is.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 19:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253368#M594550</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-27T19:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253395#M594551</link>
      <description>&lt;P&gt;here the capture of the show authentication sessions.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1738112659528.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238677iF07D834E39C878E8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_0-1738112659528.png" alt="vivarock12_0-1738112659528.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;the detination vlan es the 410 sorry for the confusion wiith the 128 that the netwrok third prefix.&lt;/P&gt;
&lt;P&gt;and here are the logs. just add them at the end.&lt;/P&gt;
&lt;P&gt;the and a PCAP with span is avaiable if you want me to shared with you.&lt;/P&gt;
&lt;P&gt;sorry for the late reply again.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 01:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253395#M594551</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-29T01:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253406#M594553</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt; did you not include all the logs in the output? I can see the VLAN assigned to VLAN 1244, not VLAN 410. By the looks of the output above I can see that ISE has sent VLAN 410 during authorisation.&lt;/P&gt;
&lt;P&gt;The logs do confirm that VLAN 1244 is being sent and works during the posture unknown phase (as per output below)? &lt;/P&gt;
&lt;PRE&gt;hp_acc_p100o_192_168_91_36#sh authentication sessions interface gi1/0/1 details &lt;BR /&gt;Interface: GigabitEthernet1/0/1&lt;BR /&gt;MAC Address: c018.0389.e5ac&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 192.168.144.33&lt;BR /&gt;User-Name: rvalencia&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: N/A&lt;BR /&gt;Session Uptime: 496s&lt;BR /&gt;Common Session ID: C0A85B2400000041042B14D9&lt;BR /&gt;Acct Session ID: 0x00000161&lt;BR /&gt;Handle: 0x34000024&lt;BR /&gt;Current Policy: POLICY_Gi1/0/1&lt;BR /&gt;&lt;BR /&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;&lt;BR /&gt;Server Policies:&lt;BR /&gt;Vlan Group: Vlan: 1244&lt;BR /&gt;URL Redirect: https://ma-srv-ise2.cableonda.interno:8443/portal/gateway?sessionId=C0A85B2400000041042B14D9&amp;amp;portal=58055550-d262-11e4-9c2b-005056b15681&amp;amp;action=cpp&amp;amp;token=f4c8fc0a793b499e1097b2700c27d7e2&lt;BR /&gt;URL Redirect ACL: ACL_Unknown_Redirect&lt;/PRE&gt;
&lt;P&gt;So the issue is not that ISE is not sending the VLANs, nor the switch applying the correct VLAN to the session, but the client is not getting an IP address in VLAN 410?&lt;/P&gt;
&lt;P&gt;Does VLAN 410 work with NAC applied?&lt;/P&gt;
&lt;P&gt;Again, I wouldn't recommend changing VLANs, but use a DACL to restrict access.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 21:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253406#M594553</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-27T21:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253412#M594554</link>
      <description>&lt;P&gt;yes the issue is that after the ISE applies the configuration to the switch and the switch applies the config to the port the PC makes a new DHCP request (suppostly) but gets the same ip address from the curantine vlan 1244, not the one from vlan 410&lt;/P&gt;
&lt;P&gt;Again, I wouldn't recommend changing VLANs, but use a DACL to restrict access. yes im with you in this but the deployment was working like that on 2.6 but after the upgrade to 3.3 and we are working anymore, that why we were trying to solve that problem. after that the direction is disable this double vlan.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 21:27:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253412#M594554</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-27T21:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253599#M594571</link>
      <description>&lt;P&gt;It does seem that the client don't even try to get a new IP address for some reason. This behaviour is expected with MAB authentications, not with dot1x. With dot1x the supplicant should take care of triggering the whole authentication process. One thing you might try to do to workaround this is to place the switch port in the quarantine VLAN (1244), not to change it during the unknown phase, and then you only apply VLAN (410) for the compliant authorization rule. That way the switch port pre authentication will already be in the quarantine VLAN and will remain into that VLAN until the client pass the posture check.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 09:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5253599#M594571</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-01-28T09:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5254006#M594602</link>
      <description>&lt;P&gt;ok guy just to update you, the thing is wokring rigth now, how i have doubts but we have determine whats making it work.&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_10-1738112399958.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238674i678781D619C28AB5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_10-1738112399958.png" alt="vivarock12_10-1738112399958.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;por configuration&lt;/P&gt;
&lt;P&gt;VLANs&lt;/P&gt;
&lt;P&gt;The port configuration is access on vlan 1, vlan 1 does not give any DHCP ipaddres.&lt;/P&gt;
&lt;P&gt;Quarentine vlan is 1244, dhcp addressing&lt;/P&gt;
&lt;P&gt;Compliant vlan is 410. reserved DHCP addressing&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;So the flow would be PC Connects to the network &amp;gt; eap validates the 802.1x, on vlan 1 &amp;gt;&lt;/P&gt;
&lt;P&gt;posture starts and puts you on unknow, and gives you the vlan 1244, till the posture result is define (at that point the PC should do a DHCP DORA and get and DHCP ip address) &amp;gt;&lt;/P&gt;
&lt;P&gt;If the ise determine that you were POSTURE COMPLIANT, ISE send the switch a DACL and the vlan 410 (at that point the PC should do a DHCP DORA and get and DHCP reserved ip address, and the switch port shows that the correct vlan was already in the port).&lt;BR /&gt;&lt;BR /&gt;image of the last part ^&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_11-1738112416286.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238675i5FA166A069687318/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_11-1738112416286.png" alt="vivarock12_11-1738112416286.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;the trouble was that on the last part the ISE determine that the device was Compliant and send to the switch the respective DACL and the vlan, but the pc dindt start a DHCP DORA process and stuck with the ip addressing of the quarentine vlan(1244).&lt;/P&gt;
&lt;P&gt;if we did a reselection of the network on the NAM module of the anyconnect, the pc begings with the DHCP DORA and got and ip address of the posture compliant vlan (410), if we dindt do that the pc would remain stuck on quarentine vlan.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_9-1738111843298.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238673i5D4461272839E174/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_9-1738111843298.png" alt="vivarock12_9-1738111843298.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;here the strange part&amp;gt;&lt;/P&gt;
&lt;P&gt;If we created and interface vlan of the quarentine vlan (1244) on the authenticator SW, the process would automaticly put the pc on the Posture vlan (410) without any reason, the pc just does the DHCP DORA and get the reserved ip address.&lt;BR /&gt;if the interface vlan was turned off, the nam reselection was the only solution.&lt;/P&gt;
&lt;P&gt;so basically&lt;/P&gt;
&lt;H1 class="style-scope ytd-watch-metadata"&gt;It Just Works&lt;/H1&gt;
&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;firstime seeing thing, i think that itr migth have something to do why the Posture agent profile part and that interface vlan i permiting the vlan validation, for the posture module and making it try againg, not sure but just for you guys to know the conclusion.&lt;BR /&gt;!&lt;BR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;thanks the both of you.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 01:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5254006#M594602</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-01-29T01:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: ise 3.3 Posture not changing quarantine VLAN after upgrade</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5256131#M594737</link>
      <description>&lt;P&gt;You're welcome. I think the issue here is that the client for some reason doesn't go through DORA process again, and as you're using NAM I would recommend looking at NAM profile to see if there is any setting that would prevent that from happening.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2025 14:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-posture-not-changing-quarantine-vlan-after-upgrade/m-p/5256131#M594737</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-02-03T14:37:11Z</dc:date>
    </item>
  </channel>
</rss>

