<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Posture - Automatic Redirection to Client Provisioning Portal in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5325473#M597990</link>
    <description>&lt;P&gt;I used OnConnect script (need to be enabled in anyconnect profile to work) that opens http://&lt;SPAN&gt;enroll.cisco.com, IP&amp;nbsp;72.163.1.80 is configured in split tunnel ACL, and redirect ACL catches it. But, I used this only for external partners &amp;amp; temporary agent. For employees it's better if you preprovision ISEPosture.cfg file and ISE posture agent, and configure ISE hosts in cfg file, then posture client knows where are ISE hosts and can connect to them without browser redirection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2025 07:02:50 GMT</pubDate>
    <dc:creator>smilic</dc:creator>
    <dc:date>2025-08-29T07:02:50Z</dc:date>
    <item>
      <title>ISE Posture - Automatic Redirection to Client Provisioning Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5282333#M596938</link>
      <description>&lt;P&gt;When I connect to my VPN headend (FTD 7.2.9) I make it through authentication and authorization. ISE recognizes my host as "Posture Unknown", but no browser pops-up automatically with the Client Provisioning Portal. If I open a browser and navigate to an http site, redirection works.&lt;/P&gt;&lt;P&gt;The redirect ACL name is exactly the same on the FTD and in the ISE Authorization Policy.&lt;/P&gt;&lt;P&gt;The redirection ACL denies DNS, DHCP and ISE from redirection and permits all else.&lt;/P&gt;&lt;P&gt;Packet capture shows host never attempts to access an http site over my VPN tunnel, which I suppose is the reason the automatic redirect doesn't work.&lt;/P&gt;&lt;P&gt;I have seen more than one video that demonstrates the browser automatically launching after the VPN connection is established.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any help will be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 13:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5282333#M596938</guid>
      <dc:creator>Danny Dulin</dc:creator>
      <dc:date>2025-04-17T13:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture - Automatic Redirection to Client Provisioning Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5325473#M597990</link>
      <description>&lt;P&gt;I used OnConnect script (need to be enabled in anyconnect profile to work) that opens http://&lt;SPAN&gt;enroll.cisco.com, IP&amp;nbsp;72.163.1.80 is configured in split tunnel ACL, and redirect ACL catches it. But, I used this only for external partners &amp;amp; temporary agent. For employees it's better if you preprovision ISEPosture.cfg file and ISE posture agent, and configure ISE hosts in cfg file, then posture client knows where are ISE hosts and can connect to them without browser redirection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 07:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5325473#M597990</guid>
      <dc:creator>smilic</dc:creator>
      <dc:date>2025-08-29T07:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture - Automatic Redirection to Client Provisioning Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326785#M598033</link>
      <description>&lt;P&gt;Have you looked at redirectionless posture instead? Also why 7.2.9 and not something newer?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 12:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326785#M598033</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-09-03T12:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture - Automatic Redirection to Client Provisioning Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326795#M598035</link>
      <description>&lt;P&gt;No I haven't looked at &lt;SPAN&gt;redirectionless&amp;nbsp;&lt;/SPAN&gt; posture.&lt;BR /&gt;&lt;BR /&gt;7.2.9 because we still have Firepower 4110's that are incompatible with anything above 7.2. Moving away from these in the future.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 12:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326795#M598035</guid>
      <dc:creator>Danny Dulin</dc:creator>
      <dc:date>2025-09-03T12:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture - Automatic Redirection to Client Provisioning Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326804#M598036</link>
      <description>&lt;P&gt;Got it, I would highly recommend looking at redirectionless posture instead. It's a much better user experience.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firepower-ngfw/firepower-4110-series-security-appliances-eol.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/firepower-ngfw/firepower-4110-series-security-appliances-eol.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 12:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326804#M598036</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-09-03T12:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Posture - Automatic Redirection to Client Provisioning Portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326807#M598037</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (322).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/251324i18617E359A047995/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (322).png" alt="Screenshot (322).png" /&gt;&lt;/span&gt;&lt;BR /&gt;check posture in client side&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 12:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-posture-automatic-redirection-to-client-provisioning-portal/m-p/5326807#M598037</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-03T12:55:21Z</dc:date>
    </item>
  </channel>
</rss>

