<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 3.3 patch-7 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329366#M598140</link>
    <description>Hello Leo, no they are not AP endpoints. The endpoints are mostly PC's connected through IP phones to the access switch or just the PC connected to the access switch port. I had forgot to mention before that the patch 7 was applied on already running patch 6 ISE v3.3.&lt;BR /&gt;</description>
    <pubDate>Thu, 11 Sep 2025 16:20:08 GMT</pubDate>
    <dc:creator>henry.astorga</dc:creator>
    <dc:date>2025-09-11T16:20:08Z</dc:date>
    <item>
      <title>Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313570#M597457</link>
      <description>&lt;P&gt;Good morning technology people,&lt;/P&gt;&lt;P&gt;Has anyone applied patch-7 on your 3.3 ISE environment?&amp;nbsp; I am almost 100% that this patch is NOT thoroughly tested by Cisco prior to releasing it.&amp;nbsp; I have to patch my 3.3 patch-6 system in about two weeks (due to security issues).&amp;nbsp; I would like to know if anyone has run into any issues after applying patch-7.&lt;/P&gt;&lt;P&gt;TIA...&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 12:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313570#M597457</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2025-07-24T12:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313619#M597459</link>
      <description>&lt;LI-CODE lang="markup"&gt; I am almost 100% that this patch is NOT thoroughly tested by Cisco prior to releasing it.&lt;/LI-CODE&gt;
&lt;P&gt;Its all depends on environment, i am testing in my Lab, have some good testing once, not seen any issue, if you have distributed environment apply the patch to one of the node and monitor., if any issue we always rely on TAC, since they are SME to answer.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 14:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313619#M597459</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-07-24T14:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313749#M597461</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I already applied &lt;STRONG&gt;ISE 3.3 P7&lt;/STRONG&gt; on &lt;STRONG&gt;ISE Clusters&lt;/STRONG&gt; with &lt;STRONG&gt;4x Nodes&lt;/STRONG&gt;, &lt;STRONG&gt;12x Nodes&lt;/STRONG&gt; and &lt;STRONG&gt;14x Nodes&lt;/STRONG&gt; ... so far so good !!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: &lt;STRONG&gt;VM Clusters&lt;/STRONG&gt; using &lt;STRONG&gt;3755&lt;/STRONG&gt; and &lt;STRONG&gt;3795&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps !!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 18:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313749#M597461</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-07-24T18:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313784#M597466</link>
      <description>&lt;P&gt;I applied patch 7 on top of patch 6 in two separate deployments. In both cases, no issues. But in the second deployment (large distributed) one of my PSNs didn't take the patch and, even after multiple reboots and application resets, I could not revive the node - it was trashed. I deleted and rebuilt the VM. Very odd, because this deployment has been patched a few times and never had any issues. I give my PSN's 300GB disk, and I wonder if that is truly too small, because the issue might have been related to the database that didn't recover. Even though it was just a PSN, I think there comes a point (bug) where the Oracle just gets trashed because of the 300GB. There is plenty of free disk - but not on the database partition. No idea - I didn't open a TAC case for this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 20:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313784#M597466</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-07-24T20:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313798#M597468</link>
      <description>&lt;P class="lia-align-justify"&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;interesting ... all the Cluster that I upgraded to &lt;STRONG&gt;3.3 P7&lt;/STRONG&gt; were &lt;STRONG&gt;600GB&lt;/STRONG&gt; (PAN and PSN) and &lt;STRONG&gt;2TB&lt;/STRONG&gt;&amp;nbsp;(MnT).&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 21:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5313798#M597468</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-07-24T21:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5321851#M597841</link>
      <description>&lt;P&gt;After upgrading from &lt;STRONG&gt;ISE 3.3.0 Patch 6 to Patch 7&lt;/STRONG&gt;, I noticed the following issue:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;When devices lose their connection to ISE and then reconnect, &lt;STRONG&gt;users configured in ISE are unable to log in&lt;/STRONG&gt; to the devices.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The following error is shown:&lt;BR /&gt;13017 Received TACACS+ packet from unknown Network Device or AAA Client&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;BR /&gt;Deleting and re-adding the affected device in ISE resolves the issue and normal login is restored.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Impact:&lt;/STRONG&gt;&lt;BR /&gt;This affects any device that temporarily loses connection with ISE and then tries to authenticate, causing administrative logins to fail until the device is re-registered.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Request:&lt;/STRONG&gt;&lt;BR /&gt;Has anyone else observed this behavior on Patch 7? Is there a recommended fix or a planned patch addressing this issue?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 19 Aug 2025 07:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5321851#M597841</guid>
      <dc:creator>muinclude</dc:creator>
      <dc:date>2025-08-19T07:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329018#M598089</link>
      <description>&lt;P&gt;Hello Sir, I have installed patch 7 on my v3.3 deployment which has been running for several weeks now and the new issues I have seen is that IP addresses are sometimes not showing up on endpoint profiles in Context Visibility. The same issue is now seen on my Catalyst 9K switches where the IP address does not show up on some ports when running a "show auth sess" with detail. I have a couple TAC cases open and they say they are aware of the issue and are working for a fix.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 15:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329018#M598089</guid>
      <dc:creator>henry.astorga</dc:creator>
      <dc:date>2025-09-10T15:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329083#M598097</link>
      <description>&lt;P&gt;What exactly are you basing that statement on? lol&lt;/P&gt;
&lt;P&gt;I have it on several deployments with zero issues.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 19:57:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329083#M598097</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-09-10T19:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329116#M598102</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/110071"&gt;@henry.astorga&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;SPAN&gt;The same issue is now seen on my Catalyst 9K switches where the IP address does not show up on some ports when running a "show auth sess" with detail. I have a couple TAC cases open and they say they are aware of the issue and are working for a fix.&lt;/SPAN&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Are these endpoints Cisco APs?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 23:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329116#M598102</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2025-09-10T23:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329179#M598110</link>
      <description>&lt;LI-CODE lang="markup"&gt; TAC cases open and they say they are aware of the issue and are working for a fix.&lt;/LI-CODE&gt;
&lt;P&gt;this is very interesting to hear from TAC, what is the issue ? did they gave any reference open bug ?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2025 06:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329179#M598110</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-09-11T06:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329312#M598133</link>
      <description>&lt;P&gt;Several minor and critical issues after going from 3.3 patch-6 to patch-7:&lt;/P&gt;&lt;P&gt;- Backup is working properly but I get a message in syslog that "Alarms: No Configuration Backup Scheduled".&amp;nbsp; Had to disable/enable backup for the message to disappear,&lt;/P&gt;&lt;P&gt;- Secondary Admin/Primary MnT stopped replicating to the Primary Admin/Secondary MnT.&amp;nbsp; The process on this node was messed up so bad that I didn't receive email notification.&amp;nbsp; Worse, it also lost connectivity to Active Directory.&amp;nbsp; Had to reboot the node to resolve the issue.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2025 13:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329312#M598133</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2025-09-11T13:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329366#M598140</link>
      <description>Hello Leo, no they are not AP endpoints. The endpoints are mostly PC's connected through IP phones to the access switch or just the PC connected to the access switch port. I had forgot to mention before that the patch 7 was applied on already running patch 6 ISE v3.3.&lt;BR /&gt;</description>
      <pubDate>Thu, 11 Sep 2025 16:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329366#M598140</guid>
      <dc:creator>henry.astorga</dc:creator>
      <dc:date>2025-09-11T16:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329377#M598142</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I already applied Cisco ISE 3.3 Patch 7 and its running without any issues.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2025 16:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329377#M598142</guid>
      <dc:creator>Leonardo Santana</dc:creator>
      <dc:date>2025-09-11T16:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329462#M598145</link>
      <description>&lt;P&gt;Please check if the IP address are shown in device tracking:&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;sh device-tracking database&lt;/LI-CODE&gt;
&lt;P&gt;We have issues where the command "sh authentication sessions interface &amp;lt;PORT&amp;gt; detail" does not display the IP address of the endpoint but this is mostly happening to some switches and not all.&amp;nbsp; I attribute this behaviour to something misconfigured in the switch because the vast majority of our switches (classic IOS and IOS-XE) are fine.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2025 21:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329462#M598145</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2025-09-11T21:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.3 patch-7</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329465#M598146</link>
      <description>Leo, they do show up in device tracking. I have a TAC case open so not sure you can come up with anything more than what TAC is working on. We have checked all that related output and that is why its such an odd problem. TAC case is still in progress to figure out root cause.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Henry&lt;BR /&gt;</description>
      <pubDate>Thu, 11 Sep 2025 21:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-3-patch-7/m-p/5329465#M598146</guid>
      <dc:creator>henry.astorga</dc:creator>
      <dc:date>2025-09-11T21:53:03Z</dc:date>
    </item>
  </channel>
</rss>

