04-17-2025 06:11 AM
When I connect to my VPN headend (FTD 7.2.9) I make it through authentication and authorization. ISE recognizes my host as "Posture Unknown", but no browser pops-up automatically with the Client Provisioning Portal. If I open a browser and navigate to an http site, redirection works.
The redirect ACL name is exactly the same on the FTD and in the ISE Authorization Policy.
The redirection ACL denies DNS, DHCP and ISE from redirection and permits all else.
Packet capture shows host never attempts to access an http site over my VPN tunnel, which I suppose is the reason the automatic redirect doesn't work.
I have seen more than one video that demonstrates the browser automatically launching after the VPN connection is established.
Any help will be greatly appreciated.
08-29-2025 12:02 AM
I used OnConnect script (need to be enabled in anyconnect profile to work) that opens http://enroll.cisco.com, IP 72.163.1.80 is configured in split tunnel ACL, and redirect ACL catches it. But, I used this only for external partners & temporary agent. For employees it's better if you preprovision ISEPosture.cfg file and ISE posture agent, and configure ISE hosts in cfg file, then posture client knows where are ISE hosts and can connect to them without browser redirection.
09-03-2025 05:05 AM
Have you looked at redirectionless posture instead? Also why 7.2.9 and not something newer?
09-03-2025 05:37 AM
No I haven't looked at redirectionless posture.
7.2.9 because we still have Firepower 4110's that are incompatible with anything above 7.2. Moving away from these in the future.
09-03-2025 05:51 AM
Got it, I would highly recommend looking at redirectionless posture instead. It's a much better user experience.
09-03-2025 05:55 AM
check posture in client side
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide