<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAC Causing Delayed Compliance Check and Session Blocking in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nac-causing-delayed-compliance-check-and-session-blocking/m-p/1204703#M122964</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• When a new user connects to the network, NAC takes approximately 10 minutes to identify the user and check compliance status.&lt;BR /&gt;• If the user is deemed non-compliant after the check, all new sessions are blocked by the firewall, as expected. However, existing sessions that were established before the compliance check continue to function and are not being terminated.&lt;BR /&gt;• This behavior allows non-compliant users to continue using their previously established sessions, which poses a security concern.&lt;BR /&gt;&lt;BR /&gt;I would appreciate your guidance on the following:&lt;BR /&gt;1. Is there a way to configure the firewall to terminate all active sessions for non-compliant users immediately upon receiving the compliance status from NAC?&lt;BR /&gt;2. Are there any recommended best practices or configurations to reduce the delay in identifying and enforcing compliance policies?&lt;/P&gt;
&lt;P&gt;• Firewall Model: PA-3250&lt;BR /&gt;• PAN-OS Version: 10.2.8-h15&lt;BR /&gt;• Integration Method: RADIUS, API, etc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chandrashekhar&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jan 2025 12:54:04 GMT</pubDate>
    <dc:creator>ChandrashekharD</dc:creator>
    <dc:date>2025-01-21T12:54:04Z</dc:date>
    <item>
      <title>NAC Causing Delayed Compliance Check and Session Blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nac-causing-delayed-compliance-check-and-session-blocking/m-p/1204703#M122964</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• When a new user connects to the network, NAC takes approximately 10 minutes to identify the user and check compliance status.&lt;BR /&gt;• If the user is deemed non-compliant after the check, all new sessions are blocked by the firewall, as expected. However, existing sessions that were established before the compliance check continue to function and are not being terminated.&lt;BR /&gt;• This behavior allows non-compliant users to continue using their previously established sessions, which poses a security concern.&lt;BR /&gt;&lt;BR /&gt;I would appreciate your guidance on the following:&lt;BR /&gt;1. Is there a way to configure the firewall to terminate all active sessions for non-compliant users immediately upon receiving the compliance status from NAC?&lt;BR /&gt;2. Are there any recommended best practices or configurations to reduce the delay in identifying and enforcing compliance policies?&lt;/P&gt;
&lt;P&gt;• Firewall Model: PA-3250&lt;BR /&gt;• PAN-OS Version: 10.2.8-h15&lt;BR /&gt;• Integration Method: RADIUS, API, etc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chandrashekhar&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 12:54:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nac-causing-delayed-compliance-check-and-session-blocking/m-p/1204703#M122964</guid>
      <dc:creator>ChandrashekharD</dc:creator>
      <dc:date>2025-01-21T12:54:04Z</dc:date>
    </item>
  </channel>
</rss>

