<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE - IOS bug! in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422187#M124502</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you change the ip of the device in your ISE configuration under &lt;STRONG&gt;Administration &amp;gt; Network Devices&lt;/STRONG&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Nov 2013 20:50:31 GMT</pubDate>
    <dc:creator>xxkozxx</dc:creator>
    <dc:date>2013-11-26T20:50:31Z</dc:date>
    <item>
      <title>ISE - IOS bug!</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422183#M124498</link>
      <description>&lt;P&gt;I am using a stange issue in my environment. I use ISE 1.2 fo as radius server for device management/authentication(Not NAC usage). I am having Cisco c6509E VSS as core device. The device was added to ISE and aaa auth was working fine. I changed IP address of switch during my DC migration. Since then AAA fail for thsi device. ISE report and TCPdump shows old IP. My wireshard capture(SPAN port) also showing old IP in packet header irrespective of radius source interface I use in switch. Debug (radius/aaa) output in switch showing the correct interface addres whcih I&amp;nbsp; use in 'ip radius source-interface'. &lt;/P&gt;&lt;P&gt;Unfortunatly I am unable to restart switch as it is core device in a critical place. It looks like a stange IOS issue. Did any one faced this kind of issues? Please advise how to resolve without restart. Don't know why the switch is always using its old IP to frame radius packet.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:07:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422183#M124498</guid>
      <dc:creator>sudheere</dc:creator>
      <dc:date>2019-03-11T04:07:41Z</dc:date>
    </item>
    <item>
      <title>ISE - IOS bug!</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422184#M124499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Radius source interface on the 6k matches ISE NAD IP for 6k&lt;/LI&gt;&lt;LI&gt;ISE NAD IP was changed when IP on 6k changed&lt;/LI&gt;&lt;LI&gt;Route/Connectivity to/from ISE/6k.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards, &lt;BR /&gt; &lt;BR /&gt;Kevin Sheahan, CCIE # 41349 (Security)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 16:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422184#M124499</guid>
      <dc:creator>Kevin P Sheahan</dc:creator>
      <dc:date>2013-11-25T16:59:11Z</dc:date>
    </item>
    <item>
      <title>ISE - IOS bug!</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422185#M124500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These have been virified. I tried difference source interfaces and even changed&amp;nbsp; MAC addresses of SVIs. I am sniffing interface of ISE appliance to capture radius packets. I wondering how C6509E switch can frame a IP packet with source address not belonging to it. MAC address belongs to the switch but source IP address not belonging to the switch(Its old IP address).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 14:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422185#M124500</guid>
      <dc:creator>sudheere</dc:creator>
      <dc:date>2013-11-26T14:58:58Z</dc:date>
    </item>
    <item>
      <title>ISE - IOS bug!</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422186#M124501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cleared all all aaa/radius related configuration and reconfigured again but probelm remains.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 15:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422186#M124501</guid>
      <dc:creator>sudheere</dc:creator>
      <dc:date>2013-11-26T15:00:51Z</dc:date>
    </item>
    <item>
      <title>ISE - IOS bug!</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422187#M124502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you change the ip of the device in your ISE configuration under &lt;STRONG&gt;Administration &amp;gt; Network Devices&lt;/STRONG&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 20:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422187#M124502</guid>
      <dc:creator>xxkozxx</dc:creator>
      <dc:date>2013-11-26T20:50:31Z</dc:date>
    </item>
    <item>
      <title>ISE - IOS bug!</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422188#M124503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version of code are you running? Also when issue a "debug radius authentication" do you see any errors when pulling the new ip address? Also if you are using radius server groups did you change the source interface under the group configuration also?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 06:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422188#M124503</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-12-01T06:03:11Z</dc:date>
    </item>
    <item>
      <title>ISE - IOS bug!</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422189#M124504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try removing and re-adding the AAA configuration to the switch, to see if that will make the RADIUS service pick the right source interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 20:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ios-bug/m-p/2422189#M124504</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2013-12-03T20:36:22Z</dc:date>
    </item>
  </channel>
</rss>

