<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Node Failure &amp; Pre-Auth ACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235178#M126023</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) for that you have a "critical auth vlan" that you can assign in case that no RADIUS-server is available. You already have that in your config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;authentication event server dead action authorize vlan XXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) My default-acl is typically not that permissive as yours:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list extended PORT-DEFAULT-ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! allow DHCP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any eq bootpc any bootps&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! allow dns to DNS-server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any host 10.10.10.1 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any host 10.10.10.2 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! PING is fine&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit icmp any any echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! PXE is ok&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any any eq tftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with your ACL, an unauthenticated user already has full access to your domain-controller which is far too much in my opinion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Jul 2013 12:01:09 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2013-07-08T12:01:09Z</dc:date>
    <item>
      <title>ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235177#M126022</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know that, what should be the best practice configuration for following points,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Network access for end users/devices if both ISE nodes become unreachable ? how we can make sure that full network access should be granted if both ISE nodes become unavailable. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) What is the best practice for pre-auth ACL configuration if IP Phones are also in the network ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the port configuration and pre-auth ACL which I am using in my network,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface Fa0/1&lt;/P&gt;&lt;P&gt;switchport access vlan 30&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport voice vlan 40&lt;/P&gt;&lt;P&gt;ip access-group ISE-ACL-DEFAULT in&lt;/P&gt;&lt;P&gt;authentication event fail action authorize vlan 30&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan 30&lt;/P&gt;&lt;P&gt;authentication event server alive action reinitialize&lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt;authentication open&lt;/P&gt;&lt;P&gt;authentication order dot1x mab&lt;/P&gt;&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;&lt;P&gt;authentication port-control auto&lt;/P&gt;&lt;P&gt;authentication periodic&lt;/P&gt;&lt;P&gt;authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt;authentication violation protect&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; dot1x pae authenticator&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 5&lt;/P&gt;&lt;P&gt;*****************************************&lt;/P&gt;&lt;P&gt;ip access-list extended ISE-ACL-DEFAULT&lt;/P&gt;&lt;P&gt;remark DHCP&lt;/P&gt;&lt;P&gt;permit udp any eq bootpc any eq bootps&lt;/P&gt;&lt;P&gt;remark DNS and Domain Controllers&lt;/P&gt;&lt;P&gt;permit ip any host 172.22.35.11&lt;/P&gt;&lt;P&gt;permit ip any host 172.22.35.12&lt;/P&gt;&lt;P&gt;remark Ping&lt;/P&gt;&lt;P&gt;permit icmp any any&lt;/P&gt;&lt;P&gt;remark PXE / TFTP&lt;/P&gt;&lt;P&gt;permit udp any any eq tftp&lt;/P&gt;&lt;P&gt;remark Deny All&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mujeeb&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235177#M126022</guid>
      <dc:creator>rmujeeb81</dc:creator>
      <dc:date>2019-03-11T03:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235178#M126023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) for that you have a "critical auth vlan" that you can assign in case that no RADIUS-server is available. You already have that in your config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;authentication event server dead action authorize vlan XXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) My default-acl is typically not that permissive as yours:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list extended PORT-DEFAULT-ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! allow DHCP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any eq bootpc any bootps&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! allow dns to DNS-server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any host 10.10.10.1 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any host 10.10.10.2 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! PING is fine&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit icmp any any echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ! PXE is ok&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit udp any any eq tftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with your ACL, an unauthenticated user already has full access to your domain-controller which is far too much in my opinion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 12:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235178#M126023</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-07-08T12:01:09Z</dc:date>
    </item>
    <item>
      <title>ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235179#M126024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About question 1,&amp;nbsp; since you're using&amp;nbsp; "authentication host-mode multi-domain" then &lt;STRONG&gt;"authentication event server dead action authorize vlan X"&lt;/STRONG&gt; is the way to go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you are using "authentication host-mode multi-auth" then you should use "&lt;STRONG&gt;authentication event server dead action reinitialize vlan X"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;About question 2 it's not mandatory to use pre-auth ACL. My current deployment have IP phones , since I use radius profiling and CDP then ISE can detect and authorize the IP phones even though the switch blocks all packets. That' why I don't need pre-auth ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 03:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235179#M126024</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2013-07-09T03:42:29Z</dc:date>
    </item>
    <item>
      <title>ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235180#M126025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using following configuration on the ports,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface Fa0/1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;switchport access vlan 30&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport voice vlan 40&lt;/P&gt;&lt;P&gt;ip access-group &lt;STRONG&gt;ISE-ACL-DEFAULT in&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;authentication event fail action authorize vlan 30 &lt;STRONG&gt;----&amp;gt; What would be the behaviour due to this command ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan 30 &lt;STRONG&gt;---&amp;gt; So in case if ISE nodes are unavailable then this port will be in VLAN 30 which is the actual VLAN ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;authentication event server alive action reinitialize &lt;STRONG&gt;---&amp;gt; This command will re-initialize the authentication process if ISE nodes becomes available ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt;authentication open&lt;/P&gt;&lt;P&gt;authentication order dot1x mab&lt;/P&gt;&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;&lt;P&gt;authentication port-control auto&lt;/P&gt;&lt;P&gt;authentication periodic&lt;/P&gt;&lt;P&gt;authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt;authentication violation protect&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; dot1x pae authenticator&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since I am using following ACL on the ports then user will have network access according to following ACL in case ISE nodes are unavailable ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended ISE-ACL-DEFAULT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;remark DHCP&lt;/P&gt;&lt;P&gt;permit udp any eq bootpc any eq bootps&lt;/P&gt;&lt;P&gt;remark DNS and Domain Controllers&lt;/P&gt;&lt;P&gt;permit ip any host 172.22.35.11&lt;/P&gt;&lt;P&gt;permit ip any host 172.22.35.12&lt;/P&gt;&lt;P&gt;remark Ping&lt;/P&gt;&lt;P&gt;permit icmp any any&lt;/P&gt;&lt;P&gt;remark PXE / TFTP&lt;/P&gt;&lt;P&gt;permit udp any any eq tftp&lt;/P&gt;&lt;P&gt;remark Deny All&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 10:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235180#M126025</guid>
      <dc:creator>rmujeeb81</dc:creator>
      <dc:date>2013-07-09T10:00:57Z</dc:date>
    </item>
    <item>
      <title>ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235181#M126026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See replies inline:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication event fail action authorize vlan 30----&amp;gt; What would be the behaviour due to this command ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the supplicant fails authentication, the port is&amp;nbsp; moved to a restricted VLAN, and an EAP success message is sent to the&amp;nbsp; supplicant because it is not notified of the actual authentication&amp;nbsp; failure. If the EAP success message is not sent, the supplicant tries to&amp;nbsp; authenticate every 60 seconds (the default) by sending an EAP-start&amp;nbsp; message. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize&amp;nbsp; vlan 30 ---&amp;gt; So in case if ISE nodes are unavailable then this port&amp;nbsp; will be in VLAN 30 which is the actual VLAN ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above&amp;nbsp; command is used to configure a port to send both new and existing hosts&amp;nbsp; to the critical VLAN when the RADIUS server is unavailable. Use this&amp;nbsp; command for ports in multiple authentication (multiauth) mode or if the&amp;nbsp; voice domain of the port is in MDA mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication event server alive action reinitialize&amp;nbsp; ---&amp;gt; This command will re-initialize the authentication process if&amp;nbsp; ISE nodes becomes available ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be used to&amp;nbsp; reinitialize an authorized Auth Manager session when a previously&amp;nbsp; unreachable authentication, authorization, and accounting server becomes&amp;nbsp; available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 11:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235181#M126026</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-09T11:34:57Z</dc:date>
    </item>
    <item>
      <title>ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235182#M126027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I should remove following command from ports as we don't have critical VLAN in our setup ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication event fail action authorize &lt;STRONG&gt;vlan 30&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly note that &lt;STRONG&gt;vlan 30&lt;/STRONG&gt; is the actual data vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**********************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the "authentication event fail action authorize vlan 30" command port will have vlan 30 if ISE node become unreachable but we have following ACL on all ports so users will get very limited access,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended ISE-ACL-DEFAULT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;remark DHCP&lt;/P&gt;&lt;P&gt;permit udp any eq bootpc any eq bootps&lt;/P&gt;&lt;P&gt;remark DNS and Domain Controllers&lt;/P&gt;&lt;P&gt;permit ip any host 172.22.35.11&lt;/P&gt;&lt;P&gt;permit ip any host 172.22.35.12&lt;/P&gt;&lt;P&gt;remark Ping&lt;/P&gt;&lt;P&gt;permit icmp any any&lt;/P&gt;&lt;P&gt;remark PXE / TFTP&lt;/P&gt;&lt;P&gt;permit udp any any eq tftp&lt;/P&gt;&lt;P&gt;remark Deny All&lt;/P&gt;&lt;P&gt;deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, should I modify this ACL or completely remove ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mujeeb&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jul 2013 08:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235182#M126027</guid>
      <dc:creator>rmujeeb81</dc:creator>
      <dc:date>2013-07-11T08:05:04Z</dc:date>
    </item>
    <item>
      <title>ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235183#M126028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly guide on the queries which I posted in the latest response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 18:16:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235183#M126028</guid>
      <dc:creator>rmujeeb81</dc:creator>
      <dc:date>2013-07-13T18:16:42Z</dc:date>
    </item>
    <item>
      <title>ISE Node Failure &amp; Pre-Auth ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235184#M126029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess you wanted to talk about this command&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authentication event server dead action authorize&amp;nbsp; vlan 30&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you mentioned the below mentioned command in you last post&lt;/P&gt;&lt;P&gt;authentication event fail action authorize&lt;STRONG&gt; vlan 30&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you've not configured critical vlan then you can remove this command: &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authentication event server dead action authorize&amp;nbsp; vlan 30 &lt;/STRONG&gt;because this actually enables the critical auth (aka inaccessible AuthenticationBypass) feature on the port. With this feature enabled, If an IEEE 802.1x authentication fails because the AAA server is unavailable, the switch can be configured to allow clients access to a special VLAN (sometimes called the "Critical VLAN") that provides configurable access to the network. The Critical VLAN can be any VLAN except for the voice VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 19:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235184#M126029</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-13T19:06:49Z</dc:date>
    </item>
    <item>
      <title>Hello, We have an issue with</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235185#M126030</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an issue with the "authentication event server alive action reinitialize".&lt;/P&gt;&lt;P&gt;- The critical auth (if server dead) works fine &amp;gt; the users move to vlan 43&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;authentication event server alive action reinitialize: when the ISE is back to alive, the 802.1X process is reinitialized, the users get their Vlan and Dacl (dynamic vlan et acl). The problem is that it seems they dont make an IP DHCP request, and they cant communicate in their Vlan - if we unplug/plug cable (or shut/no shut) the port, the process works fine, and they get an ip address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/12&lt;/P&gt;&lt;P&gt;&amp;nbsp;description Port-NAC&lt;BR /&gt;&amp;nbsp;switchport access vlan 43&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication event server dead action authorize vlan 43&lt;BR /&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication violation replace&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change added&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change removed&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout quiet-period 5&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 2&lt;BR /&gt;&amp;nbsp;dot1x timeout supp-timeout 2&lt;BR /&gt;&amp;nbsp;dot1x max-req 1&lt;BR /&gt;&amp;nbsp;macro description Port-NAC&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;&amp;nbsp;spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Port with DEAD server &amp;gt; see the screenshot&lt;/P&gt;&lt;P&gt;Reintialize &amp;gt; see the screenshot / we will notice the Vlan and Dacl are OK / but no IP ADDRESS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have an idea...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2014 09:59:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235185#M126030</guid>
      <dc:creator>GERALD LECAILLIER</dc:creator>
      <dc:date>2014-08-06T09:59:04Z</dc:date>
    </item>
    <item>
      <title>Hello Karsten,please, in your</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235186#M126031</link>
      <description>&lt;P&gt;Hello Karsten,&lt;/P&gt;&lt;P&gt;please, in your enviroment, without the access to domain controller before authentication, what happens when an user try to access a computer for first time?&lt;/P&gt;&lt;P&gt;Do you use Anyconnect NAM as supplicant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2015 22:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235186#M126031</guid>
      <dc:creator>andre.ortega</dc:creator>
      <dc:date>2015-02-11T22:38:41Z</dc:date>
    </item>
    <item>
      <title>Hello there,I got the same</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235187#M126032</link>
      <description>&lt;P&gt;Hello there,&lt;BR /&gt;I got the same doubt.&lt;BR /&gt;I can use&amp;nbsp;&lt;STRONG&gt;authentication event server dead action authorize vlan XX&lt;/STRONG&gt;, but If I am using pre authentication ACL the access will be limited, isn't it?&lt;BR /&gt;Regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2015 12:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235187#M126032</guid>
      <dc:creator>andre.ortega</dc:creator>
      <dc:date>2015-02-12T12:56:16Z</dc:date>
    </item>
    <item>
      <title>It is not a big risk if the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235188#M126033</link>
      <description>&lt;P&gt;It is not a big risk if the default port ACL seems too permissive as long as you make sure ISE authorization rules assign a proper dynamic ACL by all means.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Feb 2015 18:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235188#M126033</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2015-02-15T18:15:51Z</dc:date>
    </item>
    <item>
      <title> Absolutely! Such a</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235189#M126036</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Absolutely! Such a disappointing solution. You'll notice this question is skirted around. You can use EEM scripts to add lines to the pre auth acl but it really feels like a bodge. Obviously you'll have to remove these lines too.&amp;nbsp; Feature request needed to be able to specify an acl which will be applied when critical vlan is applied. Cisco need to start listening and start thinking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2015 06:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-pre-auth-acl/m-p/2235189#M126036</guid>
      <dc:creator>bikespace</dc:creator>
      <dc:date>2015-05-12T06:44:30Z</dc:date>
    </item>
  </channel>
</rss>

