<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE authentication fail during windows re-logon in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295671#M154207</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Possible Causes&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;This could be either a MAB or 802.1X authentication issue.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;The authorization profile could be missing the Cisco av-pair=”device-traffic-class=voice” attribute. As a result, the switch does not recognize the traffic on the voice VLAN.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;The administrator did not add the endpoint as static identity, or did not allow an unregistered endpoint to pass. create a policy rule to (“Continue/Continue/Continue” upon failure).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Resolution &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Verify that the Authorization Policy is framed properly for groups and conditions, and check to see whether the IP phone is profiled as an “IP phone”or as a “Cisco-device.”&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Verify the switch port configuration for multidomain and voice VLAN configuration.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Add the continue/continue/continue to allow the endpoint to pass:&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;Choose &lt;STRONG&gt;Policy &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authentication &amp;gt; Allowed&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Protocols &lt;/STRONG&gt;to create a Protocol Policy. MAC authentications use PAP/ASCII and EAP-MD5 protocols. Enable the following MAB Protocols settings:&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Process Host Lookup&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;PAP/ASCII&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Detect PAP as Host Lookup&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;EAP-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Detect EAP-MD5 as Host Lookup&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;From the main menu, choose &lt;STRONG&gt;Policy &amp;gt; Authentication&lt;/STRONG&gt;.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Change the authentication method from Simple to Rule-Based&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Use the action icon to create new Authentication Method entries for MAB:&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Name: MAB&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Condition: IF MAB RADIUS:Service-Type == Call Check&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Protocols: allow protocols MAB_Protocols and use&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Identity Source: Internal&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Hosts: Continue/Continue/Continue&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Sep 2013 07:23:45 GMT</pubDate>
    <dc:creator>Muhammad Munir</dc:creator>
    <dc:date>2013-09-06T07:23:45Z</dc:date>
    <item>
      <title>ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295669#M154181</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Background:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Deployed a Cisco ISE 1.1.2. that is used to authenticate and posture validate for wired users, attached to Cisco IP Phones. Backend database is Microsoft AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;At the first time both, users and IP Phones, pass authentication and posture validation steps successfully. When the user logs off from windows, the log off is done whithout any problem, and I can see it switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem takes place when the user try to log on again. The ise does not match the configured authenticion rules as in the first time, and put the user directly to default "DenyAccess" policy (rule).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone out there experienced something similar or have any ideas on why this is happening?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295669#M154181</guid>
      <dc:creator>Paulo Moreira Magalhaes</dc:creator>
      <dc:date>2019-03-26T00:30:57Z</dc:date>
    </item>
    <item>
      <title>ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295670#M154192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco ISE network enforcement points (switches) may be missing key configuration commands, may be assigning the wrong port (i.e., a port other than 1700), or have an incorrect or incorrectly entered key. &lt;/P&gt;&lt;P&gt;Ensure the following commands are present in the switch configuration file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;/P&gt;&lt;P&gt;client &lt;EM&gt;&lt;MONITORING_NODE_IP_ADDRESS&gt;&lt;/MONITORING_NODE_IP_ADDRESS&gt;&lt;/EM&gt; server-key &lt;EM&gt;&lt;RADIUS_KEY&gt;&lt;/RADIUS_KEY&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2013 19:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295670#M154192</guid>
      <dc:creator>blenka</dc:creator>
      <dc:date>2013-09-05T19:14:22Z</dc:date>
    </item>
    <item>
      <title>ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295671#M154207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Possible Causes&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;This could be either a MAB or 802.1X authentication issue.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;The authorization profile could be missing the Cisco av-pair=”device-traffic-class=voice” attribute. As a result, the switch does not recognize the traffic on the voice VLAN.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;The administrator did not add the endpoint as static identity, or did not allow an unregistered endpoint to pass. create a policy rule to (“Continue/Continue/Continue” upon failure).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Resolution &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Verify that the Authorization Policy is framed properly for groups and conditions, and check to see whether the IP phone is profiled as an “IP phone”or as a “Cisco-device.”&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Verify the switch port configuration for multidomain and voice VLAN configuration.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Add the continue/continue/continue to allow the endpoint to pass:&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;Choose &lt;STRONG&gt;Policy &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authentication &amp;gt; Allowed&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Protocols &lt;/STRONG&gt;to create a Protocol Policy. MAC authentications use PAP/ASCII and EAP-MD5 protocols. Enable the following MAB Protocols settings:&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Process Host Lookup&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;PAP/ASCII&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Detect PAP as Host Lookup&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;EAP-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Detect EAP-MD5 as Host Lookup&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;From the main menu, choose &lt;STRONG&gt;Policy &amp;gt; Authentication&lt;/STRONG&gt;.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Change the authentication method from Simple to Rule-Based&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;Use the action icon to create new Authentication Method entries for MAB:&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Name: MAB&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Condition: IF MAB RADIUS:Service-Type == Call Check&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Protocols: allow protocols MAB_Protocols and use&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Identity Source: Internal&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;STRONG&gt;– &lt;/STRONG&gt;Hosts: Continue/Continue/Continue&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Sep 2013 07:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295671#M154207</guid>
      <dc:creator>Muhammad Munir</dc:creator>
      <dc:date>2013-09-06T07:23:45Z</dc:date>
    </item>
    <item>
      <title>ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295672#M154223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please refer to the discussion below&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2188052"&gt;https://supportforums.cisco.com/thread/2188052&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Sep 2013 04:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295672#M154223</guid>
      <dc:creator>Saurav Lodh</dc:creator>
      <dc:date>2013-09-07T04:36:40Z</dc:date>
    </item>
    <item>
      <title>ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295673#M154253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Troubleshooting Steps: &lt;/P&gt;&lt;P&gt;&lt;A name="wp1054542"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Choose Monitor &amp;gt; Authentications. &lt;/P&gt;&lt;P&gt;&lt;A name="wp1046048"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Scroll over and look for the "Failure reason." &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please Look for the details of the failed authentication record and click on the failure reason link under &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Details &amp;gt; Resolution for the Authentication&lt;/STRONG&gt;. The failure reason should be listed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct the failure reason per the findings that are defined in the Possible Causes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Sep 2013 00:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295673#M154253</guid>
      <dc:creator>Naveen Kumar</dc:creator>
      <dc:date>2013-09-08T00:01:38Z</dc:date>
    </item>
    <item>
      <title>ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295674#M154299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Check the Cisco ISE dashboard (Monitor &amp;gt; Authentications)&amp;nbsp; for any indication regarding the nature of RADIUS communication loss.&amp;nbsp; (Look for instances of your specified RADIUS usernames and scan the&amp;nbsp; system messages that are associated with any error message entries.) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058895"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Log into the Cisco ISE CLI&lt;SUP&gt; &lt;/SUP&gt; and enter the following command to produce RADIUS attribute output that may aid in debugging connection issues: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058896"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; test aaa group radius &lt;USERNAME&gt; &lt;PASSWORD&gt; new-code &lt;/PASSWORD&gt;&lt;/USERNAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058897"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; If this test command is successful, you should see the following attributes: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058898"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Connect port &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058899"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Connect NAD IP address &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058900"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Connect Policy Service ISE node IP address &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058901"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Correct server key &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058902"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Recognized username or password &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058903"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Connectivity between the NAD and Policy Service ISE node &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058904"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; You can also use this command to help narrow the focus of the potential&amp;nbsp; problem with RADIUS communication by deliberately specifying incorrect&amp;nbsp; parameter values in the command line and then returning to the&amp;nbsp; administrator dashboard (Monitor &amp;gt; Authentications)&amp;nbsp; to view the type and frequency of error message entries that result&amp;nbsp; from the incorrect command line. For example, to test whether or not&amp;nbsp; user credentials may be the source of the problem, enter a username and&amp;nbsp; or password that you know is incorrect, and then go look for error message entries that are pertinent to that username in the Monitor &amp;gt; Authentications page to see what Cisco ISE is reporting.) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1058905"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;This&amp;nbsp; command does not validate whether or not the NAD is configured to use&amp;nbsp; RADIUS, nor does it verify whether the NAD is configured to use the new&amp;nbsp; AAA model. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Sep 2013 02:14:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295674#M154299</guid>
      <dc:creator>Ravi Singh</dc:creator>
      <dc:date>2013-09-08T02:14:00Z</dc:date>
    </item>
    <item>
      <title>ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295675#M154327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paulo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell us more about the policies? Are you doing machine authentication and does your authentication policy for user authentication also include a condition for machine authentication? If you can provide some screenshots of your authorization policies along with the authentication report, that will help troubleshoot your issue much faster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Sep 2013 06:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295675#M154327</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-09-08T06:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295676#M154370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everyone!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much fore your help and attention!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But before changing any policy statement. I preffer try to find a solution/workaround in client machine side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been doing some tests on the LAB environment, and I think that I find out the way to solve the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to do more consistent tests in production inviroment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution consists in the machine dot1x suplicant side (seet attachement - sorry my windows is in Portuguese).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/2/8/156821-Dot1x.png" class="jive-image" /&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 17:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295676#M154370</guid>
      <dc:creator>Paulo Moreira Magalhaes</dc:creator>
      <dc:date>2013-09-09T17:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authentication fail during windows re-logon</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295677#M154403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The as I metioned before. The I've got the enviromment working fine by enabling only "User Authentication&lt;SPAN style="font-size: 10pt;"&gt;" and "Single Sing On" as showed in picture I sent before.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks every one for helping me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Paulo Magalhães&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;*Please &lt;SPAN style="font-size: 10pt;"&gt;rate helpful posts*&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 13:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-fail-during-windows-re-logon/m-p/2295677#M154403</guid>
      <dc:creator>Paulo Moreira Magalhaes</dc:creator>
      <dc:date>2013-10-04T13:53:39Z</dc:date>
    </item>
  </channel>
</rss>

