<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE 1.1.1. and additional LDAP attribute retrieval in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038409#M185364</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm authenticating users against Active Directory and want to also check additionals attributes from LDAP. In ACS 5.3. it was possible to set this up via External Identity Sequence, but in ISE I don't see this possibility. I can set sequence only for authentication, but not for additional attribute retrieval.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I set a condition in a policy that an LDAP attribute must match with some value, the attribute is not retrieved and autorization ends on default Deny Access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me how this can be set on ISE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karel Navratil&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 02:28:54 GMT</pubDate>
    <dc:creator>Karel Navratil</dc:creator>
    <dc:date>2019-03-11T02:28:54Z</dc:date>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038409#M185364</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm authenticating users against Active Directory and want to also check additionals attributes from LDAP. In ACS 5.3. it was possible to set this up via External Identity Sequence, but in ISE I don't see this possibility. I can set sequence only for authentication, but not for additional attribute retrieval.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I set a condition in a policy that an LDAP attribute must match with some value, the attribute is not retrieved and autorization ends on default Deny Access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me how this can be set on ISE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karel Navratil&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038409#M185364</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2019-03-11T02:28:54Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038410#M185387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am curious to the attribute that you are trying to retrieve, if you are trying to map the memberOf attribute then you can do that in your authorization policy. Or you can retrieve any attribute from Active Directory (external identity sources &amp;gt; Active Directory &amp;gt; Attributes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct that ISE doesnt have the feature like ACS 5 does, but in most cases I have seen this used when authentication is being done to a token server for example and the attributes were pulled from AD. Just curious to see if you need this since you are using AD as your authentication database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 23:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038410#M185387</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-29T23:14:05Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038411#M185400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The intention is to authenticate user against Active Directory and then get an attribute value from company's LDAP server according to stripped username (not AD LDAP). If the attribute matches value Employees than the access is granted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've set up AD connection, I've set up LDAP connection to our company's LDAP ... but cannot find a way how to tell ISE to authenticate user via AD and if the authentication is sucessful retrieve LDAP attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our intention is that not every user in AD will have a privilege to use WLAN. And this is controlled by LDAP attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In past we had a problem on ACS that ACS were not able to get group members from some trusted domains in AD forrest. So we switched to company's LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it's more clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karel &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 23:19:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038411#M185400</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2012-08-29T23:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038412#M185422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What trusts type are you using in your AD infrastructure? If you are using an external trust type (forest level trusts do not allow kerberos authentication) then that should get you past the group retrieval issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can consider the option of using radius proxy feature so you can authenticate to your ACS, and open a TAC case to see when this feature will be available in ISE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 23:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038412#M185422</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-29T23:27:01Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038413#M185438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have no idea about AD infrastructure as this is maintained by different deparment. To proxy authentication requests to ACS is not the option as I want to use EAP-Chaining feature instead of MAR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still cannot believe that features which ACS 5.x has was not implemented into ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 23:49:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038413#M185438</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2012-08-29T23:49:20Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038414#M185456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It caught me off guard also, I assumed it was there till you brought it up and checked the identity store sequence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your best bet is to forward this document over to your AD team to see if they can look into the trust, my bet is that you probably used acs 4 which ran on a windows platform that used ntlm for client authentication against windows. When acs 5.x was re-archtected that protocol changed to kerberos which causes headaches in multi-domain and multi-forest environments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would however request that you open a tac case to see if this is a feature that is expected to be released in 1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a guide that explains this and hopefully the AD folks will understand.....(hopefully ;-))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://blogs.technet.com/b/surama/archive/2009/04/06/kerberos-authentication-problem-with-active-directory.aspx"&gt;http://blogs.technet.com/b/surama/archive/2009/04/06/kerberos-authentication-problem-with-active-directory.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 02:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038414#M185456</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-30T02:55:50Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038415#M185475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE does have the functionality equivalent of identity sequences that are available as in ACS.&amp;nbsp; The implementation is in a slightly different way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ACS would define two separate sequences:&lt;/P&gt;&lt;P&gt;- one for DBs to check for authentication&lt;/P&gt;&lt;P&gt;- one of DBs to check for authorization&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ISE this is implemented slightly differently&lt;/P&gt;&lt;P&gt;- the sequence defines the DBs for authentication only&lt;/P&gt;&lt;P&gt;- if there are additional attributes you want then can refer to them directly in the authorization policy without having to define in a sequence&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case, define the attributes in LDAP and then select them for conditions in the authorization policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 04:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038415#M185475</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2012-08-30T04:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038416#M185486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that's what I've tried as I wrote in my first post, but the ISE does not retrieve the attribute from LDAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are some screenshots:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authorization rule:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="100827" __jive_id="100827" alt="rule.png" class="jive-image-thumbnail jive-image" src="https://community.cisco.com/rule.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;ldap attribute in external identity source:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="100829" __jive_id="100829" alt="ldap.png" class="jive-image-thumbnail jive-image" src="https://community.cisco.com/ldap.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11017&amp;nbsp; RADIUS created a new session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;P&gt;15048&amp;nbsp; Queried PIP&lt;/P&gt;&lt;P&gt;15048&amp;nbsp; Queried PIP&lt;/P&gt;&lt;P&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;P&gt;11507&amp;nbsp; Extracted EAP-Response/Identity&lt;/P&gt;&lt;P&gt;12100&amp;nbsp; Prepared EAP-Request proposing EAP-FAST with challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12102&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response and accepting EAP-FAST as negotiated&lt;/P&gt;&lt;P&gt;12800&amp;nbsp; Extracted first TLS record; TLS handshake started&lt;/P&gt;&lt;P&gt;12805&amp;nbsp; Extracted TLS ClientHello message&lt;/P&gt;&lt;P&gt;12806&amp;nbsp; Prepared TLS ServerHello message&lt;/P&gt;&lt;P&gt;12807&amp;nbsp; Prepared TLS Certificate message&lt;/P&gt;&lt;P&gt;12810&amp;nbsp; Prepared TLS ServerDone message&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;12812&amp;nbsp; Extracted TLS ClientKeyExchange message&lt;/P&gt;&lt;P&gt;12804&amp;nbsp; Extracted TLS Finished message&lt;/P&gt;&lt;P&gt;12801&amp;nbsp; Prepared TLS ChangeCipherSpec message&lt;/P&gt;&lt;P&gt;12802&amp;nbsp; Prepared TLS Finished message&lt;/P&gt;&lt;P&gt;12816&amp;nbsp; TLS handshake succeeded&lt;/P&gt;&lt;P&gt;12149&amp;nbsp; EAP-FAST built authenticated tunnel for purpose of PAC provisioning&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;12209&amp;nbsp; Starting EAP chaining&lt;/P&gt;&lt;P&gt;12218&amp;nbsp; Selected identity type 'User'&lt;/P&gt;&lt;P&gt;12125&amp;nbsp; EAP-FAST inner method started&lt;/P&gt;&lt;P&gt;11521&amp;nbsp; Prepared EAP-Request/Identity for inner EAP method&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;12212&amp;nbsp; Identity type provided by client is equal to requested&lt;/P&gt;&lt;P&gt;11522&amp;nbsp; Extracted EAP-Response/Identity for inner EAP method&lt;/P&gt;&lt;P&gt;11806&amp;nbsp; Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;11808&amp;nbsp; Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;/P&gt;&lt;P&gt;Evaluating Identity Policy&lt;/P&gt;&lt;P&gt;15006&amp;nbsp; Matched Default Rule&lt;/P&gt;&lt;P&gt;15013&amp;nbsp; Selected Identity Store - Internal Endpoints&lt;/P&gt;&lt;P&gt;22043&amp;nbsp; Current Identity Store does not support the authentication method; Skipping it&lt;/P&gt;&lt;P&gt;24210&amp;nbsp; Looking up User in Internal Users IDStore - test,host/test-pc&lt;/P&gt;&lt;P&gt;24216&amp;nbsp; The user is not found in the internal users identity store&lt;/P&gt;&lt;P&gt;24430&amp;nbsp; Authenticating user against Active Directory&lt;/P&gt;&lt;P&gt;24402&amp;nbsp; User authentication against Active Directory succeeded&lt;/P&gt;&lt;P&gt;22037&amp;nbsp; Authentication Passed&lt;/P&gt;&lt;P&gt;11824&amp;nbsp; EAP-MSCHAP authentication attempt passed&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;11810&amp;nbsp; Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;/P&gt;&lt;P&gt;11814&amp;nbsp; Inner EAP-MSCHAP authentication succeeded&lt;/P&gt;&lt;P&gt;11519&amp;nbsp; Prepared EAP-Success for inner EAP method&lt;/P&gt;&lt;P&gt;12128&amp;nbsp; EAP-FAST inner method finished successfully&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;12126&amp;nbsp; EAP-FAST cryptobinding verification passed&lt;/P&gt;&lt;P&gt;12200&amp;nbsp; Approved EAP-FAST client Tunnel PAC request&lt;/P&gt;&lt;P&gt;12219&amp;nbsp; Selected identity type 'Machine'&lt;/P&gt;&lt;P&gt;12125&amp;nbsp; EAP-FAST inner method started&lt;/P&gt;&lt;P&gt;11521&amp;nbsp; Prepared EAP-Request/Identity for inner EAP method&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;12212&amp;nbsp; Identity type provided by client is equal to requested&lt;/P&gt;&lt;P&gt;11522&amp;nbsp; Extracted EAP-Response/Identity for inner EAP method&lt;/P&gt;&lt;P&gt;11806&amp;nbsp; Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;11808&amp;nbsp; Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;/P&gt;&lt;P&gt;Evaluating Identity Policy&lt;/P&gt;&lt;P&gt;11055&amp;nbsp; User name change detected for the session. Attributes for the session will be removed from the cache&lt;/P&gt;&lt;P&gt;15006&amp;nbsp; Matched Default Rule&lt;/P&gt;&lt;P&gt;15013&amp;nbsp; Selected Identity Store - Internal Endpoints&lt;/P&gt;&lt;P&gt;22043&amp;nbsp; Current Identity Store does not support the authentication method; Skipping it&lt;/P&gt;&lt;P&gt;24210&amp;nbsp; Looking up User in Internal Users IDStore - test,host/test-pc&lt;/P&gt;&lt;P&gt;24216&amp;nbsp; The user is not found in the internal users identity store&lt;/P&gt;&lt;P&gt;24431&amp;nbsp; Authenticating machine against Active Directory&lt;/P&gt;&lt;P&gt;24470&amp;nbsp; Machine authentication against Active Directory is successful&lt;/P&gt;&lt;P&gt;22037&amp;nbsp; Authentication Passed&lt;/P&gt;&lt;P&gt;11824&amp;nbsp; EAP-MSCHAP authentication attempt passed&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;11810&amp;nbsp; Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;/P&gt;&lt;P&gt;11814&amp;nbsp; Inner EAP-MSCHAP authentication succeeded&lt;/P&gt;&lt;P&gt;11519&amp;nbsp; Prepared EAP-Success for inner EAP method&lt;/P&gt;&lt;P&gt;12128&amp;nbsp; EAP-FAST inner method finished successfully&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;12126&amp;nbsp; EAP-FAST cryptobinding verification passed&lt;/P&gt;&lt;P&gt;12201&amp;nbsp; Approved EAP-FAST client Machine PAC request&lt;/P&gt;&lt;P&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;P&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;P&gt;15016&amp;nbsp; Selected Authorization Profile - DenyAccess&lt;/P&gt;&lt;P&gt;15039&amp;nbsp; Rejected per authorization profile&lt;/P&gt;&lt;P&gt;12855&amp;nbsp; PAC was not sent due to authorization failure&lt;/P&gt;&lt;P&gt;12105&amp;nbsp; Prepared EAP-Request with another EAP-FAST challenge&lt;/P&gt;&lt;P&gt;11006&amp;nbsp; Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018&amp;nbsp; RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;11105&amp;nbsp; Request received from a device that is configured with KeyWrap in ISE.&lt;/P&gt;&lt;P&gt;12104&amp;nbsp; Extracted EAP-Response containing EAP-FAST challenge-response&lt;/P&gt;&lt;P&gt;11514&amp;nbsp; Unexpectedly received empty TLS message; treating as a rejection by the client&lt;/P&gt;&lt;P&gt;12512&amp;nbsp; Treat the unexpected TLS acknowledge message as a rejection from the client&lt;/P&gt;&lt;P&gt;11504&amp;nbsp; Prepared EAP-Failure&lt;/P&gt;&lt;P&gt;11003&amp;nbsp; Returned RADIUS Access-Reject&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So no any information that ISE tries to retrieve something from LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 08:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038416#M185486</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2012-08-30T08:09:27Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038417#M185494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not only are the authorization poilcies used from a top to bottom (first match approach) they are also processed from the left to the right. Can you try moving the eap chaining from the left to the right, and the ldap condition from the right to the left and post the same results you did above....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 04:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038417#M185494</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-31T04:58:17Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038418#M185503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best way to see the attributes that were received during the evaluation of the request is to look at the authentication details and view the "Other Attributes" informaiton. Attributes retrieved during the policy evaluation should be listed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is hard to make a full assessment without looking at the full authorization policy. Based on the information that I see can confirm Tariq's assessment that if the EAP chaining condition did not evaluation as true then no further conditions in that rule woul dbe evaluated (for performance reasons) and so the LDAP attribute would not be retrived.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 08:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038418#M185503</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2012-08-31T08:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038419#M185507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P id="AUTOGENBOOKMARK_63"&gt;Other Attributes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="margin-top: 0pt; padding-top: 1pt;"&gt;ConfigVersionId=23,Device&amp;nbsp;&amp;nbsp; Port=32769,DestinationPort=1812,RadiusPacketType=AccessRequest,Protocol=Radius,Framed-MTU=1300,State=37CPMSessionID=0a04f83500000020503e264c;31SessionID=dc2ise1v/134934281/15;,Airespace-Wlan-Id=11,DetailedInfo=Authentication&amp;nbsp;&amp;nbsp; succeed,NACRadiusUserName=test,NACRadiusUserName=host/test-pc,CPMSessionID=0a04f83500000020503e264c,EndPointMACAddress=00-24-D6-75-EC-BE&lt;STRONG&gt;,EapChainingResult=User&amp;nbsp; and machine both succeeded&lt;/STRONG&gt;,Device Type=Device Type#All Device&amp;nbsp; Types,Location=Location#All&amp;nbsp; Locations,IdentityAccessRestricted=false,Device IP&amp;nbsp; Address=10.x.y.z,Called-Station-ID=c4-0a-cb-89-07-70:office&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I think, that the EapChainingResult is matched, but no LDAP attributes received.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 09:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038419#M185507</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2012-08-31T09:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038420#M185510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right that dont see the LDAP attribute in the Other Attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two more things I can think of:&lt;/P&gt;&lt;P&gt;1) Use of matches attribute. Following syntax needs to be used&lt;/P&gt;&lt;P&gt;- Starts With: ^(string).*&amp;nbsp; so that ^(172).*&amp;nbsp;&amp;nbsp; as the inputted text would match a string like 172greenbottles&lt;/P&gt;&lt;P&gt;- Ends With: .*(string)$&amp;nbsp;&amp;nbsp; so that .*(211)$ as the inputted text would match a string like hello211&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure about the syntax for contains and will check this a little later (maybe&amp;nbsp; .*(text).*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So can try one of these or just change to an equals operation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Do a stop/start just in case some notifications are missing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 10:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038420#M185510</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2012-08-31T10:56:11Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038421#M185514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, even reload of ISE server didn't help.&lt;/P&gt;&lt;P&gt;To me it looks that it's not doing any checks from external identities. I tried to disable LDAP and use of AD groups, but in authentication log I cannot see any message about group retrieval as I was used from ACS.&lt;/P&gt;&lt;P&gt;I also disabled EAP Chaining support in Policy elements but also without any change.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 06:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038421#M185514</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2012-09-03T06:09:49Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038422#M185517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now I got it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After creating Simple Condition under Authorization in Policy Elements and then using it in Authorization Policy rule it started to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 07:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038422#M185517</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2012-09-03T07:14:42Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038423#M185518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share more details about your solution?&amp;nbsp; I am having a very similiar issue where I do not see AD group attributes in the Other Attributes details and am trying to build my authorization policy to match on a specific AD group (Domain Computers).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 17:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038423#M185518</guid>
      <dc:creator>Brian Schultz</dc:creator>
      <dc:date>2012-09-14T17:26:04Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038424#M185519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure karel configured an authorization condition for this attribute. However your method should work just fine can post a screenshot of your authorization policy and the report of the other attributes when the machines fails to match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Sep 2012 02:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038424#M185519</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-16T02:07:39Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038425#M185520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my idea was to do EAP Chaining with AnyConnect + some other control for the users which one can access and which not. To ensure, that the computer is ours I have set up a rule with condition &lt;/P&gt;&lt;P&gt;"Network Access:EapChainingResult EQUALS User And Machine Both Succeeded" and do additional check for a user in our local LDAP (not AD) directory for internal attribute. If the attribute matches Employee, than the user is granted the access. Internal attribute is controller by our workflows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the AD groups it should work in a similar way. On ACS I remember a problem, that the ACS was not able to retrieve group membership of some of our domains even if the trusts were okay. That's the reason why we switched to our internal LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I found, that it doesn't work like expected. After applying the rule it works, but after cca 20 minutes the access is rejected and the attribute is not retrieved until the rule is deleted and again created / applied). I'm now trying to investigate why this happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 06:50:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038425#M185520</guid>
      <dc:creator>Karel Navratil</dc:creator>
      <dc:date>2012-09-17T06:50:47Z</dc:date>
    </item>
    <item>
      <title>ISE 1.1.1. and additional LDAP attribute retrieval</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038426#M185521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Found the machine was misconfigured for user authentication instead of computer authentication.&amp;nbsp; It is working properly after changing the endpoint to the correct setting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 20:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-1-1-and-additional-ldap-attribute-retrieval/m-p/2038426#M185521</guid>
      <dc:creator>Brian Schultz</dc:creator>
      <dc:date>2012-09-20T20:29:00Z</dc:date>
    </item>
  </channel>
</rss>

