<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ACS 5.1 LDAP group search error in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904948#M192057</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have opened a TAC case but haven't found a solution yet.&amp;nbsp; The ACS only allows one AD Identity Source and we're already using it with another domain so I am limited to using LDAP for this one.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 May 2012 19:03:20 GMT</pubDate>
    <dc:creator>mrpaulhurd</dc:creator>
    <dc:date>2012-05-11T19:03:20Z</dc:date>
    <item>
      <title>Cisco ACS 5.1 LDAP group search error</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904946#M192055</link>
      <description>&lt;P&gt;I have a problem where occasionally a user will attempt to login and the LDAP search will find the user but then fail when it does the group search.&amp;nbsp; The error I get is below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;22037&amp;nbsp; Authentication Passed &lt;/P&gt;&lt;P&gt;22023&amp;nbsp; Proceed to attribute retrieval &lt;/P&gt;&lt;P&gt;24032&amp;nbsp; Sending request to secondary LDAP server &lt;/P&gt;&lt;P&gt;24016&amp;nbsp; Looking up user in LDAP Server - testuser&lt;/P&gt;&lt;P&gt;24004&amp;nbsp; User search finished successfully &lt;/P&gt;&lt;P&gt;24027&amp;nbsp; Groups search ended with an error &lt;/P&gt;&lt;P&gt;24034&amp;nbsp; Secondary server failover. Switching to primary server &lt;/P&gt;&lt;P&gt;24031&amp;nbsp; Sending request to primary LDAP server &lt;/P&gt;&lt;P&gt;24016&amp;nbsp; Looking up user in LDAP Server - testuser &lt;/P&gt;&lt;P&gt;24004&amp;nbsp; User search finished successfully &lt;/P&gt;&lt;P&gt;24027&amp;nbsp; Groups search ended with an error &lt;/P&gt;&lt;P&gt;22059&amp;nbsp; The advanced option that is configured for process failure is used. &lt;/P&gt;&lt;P&gt;22062&amp;nbsp; The 'Drop' advanced option is configured in case of a failed authentication request. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some users never get this error, others will get it once in a while and I have one user that gets it every time they try and login.&amp;nbsp; Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904946#M192055</guid>
      <dc:creator>mrpaulhurd</dc:creator>
      <dc:date>2019-03-11T02:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.1 LDAP group search error</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904947#M192056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same Problem. I raised a case but the support was not good. I solved the problem by switching to AD as Identity store. A query to exactly the same groups here never gave an error. But if you need to use ldap, this is of course no solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you make a tac case, i would like to learn the outcome!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2012 17:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904947#M192056</guid>
      <dc:creator>larsen_2011</dc:creator>
      <dc:date>2012-05-11T17:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.1 LDAP group search error</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904948#M192057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have opened a TAC case but haven't found a solution yet.&amp;nbsp; The ACS only allows one AD Identity Source and we're already using it with another domain so I am limited to using LDAP for this one.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2012 19:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904948#M192057</guid>
      <dc:creator>mrpaulhurd</dc:creator>
      <dc:date>2012-05-11T19:03:20Z</dc:date>
    </item>
    <item>
      <title>Cisco ACS 5.1 LDAP group search error</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904949#M192058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just starting to get these same errors when I changed the LDAP Authentication Server from a FQDN to a domain name, ie.&amp;nbsp; 'mydomain.com', instead of 'host1.mydomain.com' .&amp;nbsp;&amp;nbsp; I am in the process of retiring a couple of domain servers and instead of just specifying one or two servers, I thought that by specifying the domain name, I could talk to any domain controller.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the log shows:&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24028&amp;nbsp; User's attributes are retrieved&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24022&amp;nbsp; User authentication succeeded&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24027&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;Groups search ended with an error&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;&lt;SPAN style="text-decoration: underline;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;I can see if user authentication failed then getting "24027&amp;nbsp; Groups search ended with an error", but user authentication did not fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="S2" style="border-bottom: #808080 1px solid; border-left: #808080 1px solid; margin: 0pt; width: 100%; border-collapse: collapse; font-family: sans-serif; empty-cells: show; font-size: small; border-top: #e3e3e3 1px; border-right: #808080 1px solid;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;11017&amp;nbsp; RADIUS created a new session&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #d9e3e9; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15012&amp;nbsp; Selected Access Service - Default Network Access&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #d9e3e9; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15006&amp;nbsp; Matched Default Rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;15013&amp;nbsp; Selected Identity Store - MY-Servers&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24031&amp;nbsp; Sending request to primary LDAP server&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24015&amp;nbsp; Authenticating user against LDAP Server&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24028&amp;nbsp; User's attributes are retrieved&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24022&amp;nbsp; User authentication succeeded&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #ff0000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;24027&amp;nbsp; Groups search ended with an error&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #ff0000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;22059&amp;nbsp; The advanced option that is configured for process failure is used.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; padding-left: 2pt; padding-right: 2pt; color: #ff0000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;" valign="middle"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt;"&gt;22062&amp;nbsp; The 'Drop' advanced option is configured in case of a failed authentication request.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 16:42:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-1-ldap-group-search-error/m-p/1904949#M192058</guid>
      <dc:creator>charlie-hall</dc:creator>
      <dc:date>2012-06-11T16:42:55Z</dc:date>
    </item>
  </channel>
</rss>

