<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you go to the External in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-1-secondary-node/m-p/3071047#M23721</link>
    <description>&lt;P&gt;If you go to the External Identity Source page, do you see the secondary node as joined to the Active directory? If not, you can try running the inbuilt diagnostic tool to troubleshoot why the secondary PSN is not talking to the AD correctly.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/ISE-ADIntegrationDoc/b_ISE-ADIntegration.html#task_013E23768CF044F08C0DAF93902F5D0D&lt;/P&gt;</description>
    <pubDate>Wed, 01 Mar 2017 00:34:24 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-03-01T00:34:24Z</dc:date>
    <item>
      <title>ISE 2.1 + Secondary Node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-secondary-node/m-p/3071046#M23720</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I add to deploy additonal node and it sync fine with primary, Now on WLC I add as radius server also IP secondary node.&lt;BR /&gt;Now sometime when I doing BYOD onboarding and request sent to secondary node, I receive back invalid user/pass, to authenticate username I use my AD in external identity. If I disable in WLC secondary node every things work fine again.&lt;BR /&gt;Seems that secondary node can't speak with AD to process authentication.&lt;/P&gt;
&lt;P&gt;Can you have some idea ? thanks&lt;/P&gt;
&lt;P&gt;M.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-secondary-node/m-p/3071046#M23720</guid>
      <dc:creator>Matteo Abrile</dc:creator>
      <dc:date>2019-03-11T07:30:25Z</dc:date>
    </item>
    <item>
      <title>If you go to the External</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-secondary-node/m-p/3071047#M23721</link>
      <description>&lt;P&gt;If you go to the External Identity Source page, do you see the secondary node as joined to the Active directory? If not, you can try running the inbuilt diagnostic tool to troubleshoot why the secondary PSN is not talking to the AD correctly.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/ISE-ADIntegrationDoc/b_ISE-ADIntegration.html#task_013E23768CF044F08C0DAF93902F5D0D&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 00:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-secondary-node/m-p/3071047#M23721</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-03-01T00:34:24Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-secondary-node/m-p/3071048#M23722</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;it's work now, thanks very much.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;M.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 16:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-secondary-node/m-p/3071048#M23722</guid>
      <dc:creator>Matteo Abrile</dc:creator>
      <dc:date>2017-03-01T16:26:28Z</dc:date>
    </item>
  </channel>
</rss>

