<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.3 and Windows AD account lockout in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944652#M309949</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're right I missed that section of your post, I've never experienced an appliance losing a section of the configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However regarding the logging, timestamps will be recorded based on the configured timezone via the clock timezone command in the CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/command/reference/cli_app_a.html#wp1894584"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/command/reference/cli_app_a.html#wp1894584&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'show timezones' will give you the exhaustive list of zones you can use (ie: America/Chicago, etc)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Sep 2012 19:51:11 GMT</pubDate>
    <dc:creator>Travis Hysuick</dc:creator>
    <dc:date>2012-09-21T19:51:11Z</dc:date>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944638#M309906</link>
      <description>&lt;P&gt;Currently on 5.3.0.40.2 when a invalid password is attempted via TACACS or RADIUS to the AD identity store is locks the account out on the first failed attempt. The AD policy is lockout after three attempts. Is there a way to fix this issue so the account is not locked out with only one failed attempt? I see options for local password policys in ACS but nothing for the identity store. For what its worth this happened also with ACS 4.X deployment before we moved to ACS 5.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to see if this is the expected behavior or if I should open a TAC case to see what is causing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944638#M309906</guid>
      <dc:creator>Andy Johnson</dc:creator>
      <dc:date>2019-03-11T01:55:55Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944639#M309911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've encountered this exact issue twice since the patch 2 upgrade, if you have a case open with TAC, I would appreciate if you could please post back and let me know what the resolution invovles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2012 18:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944639#M309911</guid>
      <dc:creator>Travis Hysuick</dc:creator>
      <dc:date>2012-03-21T18:59:05Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944640#M309916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Any updates on this? I'm having the same issue here. I checked the AD log and there are 3 failed attemps from the ACS at the exact same time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 06:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944640#M309916</guid>
      <dc:creator>Jerry Cao</dc:creator>
      <dc:date>2012-06-05T06:50:58Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944641#M309921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We were hitting a bug: CSCty60915. TAC first had me run:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1) SSH to ACS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) acs stop adclient&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3) acs-config (enter your GUI credentials when prompted)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4) ad-agent-configuration adclient.force.salt.lookup true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5) exit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6) acs start adclient&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seemed to fix the issue, but the bug is fixed in, patch 4 on ACS version 5.3,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 13:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944641#M309921</guid>
      <dc:creator>Andy Johnson</dc:creator>
      <dc:date>2012-06-05T13:11:41Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944642#M309925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Andy, I will try the patch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2012 00:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944642#M309925</guid>
      <dc:creator>Jerry Cao</dc:creator>
      <dc:date>2012-06-06T00:47:45Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944643#M309928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same horrible problem, struck earlier in the week, we are dead in water. Patched up to:&lt;/P&gt;&lt;P&gt;Version : 5.3.0.40.6&lt;/P&gt;&lt;P&gt;Internal Build ID : B.839&lt;/P&gt;&lt;P&gt;Patches :&lt;/P&gt;&lt;P&gt;5-3-0-40-6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Had some clock drift and UTC vs Local problems, already fixed those. The "salt" thing did not work:&lt;/P&gt;&lt;P&gt;ecb-acs1/bubba(config-acs)# ad-agent-configuration adclient.force.salt.lookup true&lt;/P&gt;&lt;P&gt;Performing AD agent internal setting modification is only allowed with ACS support approval. continue (y/n)?&lt;/P&gt;&lt;P&gt;Unable to restart AD agent. Define AD configuration or check current AD configuration settings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the tail of the log, some other info. Really need help, thousands of users locked out. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ecb-acs1/admin# sh application status acs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS role: PRIMARY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Process 'database'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Process 'management'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Process 'runtime'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Process 'adclient'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Execution failed&lt;/P&gt;&lt;P&gt;Process 'view-database'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Process 'view-jobmanager'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Process 'view-alertmanager'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Process 'view-collector'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Process 'view-logprocessor'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ecb-acs1/admin# sh logging system tail&lt;/P&gt;&lt;P&gt;ADEOS Platform log:&lt;/P&gt;&lt;P&gt;-----------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sep 20 22:30:23 ecb-acs1 ACS adclient INFO: adclient monitoring already enabled&lt;/P&gt;&lt;P&gt;Sep 20 22:30:45 ecb-acs1 debugd[2754]: [13824]: application:operation cars_install.c[785] [admin]: Application opr initiated for app&lt;/P&gt;&lt;P&gt;name - acs&lt;/P&gt;&lt;P&gt;Sep 20 22:30:45 ecb-acs1 debugd[2754]: [13824]: application:operation cars_install.c[789] [admin]: Verifying app (acs) is installed&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;Sep 20 22:30:45 ecb-acs1 debugd[2754]: [13824]: application:operation cars_install.c[797] [admin]: Reading the manifest init param&lt;/P&gt;&lt;P&gt;Sep 20 22:30:45 ecb-acs1 debugd[2754]: [13824]: application:operation cars_install.c[806] [admin]: Executing init tag&lt;/P&gt;&lt;P&gt;Sep 20 22:30:46 ecb-acs1 admin: [MGMT-active-test] starting&lt;/P&gt;&lt;P&gt;Sep 20 22:30:48 ecb-acs1 admin: [MGMT-active-test] GUI is active&lt;/P&gt;&lt;P&gt;Sep 20 22:30:48 ecb-acs1 admin: [MGMT-active-test] finished&lt;/P&gt;&lt;P&gt;Sep 20 22:30:48 ecb-acs1 debugd[2754]: [13824]: application:operation cars_install.c[814] [admin]: Operation of application complete&lt;/P&gt;&lt;P&gt; - out = ACS role: PRIMARY&amp;nbsp; Process 'database'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running Process 'management'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running Process 'runtime&lt;/P&gt;&lt;P&gt;'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running Process 'adclient'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Execution failed Process 'view-database'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running Process&lt;/P&gt;&lt;P&gt; 'view-jobmanager'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running Process 'view-alertmanager'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running Process 'view-collector'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running Process&lt;/P&gt;&lt;P&gt; 'view-logprocessor'&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; running&lt;/P&gt;&lt;P&gt;Sep 20 22:30:54 ecb-acs1 debugd[2754]: [13910]: logging: logutils_cli.c[1202] [admin]: Got cfg: Server localhost location /var/log/a&lt;/P&gt;&lt;P&gt;de/ADE.log loglevel 6 islocal 1&lt;/P&gt;&lt;P&gt;Sep 20 22:31:10 ecb-acs1 monit[4836]: 'adclient' process is not running&lt;/P&gt;&lt;P&gt;Sep 20 22:31:10 ecb-acs1 monit[4836]: 'adclient' trying to restart&lt;/P&gt;&lt;P&gt;Sep 20 22:31:10 ecb-acs1 monit[4836]: 'adclient' start: /opt/CSCOacs/bin/exec_wrapper.sh&lt;/P&gt;&lt;P&gt;Sep 20 22:31:11 ecb-acs1 ACS adclient INFO: Run, Initializing DB query...&lt;/P&gt;&lt;P&gt;Sep 20 22:31:11 ecb-acs1 ACS adclient ERROR: log4j:WARN No appenders could be found for logger (org.hibernate.cfg.Environment).&lt;/P&gt;&lt;P&gt;Sep 20 22:31:11 ecb-acs1 ACS adclient ERROR: log4j:WARN Please initialize the log4j system properly.&lt;/P&gt;&lt;P&gt;Sep 20 22:31:11 ecb-acs1 monit[4836]: 'adclient' failed to start&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 22:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944643#M309928</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-09-20T22:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944644#M309931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please delete the ACS computer account in Active Directory and then reboot the ACS appliance to force it to rejoin the domain. Also make sure the account credentials that are used to connect to the domain are accurate and saved before the reboot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 23:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944644#M309931</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-20T23:22:44Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944645#M309934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a document that i created which will help troubleshoot AD related issues, you can provide the log output to TAC or you can post the pertinent information here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-26787"&gt;https://supportforums.cisco.com/docs/DOC-26787&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 23:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944645#M309934</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-20T23:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944646#M309936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, but that is something we already tried. I guess we can try again ... already deleted it a half-dozen times but one more try won't hurt. Have not rebooted the ACS since the last delete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can "test" the credentials and the pass the test, but if we try to hit the save button it says they are invalid. I suspect that happens because the adclient process will not run. In any event, we have tried with two different sets of credentials, we know that both work ... one of them is an account I use every day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stand by ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 23:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944646#M309936</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-09-20T23:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944647#M309939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this most recent reboot does not fix I'll try your DOC-26787. Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 23:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944647#M309939</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-09-20T23:34:30Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944648#M309941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check to see if the dns record is till present? Try a "nslookup ecb-acs1.domain.com" and nslookup ipaddofacs and see if that resolves correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also in ACS 5.3 the force SALT lookup option was already enabled so we need to see what errors you see on the DC side, also do provide the logs in the ACSADAgent.log file at around the timeframe the acs services are started. Also when you delete the computer account do you try to search for it to make sure it is deleted across the entire domain?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 01:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944648#M309941</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-21T01:35:11Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944649#M309943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, we got it working. Not sure of the exact fix, but allow me to ramble, perhaps it will help someone else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We think that a combinationof factors caused the problem. First, we had clock drift, and that resulted in clock skew messages in the logs like these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sep 20 18:06:03 ecb-acs1 adclient[8322]: INFO&amp;nbsp; &lt;MAIN&gt; base.adagent start: Problem connecting to domain controller (KDC refused skey: Clock skew too great), will try again later.&lt;/MAIN&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ecb-acs1 adclient[1163]: WARN&amp;nbsp; &lt;27 capigetobjectbyname=""&gt; base.bind.cache LDAP fetch CN=bubba,OU=staff,OU=edcenter,OU=edcenterarea,OU=episd,DC=episd,DC=org threw unexpected exception: SASL bind to &lt;/27&gt;&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:ldap/ecb-dc-domain3.episd.org@EPISD.ORG"&gt;ldap/ecb-dc-domain3.episd.org@EPISD.ORG&lt;/A&gt;&lt;SPAN&gt; - GSSAPI Mechanism with Kerberos error ": Clock skew too great"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Somehow the ACS lost the ntp config, very disturbing, because I know that one of the first things I did was setup NTP. So I re-did the ntp config, confirmed the time was accurate. Still failed. Then, because I was annoyed by the log entries comning out in UTC, I did a clock timezone to set it to local. That made the logs come out in local time, but might have caused other problems (I saw another forum entry for that) so I set it back to UTC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This begs the question - how to leave the timezone at UTC but fix the timestamps for the logs? This is easy on Cisco switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Various reboots of the ACS after deleting the object in AD did not fix the problem. During these reboots I continued to use the original userid and password to authenticate. At all times, the "test connection" button showed that the credentials were OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because we had recently added our first Win2008 domain controller to our world (all ther other DCs are Win2k3), we started worrying about this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/978055/en-us"&gt;http://support.microsoft.com/kb/978055/en-us&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, after some checking, it seems as if we already had the fix applied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, we created a dedicated user in AD for the ACS to use when authenticating. Deleted the ACS object, restarted the ACS, applied those new credentials. Still broken.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our AD admin looked in various logs and found some things, here is his summary:&lt;/P&gt;&lt;P&gt;----------- from Danny --------&lt;/P&gt;&lt;P&gt;Checked the domain controller log under system.&amp;nbsp; Found the following:&lt;/P&gt;&lt;P&gt;While processing an AS request for target service krbtgt, the account ecb-acs1$ did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 1). The requested etypes : 17. The accounts available etypes : 23&amp;nbsp; -133&amp;nbsp; -128&amp;nbsp; 3&amp;nbsp; 1. Changing or resetting the password of ecb-acs1$ will generate a proper key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While processing an AS request for target service krbtgt, the account stcrye did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 2). The requested etypes : 18. The accounts available etypes : 23&amp;nbsp; -133&amp;nbsp; -128&amp;nbsp; 3&amp;nbsp; 1. Changing or resetting the password of stcrye will generate a proper key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This may be related to either clock scew between acs and the domain or introducing server 2008 domain controllers into an existing server 2003 domain.&amp;nbsp; &lt;/P&gt;&lt;P&gt; -----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a desperate hunch, after yet again deleting the ACS object in AD and reloading the ACS, I used the new dedicated ACS user account, but gave it a wrong password. Hit save, watched it fail. Then I put in the correct password, hit save, and it worked! Finall we have re-joined and are connected to the domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT ... I have now lost all confidence in ACS 5.3 . We are in the middle of a major rollout of WiFi clients using 802.1x authentitcation, replacing our previous pre-shared WPA setup. We are talking &amp;gt; 20,000 WiFi clients. If ACS &amp;lt;--&amp;gt; AD is not rock-solid, I need to try something else. Should we consider using LDAPS instead?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 17:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944649#M309943</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-09-21T17:04:11Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944650#M309945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steve, please keep in mind that AD-integration with any 3-rd party service including ACS, ISE, etc. absolutely requires accurate network time. If you're experiencing clock differences between the AAA appliance and the Domain Controller, that would largely account for why the authentication is failing. Kerberos is a token-based authentication mechanism, and as such relies heavily on time synchronization between all client systems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where are your domain controllers pulling their time from (hopefully the&amp;nbsp; same place that your ACS instance is pointing)? If you don't already&amp;nbsp; have a dedicated NTP appliance(s), it would be very much worth your&amp;nbsp; while to look into procuring a hardware-based NTP appliance (such as the&amp;nbsp; Symmetricom SyncServer units) which can take an external clock reference from a&amp;nbsp; GPS signal, 1PPS, Sysplex, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have been running ACS 5.3 for a while, with both RADIUS and TACACS-based policies, and 802.1x WLAN client and VPN client authentication; since patch 5 it has been absolutely rock-solid stable. The inconsistencies you note above could also possibly be due to the AD domain and/or forest functional level settings (personally I've never been a fan of mixed version domain controller deployments). Also, please make sure that the AD account you are using for integration has the "Read All Properties" right on all user and computer objects in your AD structure (The permission for all computer accounts is required if you are going to permit Computer Authentication as part of your Dot1X service policy)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 17:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944650#M309945</guid>
      <dc:creator>Travis Hysuick</dc:creator>
      <dc:date>2012-09-21T17:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944651#M309948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Travis;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My post was long, you might have missed where I mentioned that the ACS had lost the NTP config. All our devices and servers get time from a Tempus GPS-based NTP server:&lt;/P&gt;&lt;P&gt;Primary NTP&amp;nbsp;&amp;nbsp; : 10.254.8.123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;synchronised to NTP server (10.254.8.123) at stratum 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; time correct to within 54 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; polling server every 1024 s&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; refid&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; st t when poll reach&amp;nbsp;&amp;nbsp; delay&amp;nbsp;&amp;nbsp; offset&amp;nbsp; jitter&lt;/P&gt;&lt;P&gt;==============================================================================&lt;/P&gt;&lt;P&gt; 127.127.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LOCAL(0)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 l&amp;nbsp;&amp;nbsp; 33&amp;nbsp;&amp;nbsp; 64&amp;nbsp; 377&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.000&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.000&amp;nbsp;&amp;nbsp; 0.004&lt;/P&gt;&lt;P&gt;*10.254.8.123&amp;nbsp;&amp;nbsp;&amp;nbsp; .GPS.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 u&amp;nbsp; 968 1024&amp;nbsp; 377&amp;nbsp;&amp;nbsp; 11.330&amp;nbsp;&amp;nbsp;&amp;nbsp; 7.343&amp;nbsp;&amp;nbsp; 2.548&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope the ACS has an SNMP trap that will warn us in the future when if it has problems. I hate being notified of a failure via help desk complaints.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm pretty sure the AD integration account has&amp;nbsp; Read All Properties, but will double-check.&amp;nbsp; Never had problems with it until the recent troubles. What was scary was even after time was perfectly in sync, it took a full day of crystal-dangling and goat-entrails inspection before it would re-connect to the domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding mixed OS in DCs, yeah, it would be nice to have the kind of budget/staff that MS expects the world to have, but we have to live with what we got...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any thoughts on logging timestamps? I hate UTC timestamps on logs (even though I wear a watch with T2 set to Zulu) , but I'm afraid to set the clock to the local timezone now ... I can't find the equilvalent of &lt;CODE&gt;"service timestamps log datetime localtime&lt;/CODE&gt;" in the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 19:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944651#M309948</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-09-21T19:26:05Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944652#M309949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're right I missed that section of your post, I've never experienced an appliance losing a section of the configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However regarding the logging, timestamps will be recorded based on the configured timezone via the clock timezone command in the CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/command/reference/cli_app_a.html#wp1894584"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/command/reference/cli_app_a.html#wp1894584&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'show timezones' will give you the exhaustive list of zones you can use (ie: America/Chicago, etc)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 19:51:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944652#M309949</guid>
      <dc:creator>Travis Hysuick</dc:creator>
      <dc:date>2012-09-21T19:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944653#M309951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Travis, I've been afraid to set the TZ back local, mostly because of the post by Anterov&amp;nbsp;&amp;nbsp;&amp;nbsp; in this thread:&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3462703#3462703" rel="nofollow"&gt;https://supportforums.cisco.com/message/3462703#3462703&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; Oct 10, 2011 5:25 PM&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (&lt;A _jive_internal="true" href="https://community.cisco.com/message/3462703#3460424" rel="nofollow" title="Go to message"&gt;in response to Vincent Fortrat&lt;/A&gt;) &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt; &lt;A _jive_internal="true" href="https://community.cisco.com/message/3462703#3462703" rel="nofollow"&gt; Re: ACS Appliance "ADClient" &lt;/A&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check if clock and time zone are correct as the Domain controller, had the same problem and that was the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anterov&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Our DCs use UTC, and the AD team is not going to set them to localtime. The &lt;/P&gt;&lt;P&gt;&lt;CODE&gt;"service timestamps log datetime localtime &lt;/CODE&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;used by IOS in Cisco switches does not modify the internal timezone, it just stamps the logs with localtime.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 20:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944653#M309951</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-09-21T20:07:31Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944654#M309953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you add the ntp server after the initial installation script ran? Also did you issue a "wr me" in order to save the cli, it could be that this was added but the changes werent saved, and if the ACS ever rebooted then that could have left the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this sounds like a symptom or not. Also since you are still testing please save the config and reboot the ACS and see if still connects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also with regards to the message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The requested etypes : 17. The accounts available etypes : 23&amp;nbsp; -133&amp;nbsp;&amp;nbsp; -128&amp;nbsp; 3&amp;nbsp; 1. Changing or resetting the password of ecb-acs1$ will&amp;nbsp; generate a proper key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen this error before and have seen that this could be ignored and that the kerberos ticket type fixes itself on the backend but doesnt get logged. In order to confirm this did you still see the same error prior to the ACS connecting successfully?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 21:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944654#M309953</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-21T21:14:30Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and Windows AD account lockout</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944655#M309954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, I do wr mem obsessivley. Who knows how it lost the ntp config ... might be one of those things we never figure out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't have access to the AD logs, that is a different group of people. I'll try to check on Monday.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This timezone thing is really driving us CraZY. We have a new DateTime policy element called MWTThF-Daytime, that we want to use to restrict Students to login only during normal school hours. But, with the ACS using UTC, everything is shifted by 7 hours. I wasted about 1/2 hour before I realized the system was rejecting logins right now because it thought it was 10:00pm!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm afraid to set the ACS to use UTC-7 , because our AD system is on UTC. (BTW, all the AD log timestamps are off by 7 hours too grrr). The AD group does not want to change all the DCs to use local time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I doomed? Is there any way to set the ACS to local time without breaking the ability to connect to the domain? Any help would be great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 22:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944655#M309954</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-09-21T22:07:13Z</dc:date>
    </item>
    <item>
      <title>Be sure your AD account</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944656#M309956</link>
      <description>&lt;P&gt;Be sure your AD account password is not too complex. &amp;nbsp;In 5.3.0.40.9 (at least) a password may pass the "test" and then fail to "Save". &amp;nbsp;There are special characters (suspecting !&amp;nbsp;at this point) that cause failure.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2015 19:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944656#M309956</guid>
      <dc:creator>hoylea</dc:creator>
      <dc:date>2015-01-20T19:51:16Z</dc:date>
    </item>
    <item>
      <title>Be sure your AD account</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944657#M309959</link>
      <description>&lt;P&gt;Be sure your AD account password is not too complex. &amp;nbsp;In 5.3.0.40.9 (at least) a password may pass the "test" and then fail to "Save". &amp;nbsp;There are special characters (suspecting !&amp;nbsp;at this point) that cause failure.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2015 19:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-windows-ad-account-lockout/m-p/1944657#M309959</guid>
      <dc:creator>hoylea</dc:creator>
      <dc:date>2015-01-20T19:51:58Z</dc:date>
    </item>
  </channel>
</rss>

