<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.3 and AD domain trust in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976913#M394224</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the reason is that the ACS uses kerberos instead of NTLM for authentication. With the forest trusts only NTLM is supported, with an external trust you can use kerberos.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Jul 2012 16:09:37 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2012-07-30T16:09:37Z</dc:date>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976910#M394131</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Hello ,I´m having this problem:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;I have 2 AD domains y 2 different forrests (i.e domain1.com and domain2.com) and they were configured to trust each other (two-way trust).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;In the AD enviroment it works great.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;The problem is that in ACS wich is intergrated with domain1.com y can´t see the groups of the other domain domain2.com.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;If I look for them under &lt;STRONG&gt;Directory Groups&lt;/STRONG&gt; they don´t appear and if i put them manually in &lt;STRONG&gt;Group Name&lt;/STRONG&gt; (with sintax domain2.com&lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;/Users/GroupX) and then I a&lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;dd it&lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt; with &lt;STRONG&gt;Add^&lt;/STRONG&gt; button&lt;/SPAN&gt; I am able to add them and to use them in policies but they don´t work (I get errors and nothing is authenticated).&lt;/P&gt;&lt;P&gt;I´m using ACS 5.3.0.40.5 version and Windows 2003 server enterprise edition.&lt;/P&gt;&lt;P&gt;I´ve read this post &lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2064843" rel="nofollow" target="_blank"&gt;https://supportforums.cisco.com/thread/2064843&lt;/A&gt;&lt;/P&gt;&lt;P&gt;but I couldn´t make it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone knows how I can get this working I will really appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976910#M394131</guid>
      <dc:creator>kamarale</dc:creator>
      <dc:date>2019-03-11T02:20:37Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976911#M394167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please use this guide for reference when configuring trusts between the forests. It seems that authenticaiton works fine when using transitive trusts but SID filtering may be in the picture since you can query for groups. Please do some research regarding the effects of disabling sid filtering, but for the most part this seems to be what you are facing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/cc755427%28v=ws.10%29.aspx"&gt;http://technet.microsoft.com/en-us/library/cc755427%28v=ws.10%29.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 05:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976911#M394167</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-27T05:49:15Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976912#M394198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,thanks for the reply.&lt;/P&gt;&lt;P&gt;I had configured a forest trust type,and that did not work. So I&amp;nbsp; changed the trust type to external trust and it started to work&amp;nbsp; perfectly.&lt;/P&gt;&lt;P&gt;Is there a limitation with the ACS that does not support forest trust??&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 16:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976912#M394198</guid>
      <dc:creator>kamarale</dc:creator>
      <dc:date>2012-07-30T16:06:57Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976913#M394224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the reason is that the ACS uses kerberos instead of NTLM for authentication. With the forest trusts only NTLM is supported, with an external trust you can use kerberos.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 16:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976913#M394224</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-30T16:09:37Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976914#M394244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the quick replay.&lt;/P&gt;&lt;P&gt;Where does Cisco say that? Do you have some link?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 16:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976914#M394244</guid>
      <dc:creator>kamarale</dc:creator>
      <dc:date>2012-07-30T16:13:28Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976915#M394262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem you are welcome,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I havent seen this mentioned in the Cisco documentation, its something I have come across while working on trusts types and what the ACS uses for authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 16:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976915#M394262</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-30T16:41:49Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976916#M394279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One more question, the two domains are going to have different hours(they are on separate countries).&lt;/P&gt;&lt;P&gt;How do I do with this? Should I point the two domain controllers to the same NTP and in each DC set the correct time zone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 17:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976916#M394279</guid>
      <dc:creator>kamarale</dc:creator>
      <dc:date>2012-07-30T17:56:27Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976917#M394301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as you point to a trusted ntp source which gives you the accurate GMT source, then the ACS and the domain controllers will use their timezone setting to offset this value locally. Kerberos should use the GMT value as its basis for its operability&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information - &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://social.technet.microsoft.com/Forums/ta/winserverNIS/thread/5231d52d-cf78-4685-b1a2-c39dcb767427"&gt;http://social.technet.microsoft.com/Forums/ta/winserverNIS/thread/5231d52d-cf78-4685-b1a2-c39dcb767427&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2012 18:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976917#M394301</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-30T18:36:50Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976918#M394316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me know if there is anything else I can help you and how everything is going.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 03:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976918#M394316</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-31T03:58:21Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976919#M394330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for your support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 12:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976919#M394330</guid>
      <dc:creator>kamarale</dc:creator>
      <dc:date>2012-07-31T12:56:09Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976920#M394339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you can help me with an issue i am facing on migration from Cisco ACS 4.1.24 to Cisco 5.3.0.40&lt;/P&gt;&lt;P&gt;and testing Radius authentication for vpn client users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication method used is external Active Directory and for some users authenticating to the external AD via ACS, the following message is obtained:&lt;/P&gt;&lt;P&gt;"15039 Selected Authorization Profile is DenyAcces", which results in Auth failure.&lt;/P&gt;&lt;P&gt;Other users on the same AD group seem to work fine and there are no changes performed on the AD for any of the&amp;nbsp; concerned users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the detail report for the user, confirms that no attributes&amp;nbsp; are returned to the Radius(under the other attributes field) from the&amp;nbsp; external server. The Radius also returns the following messages:&lt;/P&gt;&lt;P&gt;"24412 User not&amp;nbsp; found in Active Directory"&lt;/P&gt;&lt;P&gt;"22056 Subject not found in the applicable&amp;nbsp; identity store(s)"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Within the ACS Identity sequence in the ID store, the sequence is set to match on AD first and then Internal user.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Identity for the default network profile(for Radius users) is configured to General sequence. The same user/s seem to work fine when swithced to ACS4.&lt;/P&gt;&lt;P&gt;We are also looking at possible NTP sync issue with the ACS/AD or any NTLM/Kerberos auth issues or any issues related to applying the latest ACS patch to the box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 09:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976920#M394339</guid>
      <dc:creator>mohankumarm</dc:creator>
      <dc:date>2012-09-03T09:19:14Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976921#M394349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to troubleshoot this a little deeper, I dont think that ntp is an issue because you would see errors in the AD configuration page if it shows disconnected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, please install the latest patch, there were some AD issues with the 5.3 code and have been resolved in the most recent patches. Please try again afterwards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also while you are in the AD settings page there is a tab for "Directory Attributes" please type in the user account that isnt found in the authentication report and see if you can pull any attributes in the page. If you get the error then try you user account and see if it pulls the attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we can start to see what the problem is there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 09:33:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976921#M394349</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-03T09:33:06Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976922#M394359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks very much for the quick response. When i try to enter the failed user and select the attributes, it prompts me to select a number of them, which means the attributes are being returned for the failed user? some of the attribs are 1)CN 2) DN 3) member of...etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 09:45:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976922#M394359</guid>
      <dc:creator>mohankumarm</dc:creator>
      <dc:date>2012-09-03T09:45:52Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976923#M394370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to continue with my previous message, When i try an unknown user on the Directory attribute, it comes up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "No data to Display" screen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Mohan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 10:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976923#M394370</guid>
      <dc:creator>mohankumarm</dc:creator>
      <dc:date>2012-09-03T10:02:50Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976924#M394378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please copy and paste the output from the ACS report. Also please try installing the latest patch and see if that resolves your issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 18:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976924#M394378</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-03T18:27:09Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976925#M394384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;AAA Protocol &amp;gt; RADIUS Authentication Detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;ACS&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;session ID&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Date : September 3, 2012&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Generated on September 3, 2012 2:30:12 PM EST&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authentication Summary&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Logged At: September 3,2012 10:09:41.676 AM&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;RADIUS Status:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Authentication failed:15039 Selected&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authorization Profile is DenyAccess&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;NAS Failure:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Username: sipcarra&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;MAC/IP Address: y.y.y.y&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Network Device: DRPIX:z.z.z.z&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Access Service: All Radius users&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Identity Store:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authorization Profiles: DenyAccess&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;CTS Security Group:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authentication Method: PAP_ASCII&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Actions&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Troubleshoot Authentication&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;View Diagnostic Messages&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Audit Network Device Configuration&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;View Network Device Configuration&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;View ACS Configuration Changes&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authentication Result&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;RadiusPacketType=AccessReject&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;AuthenticationResult=UnknownUser&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Session Events&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;Sep 3,12 10:09:41.676 AM Radius authentication failed for USER: xxxxx MAC: y.y.y.y&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;AUTHTYPE: Radius authentication failed&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authentication Details&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Logged At: September 3,2012 10:09:41.676 AM&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;ACS Time: September 3,2012 10:09:41.663 AM&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;ACS Instance: xxxxx01&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authentication Method: PAP_ASCII&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;EAP Authentication&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Method :&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;EAP Tunnel Method :&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;User&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;ACS Username: sipcarra&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;RADIUS Username : sipcarra&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Calling Station ID: x.x.x.x&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Framed IP Address:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Host Lookup:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Network Device&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Network Device: DRPIX&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Network Device&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Groups:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Migrated_NDGs:All Migrated_NDGs:Loc1 / DRC all&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Device Type:All Device Types&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Location:All Locations&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;NAS IP Address: a.a.a.a&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;NAS Identifier:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;NAS Port: 7360512&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;NAS Port ID:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;NAS Port Type: Virtual&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Access Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Access Service: All Radius users&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Identity Store:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authorization Profiles: DenyAccess&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Exception&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authorization Profiles:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Active Directory&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Domain:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;simnetad.simplot.com.au&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Identity Group: All Groups:External&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Access Service&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Selection Matched Rule&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Radius Network Access&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Identity Policy Matched&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Rule:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Default&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Selected Identity Stores&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Internal Users, AD1&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Query Identity Stores:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Selected Query Identity&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Stores:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Group Mapping Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Matched Rule:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Default&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authorization Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Matched Rule:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Default&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Authorization&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Exception Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Matched Rule:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;CTS&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;CTS Security Group:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Other&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;ACS Session ID: ____&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Audit Session ID:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Tunnel Details: Tunnel-Client-Endpoint=(tag=0) x.x.x.x&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;H323 Attributes:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;SSG Attributes:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Cisco-AVPairs: ip:source-ip=x.x.x.x&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Other Attributes:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;ACSVersion=acs-5.3.0.40-B.839&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;ConfigVersionId=164&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Device Port=1025&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;RadiusPacketType=AccessRequest&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Protocol=Radius&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Service-Type=Framed&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Framed-Protocol=PPP&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Called-Station-ID=z.z.z.z&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Device IP Address=z.z.z.z&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Steps&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;11001 Received RADIUS Access-Request&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;11017 RADIUS created a new session&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15004 Matched rule&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15012 Selected Access Service - All Radius users&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15006 Matched Default Rule&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15013 Selected Identity Store -&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;24210 Looking up User in Internal Users IDStore - Test&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;24216 The user is not found in the internal users identity store.&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;24430 Authenticating user against Active Directory&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;24412 User not found in Active Directory&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;22016 Identity sequence completed iterating the IDStores&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;22056 Subject not found in the applicable identity store(s).&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;22058 The advanced option that is configured for an unknown user is used.&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;22060 The 'Continue' advanced option is configured in case of a failed authentication request.&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Evaluating Group Mapping Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15006 Matched Default Rule&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Evaluating Exception Authorization Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15042 No rule was matched&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15006 Matched Default Rule&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;15016 Selected Authorization Profile - DenyAccess&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; line-height: normal;"&gt;&lt;STRONG&gt;15039 Selected Authorization Profile is DenyAccess&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;11003 Returned RADIUS Access-Reject&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Sep 2012 22:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976925#M394384</guid>
      <dc:creator>mohankumarm</dc:creator>
      <dc:date>2012-09-03T22:54:15Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976926#M394391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please follow the steps in order to troubleshoot this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh into the ACS and issue the command "acs-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wait 45 seconds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then run debug-adclient enable (this enables debug level logging for AD related communication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reproduce your issue and note the time stamp in the logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the monitoring and reporting section there is an option for "ACS Support Bundle" download that with only the debug-logs option enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After downloading the logs you should be able to open them with winrar, and look in the logs directory then in the debug logs directory. Please open the ACSADAgent.log file that contains the timeframe when this occured, if there is a lot of traffic running it could be in the other incremental logs. You can open this log with wordpad (or notepad++)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at the events that occured at the timestamp noted before and see what response you are receiving from AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 00:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976926#M394391</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-05T00:35:24Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976927#M394396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just published a doc that will help you with the debugging:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-26787"&gt;https://supportforums.cisco.com/docs/DOC-26787&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate it if you find it helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 08:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976927#M394396</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-05T08:05:35Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976928#M394402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Tarik,&lt;/P&gt;&lt;P&gt;Thanks very much indeed and we have updated the ACS to the latest patch 5-3-0-40-6 and currently testing all the VPN users now and at the moment we dont see any failures now and we are waiting for previous failed VPN users to connect now and will update accordingly.&lt;/P&gt;&lt;P&gt;In the meantime, we tried to enter "acs-config" by ssh to the VM on which ACS is running and this prompts for a Username/Password and when we enter the GUI credentials(for acsadmin superadmin user), it hangs and sometimes comes up with "Connecting" message and does nothing. The ssh was from Putty terminal software and do you think using Secure CRT is a better option. We also lost access to the web gui and had to restart the VM to bring it back up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Mohan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 08:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976928#M394402</guid>
      <dc:creator>mohankumarm</dc:creator>
      <dc:date>2012-09-05T08:24:48Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 and AD domain trust</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976929#M394408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just checking if there is any update to the "acs-config" issue.&lt;/P&gt;&lt;P&gt;Also, I have a scenario where several iphones/ipads have to&amp;nbsp; be authenticated via Cisco ACS 5.3 and WLC. Currently, all the idevices&amp;nbsp; are using PEAP with username/passwords and this is required to be moved&amp;nbsp; to an EAP-TLS based configuration, so that there is no need to enter&amp;nbsp; username/password credentials on the idevice and the clients will rely&amp;nbsp; on only on certificate based authentication.&lt;/P&gt;&lt;P&gt;In the current ACS setup,&amp;nbsp; the Identity store sequence&amp;nbsp; configuration is password based and this general sequence is mapped to&amp;nbsp; the access service profiles for Default Network Access (external AD) for&amp;nbsp; all users. If we create a new IDentity store and select the&amp;nbsp; "Certificate based" option, then a new access service policy has to be&amp;nbsp; defined to map all the idevices to this ID sequence, which means&amp;nbsp; creation of additional access service policies. Currently there are two&amp;nbsp; service policies one for device access and one for network access and i&amp;nbsp; am not sure if by creating new policy how the idevice traffic will hit&amp;nbsp; this policy. Please advise how do we go about implementing this feature&amp;nbsp; for idevices with no&amp;nbsp; username/password credentials but should use only&amp;nbsp; certificate based authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 04:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-and-ad-domain-trust/m-p/1976929#M394408</guid>
      <dc:creator>mohankumarm</dc:creator>
      <dc:date>2012-09-12T04:45:57Z</dc:date>
    </item>
  </channel>
</rss>

