<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Problem in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002825#M404420</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reyad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The password change is done through the supplicant and over to ISE via peap-mschapv2, there is no need for the client to be connected to the domain in order to do the password change. What version of ISE are you currently running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Jul 2012 14:21:09 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2012-07-13T14:21:09Z</dc:date>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002822#M404410</link>
      <description>&lt;P&gt;Hi Experts&lt;/P&gt;&lt;P&gt;we have new ISE servers at our network and it work good .&lt;/P&gt;&lt;P&gt;but lately i faced the below problem :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the ISE integrated to get the authentication from the microsoft active directory which depend on the windows login username / password , and the dot1x configurations and settings pushed to the users PCs via the active directory and the user can't change it .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if the user login to the windows sucessfully , the ISE put the user in the quarantine vlan , then check the policy and if pass assign the full access to the users .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our System Admins force the users to change the password monthly bases , so when the password expired , the authentication failed so the ISE will not assign any vlan to the user , and the can't change the password on the Active Directory becouse he is disconnected from the network .&lt;/P&gt;&lt;P&gt;so i need a way to enable the switch to assign a restricted vlan to reach the Active Directory once the user plug the network cable , regardless he authenticate succesfully or not .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;our switch configuration is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login TEST group radius&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius &lt;/P&gt;&lt;P&gt;aaa accounting dot1x default start-stop group radius&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;/P&gt;&lt;P&gt;client 10.10.10.238 server-key C1sc0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;system mtu routing 1500&lt;/P&gt;&lt;P&gt;authentication mac-move permit&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip device tracking&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 22&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport voice vlan 110&lt;/P&gt;&lt;P&gt;authentication port-control auto&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended ACL-POSTURE-REDIRECT&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.238&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.239&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; udp any any&lt;/P&gt;&lt;P&gt;permit tcp any any eq www&lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;permit tcp any any eq 8443&lt;/P&gt;&lt;P&gt;ip access-list extended webauth&lt;/P&gt;&lt;P&gt;permit tcp any any eq www&lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.238&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.239&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip radius source-interface Vlan10 &lt;/P&gt;&lt;P&gt;ip sla enable reaction-alerts&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server attribute 25 access-request include&lt;/P&gt;&lt;P&gt;radius-server dead-criteria time 20 tries 3&lt;/P&gt;&lt;P&gt;radius-server host 10.10.10.238 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;radius-server host 10.10.10.239 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;radius-server key C1sc0&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;!&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login TEST group radius&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius &lt;/P&gt;&lt;P&gt;aaa accounting dot1x default start-stop group radius&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;/P&gt;&lt;P&gt;client 10.10.10.238 server-key C1sc0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;system mtu routing 1500&lt;/P&gt;&lt;P&gt;authentication mac-move permit&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip device tracking&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface FastEthernet0/2&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 110&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;ip access-list extended ACL-POSTURE-REDIRECT&lt;BR /&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.238&lt;BR /&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.239&lt;BR /&gt;deny&amp;nbsp;&amp;nbsp; udp any any&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;permit tcp any any eq 443&lt;BR /&gt;permit tcp any any eq 8443&lt;BR /&gt;ip access-list extended webauth&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;permit tcp any any eq 443&lt;BR /&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.238&lt;BR /&gt;deny&amp;nbsp;&amp;nbsp; ip any host 10.10.10.239&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface Vlan10 &lt;BR /&gt;ip sla enable reaction-alerts&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 20 tries 3&lt;BR /&gt;radius-server host 10.10.10.238 auth-port 1812 acct-port 1813&lt;BR /&gt;radius-server host 10.10.10.239 auth-port 1812 acct-port 1813&lt;BR /&gt;radius-server key C1sc0&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any suggestion to solve this problem .....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reyad&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002822#M404410</guid>
      <dc:creator>Reyad Safi</dc:creator>
      <dc:date>2019-03-11T02:17:52Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002823#M404414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reyad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check and see if you have the enable password change box enabled under your AD settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.1/user_guide/ise_man_id_stores.html#wp1243634"&gt;http://www.cisco.com/en/US/docs/security/ise/1.1/user_guide/ise_man_id_stores.html#wp1243634&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 13:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002823#M404414</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-13T13:42:45Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002824#M404416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Tarik&lt;/P&gt;&lt;P&gt;thank you for your reply , but it's already enabled there ...&lt;/P&gt;&lt;P&gt;i think i should add some configuration or ACL to the switch to assign native vlan to the port before checking the authentication from the AD .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Suggestion&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reyad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 14:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002824#M404416</guid>
      <dc:creator>Reyad Safi</dc:creator>
      <dc:date>2012-07-13T14:18:06Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002825#M404420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reyad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The password change is done through the supplicant and over to ISE via peap-mschapv2, there is no need for the client to be connected to the domain in order to do the password change. What version of ISE are you currently running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 14:21:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002825#M404420</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-13T14:21:09Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002826#M404425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear tarik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Version Identifier (VID)&amp;nbsp; V01 &lt;/P&gt;&lt;P&gt;ADE-OS Version&amp;nbsp; 2.0.2.103&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;Version Identifier (VID)&amp;nbsp; V01 &lt;BR /&gt;ADE-OS Version&amp;nbsp; 2.0.2.103 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the above reply not clear for me , please clarify it more , how could i change the AD Password while im not connected to the network ? please advise .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the PC IP address when it not authenticated succesfully is nubian ip address ( 169.x.x.x)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reyad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 14:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002826#M404425</guid>
      <dc:creator>Reyad Safi</dc:creator>
      <dc:date>2012-07-13T14:48:01Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002827#M404430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is normal, dot1x works as a L2 authentication mechanism in which radius from the NAD to the radius server is encapsulated in a radius packet. If authentication fails then the client doesnt receive and ip address since dhcp isnt forwarded from the NAD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need you to issue a show ver from the cli.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also can you post the screenshot of the authentication to see why the client is failing, is it because the password is expired or is the account locked out? That will make a difference too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 16:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002827#M404430</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-13T16:09:48Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002828#M404434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; the Sho Ver from cli is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ME-ISE-1/reyad# sh version &lt;/P&gt;&lt;P&gt;Cisco Application Deployment Engine OS Release: 2.0&lt;BR /&gt;ADE-OS Build Version: 2.0.2.103&lt;BR /&gt;ADE-OS System Architecture: i386&lt;/P&gt;&lt;P&gt;Copyright (c) 2005-2011 by Cisco Systems, Inc.&lt;BR /&gt;All rights reserved.&lt;BR /&gt;Hostname: ME-ISE-1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Version information of installed applications&lt;BR /&gt;---------------------------------------------&lt;/P&gt;&lt;P&gt;Cisco Identity Services Engine&lt;BR /&gt;---------------------------------------------&lt;BR /&gt;Version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1.1.0.665&lt;BR /&gt;Build Date&amp;nbsp;&amp;nbsp; : Thu Mar&amp;nbsp; 8 00:51:03 2012&lt;BR /&gt;Install Date : Tue May 22 10:39:15 2012&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Cisco Identity Services Engine Patch &lt;BR /&gt;---------------------------------------------&lt;BR /&gt;Version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;BR /&gt;Install Date : Thu Jun 21 10:47:35 2012&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and i will provide you the GUI screenshot when available .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for support&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reyad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 18:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002828#M404434</guid>
      <dc:creator>Reyad Safi</dc:creator>
      <dc:date>2012-07-13T18:59:21Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002829#M404438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reyad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My apologies for the delay were you able to get this resolved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2012 07:55:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002829#M404438</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-25T07:55:31Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002830#M404442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear TArik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for your interesting ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i solved the problem , and every thing working now &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reyad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2012 12:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002830#M404442</guid>
      <dc:creator>Reyad Safi</dc:creator>
      <dc:date>2012-07-25T12:57:45Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002831#M404447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please share how you solved your problem?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 14:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002831#M404447</guid>
      <dc:creator>edondurguti</dc:creator>
      <dc:date>2012-07-26T14:25:14Z</dc:date>
    </item>
    <item>
      <title>ISE Problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002832#M404450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Edondurquti&lt;/P&gt;&lt;P&gt;yes you are right .....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i changed the authentication method from user authentication to computer authentication , so when you plug the network cable to the PC , it start authentication and the ISE assign the quarantine vlan to the port , so the changing password problem solved .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the computer authentication solved many problems i faced when implementation .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; when you try to connect remotly to your PC at the office ( when i applied user authentication ) , it was&lt;/P&gt;&lt;P&gt;connected for seconds , then the PC re-authentiate and assigned to the quarantine vlan , so i lost the connection to my PC .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; the password expire problem happened on the user authentication especially when you put the option to use the windows login .... its big problem .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; many PCs can connect to the network using the same username/password ,,, and this is also big problem .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no way to enforce the users to join to the domain if you use the user authentication , you can login locally at your pc , then at the popup screen you can enter the AD user .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by using the computer authentication , all the above problems solved , and the connection become more stable , and all PCs enforced to join to the domain to get the authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;another helpful command on the switch , is to assign a restricted configured VLAN to the switches as native VLAN , and you can apply the below command on the interface to assign a VLAN when the authentication fail .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch(config-if)#authentication event fail action authorize vlan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hope this can help you in case you faced the above problems ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reyad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 18:15:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem/m-p/2002832#M404450</guid>
      <dc:creator>Reyad Safi</dc:creator>
      <dc:date>2012-07-27T18:15:32Z</dc:date>
    </item>
  </channel>
</rss>

