<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Please ensure you have the in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3369661#M40578</link>
    <description>&lt;P&gt;Coming late to this party, but&amp;nbsp;had the same problem recently.&lt;/P&gt;
&lt;P&gt;Adding A record of your AD server to your DNS server resolved this problem for me. These two tests were failing with the exact same error you mentioned.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Kerberos check SASL connectivity to AD&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Kerberos test obtaining join point TGT&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Something like this was added to DNS&lt;/P&gt;
&lt;P&gt;win2008.homelab.local. IN A 192.168.0.100&lt;/P&gt;</description>
    <pubDate>Fri, 20 Apr 2018 09:49:29 GMT</pubDate>
    <dc:creator>mprstacic</dc:creator>
    <dc:date>2018-04-20T09:49:29Z</dc:date>
    <item>
      <title>Kerberos check SASL connectivity to AD</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/2785648#M40575</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DNS, AD service, and NTP server all all synced between ISE and the AD instance we are trying to sync here.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The one remaining test that fails is Kerberos, here is the error message:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Could not get Machine account info : Machine is not joined to AD. PBIS error code: NERR_SetupNotJoined. Check Kerberos configuration and network settings&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Does anyone know how to remedy this situation?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/2785648#M40575</guid>
      <dc:creator>andrewsigna</dc:creator>
      <dc:date>2019-03-11T06:27:14Z</dc:date>
    </item>
    <item>
      <title>Please ensure you have the</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/2785649#M40576</link>
      <description>&lt;DIV class="nested2" lang="en_US"&gt;
&lt;H3 class="topictitle3"&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt;Please ensure you have the below listed network Ports open between the ISE and AD for communication. The error message you have listed suggest that Port 445&amp;nbsp; (MSRPC) and 88 (kerberos) are blocked in between.&lt;/SPAN&gt;&lt;/H3&gt;
&lt;DIV&gt;
&lt;DIV class="section"&gt;
&lt;DIV class="tablenoborder"&gt;
&lt;TABLE summary="" frame="border" rules="all" border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" width="90%"&gt;
&lt;THEAD align="left"&gt;
&lt;TR&gt;
&lt;TH class="cellrowborder" id="d25e541" valign="top" width="NaN%"&gt;
&lt;P&gt;Protocol&lt;/P&gt;
&lt;/TH&gt;
&lt;TH class="cellrowborder" id="d25e546" valign="top" width="NaN%"&gt;
&lt;P&gt;Port (remote-local)&lt;/P&gt;
&lt;/TH&gt;
&lt;TH class="cellrowborder" id="d25e551" valign="top" width="NaN%"&gt;
&lt;P&gt;Target&lt;/P&gt;
&lt;/TH&gt;
&lt;TH class="cellrowborder" id="d25e556" valign="top" width="NaN%"&gt;
&lt;P&gt;Authenticated&lt;/P&gt;
&lt;/TH&gt;
&lt;TH class="cellrowborder" id="d25e561" valign="top" width="NaN%"&gt;
&lt;P&gt;Notes&lt;/P&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" headers="d25e541 " valign="top" width="NaN%"&gt;
&lt;P&gt;DNS (TCP/UDP)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e546 " valign="top" width="NaN%"&gt;
&lt;P&gt;Random number greater than or equal to 49152&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e551 " valign="top" width="NaN%"&gt;
&lt;P&gt;DNS Servers/AD Domain Controllers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e556 " valign="top" width="NaN%"&gt;
&lt;P&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e561 " valign="top" width="NaN%"&gt;
&lt;P&gt;—&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" headers="d25e541 " valign="top" width="NaN%"&gt;
&lt;P&gt;MSRPC&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e546 " valign="top" width="NaN%"&gt;
&lt;P&gt;445&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e551 " valign="top" width="NaN%"&gt;
&lt;P&gt;Domain Controllers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e556 " valign="top" width="NaN%"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e561 " valign="top" width="NaN%"&gt;
&lt;P&gt;—&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" headers="d25e541 " valign="top" width="NaN%"&gt;
&lt;P&gt;Kerberos (TCP/UDP)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e546 " valign="top" width="NaN%"&gt;
&lt;P&gt;88&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e551 " valign="top" width="NaN%"&gt;
&lt;P&gt;Domain Controllers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e556 " valign="top" width="NaN%"&gt;
&lt;P&gt;Yes (Kerberos)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e561 " valign="top" width="NaN%"&gt;
&lt;P&gt;MS AD/KDC&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" headers="d25e541 " valign="top" width="NaN%"&gt;
&lt;P&gt;LDAP (TCP/UDP)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e546 " valign="top" width="NaN%"&gt;
&lt;P&gt;389&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e551 " valign="top" width="NaN%"&gt;
&lt;P&gt;Domain Controllers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e556 " valign="top" width="NaN%"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e561 " valign="top" width="NaN%"&gt;
&lt;P&gt;—&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" headers="d25e541 " valign="top" width="NaN%"&gt;
&lt;P&gt;LDAP (GC)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e546 " valign="top" width="NaN%"&gt;
&lt;P&gt;3268&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e551 " valign="top" width="NaN%"&gt;
&lt;P&gt;Global Catalog Servers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e556 " valign="top" width="NaN%"&gt;
&lt;P&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e561 " valign="top" width="NaN%"&gt;
&lt;P&gt;—&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" headers="d25e541 " valign="top" width="NaN%"&gt;
&lt;P&gt;NTP&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e546 " valign="top" width="NaN%"&gt;
&lt;P&gt;123&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e551 " valign="top" width="NaN%"&gt;
&lt;P&gt;NTP Servers/Domain Controllers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e556 " valign="top" width="NaN%"&gt;
&lt;P&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e561 " valign="top" width="NaN%"&gt;
&lt;P&gt;—&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" headers="d25e541 " valign="top" width="NaN%"&gt;
&lt;P&gt;IPC&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e546 " valign="top" width="NaN%"&gt;
&lt;P&gt;80&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e551 " valign="top" width="NaN%"&gt;
&lt;P&gt;Other ISE Nodes in the Deployment&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e556 " valign="top" width="NaN%"&gt;
&lt;P&gt;Yes (Using RBAC credentials)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" headers="d25e561 " valign="top" width="NaN%"&gt;
&lt;P&gt;—&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="nested2" lang="en_US"&gt;&lt;BR /&gt;
&lt;H3 class="topictitle3"&gt;&lt;SPAN style="font-size: 10pt;"&gt;~ Jatin&lt;/SPAN&gt;&lt;/H3&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 04 Feb 2016 03:28:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/2785649#M40576</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-02-04T03:28:28Z</dc:date>
    </item>
    <item>
      <title>Re: Please ensure you have the</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3227462#M40577</link>
      <description>&lt;P&gt;I have the same error, and no firewall is installed on the DC.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 23:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3227462#M40577</guid>
      <dc:creator>Willieh13</dc:creator>
      <dc:date>2017-12-05T23:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: Please ensure you have the</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3369661#M40578</link>
      <description>&lt;P&gt;Coming late to this party, but&amp;nbsp;had the same problem recently.&lt;/P&gt;
&lt;P&gt;Adding A record of your AD server to your DNS server resolved this problem for me. These two tests were failing with the exact same error you mentioned.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Kerberos check SASL connectivity to AD&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Kerberos test obtaining join point TGT&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Something like this was added to DNS&lt;/P&gt;
&lt;P&gt;win2008.homelab.local. IN A 192.168.0.100&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 09:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3369661#M40578</guid>
      <dc:creator>mprstacic</dc:creator>
      <dc:date>2018-04-20T09:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Please ensure you have the</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3891591#M40579</link>
      <description>&lt;P&gt;Can you add more details. I have exactly same problem. I have single node ISE deployment reunning admin, PSN and MnT personas on it.&lt;/P&gt;&lt;P&gt;I am joining ISE node to abc.com domain and on doing nslookup to abc.com i am getting 10.10.10.10 (DC IP). Same DC is running DNS Server too. My ISE server ip is 10.10.10.20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you advise what DNS record i need. Appreciate your help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 05:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3891591#M40579</guid>
      <dc:creator>gagandeeps1</dc:creator>
      <dc:date>2019-07-17T05:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Please ensure you have the</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3893111#M40580</link>
      <description>Please see the requirements under &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01110.html#reference_EA017E71F25145C9A1374373ABFA102E" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01110.html#reference_EA017E71F25145C9A1374373ABFA102E&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Jul 2019 21:19:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/3893111#M40580</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-07-18T21:19:59Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos check SASL connectivity to AD</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4106176#M561309</link>
      <description>&lt;P&gt;Bro, what do you do to solve this issue ? I have same issue with you&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2020 07:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4106176#M561309</guid>
      <dc:creator>torkis.halomoan</dc:creator>
      <dc:date>2020-06-19T07:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos check SASL connectivity to AD</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4106279#M561321</link>
      <description>Check time between NAC and AD controller. Needs to be within 5 minutes or so or Kerberos will fail.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Jun 2020 11:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4106279#M561321</guid>
      <dc:creator>Willieh13</dc:creator>
      <dc:date>2020-06-19T11:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos check SASL connectivity to AD</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4107823#M561362</link>
      <description>Solved : Troubleshoot with rejoin AD to cisco ISE, Thank you for answer (y).&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Jun 2020 08:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4107823#M561362</guid>
      <dc:creator>torkis.halomoan</dc:creator>
      <dc:date>2020-06-23T08:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos check SASL connectivity to AD</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4190402#M564064</link>
      <description>&lt;P&gt;The same thing happened to me and I resolved it by adding a host entry into my forward lookup zone.&lt;/P&gt;&lt;P&gt;Go to your Windows Server DNS manager &amp;gt; forward lookup zones &amp;gt; the zone you have created that your ISE/AD server uses. In my case it is 'mylab.local'&lt;BR /&gt;Create a new host entry under that zone.&lt;/P&gt;&lt;P&gt;The name field will be the hostname of ISE. If you are unsure of what it is, check the report under the test details in your diagnostic tool menu. It will mention at the top, 'Diagnostic Report for ISE node: my-ise-server.mylab.local'&lt;BR /&gt;Go back to your windows server and enter&amp;nbsp; as your name and then under the IP address field, enter the IP of your ISE node.&lt;/P&gt;&lt;P&gt;Save changes and restart your DNS server service. Then try to re-join your AD in ISE from scratch again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks all for the pointers!&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 01:29:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4190402#M564064</guid>
      <dc:creator>benjamin.gillies</dc:creator>
      <dc:date>2020-11-30T01:29:14Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos check SASL connectivity to AD</title>
      <link>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4266205#M564542</link>
      <description>&lt;P&gt;I have this same error on one node.&lt;/P&gt;&lt;P&gt;DNS -&amp;gt; check&lt;/P&gt;&lt;P&gt;FW ports -&amp;gt; check&lt;/P&gt;&lt;P&gt;Delegated permission to join for the user account -&amp;gt; check&lt;/P&gt;&lt;P&gt;Able to resolve domain -&amp;gt; check&lt;/P&gt;&lt;P&gt;time sync with Domain Controller -&amp;gt; check&lt;/P&gt;&lt;P&gt;Last option I am looking at is patching ISE.&lt;/P&gt;&lt;P&gt;Does anyone here have a different solution?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 08:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/kerberos-check-sasl-connectivity-to-ad/m-p/4266205#M564542</guid>
      <dc:creator>JanusBarinan60286</dc:creator>
      <dc:date>2021-01-04T08:28:45Z</dc:date>
    </item>
  </channel>
</rss>

