<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3943042#M456365</link>
    <description>Please see this post for general guidance on using community,&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_blank"&gt;https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 18 Oct 2019 06:02:38 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2019-10-18T06:02:38Z</dc:date>
    <item>
      <title>Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3942694#M456364</link>
      <description>&lt;P&gt;We have had an issue a few times now&amp;nbsp; so it is becoming an emergency. We had a domain controller reboot cause an issue with the policy node saying that a domain is unusable. We are running ISE 2.4 patch 8.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are some key points:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Domain Controller has updates applied and reboots, comes online within 30 seconds.&lt;/LI&gt;&lt;LI&gt;Identity Services Engine stops authenticating clients with the following error: 24367&amp;nbsp; Skipping unusable domain - "domain name", Server not found in Kerberos database. This causes issues for hundreds of users.&lt;/LI&gt;&lt;LI&gt;For one outage, we rebooted an ISE Policy node and it re-connected to a different domain controller and started working.&lt;/LI&gt;&lt;LI&gt;For the second outage, authentications started working after approximately 2 hours with no Policy node reboot.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Any information would be appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2019 16:36:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3942694#M456364</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2019-10-17T16:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3943042#M456365</link>
      <description>Please see this post for general guidance on using community,&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_blank"&gt;https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 18 Oct 2019 06:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3943042#M456365</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-10-18T06:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3944615#M456366</link>
      <description>&lt;P&gt;I have a TAC case open. I know that this is not Cisco TAC. I always share issues that I am having here as a way to let other people know about the issue and see if they have had it before. I do not see anything wrong with that. This was also informational and you definitely did not have the right solution.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 14:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3944615#M456366</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2019-10-21T14:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3944620#M456367</link>
      <description>&lt;P&gt;I am working with TAC and we already had the debugs enabled on the ISE policy node. We were able to see some good logs. I am waiting to hear back if we have the exact cause. Here are some example logs in case somebody runs into a similar issue in the future.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;TimeStamp VERBOSE,Transaction Log Number Hidden,AdIdentitySearcher::performSearch: domain=[Some.Domain], base=[dc=Some,dc=Domain,dc=com], filter=[(&amp;amp;(|(objectCategory=person)(objectCategory=computer))(sAMAccountName=Bob))],lsass/server/auth-providers/ad-open-provider/ad_identity_searcher.cpp:324&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;TimeStamp VERBOSE,Transaction Log Number Hidden,LsaDmLdapDirectorySearch: domain=Some.Domain, dn='dc=Some,dc=Domain,dc=com', scope=2, query=(&amp;amp;(|(objectCategory=person)(objectCategory=computer))(sAMAccountName=Bob)),lsass/server/auth-providers/ad-open-provider/lsadm.c:4393&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;TimeStamp VERBOSE,Transaction Log Number Hidden,LsaDmLdapDirectorySearch: attempt=1, error=40286(LW_ERROR_LDAP_SERVER_DOWN),lsass/server/auth-providers/ad-open-provider/lsadm.c:4420&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;TimeStamp VERBOSE,Transaction Log Number Hidden,LocatorLookup(0x7f5091806e90): dc=Domain-Controller1, x.x.x.x-IPA,netlogon/service_locator/service_locator.c:318&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;TimeStamp VERBOSE,Transaction Log Number Hidden,LocatorLookup(0x7f509176c190): dc=Domain-Controller2, x.x.x.x-IPB,netlogon/service_locator/service_locator.c:318&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;TimeStamp ERROR&amp;nbsp; ,Transaction Log Number Hidden,LsaDmConnectDomain: domain Some.Domain is offline,lsass/server/auth-providers/ad-open-provider/lsadm.c:5011&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 16:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3944620#M456367</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2019-10-21T16:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3945017#M456368</link>
      <description>Alex thank you, it would be good to state what your intent is so we can close out the solution. If its just information sharing then please post as a document or blog and not something needing an actual solution. We are trying to manage and make sure everything is covered.</description>
      <pubDate>Tue, 22 Oct 2019 05:39:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3945017#M456368</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-10-22T05:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3946401#M456371</link>
      <description>&lt;P&gt;We ended up finding that it was a bug. It can happen when multiple domain controllers are rebooted at the same time.&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp73385" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp73385&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We verified that this error was being thrown: LW_ERROR_KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN.&lt;/P&gt;&lt;P&gt;The issue is resolved in ISE 2.4 patch 10.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 14:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3946401#M456371</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2019-10-23T14:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine Unusable Domain Caused By Windows Domain Controller Reboot</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3946408#M456372</link>
      <description>&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;I have found multiple discussions in the forums that are bugs that have helped me in the past. The purpose of my post was to get as many eyes on my problem as I possibly could. Sometimes, a person will reply immediately with the fix. Other times, it could be that TAC will be the final solution. And now, this thread will help somebody in the future.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 14:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-unusable-domain-caused-by-windows/m-p/3946408#M456372</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2019-10-23T14:43:30Z</dc:date>
    </item>
  </channel>
</rss>

