<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Device Authentication Issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792408#M485736</link>
    <description>&lt;P&gt;when we use server groups thats how we set it up. but this device uses radius-server host&lt;/P&gt;&lt;P&gt;AAA Configuration&lt;/P&gt;&lt;P&gt;radius-server host 10.100.100.100 (local ise node)&lt;BR /&gt;radius-server host 10.200.200.200 (remote ise node)&lt;/P&gt;&lt;P&gt;aaa authentication login default radius local&lt;/P&gt;&lt;P&gt;radius-server key 7 &amp;lt;key here&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;its for soem reason skipping the 10.100.100.100 and going right too 10.200.200.200 which doesnt make any sense when i can ping 10.100.100.100. I know the device can reach the local ise node&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 31 Jan 2019 18:04:07 GMT</pubDate>
    <dc:creator>mpbaker82</dc:creator>
    <dc:date>2019-01-31T18:04:07Z</dc:date>
    <item>
      <title>Device Authentication Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792242#M485731</link>
      <description>&lt;P&gt;I use ISE in a&amp;nbsp; distributive deployment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NAD&amp;nbsp; in question is configured with two radius server IP's. (Radius 1 (local PSN) &amp;gt; Radius 2 (Backup PAN))&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can reach both my local psn and remote pan ise nodes from this nad. (i can ping both ISE nodes with no problem)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can even authenticate with the nad device. The live radius logs show the device authentication successfully. My issue is that its authenticating with&amp;nbsp;the wrong policy server. The authentication request is sent to the&amp;nbsp;remote policy server&amp;nbsp;(backup) and not using the local policy server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would expect the authentication request to use the local policy server and not the remote policy server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 15:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792242#M485731</guid>
      <dc:creator>mpbaker82</dc:creator>
      <dc:date>2019-01-31T15:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Device Authentication Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792320#M485733</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Depends on the configuration of the NAD&amp;nbsp; , check the how the PSN's are configured and the priority-order.&lt;/P&gt;
&lt;P&gt;M.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 16:08:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792320#M485733</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2019-01-31T16:08:26Z</dc:date>
    </item>
    <item>
      <title>Re: Device Authentication Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792379#M485735</link>
      <description>This can vayr a bit based on the configuration used in your environment.  An example of how this works follows.  &lt;BR /&gt;&lt;BR /&gt;You will have two radius servers configured on the NAD. The order these two pieces appear is does not matter. &lt;BR /&gt;!!!Define radius server 1 &lt;BR /&gt;radius server ISE-East&lt;BR /&gt;address ipv4 10.100.100.100 auth-port 1812 acct-port 1813&lt;BR /&gt;key xxxxx &lt;BR /&gt;!&lt;BR /&gt;!!!Define raidus server 2&lt;BR /&gt;radius server ISE-West&lt;BR /&gt;address ipv4 10.200.200.200 auth-port 1812 acct-port 1813&lt;BR /&gt;key xxxxx&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;You then should have your radius servers defined as a group.  The order that the radius server names above appear in this group defines the order that they are used.  In this case, ISE-West will be used first, ISE-East second (when there is an issue with first). &lt;BR /&gt;!&lt;BR /&gt;aaa group server radius &amp;lt;your_group_name&amp;gt;&lt;BR /&gt;server name  ISE-West&lt;BR /&gt;server name  ISE-East&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;Some alternate configs exist where the NAD can do load balancing across radius server nodes.  If you scrub a config and share it we can confirm for you if this is the case, or at least why you are seeing the behavior you are.  &lt;BR /&gt;</description>
      <pubDate>Thu, 31 Jan 2019 17:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792379#M485735</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-01-31T17:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: Device Authentication Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792408#M485736</link>
      <description>&lt;P&gt;when we use server groups thats how we set it up. but this device uses radius-server host&lt;/P&gt;&lt;P&gt;AAA Configuration&lt;/P&gt;&lt;P&gt;radius-server host 10.100.100.100 (local ise node)&lt;BR /&gt;radius-server host 10.200.200.200 (remote ise node)&lt;/P&gt;&lt;P&gt;aaa authentication login default radius local&lt;/P&gt;&lt;P&gt;radius-server key 7 &amp;lt;key here&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;its for soem reason skipping the 10.100.100.100 and going right too 10.200.200.200 which doesnt make any sense when i can ping 10.100.100.100. I know the device can reach the local ise node&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 18:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792408#M485736</guid>
      <dc:creator>mpbaker82</dc:creator>
      <dc:date>2019-01-31T18:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Device Authentication Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792559#M485737</link>
      <description>I was going to play with this in my lab but I didn't have a switch on a version of software that supported the old radius-server host config. It took me a while but I found an old 2960 in my closet and played with it a bit.  &lt;BR /&gt;&lt;BR /&gt;I found that the aaa server priority it set based on which server is configured first, sh aaa servers. The servers go in to the running config in the order I configure them on my test switch and they persist this way through reloads.  I was able to flip the order removing priority one from the running/startup config, then entering it in to the config again.</description>
      <pubDate>Thu, 31 Jan 2019 22:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-issue/m-p/3792559#M485737</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-01-31T22:20:14Z</dc:date>
    </item>
  </channel>
</rss>

