<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.4 Patch 4 Warning + Release Notes Feedback in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734516#M489081</link>
    <description>To be honest I'm not entirely sure either. LDAP appeared unaffected, I was still able to log in to the GUI via the LDAP connector.  When I went to go lookup my same user account, which is synced between AD and LDAP,  the AD connector test utility if would fail.  Within the whitelisted domains section of the AD connector there are 9 domains across 4 forests.  &lt;BR /&gt;&lt;BR /&gt;Test Username : abc123&lt;BR /&gt;ISE NODE : &lt;BR /&gt;Scope : Default_Scope&lt;BR /&gt;Instance : alphabet-world&lt;BR /&gt;&lt;BR /&gt;Authentication Result : FAILED&lt;BR /&gt;Error : Identity Not Found; Some Of The Domains Were Not Available&lt;BR /&gt;&lt;BR /&gt;Processing Steps:&lt;BR /&gt;05:14:24:269: Resolving Identity - abc123&lt;BR /&gt;05:14:24:270: Search For Matching Accounts At Join Point - world.abc.alphabet.com&lt;BR /&gt;05:14:24:270: LDAP Search In Forest Failed - abc.alphabet.com,ERROR_NO_SUCH_DOMAIN&lt;BR /&gt;05:14:24:270: Skipping Unusable Domain - def.local,Domain Trust Is One-way&lt;BR /&gt;Trimmed&lt;BR /&gt;05:14:24:271: Identity Resolution Detected No Matching Account&lt;BR /&gt;05:14:24:271: Identity Resolution Failed - ERROR_NO_SUCH_USER_SOME_DOMAINS_NOT_AVAILABLE&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If I was to append the domain, ex. world\abc123 the lookup would work.  It would also work fine if I was to use abc123@world.abc.alphabet.com.  If I did not specify the domain it would always fail.  The failed lookups weren't even being logged to the ad_agent.log file, just a silent failure.  &lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Sun, 28 Oct 2018 22:21:54 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2018-10-28T22:21:54Z</dc:date>
    <item>
      <title>ISE 2.4 Patch 4 Warning + Release Notes Feedback</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734260#M488997</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had the opportunity to hit this Severity 1 Catastrophic bug while installing patch 4 last night and it got me thinking.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm93698/" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm93698/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Why is&amp;nbsp;an available patch still available for download, and not deferred, if it has a catastrophic bug open with no fix/work around. The conditions being a multiforest AD isn't some rare one off environment. The number of support cases attached to it can attest to this.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Why do the release notes open caveats always trail one patch behind.&amp;nbsp; ex. When patch 5 releases, we will see patch 4 open caveats updated. It seems that serious and high impact bugs are sometimes available on the bug tracker or hidden from public view. It's almost like those of us in the field need to always trail a patch behind to be safe. It would be nice to at least see the more serious issues added/updated in more real time.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Oct 2018 00:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734260#M488997</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-10-28T00:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Patch 4 Warning + Release Notes Feedback</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734270#M488998</link>
      <description>&lt;P&gt;On 1, we did not get any report CSCvm93698&amp;nbsp;impacting ISE 2.4 Patch 4 until a couple of days ago. And, no issue in backing out the patch.&lt;/P&gt;
&lt;P&gt;On 2, I will forward your comments to our teams to review. However, we do not generally update the release notes until new patch releases.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Oct 2018 02:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734270#M488998</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-28T02:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Patch 4 Warning + Release Notes Feedback</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734511#M489000</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt; - sorry to hear about that - those are not fun times.&amp;nbsp; You'd think AD software in ISE should be rock solid by now so that we can concentrate on fighting bugs in NEW FEATURES &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently did two separate customer deployments where I built ISE 2.4 from scratch and in one case patched straight to 4. And in the other case I went from 3 to 4.&amp;nbsp; In both cases I have AD integration. I am not sure I understand this bug because I have not noticed any issues. Can you please expand on the exact trigger here?&lt;/P&gt;
&lt;P&gt;e.g. In one customer case I have one join point, which reveals 4 domains.&amp;nbsp; I whitelist one of the 4 domains.&amp;nbsp; We are able to authenticate just fine against the whitelisted domain.&lt;/P&gt;
&lt;P&gt;I don't have more than one join point - and I have not used scopes.&lt;/P&gt;
&lt;P&gt;Would this be an issue if I used LDAP against an AD domain?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Oct 2018 21:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734511#M489000</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-28T21:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Patch 4 Warning + Release Notes Feedback</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734516#M489081</link>
      <description>To be honest I'm not entirely sure either. LDAP appeared unaffected, I was still able to log in to the GUI via the LDAP connector.  When I went to go lookup my same user account, which is synced between AD and LDAP,  the AD connector test utility if would fail.  Within the whitelisted domains section of the AD connector there are 9 domains across 4 forests.  &lt;BR /&gt;&lt;BR /&gt;Test Username : abc123&lt;BR /&gt;ISE NODE : &lt;BR /&gt;Scope : Default_Scope&lt;BR /&gt;Instance : alphabet-world&lt;BR /&gt;&lt;BR /&gt;Authentication Result : FAILED&lt;BR /&gt;Error : Identity Not Found; Some Of The Domains Were Not Available&lt;BR /&gt;&lt;BR /&gt;Processing Steps:&lt;BR /&gt;05:14:24:269: Resolving Identity - abc123&lt;BR /&gt;05:14:24:270: Search For Matching Accounts At Join Point - world.abc.alphabet.com&lt;BR /&gt;05:14:24:270: LDAP Search In Forest Failed - abc.alphabet.com,ERROR_NO_SUCH_DOMAIN&lt;BR /&gt;05:14:24:270: Skipping Unusable Domain - def.local,Domain Trust Is One-way&lt;BR /&gt;Trimmed&lt;BR /&gt;05:14:24:271: Identity Resolution Detected No Matching Account&lt;BR /&gt;05:14:24:271: Identity Resolution Failed - ERROR_NO_SUCH_USER_SOME_DOMAINS_NOT_AVAILABLE&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If I was to append the domain, ex. world\abc123 the lookup would work.  It would also work fine if I was to use abc123@world.abc.alphabet.com.  If I did not specify the domain it would always fail.  The failed lookups weren't even being logged to the ad_agent.log file, just a silent failure.  &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 28 Oct 2018 22:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734516#M489081</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-10-28T22:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Patch 4 Warning + Release Notes Feedback</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734524#M489082</link>
      <description>&lt;P&gt;I will admit that most of the time I can't tell the difference between a domain and a forest (other than the technical definition) so when I first get introduced to a customer network, and they say, our users live in domain&amp;nbsp; mycompany.com, then all I do is create a joinpoint at mycompany.com and ensure that I only whitelist mycompany.com once ISE discovers all the other "linked/trusted" domains.&amp;nbsp; But whether or not I have joined a forest or not, I have no idea. I would like to understand that stuff a bit better.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is one guy at Cisco (&lt;SPAN class="speaker-trigger" data-test="speaker-trigger"&gt;Chris Murray&lt;/SPAN&gt;, Technical Leader) who gave a CiscoLive preso on the AD Connector and I think he also created the AD stuff back in ACS days - as far as engineering goes, for me it stands out as better than anything else in the code base (it's been very stable in the past, well documented and the debugging in the GUI is top stuff).&amp;nbsp; This guy might be able to explain this nicely.&amp;nbsp; &lt;/P&gt;
&lt;P&gt;Pity that he doesn't appear on the forums &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;His session is BRKSEC-2132&lt;/P&gt;</description>
      <pubDate>Sun, 28 Oct 2018 22:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734524#M489082</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-28T22:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Patch 4 Warning + Release Notes Feedback</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734872#M489083</link>
      <description>&lt;P&gt;This behavior definitely needs to change. If there is a bug above a certain threshold, the release notes need to be updated with that information...&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;U&gt;&lt;FONT size="4" color="#FF0000"&gt;&lt;STRONG&gt;Big Bold Red&lt;/STRONG&gt;&lt;/FONT&gt;&lt;STRONG&gt;&lt;FONT size="4" color="#FF0000"&gt; banner&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;If you look back to&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj53801" target="_blank"&gt;CSCvj53801&lt;/A&gt;, that memory leak existed in two patches. The delta between introducing the memory leak, and the fixed patch-9 was nearly 100 days. Even if Cisco found the leak 60 days after releasing patch 7, that left customers un-aware for over a month unless they did some Sherlock level sleuthing to find the bug ID.&lt;/P&gt;
&lt;P&gt;What is the reasoning on holding Release Note revisions until a new version is published?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 13:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734872#M489083</guid>
      <dc:creator>anthonylofreso</dc:creator>
      <dc:date>2018-10-29T13:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Patch 4 Warning + Release Notes Feedback</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734894#M489084</link>
      <description>&lt;P&gt;I also have the same problem with patch 4.&lt;/P&gt;
&lt;P&gt;First time I hit the bug, I thought it was because I went directly to patch 4 so I rolled back and installed the patches one by one but still I had the error in patch 4 so I rolled back to patch 3 and opened a TAC case, hopefully they will find the root cause.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 13:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-patch-4-warning-release-notes-feedback/m-p/3734894#M489084</guid>
      <dc:creator>walwar</dc:creator>
      <dc:date>2018-10-29T13:34:30Z</dc:date>
    </item>
  </channel>
</rss>

