<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE CWA not working with 3650 running denali 16.3.6 and 16.6.4 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3677890#M495798</link>
    <description>Could you possibly give us more details around the piece that is not working?&lt;BR /&gt;&lt;BR /&gt;For example, when an endpoint that you expect to hit CWA attempts to connect?  Does the auth session on the port receive the CWA redirect url?  Is the endpoint redirected to the portal?  If redirected, after log in, do you just land back on the CWA portal, are you using DHCP relese/renew on the portal, etc? &lt;BR /&gt;&lt;BR /&gt;We need to know more about your intended authentication flow in order to suggest possibly issues or potential open caveats.</description>
    <pubDate>Mon, 30 Jul 2018 22:38:42 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2018-07-30T22:38:42Z</dc:date>
    <item>
      <title>ISE CWA not working with 3650 running denali 16.3.6 and 16.6.4</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3677776#M495797</link>
      <description>&lt;P&gt;We have purchased 3650 new switches 40, configured 5 switches per stack with total of 8 stack switches to be exact and all of them comes with IOS-XE 16.3.x. but I am having issues getting all switches to work with CWA and 802.1x.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried upgrading IOS-XE one stack switch from 16.3.5 to 16.3.6 still no luck. After trial and error I was able to work it with 16.6.4 I already opened support ticket but I have not heard back yet. I was wondering anyone here might have encountered this? I think it is a bug because one stack is on 16.3.6 not working and one stack is on 16.6.4 working so far with same configurations. Please note that we also have 802.1x working on 3560 IOS 15.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2018 20:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3677776#M495797</guid>
      <dc:creator>creserva1</dc:creator>
      <dc:date>2018-07-30T20:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CWA not working with 3650 running denali 16.3.6 and 16.6.4</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3677890#M495798</link>
      <description>Could you possibly give us more details around the piece that is not working?&lt;BR /&gt;&lt;BR /&gt;For example, when an endpoint that you expect to hit CWA attempts to connect?  Does the auth session on the port receive the CWA redirect url?  Is the endpoint redirected to the portal?  If redirected, after log in, do you just land back on the CWA portal, are you using DHCP relese/renew on the portal, etc? &lt;BR /&gt;&lt;BR /&gt;We need to know more about your intended authentication flow in order to suggest possibly issues or potential open caveats.</description>
      <pubDate>Mon, 30 Jul 2018 22:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3677890#M495798</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-07-30T22:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CWA not working with 3650 running denali 16.3.6 and 16.6.4</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3678406#M495799</link>
      <description>&lt;P&gt;Both of these stack switches have same configurations only differences is stack1 16.3.6 and stack2 is 16.6.4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Stack1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;STACK1#show run int gi 1/0/1&lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;Current configuration : 581 bytes&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt; description B9_Client&lt;BR /&gt; switchport access vlan 14&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan 96&lt;BR /&gt; device-tracking attach-policy IP-TRACKING&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; access-session port-control auto&lt;BR /&gt; mab&lt;BR /&gt; trust device cisco-phone&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 10&lt;BR /&gt; auto qos voip cisco-phone &lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; service-policy type control subscriber DOT1X-DEFAULT&lt;BR /&gt; service-policy input AutoQos-4.0-CiscoPhone-Input-Policy&lt;BR /&gt; service-policy output AutoQos-4.0-Output-Policy&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;STACK1#&lt;BR /&gt;Jul 31 2018 10:15:17.220 CST: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/1, changed state to up&lt;BR /&gt;Jul 31 2018 10:15:18.220 CST: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/1, changed state to up&lt;BR /&gt;STACK1#show access-sess int gi &lt;BR /&gt;Jul 31 2018 10:15:45.267 CST: %DOT1X-5-FAIL:Switch 1 R0/0: smd: Authentication failed for client (00B5.6D00.3CA9) on Interface Gi1/0/1 AuditSessionID 0A0A016200000025F0DFCAB9&lt;BR /&gt;Jul 31 2018 10:15:45.268 CST: %SESSION_MGR-5-FAIL:Switch 1 R0/0: smd: Authorization failed or unapplied for client (00B5.6D00.3CA9) on Interface GigabitEthernet1/0/1 AuditSessionID 0A0A016200000025F0DFCAB9&lt;BR /&gt;STACK1#show access-sess int gi 1/0/1 deta&lt;BR /&gt;STACK1#show access-sess int gi 1/0/1 details &lt;BR /&gt; Interface: GigabitEthernet1/0/1&lt;BR /&gt; IIF-ID: 0x1D49D7DA&lt;BR /&gt; MAC Address: 00b5.6d00.3ca9&lt;BR /&gt; IPv6 Address: Unknown&lt;BR /&gt; IPv4 Address: Unknown&lt;BR /&gt; User-Name: 00b56d003ca9&lt;BR /&gt; Status: Unauthorized&lt;BR /&gt; Domain: UNKNOWN&lt;BR /&gt; Oper host mode: multi-auth&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Common Session ID: 0A0A016200000025F0DFCAB9&lt;BR /&gt; Acct Session ID: Unknown&lt;BR /&gt; Handle: 0x6800001a&lt;BR /&gt; Current Policy: DOT1X-DEFAULT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Method status list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Authc Failed&lt;BR /&gt; mab Authc Failed&lt;/P&gt;
&lt;P&gt;STACK1#&lt;BR /&gt;Jul 31 2018 10:16:15.277 CST: %DOT1X-5-FAIL:Switch 1 R0/0: smd: Authentication failed for client (00B5.6D00.3CA9) on Interface Gi1/0/1 AuditSessionID 0A0A016200000025F0DFCAB9&lt;BR /&gt;Jul 31 2018 10:16:15.282 CST: %SESSION_MGR-5-FAIL:Switch 1 R0/0: smd: Authorization failed or unapplied for client (00B5.6D00.3CA9) on Interface GigabitEthernet1/0/1 AuditSessionID 0A0A016200000025F0DFCAB9&lt;BR /&gt;STACK1##unde&lt;BR /&gt;STACK1#undebug all&lt;BR /&gt;All possible debugging has been turned off&lt;BR /&gt;STACK1#&lt;BR /&gt;Jul 31 2018 10:16:45.300 CST: %DOT1X-5-FAIL:Switch 1 R0/0: smd: Authentication failed for client (00B5.6D00.3CA9) on Interface Gi1/0/1 AuditSessionID 0A0A016200000025F0DFCAB9&lt;BR /&gt;Jul 31 2018 10:16:45.306 CST: %SESSION_MGR-5-FAIL:Switch 1 R0/0: smd: Authorization failed or unapplied for client (00B5.6D00.3CA9) on Interface GigabitEthernet1/0/1 AuditSessionID 0A0A016200000025F0DFCAB9&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*****************************************************************&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Stack3&lt;/P&gt;
&lt;P&gt;STACK3#&lt;/P&gt;
&lt;P&gt;STACK3#show run int gi 1/0/1&lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;Current configuration : 581 bytes&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt; description B9_Client&lt;BR /&gt; switchport access vlan 14&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan 96&lt;BR /&gt; device-tracking attach-policy IP-TRACKING&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; access-session port-control auto&lt;BR /&gt; mab&lt;BR /&gt; trust device cisco-phone&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 10&lt;BR /&gt; auto qos voip cisco-phone &lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; service-policy type control subscriber DOT1X-DEFAULT&lt;BR /&gt; service-policy input AutoQos-4.0-CiscoPhone-Input-Policy&lt;BR /&gt; service-policy output AutoQos-4.0-Output-Policy&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Jul 31 2018 10:20:22.056 CST: %EPM-6-AAA: Switch 1 R0/0: smd: POLICY xACSACLx-IP-DACL-pre-WebAuth-5b5c7f89| EVENT DOWNLOAD_REQUEST&lt;BR /&gt;Jul 31 2018 10:20:22.069 CST: %EPM-6-AAA: Switch 5 R0/0: smd: POLICY xACSACLx-IP-DACL-pre-WebAuth-5b5c7f89| EVENT DOWNLOAD-SUCCESS&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:20:23.944 CST: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/1, changed state to up&lt;BR /&gt;Jul 31 2018 10:20:24.945 CST: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/1, changed state to up&lt;BR /&gt;STACK3#show access-se&lt;BR /&gt;STACK3#show access-session int gi 1/0/1 de&lt;BR /&gt;STACK3#show access-session int gi 1/0/1 details &lt;BR /&gt; Interface: GigabitEthernet1/0/1&lt;BR /&gt; IIF-ID: 0x117F7FC0&lt;BR /&gt; MAC Address: 00b5.6d00.3ca9&lt;BR /&gt; IPv6 Address: fe80::f47d:60a2:6a33:31ba&lt;BR /&gt; IPv4 Address: 10.96.14.9&lt;BR /&gt; User-Name: 00-B5-6D-00-3C-A9&lt;BR /&gt; Status: Authorized&lt;BR /&gt; Domain: DATA&lt;BR /&gt; Oper host mode: multi-auth&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Common Session ID: 0A0A016400000014EFDACB31&lt;BR /&gt; Acct Session ID: 0x0000000b&lt;BR /&gt; Handle: 0xf500000a&lt;BR /&gt; Current Policy: DOT1X-DEFAULT&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Server Policies:&lt;BR /&gt; Vlan Group: Vlan: 14&lt;BR /&gt; URL Redirect ACL: ACL-WEBAUTH-REDIRECT&lt;BR /&gt; URL Redirect: &lt;A href="https://10.96.50.181:8443/portal/gateway?sessionId=0A0A016400000014EFDACB31&amp;amp;portal=3f48ef20-7ecd-11e8-a0ec-005056859240&amp;amp;action=cwa&amp;amp;token=65bc1c45e79bc1364c26a3fed54a3930" target="_blank"&gt;https://10.96.50.181:8443/portal/gateway?sessionId=0A0A016400000014EFDACB31&amp;amp;portal=3f48ef20-7ecd-11e8-a0ec-005056859240&amp;amp;action=cwa&amp;amp;token=65bc1c45e79bc1364c26a3fed54a3930&lt;/A&gt;&lt;BR /&gt; ACS ACL: xACSACLx-IP-DACL-pre-WebAuth-5b5c7f89&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Running&lt;BR /&gt; mab Authc Success&lt;/P&gt;
&lt;P&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:20:51.997 CST: %DOT1X-5-FAIL: Switch 1 R0/0: smd: Authentication failed for client (00B5.6D00.3CA9) on Interface Gi1/0/1 AuditSessionID 0A0A016400000014EFDACB31&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:21:03.879 CST: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/1, changed state to down&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:21:04.883 CST: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/1, changed state to down&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:21:10.444 CST: %EPM-6-AAA: Switch 1 R0/0: smd: POLICY xACSACLx-IP-DACL-pre-WebAuth-5b5c7f89| EVENT DOWNLOAD_REQUEST&lt;BR /&gt;Jul 31 2018 10:21:10.457 CST: %EPM-6-AAA: Switch 5 R0/0: smd: POLICY xACSACLx-IP-DACL-pre-WebAuth-5b5c7f89| EVENT DOWNLOAD-SUCCESS&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:21:12.173 CST: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/2, changed state to up&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:21:13.173 CST: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/2, changed state to up&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:21:40.406 CST: %DOT1X-5-FAIL: Switch 1 R0/0: smd: Authentication failed for client (00B5.6D00.3CA9) on Interface Gi1/0/2 AuditSessionID 0A0A016400000015EFDB884D&lt;BR /&gt;STACK3#&lt;BR /&gt;Jul 31 2018 10:21:51.827 CST: %EPM-6-AAA: Switch 1 R0/0: smd: POLICY xACSACLx-IP-DACL-Guest_Internet-5b292354| EVENT DOWNLOAD_REQUEST&lt;BR /&gt;Jul 31 2018 10:21:51.859 CST: %EPM-6-AAA: Switch 5 R0/0: smd: POLICY xACSACLx-IP-DACL-Guest_Internet-5b292354| EVENT DOWNLOAD-SUCCESS&lt;BR /&gt;STACK3#show access-session int gi 1/0/2 details &lt;BR /&gt; Interface: GigabitEthernet1/0/2&lt;BR /&gt; IIF-ID: 0x1E0E2E0F&lt;BR /&gt; MAC Address: 00b5.6d00.3ca9&lt;BR /&gt; IPv6 Address: fe80::f47d:60a2:6a33:31ba&lt;BR /&gt; IPv4 Address: 10.96.14.9&lt;BR /&gt; User-Name: guest@domain.any&lt;BR /&gt; Status: Authorized&lt;BR /&gt; Domain: DATA&lt;BR /&gt; Oper host mode: multi-auth&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: 5400s (server), Remaining: 5376s&lt;BR /&gt; Timeout action: Reauthenticate&lt;BR /&gt; Common Session ID: 0A0A016400000015EFDB884D&lt;BR /&gt; Acct Session ID: 0x0000000d&lt;BR /&gt; Handle: 0x9d00000b&lt;BR /&gt; Current Policy: DOT1X-DEFAULT&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Server Policies:&lt;BR /&gt; Vlan Group: Vlan: 14&lt;BR /&gt; ACS ACL: xACSACLx-IP-DACL-Guest_Internet-5b292354&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Stopped&lt;BR /&gt; mab Authc Success&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jul 2018 15:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3678406#M495799</guid>
      <dc:creator>creserva1</dc:creator>
      <dc:date>2018-07-31T15:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CWA not working with 3650 running denali 16.3.6 and 16.6.4</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3682044#M495844</link>
      <description>&lt;P&gt;confirmed with cisco tac support that it is similar bug to &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg07470/?reffering_site=dumpcr" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg07470/?reffering_site=dumpcr&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They are&amp;nbsp;advising to use 16.6.4 in my case, it is not a big deal since all these 40 switches came in with out-of-box&amp;nbsp;of pre-installed 16.3.6 and was not on productions environment at this time. Moving to 16.6.4 I already did on 6 stack switches anyway since 802.1x is broken on 16.3.6&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 13:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cwa-not-working-with-3650-running-denali-16-3-6-and-16-6-4/m-p/3682044#M495844</guid>
      <dc:creator>creserva1</dc:creator>
      <dc:date>2018-08-06T13:42:30Z</dc:date>
    </item>
  </channel>
</rss>

