<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.4 and Radius on Ciena Optical Platforms in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716325#M507343</link>
    <description>&lt;P&gt;Attached policy screenshot.&amp;nbsp; Note that the last two rules have shown 0 and 5 hits for weeks, so neither rule is getting hit.&amp;nbsp; Also, the default device admin allowed protocols profile has pap radius allowed.&amp;nbsp; Also below is the detailed auth report.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="cpmLocalTableSpacing" border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top" colspan="2"&gt;
&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;TABLE width="100%" class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Overview&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Event&lt;/TD&gt;
&lt;TD width="69%"&gt;5400 Authentication failed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Username&lt;/TD&gt;
&lt;TD width="69%" class="endPointClass"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Endpoint Id&lt;/TD&gt;
&lt;TD width="69%" class="endPointClass"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Endpoint Profile&lt;/TD&gt;
&lt;TD width="69%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Authentication Policy&lt;/TD&gt;
&lt;TD width="67%"&gt;Default&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Authorization Policy&lt;/TD&gt;
&lt;TD width="67%"&gt;Default&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Authorization Result&lt;/TD&gt;
&lt;TD width="69%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;BR /&gt;
&lt;TABLE width="100%" class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Authentication Details&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Source Timestamp&lt;/TD&gt;
&lt;TD width="69%"&gt;2018-10-01 07:53:09.539&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Received Timestamp&lt;/TD&gt;
&lt;TD width="69%"&gt;2018-10-01 07:53:09.539&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Policy Server&lt;/TD&gt;
&lt;TD width="69%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Event&lt;/TD&gt;
&lt;TD width="69%"&gt;5400 Authentication failed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Failure Reason&lt;/TD&gt;
&lt;TD width="69%"&gt;15024 PAP is not allowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Resolution&lt;/TD&gt;
&lt;TD width="69%"&gt;Enable PAP/ASCII protocol for the selected service&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Root cause&lt;/TD&gt;
&lt;TD width="69%"&gt;PAP is not allowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Username&lt;/TD&gt;
&lt;TD width="69%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Network Device&lt;/TD&gt;
&lt;TD width="69%"&gt;ION015OT03P&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Device Type&lt;/TD&gt;
&lt;TD width="69%"&gt;All Device Types#DC Core#Optical&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Location&lt;/TD&gt;
&lt;TD width="69%"&gt;All Locations&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;NAS IPv4 Address&lt;/TD&gt;
&lt;TD width="69%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Response Time&lt;/TD&gt;
&lt;TD width="69%"&gt;3&amp;nbsp;milliseconds&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;BR /&gt;
&lt;TABLE class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Other Attributes&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;ConfigVersionId&lt;/TD&gt;
&lt;TD width="67%"&gt;284&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device Port&lt;/TD&gt;
&lt;TD width="67%"&gt;5556&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;DestinationPort&lt;/TD&gt;
&lt;TD width="67%"&gt;1812&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;RadiusPacketType&lt;/TD&gt;
&lt;TD width="67%"&gt;AccessRequest&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Protocol&lt;/TD&gt;
&lt;TD width="67%"&gt;Radius&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;NetworkDeviceProfileId&lt;/TD&gt;
&lt;TD width="67%"&gt;b0699505-3150-4215-a80e-6753d45bf56c&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;IsThirdPartyDeviceFlow&lt;/TD&gt;
&lt;TD width="67%"&gt;false&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;AcsSessionID&lt;/TD&gt;
&lt;TD width="67%"&gt;inv001ise01p/323033956/7111027&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;CPMSessionID&lt;/TD&gt;
&lt;TD width="67%"&gt;0a800a28LmSHodSQfzi0b6n5i6Sop3TJkKLH9RgDBnXqTuLbiqs&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;ISEPolicySetName&lt;/TD&gt;
&lt;TD width="67%"&gt;Default&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;DTLSSupport&lt;/TD&gt;
&lt;TD width="67%"&gt;Unknown&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Network Device Profile&lt;/TD&gt;
&lt;TD width="67%"&gt;Cisco&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Location&lt;/TD&gt;
&lt;TD width="67%"&gt;Location#All Locations&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device Type&lt;/TD&gt;
&lt;TD width="67%"&gt;Device Type#All Device Types#DC Core#Optical&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;IPSEC&lt;/TD&gt;
&lt;TD width="67%"&gt;IPSEC#Is IPSEC Device#No&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;RADIUS Username&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;NAS-Identifier&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device IP Address&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Called-Station-ID&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;BR /&gt;
&lt;TABLE width="1005" class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Result&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;RadiusPacketType&lt;/TD&gt;
&lt;TD width="69%"&gt;AccessReject&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;AuthenticationResult&lt;/TD&gt;
&lt;TD width="69%"&gt;NotAllowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;H3 class="title"&gt;&lt;SPAN&gt;Steps&lt;/SPAN&gt;&lt;/H3&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11017&lt;/TD&gt;
&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11117&lt;/TD&gt;
&lt;TD&gt;Generated a new session ID&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15049&lt;/TD&gt;
&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15008&lt;/TD&gt;
&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - Network Access.Protocol&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - DEVICE.Device Type&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15024&lt;/TD&gt;
&lt;TD&gt;PAP is not allowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11003&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;DIV tabindex="-1" class="xwtPopoverCoordNode" id="ttp2_coordNode"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Mon, 01 Oct 2018 12:55:32 GMT</pubDate>
    <dc:creator>cmlozano8</dc:creator>
    <dc:date>2018-10-01T12:55:32Z</dc:date>
    <item>
      <title>ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714528#M507334</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I am having difficulty getting radius authentication to work with our Ciena 6500 optical chassis.&amp;nbsp; Trying to do Radius with PAP.&amp;nbsp; I have policy sets defined with TACACs and Radius.&amp;nbsp; Tacacs works fine.&amp;nbsp; I have a single policy that is suppossed to match network access protocol radius and from their authorize based on user and group, however I can't seem to get any hits on the policy.&amp;nbsp; The radius live logs indicate it is hitting default which doesn't permit PAP.&amp;nbsp; However the hit counters don't increment for the default catch all rule either at the bottom so I am not sure what I am hitting.&amp;nbsp; If I can get the requests to hit the policy I created I think I should be good.&amp;nbsp; The only condition for the policy is Network Access Protocol Radius.&amp;nbsp; Is there something else I need to do to make this work?&amp;nbsp; Or is there something else I may need to consider given they are not Cisco devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We currently have the Ciena devices successfully doing Radius Auth via Windows Network Policy Server without issue.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 18:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714528#M507334</guid>
      <dc:creator>cmlozano8</dc:creator>
      <dc:date>2018-09-27T18:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714529#M507335</link>
      <description>Just so I understand correctly, you have a policy set for these optical switches and are trying to match that policy using RADIUS?  If that is correct, why not try to match based on device type instead?  You can add all those switches to a device type and then us it to match RADIUS requests.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Tim&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Sep 2018 18:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714529#M507335</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-09-27T18:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714536#M507336</link>
      <description>Hi Tim,&lt;BR /&gt;Thanks for the suggestion, I did try that as I have created a seperate group for the Optical Chassis however I am getting the same exact behavior.  I don't see any hits going up.  Even moved the rule to the very top.  Almost as if it is not even trying the policy set.</description>
      <pubDate>Thu, 27 Sep 2018 19:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714536#M507336</guid>
      <dc:creator>cmlozano8</dc:creator>
      <dc:date>2018-09-27T19:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714539#M507337</link>
      <description>You may be running into an issue I’ve seen in the past.  Are you using “equals” in your condition to match the policy set?  If so, trying using “starts with” instead.  If that doesn’t work, I recommend contacting the TAC to troubleshoot further.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Tim&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Sep 2018 19:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3714539#M507337</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-09-27T19:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3715719#M507340</link>
      <description>&lt;P&gt;You need to have an authentication rule covering PAP in the Allowed Protocols list.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Sep 2018 10:35:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3715719#M507340</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2018-09-30T10:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3715779#M507341</link>
      <description>&lt;P&gt;Please attach the policy screenshot and the detailed radius log.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Sep 2018 17:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3715779#M507341</guid>
      <dc:creator>Aravind Ravichandran</dc:creator>
      <dc:date>2018-09-30T17:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3715800#M507342</link>
      <description>&lt;P&gt;IF the default authentication policy does not include PAP, then you will either need to add it to the default or create a new authentication rule that does.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that authentication &amp;amp; authorization policy hits are not updated real-time. ISE updates the hit counters every 10 minutes or so. Use Livelog error messages to understand what rules are being hit and why.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Sep 2018 19:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3715800#M507342</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2018-09-30T19:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716325#M507343</link>
      <description>&lt;P&gt;Attached policy screenshot.&amp;nbsp; Note that the last two rules have shown 0 and 5 hits for weeks, so neither rule is getting hit.&amp;nbsp; Also, the default device admin allowed protocols profile has pap radius allowed.&amp;nbsp; Also below is the detailed auth report.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="cpmLocalTableSpacing" border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top" colspan="2"&gt;
&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;TABLE width="100%" class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Overview&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Event&lt;/TD&gt;
&lt;TD width="69%"&gt;5400 Authentication failed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Username&lt;/TD&gt;
&lt;TD width="69%" class="endPointClass"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Endpoint Id&lt;/TD&gt;
&lt;TD width="69%" class="endPointClass"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Endpoint Profile&lt;/TD&gt;
&lt;TD width="69%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Authentication Policy&lt;/TD&gt;
&lt;TD width="67%"&gt;Default&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Authorization Policy&lt;/TD&gt;
&lt;TD width="67%"&gt;Default&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Authorization Result&lt;/TD&gt;
&lt;TD width="69%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;BR /&gt;
&lt;TABLE width="100%" class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Authentication Details&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Source Timestamp&lt;/TD&gt;
&lt;TD width="69%"&gt;2018-10-01 07:53:09.539&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Received Timestamp&lt;/TD&gt;
&lt;TD width="69%"&gt;2018-10-01 07:53:09.539&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Policy Server&lt;/TD&gt;
&lt;TD width="69%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Event&lt;/TD&gt;
&lt;TD width="69%"&gt;5400 Authentication failed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Failure Reason&lt;/TD&gt;
&lt;TD width="69%"&gt;15024 PAP is not allowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Resolution&lt;/TD&gt;
&lt;TD width="69%"&gt;Enable PAP/ASCII protocol for the selected service&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Root cause&lt;/TD&gt;
&lt;TD width="69%"&gt;PAP is not allowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Username&lt;/TD&gt;
&lt;TD width="69%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Network Device&lt;/TD&gt;
&lt;TD width="69%"&gt;ION015OT03P&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Device Type&lt;/TD&gt;
&lt;TD width="69%"&gt;All Device Types#DC Core#Optical&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Location&lt;/TD&gt;
&lt;TD width="69%"&gt;All Locations&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;NAS IPv4 Address&lt;/TD&gt;
&lt;TD width="69%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Response Time&lt;/TD&gt;
&lt;TD width="69%"&gt;3&amp;nbsp;milliseconds&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;BR /&gt;
&lt;TABLE class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Other Attributes&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;ConfigVersionId&lt;/TD&gt;
&lt;TD width="67%"&gt;284&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device Port&lt;/TD&gt;
&lt;TD width="67%"&gt;5556&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;DestinationPort&lt;/TD&gt;
&lt;TD width="67%"&gt;1812&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;RadiusPacketType&lt;/TD&gt;
&lt;TD width="67%"&gt;AccessRequest&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Protocol&lt;/TD&gt;
&lt;TD width="67%"&gt;Radius&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;NetworkDeviceProfileId&lt;/TD&gt;
&lt;TD width="67%"&gt;b0699505-3150-4215-a80e-6753d45bf56c&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;IsThirdPartyDeviceFlow&lt;/TD&gt;
&lt;TD width="67%"&gt;false&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;AcsSessionID&lt;/TD&gt;
&lt;TD width="67%"&gt;inv001ise01p/323033956/7111027&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;CPMSessionID&lt;/TD&gt;
&lt;TD width="67%"&gt;0a800a28LmSHodSQfzi0b6n5i6Sop3TJkKLH9RgDBnXqTuLbiqs&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;ISEPolicySetName&lt;/TD&gt;
&lt;TD width="67%"&gt;Default&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;DTLSSupport&lt;/TD&gt;
&lt;TD width="67%"&gt;Unknown&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Network Device Profile&lt;/TD&gt;
&lt;TD width="67%"&gt;Cisco&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Location&lt;/TD&gt;
&lt;TD width="67%"&gt;Location#All Locations&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device Type&lt;/TD&gt;
&lt;TD width="67%"&gt;Device Type#All Device Types#DC Core#Optical&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;IPSEC&lt;/TD&gt;
&lt;TD width="67%"&gt;IPSEC#Is IPSEC Device#No&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;RADIUS Username&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;NAS-Identifier&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Device IP Address&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33%"&gt;Called-Station-ID&lt;/TD&gt;
&lt;TD width="67%"&gt;scrubbed&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;BR /&gt;
&lt;TABLE width="1005" class="auth_detail_container"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;H3 class="title"&gt;Result&lt;/H3&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;RadiusPacketType&lt;/TD&gt;
&lt;TD width="69%"&gt;AccessReject&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;AuthenticationResult&lt;/TD&gt;
&lt;TD width="69%"&gt;NotAllowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;H3 class="title"&gt;&lt;SPAN&gt;Steps&lt;/SPAN&gt;&lt;/H3&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11017&lt;/TD&gt;
&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11117&lt;/TD&gt;
&lt;TD&gt;Generated a new session ID&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15049&lt;/TD&gt;
&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15008&lt;/TD&gt;
&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - Network Access.Protocol&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - DEVICE.Device Type&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15024&lt;/TD&gt;
&lt;TD&gt;PAP is not allowed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11003&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;DIV tabindex="-1" class="xwtPopoverCoordNode" id="ttp2_coordNode"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 01 Oct 2018 12:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716325#M507343</guid>
      <dc:creator>cmlozano8</dc:creator>
      <dc:date>2018-10-01T12:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716340#M507344</link>
      <description>&lt;P&gt;attached allowed protocols "default device admin"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 13:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716340#M507344</guid>
      <dc:creator>cmlozano8</dc:creator>
      <dc:date>2018-10-01T13:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716431#M507347</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You have configured Radius related policies under device admin policy sets,try to create the same policy under &lt;STRONG&gt;Policy-&amp;gt;Policy sets&lt;/STRONG&gt; &amp;amp; use&lt;STRONG&gt; Default network access&lt;/STRONG&gt; in Allowed protocol.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 14:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716431#M507347</guid>
      <dc:creator>Aravind Ravichandran</dc:creator>
      <dc:date>2018-10-01T14:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 and Radius on Ciena Optical Platforms</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716648#M507350</link>
      <description>&lt;P&gt;Yes! Thanks that was my problem.&amp;nbsp; Didn't realize they were separate.&amp;nbsp; I am now hitting the policy.&amp;nbsp; Now I need to tshoot authorization as I am not getting full admin rights in the Ciena GUI.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 15:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-and-radius-on-ciena-optical-platforms/m-p/3716648#M507350</guid>
      <dc:creator>cmlozano8</dc:creator>
      <dc:date>2018-10-01T15:57:28Z</dc:date>
    </item>
  </channel>
</rss>

