<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Recommended RADIUS suppression settings in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696272#M508052</link>
    <description>I have many production deployments, some very large with "Reject repeated failures" disabled.  Per the ISE Advanced Tips and Tricks (AT&amp;amp;T, the good one) recommendations I do have PEAP and EAP-TLS session resume and PEAP Fast Reconnect enabled.  Also under the allowed protocols I have Stateless Session Resume enabled for EAP-TLS with a session ticket life of 2 hours.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I know AT&amp;amp;T says to keep reject repeated failures enabled, but like I said I leave that up to the customer and disable it for the early rollout until we get authentication issues ironed out.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 28 Aug 2018 15:00:05 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2018-08-28T15:00:05Z</dc:date>
    <item>
      <title>Recommended RADIUS suppression settings</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696190#M507950</link>
      <description>&lt;P&gt;I'm wondering what others configure under:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="2"&gt;Administration &amp;gt; System &amp;gt; Settings &amp;gt; Protocols &amp;gt; RADIUS &amp;gt; Suppression &amp;amp; Reports&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Screenshot of my settings attached. While I understand that this is probably highly specific to your environment, I'm curious of the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;I believe TAC has advised enabling some of these features to prevent overloading ISE. Which are safe to disable in a production deployment?&lt;/LI&gt;
&lt;LI&gt;Are the settings I have configured typical? I believe they are mostly default.&lt;/LI&gt;
&lt;LI&gt;If you've configured values other than default, what was your logic? How did you come up with appropriate values?&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 28 Aug 2018 13:42:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696190#M507950</guid>
      <dc:creator>anthonylofreso</dc:creator>
      <dc:date>2018-08-28T13:42:26Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended RADIUS suppression settings</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696212#M508050</link>
      <description>&lt;P&gt;When I am first doing the ISE rollout at a customer, I turn off "&lt;SPAN&gt;Reject RADIUS requests from clients with repeated failures".&amp;nbsp; I explain this feature to them and while it is good feature from an ISE performance perspective it can be frustrating when troubleshooting issues and you forget this feature is enabled.&amp;nbsp; I equate it to client exclusion setting on WLC.&amp;nbsp; Nice feature to have, but again if you forget about the setting it can make troubleshooting more difficult.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once we have authentication working the way we want and work through any issues, I leave it up to the customer if they want to turn it back on.&amp;nbsp; I don't change the other settings.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 14:27:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696212#M508050</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-28T14:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended RADIUS suppression settings</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696252#M508051</link>
      <description>&lt;P&gt;Makes sense. So you have environments in production then with Reject Repeated Failures disabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We've got things mostly configured the way we want, but are seeing some odd issues with Windows clients. I'm thinking we need to tweak the PEAP settings. "PEAP Session Resume" is currently disabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've noticed that "Enable Fast Reconnect" is checked on the windows supplicants... but since PEAP Session Resume is disabled, Fast Reconnect is also disabled in ISE.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 14:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696252#M508051</guid>
      <dc:creator>anthonylofreso</dc:creator>
      <dc:date>2018-08-28T14:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended RADIUS suppression settings</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696272#M508052</link>
      <description>I have many production deployments, some very large with "Reject repeated failures" disabled.  Per the ISE Advanced Tips and Tricks (AT&amp;amp;T, the good one) recommendations I do have PEAP and EAP-TLS session resume and PEAP Fast Reconnect enabled.  Also under the allowed protocols I have Stateless Session Resume enabled for EAP-TLS with a session ticket life of 2 hours.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I know AT&amp;amp;T says to keep reject repeated failures enabled, but like I said I leave that up to the customer and disable it for the early rollout until we get authentication issues ironed out.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Aug 2018 15:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696272#M508052</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-28T15:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended RADIUS suppression settings</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696305#M508053</link>
      <description>&lt;P&gt;Good info. Would you link that ATT Tips/Tricks guide?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 15:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696305#M508053</guid>
      <dc:creator>anthonylofreso</dc:creator>
      <dc:date>2018-08-28T15:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Recommended RADIUS suppression settings</title>
      <link>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696310#M508054</link>
      <description>&lt;P&gt;&lt;A href="https://www.ciscolive.com/global/on-demand-library/?search.event=ciscoliveus2018&amp;amp;search=ISE#/session/1511296178359001Alyb" target="_blank"&gt;BRKSEC-3557 ISE Advanced Tips and Tricks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 15:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/recommended-radius-suppression-settings/m-p/3696310#M508054</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-28T15:40:45Z</dc:date>
    </item>
  </channel>
</rss>

