<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Authentication failed - Extreme in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539019#M510704</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For starters, my mistake since I assumed you were trying MAC auth first but realize you mention NAM and that would explain the username of anonymous as outer identity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For MAB use case:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You must first config Extreme Switch for MAC Auth which seems to be missing from config.&amp;nbsp; See:&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-Mac-based-Netlogin-with-Radius/?l=en_US&amp;amp;fs=RelatedArticle" title="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-Mac-based-Netlogin-with-Radius/?l=en_US&amp;amp;fs=RelatedArticle"&gt;&lt;BR /&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-Mac-based-Netlogin-with-Radius/?l=en_US&amp;amp;fs=Re…&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Remove CHAP if not used.&lt;/LI&gt;&lt;LI&gt;Remove the MAB flow condition for matching username to Calling ID.&amp;nbsp; By default, Wired MAB flow is at the top of Authentication Policy and should match once make above change.&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;If properly matching correct flow type for MAB and 1X, then good to go, but if hitting wrong rule, then may need to disable one or change order rule sequence until determine other unique attributes to distinguish MAB vs 1X.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For 1X use case:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;See &lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-with-Radius-on-EXOS/?l=en_US&amp;amp;fs=RelatedArticle" title="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-with-Radius-on-EXOS/?l=en_US&amp;amp;fs=RelatedArticle"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-with-Radius-on-EXOS/?l=…&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Make sure ISE Allowed Protocols are set to match EAP protocol used by Extreme.&lt;/LI&gt;&lt;LI&gt;Make sure correct NAD profile is being selected and applied to Authorization Profile and that profile is applied to the matching AuthZ Policy Rule.&lt;/LI&gt;&lt;LI&gt;If having issues with NAM, try native supplicant.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Apr 2018 19:05:50 GMT</pubDate>
    <dc:creator>Craig Hyps</dc:creator>
    <dc:date>2018-04-17T19:05:50Z</dc:date>
    <item>
      <title>ISE Authentication failed - Extreme</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539014#M510699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working on an important POV but we are facing one issues with Extreme Networks switches which is the following :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="screenshot.png" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/116562_screenshot.png" style="height: 467px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="screenshot.png" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/116563_screenshot.png" style="height: 144px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how the NAD is configured :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="screenshot.png" class="jive-image image-3" src="https://community.cisco.com/legacyfs/online/fusion/116582_screenshot.png" style="height: 112px; width: 620px;" /&gt;&lt;IMG alt="screenshot.png" class="jive-image image-4" src="https://community.cisco.com/legacyfs/online/fusion/116583_screenshot.png" style="height: 193px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We tried different devices, the session of those sessions are terminated in the Live Logs.&lt;/P&gt;&lt;P&gt;The endpoint use NAM and has been tested working fine on other switches with 802.1X&lt;/P&gt;&lt;P&gt;Attached the config on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to close this POV on Friday and this is an important part of it, your inputs are more than welcome &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 13:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539014#M510699</guid>
      <dc:creator>rvacher</dc:creator>
      <dc:date>2018-04-17T13:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication failed - Extreme</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539015#M510700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you able to see what the RADIUS service-type is?&amp;nbsp; I'm wondering if it is not matching because of the service-type value sent from the switch to ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 13:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539015#M510700</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-04-17T13:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication failed - Extreme</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539016#M510701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The service-type is Login. This is what is configured in the NAD and also what we receive from the RADIUS request (see screenshot)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 14:05:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539016#M510701</guid>
      <dc:creator>rvacher</dc:creator>
      <dc:date>2018-04-17T14:05:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication failed - Extreme</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539017#M510702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue is typically in NAD Profile under the Host Lookup settings.&amp;nbsp; One EXOS reference indicates that PAP is required protocol.&amp;nbsp; Another item to investigate is Policy &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authentication &amp;gt; Allowed Protocols and the use of Message Authenticator (at bottom).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another issue is that current flow matches are not distinct enough to separate 802.1X from MAB flow.&amp;nbsp; In your screenshot above, the username was anonymous but Calling ID is MAC.&amp;nbsp; Need to make sure matching MAB flow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 15:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539017#M510702</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-17T15:34:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication failed - Extreme</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539018#M510703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig. This is how the NAD is configured with PAP activated.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2.jpg" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/116598_2.jpg" style="height: 405px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try tomorrow to activate Message Authenticator.&lt;/P&gt;&lt;P&gt;For the flow, yes for MAB it is not matching. Not sure so far how can I distinguish them.&lt;/P&gt;&lt;P&gt;For 802.1X it should match however but still getting this error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 18:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539018#M510703</guid>
      <dc:creator>rvacher</dc:creator>
      <dc:date>2018-04-17T18:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authentication failed - Extreme</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539019#M510704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For starters, my mistake since I assumed you were trying MAC auth first but realize you mention NAM and that would explain the username of anonymous as outer identity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For MAB use case:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You must first config Extreme Switch for MAC Auth which seems to be missing from config.&amp;nbsp; See:&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-Mac-based-Netlogin-with-Radius/?l=en_US&amp;amp;fs=RelatedArticle" title="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-Mac-based-Netlogin-with-Radius/?l=en_US&amp;amp;fs=RelatedArticle"&gt;&lt;BR /&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-Mac-based-Netlogin-with-Radius/?l=en_US&amp;amp;fs=Re…&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Remove CHAP if not used.&lt;/LI&gt;&lt;LI&gt;Remove the MAB flow condition for matching username to Calling ID.&amp;nbsp; By default, Wired MAB flow is at the top of Authentication Policy and should match once make above change.&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;If properly matching correct flow type for MAB and 1X, then good to go, but if hitting wrong rule, then may need to disable one or change order rule sequence until determine other unique attributes to distinguish MAB vs 1X.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For 1X use case:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;See &lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-with-Radius-on-EXOS/?l=en_US&amp;amp;fs=RelatedArticle" title="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-with-Radius-on-EXOS/?l=en_US&amp;amp;fs=RelatedArticle"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-with-Radius-on-EXOS/?l=…&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Make sure ISE Allowed Protocols are set to match EAP protocol used by Extreme.&lt;/LI&gt;&lt;LI&gt;Make sure correct NAD profile is being selected and applied to Authorization Profile and that profile is applied to the matching AuthZ Policy Rule.&lt;/LI&gt;&lt;LI&gt;If having issues with NAM, try native supplicant.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 19:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication-failed-extreme/m-p/3539019#M510704</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-17T19:05:50Z</dc:date>
    </item>
  </channel>
</rss>

