<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows 10 machine onboard every couple of days in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581479#M510861</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a client that is using Windows 10 machines. The machine onboards without any issues, but every week or so the machine does not send the user authentication and wants to onboard again. Where do I look to get this resolved. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE version 2.2&lt;/P&gt;&lt;P&gt;Switch 3850&lt;/P&gt;&lt;P&gt;3CPL on the ports &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber ISE-PORTS-Configuration&lt;/P&gt;&lt;P&gt; event session-started match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x priority 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab priority 20&lt;/P&gt;&lt;P&gt; event agent-found match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/P&gt;&lt;P&gt; event authentication-success match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-until-failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE&lt;/P&gt;&lt;P&gt; event violation match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 restrict&lt;/P&gt;&lt;P&gt; event authentication-failure match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class AAA-DOWN do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authorize&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 activate service-template CRITICAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 30 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 40 terminate mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20 class DOT1X-FAILED do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using mab&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Apr 2018 07:40:24 GMT</pubDate>
    <dc:creator>chrisvanwyk</dc:creator>
    <dc:date>2018-04-11T07:40:24Z</dc:date>
    <item>
      <title>Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581479#M510861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a client that is using Windows 10 machines. The machine onboards without any issues, but every week or so the machine does not send the user authentication and wants to onboard again. Where do I look to get this resolved. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE version 2.2&lt;/P&gt;&lt;P&gt;Switch 3850&lt;/P&gt;&lt;P&gt;3CPL on the ports &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber ISE-PORTS-Configuration&lt;/P&gt;&lt;P&gt; event session-started match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x priority 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab priority 20&lt;/P&gt;&lt;P&gt; event agent-found match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/P&gt;&lt;P&gt; event authentication-success match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-until-failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE&lt;/P&gt;&lt;P&gt; event violation match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 restrict&lt;/P&gt;&lt;P&gt; event authentication-failure match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class AAA-DOWN do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authorize&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 activate service-template CRITICAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 30 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 40 terminate mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20 class DOT1X-FAILED do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using mab&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2018 07:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581479#M510861</guid>
      <dc:creator>chrisvanwyk</dc:creator>
      <dc:date>2018-04-11T07:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581480#M510862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not clear what is meant by "onboards every two days"--Actually goes through some type of onboarding flow, or simply loses connectivity?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;General troubleshooting prior to opening case with Microsoft and possibly Cisco TAC:&lt;/P&gt;&lt;P&gt;- Are other clients working as expected? &lt;/P&gt;&lt;P&gt;- Is issue isolated to specific Windows version, or switch, switch model, version, or config?&lt;/P&gt;&lt;P&gt;- What is triggering event for endpoint to restart auth?&amp;nbsp; CoA?&amp;nbsp; Session timeout? Other?&lt;/P&gt;&lt;P&gt;- Is there a periodic event that correlates to the 2 day period such as session timer or other?&lt;/P&gt;&lt;P&gt;- Does logoff /login resolve?&amp;nbsp; Reboot resolve? Plug/unplug of device?&lt;/P&gt;&lt;P&gt;- Is PC behind phone which may interfere with communications?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2018 20:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581480#M510862</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-12T20:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581481#M510866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt; Does logoff /login resolve?&amp;nbsp; Reboot resolve? Plug/unplug of device? Yes this does work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;User auth does not happen and then hits default rule to onboard. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Apr 2018 08:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581481#M510866</guid>
      <dc:creator>chrisvanwyk</dc:creator>
      <dc:date>2018-04-13T08:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581482#M510869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please take a look at the comment posted by &lt;A href="https://community.cisco.com//u1/128384"&gt;edondurguti&lt;/A&gt; at &lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-68171"&gt;How To: Universal IOS Switch Config for ISE&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Apr 2018 00:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581482#M510869</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-04-15T00:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581483#M510872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not a helpful post the below was used&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-68174"&gt;How To: Universal 3850 Wired Class-based Policy Language (C3PL) Configuration for ISE&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 06:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581483#M510872</guid>
      <dc:creator>chrisvanwyk</dc:creator>
      <dc:date>2018-04-18T06:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581484#M510875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems the user disconnects from the port goes home and tomorrow morning when he plugs his PC back no authentication happens. For the moment looks like Windows 10 Machines. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 06:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581484#M510875</guid>
      <dc:creator>chrisvanwyk</dc:creator>
      <dc:date>2018-04-18T06:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581485#M510877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It will be difficult to troubleshoot,especially with such limited info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still not clear what "onboard" exactly means whether simple connection to network or transition to BYOD flow. Many questions unanswered and the one that was answered about reboot/disconnect is later conflicted.&amp;nbsp; For example, you earlier state that unplug/plug of device works, but then say that user disconnect/reconnect may result in no auth.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By saying "it looks like Windows 10 machines", does that mean all other Windows clients are working as expected?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When user disconnects, does switch properly reflect auth status via 'show auth status int &amp;lt;interface&amp;gt;'?&amp;nbsp;&amp;nbsp; Is session cleared at switch?&amp;nbsp; Does ISE considered session still connected?&amp;nbsp; Again, if connecting to intermediate phone switch, then that too can complicate signals to switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also try responses to Windows 10 connectivity such as following: &lt;A href="https://social.technet.microsoft.com/Forums/en-US/bc0a05a4-c62d-41a2-9ea3-79b589829a7e/windows-10-8021x-wired-authentication-issue?forum=win10itpronetworking" title="https://social.technet.microsoft.com/Forums/en-US/bc0a05a4-c62d-41a2-9ea3-79b589829a7e/windows-10-8021x-wired-authentication-issue?forum=win10itpronetworking"&gt;https://social.technet.microsoft.com/Forums/en-US/bc0a05a4-c62d-41a2-9ea3-79b589829a7e/windows-10-8021x-wired-authentication-issue?forum=win10itpronetworking&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 10:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581485#M510877</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-04-18T10:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 machine onboard every couple of days</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581486#M510879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thanks for the reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below link tried still an issue.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;You can also try responses to Windows 10 connectivity such as following: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://social.technet.microsoft.com/Forums/en-US/bc0a05a4-c62d-41a2-9ea3-79b589829a7e/windows-10-8021x-wired-authentication-issue?forum=win10itpronetworking" rel="nofollow" style="font-size: 12px; font-family: arial; color: #0a63a7;" target="_blank"&gt;https://social.technet.microsoft.com/Forums/en-US/bc0a05a4-c62d-41a2-9ea3-79b589829a7e/windows-10-8021x-wired-authentication-issue?forum=win10itpronetworking&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking for assistance on the c3pl configuration rather than looking at the Machine issue now. I might have left some stuff out from the normal way of configuration. &lt;/P&gt;&lt;P&gt;Here is the updated C3PL configuration. I need verification that the below is either good or need some adjustments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;policy-map type control subscriber ISE-PORTS-Configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;event session-started match-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 10 class always do-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x priority 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab priority 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;event authentication-failure match-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 5 class DOT1X_FAILED do-until-failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab priority 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 30 authentication-restart 30&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 10 class AAA-DOWN do-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 authorize&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 20 activate service-template CRITICAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 30 terminate dot1x&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 40 terminate mab&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 20 class DOT1X-FAILED do-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using mab&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 20 authentication-restart 30&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 40 class always do-until-failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 20 terminate mab&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 30 authentication-restart 60&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;event agent-found match-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 10 class always do-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;event authentication-success match-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 10 class always do-until-failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;event violation match-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp; 10 class always do-all&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; 10 restrict&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt; authentication periodic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;authentication timer reauthenticate server&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;access-session host-mode multi-domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;access-session control-direction in&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;access-session port-control auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;mab&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;snmp trap mac-notification change added&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;snmp trap mac-notification change removed&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;dot1x pae authenticator&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;dot1x timeout tx-period 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;spanning-tree portfast&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;spanning-tree bpduguard enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-size: 12pt; font-family: Calibri;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;service-policy type control subscriber ISE-PORTS-Configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2018 06:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-machine-onboard-every-couple-of-days/m-p/3581486#M510879</guid>
      <dc:creator>chrisvanwyk</dc:creator>
      <dc:date>2018-04-19T06:08:41Z</dc:date>
    </item>
  </channel>
</rss>

