<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Configure AD Fail over for ISE 1.4? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433241#M518254</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Saif-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on your core switch run the command:&lt;/P&gt;&lt;P&gt;sh aaa server&lt;/P&gt;&lt;P&gt;(this should show multiple servers ) you should also see : State: current UP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as for the ISE end, i believe I have seen issues with some Server 2012R2 DC's because of SMB versions, but i have had no issues with 2010 DC's.&amp;nbsp; Check If you can see that the AD connector is good in ISE, and you can query the AD groups.&amp;nbsp; I can't remember if ISE 1.4 has the "Diagnostic Tool" to test DNS, LDAP, Kerberos and System health as it does in ISE 2.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vince&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Jan 2018 20:24:06 GMT</pubDate>
    <dc:creator>vrostowsky</dc:creator>
    <dc:date>2018-01-29T20:24:06Z</dc:date>
    <item>
      <title>How to Configure AD Fail over for ISE 1.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433235#M518246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had recently experienced a situation where &lt;SPAN style="font-size: 11.0pt; font-family: 'SABIC Typeface Text Light',sans-serif; color: #53565a;"&gt;the ISE was having issue reaching one of the Domain Controllers (DCs) for authentication and was not able to fail-over to another one. The ISE was however seeing the RADIUS server as active but the DC was down. This caused the authentication to fail completely for several sites.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'SABIC Typeface Text Light',sans-serif; color: #53565a;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'SABIC Typeface Text Light',sans-serif; color: #53565a;"&gt;How to design the ISE setup to avoid such issues in the future?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'SABIC Typeface Text Light',sans-serif; color: #53565a;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'SABIC Typeface Text Light',sans-serif; color: #53565a;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 12:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433235#M518246</guid>
      <dc:creator>ahmedsaif</dc:creator>
      <dc:date>2018-01-29T12:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to Configure AD Fail over for ISE 1.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433236#M518247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Saif-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you would need multiple ISE servers, with each using a different domain controller.&amp;nbsp; The main settings will be on the switches defining the RADIUS and timeouts. (something like below)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius server RADIUS1&lt;/P&gt;&lt;P&gt; address ipv4 x.x.x.x auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt; timeout 15&lt;/P&gt;&lt;P&gt; retransmit 3&lt;/P&gt;&lt;P&gt; key "RADIUS passphrase"&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius server RADIUS2&lt;/P&gt;&lt;P&gt; address ipv4 x.x.x.x auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt; timeout 15&lt;/P&gt;&lt;P&gt; retransmit 3&lt;/P&gt;&lt;P&gt; key "RADIUS passphrase"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server radius RADIUS&lt;/P&gt;&lt;P&gt; server name RADIUS1&lt;/P&gt;&lt;P&gt; server name RADIUS2&lt;/P&gt;&lt;P&gt; ip radius source-interface vlan x&lt;/P&gt;&lt;P&gt; deadtime 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;aaa server radius dynamic-author&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; client x.x.x.x server-key "RADIUS passphrase"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; client x.x.x.x server-key "RADIUS passphrase"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; radius-server dead-criteria time 10 tries 3&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433236#M518247</guid>
      <dc:creator>vrostowsky</dc:creator>
      <dc:date>2018-01-29T15:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to Configure AD Fail over for ISE 1.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433237#M518248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Recommendation will be to configure your active directory services to be redundant. If ISE is failing to authenticate users against one domain controller then it should switch to another domain controller depending on what your domain services return as the domain controller&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option is to configure your switch with a radius test user in the domain. If that were to fail and you could fill open with critical auth services on the switch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433237#M518248</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-01-29T15:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to Configure AD Fail over for ISE 1.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433238#M518249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would be good to understand why DC failover not happening. As Jason suggested, ensure AD infrastructure already properly configured with Sites and Services with good redundancy. If that already checked ok, then please engage Cisco TAC to see if it an ISE bug and if a patch available for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/eos-eol-notice-c51-738841.html" style="font-size: 10pt;"&gt;Cisco ISE 1.4 EoS/EoL&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; shows only Severity-1 and security vulnerability bugs are being addressed so please do plan to upgrade&amp;nbsp; in the near future.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 18:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433238#M518249</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-01-29T18:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to Configure AD Fail over for ISE 1.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433239#M518251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vince, the template I have been using in my environment is the same as mentioned by you. The only thing I am are the below two commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;retransmit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;2. timeout&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 20:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433239#M518251</guid>
      <dc:creator>ahmedsaif</dc:creator>
      <dc:date>2018-01-29T20:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to Configure AD Fail over for ISE 1.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433240#M518252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AD has been configured with redundancy, with 3 inherent DCs. However, for ISE the RADIUS server is up and active but the DC is dead and for some reason the ISE is unable to fail over to another DC unless ISE is rebooted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hslal, We already have the plan to upgrade to a later version but for now we have started to face this this issue more frequently and need to return to a stable state before going for the upgrade&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 20:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433240#M518252</guid>
      <dc:creator>ahmedsaif</dc:creator>
      <dc:date>2018-01-29T20:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to Configure AD Fail over for ISE 1.4?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433241#M518254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Saif-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on your core switch run the command:&lt;/P&gt;&lt;P&gt;sh aaa server&lt;/P&gt;&lt;P&gt;(this should show multiple servers ) you should also see : State: current UP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as for the ISE end, i believe I have seen issues with some Server 2012R2 DC's because of SMB versions, but i have had no issues with 2010 DC's.&amp;nbsp; Check If you can see that the AD connector is good in ISE, and you can query the AD groups.&amp;nbsp; I can't remember if ISE 1.4 has the "Diagnostic Tool" to test DNS, LDAP, Kerberos and System health as it does in ISE 2.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vince&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 20:24:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-configure-ad-fail-over-for-ise-1-4/m-p/3433241#M518254</guid>
      <dc:creator>vrostowsky</dc:creator>
      <dc:date>2018-01-29T20:24:06Z</dc:date>
    </item>
  </channel>
</rss>

