<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x on ES2020 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470543#M521242</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See also &lt;A href="https://community.cisco.com/docs/DOC-75329"&gt;Does ISE Support My Network Access Device?&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Oct 2017 14:04:20 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2017-10-27T14:04:20Z</dc:date>
    <item>
      <title>802.1x on ES2020</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470541#M521240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;ISE Team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Not sure if everyone is aware but we offer an embedded switch called an ES2020 for tactical/hardened remote access kits. Customer is trying to do .1x and having issues with the dead timer settings (see logs below) on that platform. I looked at the compatibility matrix and I don’t see the ES2020 on there. I am curious if this “should” work and do we support this? I am assuming no one really knew about the switch as it is not widely used and it wasn’t really tested. Thoughts?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;ES2020&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;A href="https://www.cisco.com/c/en/us/products/switches/embedded-service-2020-series-switches/index.html"&gt;https://www.cisco.com/c/en/us/products/switches/embedded-service-2020-series-switches/index.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;JP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Here are the logs:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 12.0pt;"&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;Cisco 2020 running 15.2-5E2c.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 12.0pt;"&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;"Open" authentication (PACL applied).&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 12.0pt;"&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;"authentication event server alive action reinitialize"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;At the end of "server-dead" timeout, while attempting to regain connectivity to radius, the switch "deauthorizes" the port for a period (restricting the client) while attempting to regain radius.&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:11:33: %RADIUS-3-ALLDEADSERVER: Group radius: No active radius servers found. Id 1.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:11:34: %DOT1X-5-FAIL: Authentication failed for client (1866.da2d.1587) on Interface Fa1/18 AuditSessionID 0A64CEE30000000C0009C465&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:11:35: %DOT1X-5-RESULT_OVERRIDE: Authentication result overridden for client (1866.da2d.1587) on Interface Fa1/18 AuditSessionID 0A64CEE30000000C0009C465&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:15:41: %RADIUS-6-SERVERALIVE: Group radius: Radius server XXX.XXX.201.166:1645,1646 is responding again (previously dead).&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:15:41: %RADIUS-4-RADIUS_ALIVE: RADIUS server XXX.XXX.201.166:1645,1646 is being marked alive.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:15:52: %RADIUS-4-RADIUS_ALIVE: RADIUS server XXX.XXX.210.12:1645,1646 is being marked alive.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:15:58: %RADIUS-4-RADIUS_DEAD: RADIUS server XXX.XXX.201.166:1645,1646 is not responding.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:16:10: %DOT1X-5-FAIL: Authentication failed for client (1866.da2d.1587) on Interface Fa1/18 AuditSessionID 0A64CEE30000000D000EB3CC&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:16:13: %RADIUS-4-RADIUS_DEAD: RADIUS server XXX.XXX.210.12:1645,1646 is not responding.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:16:53: %RADIUS-3-ALLDEADSERVER: Group radius: No active radius servers found. Id 24.&lt;/SPAN&gt;&lt;SPAN style="font-family: -webkit-standard; color: black;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: -webkit-standard; color: black;"&gt;*Jan 2 00:16:55: %MAB-5-FAIL: Authentication failed for client (1866.da2d.1587) on Interface Fa1/18 AuditSessionID 0A64CEE30000000D000EB3CC&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 17:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470541#M521240</guid>
      <dc:creator>jupoole</dc:creator>
      <dc:date>2017-09-28T17:09:01Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x on ES2020</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470542#M521241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest to engage Cisco TAC so TAC may help in verifying the global and interface configurations, etc. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/compatibility/ise_sdt.html#pgfId-55038"&gt;ISE compatiblity matrix&lt;/A&gt; says,&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;&lt;SPAN style="color: #525252; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;Cisco ISE supports interoperability with any Cisco or non-Cisco RADIUS client network access device (NAD) that implements common RADIUS behavior (similar to Cisco IOS 12.x) for standards-based authentication.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #525252; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were you, I would perform a wired capture and see any exchanges between the switch and ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sales Connect has a product page &lt;A href="https://salesconnect.cisco.com/#/program/PAGE-5849" title="https://salesconnect.cisco.com/#/program/PAGE-5849"&gt;https://salesconnect.cisco.com/#/program/PAGE-5849&lt;/A&gt; which might provide some info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Oct 2017 21:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470542#M521241</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-10-03T21:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x on ES2020</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470543#M521242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See also &lt;A href="https://community.cisco.com/docs/DOC-75329"&gt;Does ISE Support My Network Access Device?&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Oct 2017 14:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470543#M521242</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2017-10-27T14:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x on ES2020</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470544#M521243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI. The 2020 doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;P&gt;408 895 2605&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Oct 2017 14:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-on-es2020/m-p/3470544#M521243</guid>
      <dc:creator>jupoole</dc:creator>
      <dc:date>2017-10-27T14:17:31Z</dc:date>
    </item>
  </channel>
</rss>

