<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Better RADIUS server dead detection? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3858674#M528769</link>
    <description>&lt;P&gt;Ensure to configure the authentication to drop in case of process failure. If still not helping, please open a TAC case to investigate and troubleshoot further.&lt;/P&gt;</description>
    <pubDate>Sat, 18 May 2019 02:12:19 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2019-05-18T02:12:19Z</dc:date>
    <item>
      <title>Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516123#M528760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This may be a question better suited for the EN team (or maybe I've missed some documentation), but how can we achieve a more accurate definition of RADIUS server availability beyond listening on 1812/1645 and 1813/1646?&amp;nbsp; That is, if ISE is using an external identity store (AD, SQL) to authenticate and authorize users/devices, just having the PSN online isn't sufficient -it needs to be able to have connectivity to and be able to perform lookups against that external store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much like a web server still listening on 8080, but the tomcat process being hung to the point of not being able to render a web page, port availability does not constitute service/application functionality.&amp;nbsp; It would seem that we could achieve this kind of check with something like F5 LTM health checks; but it would nice to have this available directly in IOS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 19:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516123#M528760</guid>
      <dc:creator>bricrock</dc:creator>
      <dc:date>2017-06-30T19:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516124#M528761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a dead server detection built into IOS already:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New style command structure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius server &amp;lt;radius server name&amp;gt;&lt;/P&gt;&lt;P&gt; address ipv4 &amp;lt;IP address&amp;gt; auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt; key 0 &amp;lt;RADIUS KEY&amp;gt;&lt;/P&gt;&lt;P&gt; automate-tester username &amp;lt;radius test username&amp;gt; &lt;SPAN style="font-size: 10pt;"&gt;ignore-acct-port idle-time 5 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Legacy command structure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host &amp;lt;IP address&amp;gt; auth-port 1812 acct-port 1813 ignore-acct-authenticator test username &amp;lt;radius test username&amp;gt; idle-time 5 key &amp;lt;RADIUS Key&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I typically don't put a username/password on the switch which means all I am testing is ISE's ability to process the RADIUS transaction.&amp;nbsp; If you wanted to test all the way to AD that could be a service account.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 20:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516124#M528761</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-06-30T20:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516125#M528762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, Paul.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm familiar with the "automate-tester" construct, but, from the documentation: "&lt;SPAN style="color: #525252; font-family: Arial, Helvetica, sans-serif; font-size: 14px;"&gt;With this practice, the switch sends periodic test authentication messages to the RADIUS server. It looks for a RADIUS response from the server. A success message is not necessary - a failed authentication will suffice, because it shows that the server is alive."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: Arial, Helvetica, sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: Arial, Helvetica, sans-serif; font-size: 14px;"&gt;I'm looking for a way for the RADIUS server to be marked as "dead" when the automated test fails -i.e. if I specify an AD user for the test, and that user isn't able to be successfully authenticated because AD cannot be reached for some reason, mark the RADIUS server as "dead" for whatever duration I've configured.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: Arial, Helvetica, sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I realize this isn't a RFC-level requirement as you don't have to use an external ID store; but, in the case of all the customers I interact with, AD is that identity source, and it would be helpful for the interface-level "authentication event server dead" mechanisms to engage as soon as AD is unreachable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or is there a better approach?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jul 2017 13:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516125#M528762</guid>
      <dc:creator>bricrock</dc:creator>
      <dc:date>2017-07-05T13:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516126#M528763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 3 failure conditions in the ISE authentication phase.  I believe if you have your authentication policy tied to AD only and the PSN can’t connect to AD properly that would be the process failed condition and should result in a drop.  I haven’t tested that to make sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jul 2017 14:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516126#M528763</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-07-05T14:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516127#M528764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You brought a valid point Brian.&lt;/P&gt;&lt;P&gt;I had a customer who accidentally deleted the ISE PSN service accounts of one location.&lt;/P&gt;&lt;P&gt;Now I would have expected that since PSN is not able to query the AD no response would be sent to the switch and it would be marked dead failover over to remote PSN but instead the PSN did send Radius Reject and it was not marked down.&lt;/P&gt;&lt;P&gt;Subsequently all endpoints were rejected access and the whole site went down. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jul 2017 14:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516127#M528764</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2017-07-05T14:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516128#M528765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That looks like related to CSCva32914&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jul 2017 01:51:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516128#M528765</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-07-09T01:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516129#M528766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I appreciate the contributions to this thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@Hsing-Tsu, that bug shows to be fixed in ISE 2.1 (which the customer is running).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Given the observed behavior at my customer, in conjunction with that seen at @Utkarsh's, it would seem there is something critically missing in the reachability check of a NAD to ISE to AD for the purposes of RADIUS AuthC and AuthZ.&amp;nbsp; We are telling our customers to put their trust in ISE for all network access; we are positioning ISE at the center of "The Network. Intuitive"; yet, we cannot provide a robust mechanism for identity store failure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some environments may be ok with an inability to authenticate to the network when there is a problem; but a healthcare or manufacturing customer needs to be able to have a proper business continuity configuration when/if ISE or its external identity store is (&lt;STRONG&gt;&lt;EM&gt;verifiably&lt;/EM&gt;&lt;/STRONG&gt;) unreachable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we can't do this natively, are there any other ways to get the NAD to properly mark a PSN as down when AD is not available?&amp;nbsp; TCL script?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jul 2017 14:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516129#M528766</guid>
      <dc:creator>bricrock</dc:creator>
      <dc:date>2017-07-10T14:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516130#M528767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to clarify that I saw this issue an year back on ISE 1.4 .&lt;/P&gt;&lt;P&gt;I guess you should test it in ISE 2.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jul 2017 20:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3516130#M528767</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2017-07-10T20:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3855411#M528768</link>
      <description>&lt;P&gt;Hello bricrock&lt;/P&gt;&lt;P&gt;Are you aware of a suitable solution against the lack of an external identity store (AD) check on a NAD that does radius over cisco ISE?&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 19:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3855411#M528768</guid>
      <dc:creator>scarabaus</dc:creator>
      <dc:date>2019-05-13T19:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Better RADIUS server dead detection?</title>
      <link>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3858674#M528769</link>
      <description>&lt;P&gt;Ensure to configure the authentication to drop in case of process failure. If still not helping, please open a TAC case to investigate and troubleshoot further.&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2019 02:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/better-radius-server-dead-detection/m-p/3858674#M528769</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-18T02:12:19Z</dc:date>
    </item>
  </channel>
</rss>

