<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to authorize switch port when ISE is down in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585913#M538107</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV style="display: none;"&gt;2.5.0.0&lt;/DIV&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;Kareem Ali wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hello Deepu,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; i'm using the below switch template and it's working with anyconnect and without anyconnect&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;dot1x critical eapol&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet w/x/y-z&lt;/P&gt;
&lt;P&gt;switchport access vlan X&lt;/P&gt;
&lt;P&gt;switchport voice vlan y&lt;/P&gt;
&lt;P&gt;switchport mode access&lt;/P&gt;
&lt;P&gt;authentication event fail action next-method&lt;/P&gt;
&lt;P&gt;authentication event server dead action authorize vlan X&lt;/P&gt;
&lt;P&gt;authentication event server dead action authorize voice&lt;/P&gt;
&lt;P&gt;dot1x pae authenticator&lt;/P&gt;
&lt;P&gt;dot1x port-control auto&lt;/P&gt;
&lt;P&gt;authentication order dot1x mab&lt;/P&gt;
&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;
&lt;P&gt;mab&lt;/P&gt;
&lt;P&gt;dot1x timeout tx-period 10&lt;/P&gt;
&lt;P&gt;authentication periodic&lt;/P&gt;
&lt;P&gt;authentication timer reauthenticate server&lt;/P&gt;
&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;
&lt;P&gt;snmp trap mac-notification change added&lt;/P&gt;
&lt;P&gt;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;exit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;anyconnect configuration was allow data before authentication&lt;/P&gt;
&lt;P&gt;i faced a disaster with a customer last month when all ISE nodes was down and AD was down but nobody complains because the critical VLAN applied to all interfaces.&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello Kareem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have tried the option "data before authentication" in anyconnect configuration but the issue remains the same. Anyconnect is showing authenticating and on switch side dot1x is running and never fall back. We stopped the services of anyconnect and everything working fine as expected. So i believe we need some tweaking in anyconnect profile. Any idea ?. As below mentioned by Jason, do we need to post put discussion on anyconnect group ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using "authentication open" command on switch ports ?.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Apr 2018 08:55:36 GMT</pubDate>
    <dc:creator>deepuvarghese1</dc:creator>
    <dc:date>2018-04-09T08:55:36Z</dc:date>
    <item>
      <title>how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585900#M538094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; i'm trying to implement how to authorize the switch port when ISE nodes are dead &lt;/P&gt;&lt;P&gt;i tried some commands but i see that only one endpoint can work ip phone or pc ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan x&lt;/P&gt;&lt;P&gt; authentication event server alive action authorize voice&lt;/P&gt;&lt;P&gt; authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so is there a way to authorize both endpoints when ISE is dead ? can i use service policy for example ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2016 21:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585900#M538094</guid>
      <dc:creator>kareali@cisco.com</dc:creator>
      <dc:date>2016-07-29T21:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585901#M538095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If not already done, please check out this how-to &lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-68171"&gt;How To: Universal IOS Switch Config for ISE&lt;/A&gt; and the other guides on &lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-64012#jive_content_id_Cisco_Switches"&gt;Cisco Switches&lt;/A&gt; might be of interest to you, too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your inquiry is actually more on the switch side so I would suggest to seek support from Cisco switch platform team if you have further questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jul 2016 00:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585901#M538095</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-07-30T00:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585902#M538096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The correct command is &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;authentication event server dead action authorize voice&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jul 2016 17:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585902#M538096</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2016-07-30T17:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585903#M538097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp; thanks a lot for the document but the PC is always stucked in dot1x authentication it is always running so PC never gets the critical vlan but ip phone worked perfectly . when i removed anyconnect from the PC it gets the critical vlan &lt;/P&gt;&lt;P&gt;so i guess the problem in timeouts maybe or something else and here is the switch command &lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/15&lt;/P&gt;&lt;P&gt; switchport access vlan 15&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport voice vlan 248&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize vlan 15&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize &lt;/P&gt;&lt;P&gt; authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt; authentication order dot1x mab&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication periodic&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication violation restrict&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; mls qos trust device cisco-phone&lt;/P&gt;&lt;P&gt; mls qos trust cos&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Jul 2016 11:12:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585903#M538097</guid>
      <dc:creator>kareali@cisco.com</dc:creator>
      <dc:date>2016-07-31T11:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585904#M538098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you seeing this issue with new authentications? If a DOT1X client already authorized, I do not think it would get put into critical VLAN. Also, it might depend on the AnyConnect NAM profile to allow DOT1X auth failures.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2016-08-01 at 7.13.01 AM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/98630_Screen Shot 2016-08-01 at 7.13.01 AM.png" style="height: 497px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2016 14:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585904#M538098</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-08-01T14:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585905#M538099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; yes i'm talking about new clients trying to connect when radius is dead and your suggestion is already enabled !!&lt;/P&gt;&lt;P&gt;the problem is that dot1x is keeping running it never fails in the switch !!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Aug 2016 05:51:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585905#M538099</guid>
      <dc:creator>kareali@cisco.com</dc:creator>
      <dc:date>2016-08-02T05:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585906#M538100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kareem, run 'dot1x critical eapol' global command and try the test again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Aug 2016 11:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585906#M538100</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-08-02T11:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585907#M538101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not working i should allow data before authentication from anyconnect and this is not acceptable &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Aug 2016 09:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585907#M538101</guid>
      <dc:creator>kareali@cisco.com</dc:creator>
      <dc:date>2016-08-07T09:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585908#M538102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried it with Windows native supplicant? I would expect the same result as your AnyConnect NAM tests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please detail which switch model and Cisco IOS release on the switch. As I mentioned before, this is a switch feature, it's best to seek support from the switch platform teams.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Aug 2016 23:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585908#M538102</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-08-07T23:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585909#M538103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kareem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any luck on the issue. We do have the same issue with the PC's installed with Anyconnect. It is stuck in&amp;nbsp; authentication. PC's without anyconnect works fine and getting the critical auth VLAN but no luck for anyconnect installed machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried the option Enable the port exception mentioned above but same result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="display: none;"&gt;2.5.0.0&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2018 10:29:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585909#M538103</guid>
      <dc:creator>deepuvarghese1</dc:creator>
      <dc:date>2018-04-08T10:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585910#M538104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Deepu,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; i'm using the below switch template and it's working with anyconnect and without anyconnect &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;dot1x critical eapol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet w/x/y-z&lt;/P&gt;&lt;P&gt;switchport access vlan X&lt;/P&gt;&lt;P&gt;switchport voice vlan y&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;authentication event fail action next-method&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan X&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;dot1x port-control auto&lt;/P&gt;&lt;P&gt;authentication order dot1x mab&lt;/P&gt;&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt;authentication periodic&lt;/P&gt;&lt;P&gt;authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt;snmp trap mac-notification change added&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyconnect configuration was allow data before authentication&lt;/P&gt;&lt;P&gt;i faced a disaster with a customer last month when all ISE nodes was down and AD was down but nobody complains because the critical VLAN applied to all interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2018 10:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585910#M538104</guid>
      <dc:creator>kareali@cisco.com</dc:creator>
      <dc:date>2018-04-08T10:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585911#M538105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Karem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you for your quick reply. Much appreciated. I am using the same template on switches. But still the same problem. Could you please help how do you configure "anyconnect configuration was allow data before authentication" ?. Do you have the configuration.xml sample so that i can check the setting. My email ID is &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:deepu.vargheset@gmail.com"&gt;deepu.vargheset@gmail.com&lt;/A&gt;&lt;SPAN&gt;. Please send if possible.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Deepu&lt;/P&gt;&lt;DIV style="display: none;"&gt;2.5.0.0&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2018 12:54:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585911#M538105</guid>
      <dc:creator>deepuvarghese1</dc:creator>
      <dc:date>2018-04-08T12:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585912#M538106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems like you are talking about anyconnect  NAM to allow network access when dot1x fails? This has nothing to do with ISE or the switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please reference the anyconnect document&lt;/P&gt;&lt;P&gt;https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/configure-nam.html#ID-1424-00000172&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If more questions on anyconnect nam please move this to the anyconnect forum&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2018 15:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585912#M538106</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-04-08T15:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585913#M538107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV style="display: none;"&gt;2.5.0.0&lt;/DIV&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;Kareem Ali wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hello Deepu,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; i'm using the below switch template and it's working with anyconnect and without anyconnect&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;dot1x critical eapol&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet w/x/y-z&lt;/P&gt;
&lt;P&gt;switchport access vlan X&lt;/P&gt;
&lt;P&gt;switchport voice vlan y&lt;/P&gt;
&lt;P&gt;switchport mode access&lt;/P&gt;
&lt;P&gt;authentication event fail action next-method&lt;/P&gt;
&lt;P&gt;authentication event server dead action authorize vlan X&lt;/P&gt;
&lt;P&gt;authentication event server dead action authorize voice&lt;/P&gt;
&lt;P&gt;dot1x pae authenticator&lt;/P&gt;
&lt;P&gt;dot1x port-control auto&lt;/P&gt;
&lt;P&gt;authentication order dot1x mab&lt;/P&gt;
&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;
&lt;P&gt;mab&lt;/P&gt;
&lt;P&gt;dot1x timeout tx-period 10&lt;/P&gt;
&lt;P&gt;authentication periodic&lt;/P&gt;
&lt;P&gt;authentication timer reauthenticate server&lt;/P&gt;
&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;
&lt;P&gt;snmp trap mac-notification change added&lt;/P&gt;
&lt;P&gt;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;exit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;anyconnect configuration was allow data before authentication&lt;/P&gt;
&lt;P&gt;i faced a disaster with a customer last month when all ISE nodes was down and AD was down but nobody complains because the critical VLAN applied to all interfaces.&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello Kareem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have tried the option "data before authentication" in anyconnect configuration but the issue remains the same. Anyconnect is showing authenticating and on switch side dot1x is running and never fall back. We stopped the services of anyconnect and everything working fine as expected. So i believe we need some tweaking in anyconnect profile. Any idea ?. As below mentioned by Jason, do we need to post put discussion on anyconnect group ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using "authentication open" command on switch ports ?.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 08:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585913#M538107</guid>
      <dc:creator>deepuvarghese1</dc:creator>
      <dc:date>2018-04-09T08:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585914#M538108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;   I didn’t configure any special configuration for Anyconnect I just configured allow data before authentication and the remaining settings is the default settings .&lt;/P&gt;&lt;P&gt;From switch side the switch has to mark the ISE as dead in order to apply critical vlan . so do you see ISE dead ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From switch configuration I do radius test every 5 minutes I believe this is important . here is the whole template I use in the switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global configuration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 09:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585914#M538108</guid>
      <dc:creator>kareali@cisco.com</dc:creator>
      <dc:date>2018-04-09T09:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585915#M538109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Kareem for your reply. Could you please provide the global configuration for a reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Deepu&lt;/P&gt;&lt;DIV style="display: none;"&gt;2.5.0.0&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 09:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585915#M538109</guid>
      <dc:creator>deepuvarghese1</dc:creator>
      <dc:date>2018-04-09T09:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585916#M538110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;global configuration&lt;/P&gt;&lt;P&gt;-----------------------&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;username ISERADIUSTEST password ISEtest123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius server Abb-ISE&lt;/P&gt;&lt;P&gt;address ipv4 x.x.x.x auth-port 1645 acct-port 1646 &lt;/P&gt;&lt;P&gt;automate-tester username ISERADIUSTEST idle-time 15 &lt;/P&gt;&lt;P&gt;key CSO@citc!&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius server Oct-ISE&lt;/P&gt;&lt;P&gt;address ipv4 y.y.y.y auth-port 1645 acct-port 1646 &lt;/P&gt;&lt;P&gt;automate-tester username ISERADIUSTEST idle-time 15 &lt;/P&gt;&lt;P&gt;key CSO@citc!&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server radius ISE&lt;/P&gt;&lt;P&gt;server name Abb-ISE&lt;/P&gt;&lt;P&gt;server name Oct-ISE&lt;/P&gt;&lt;P&gt;deadtime 10&lt;/P&gt;&lt;P&gt; exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;/P&gt;&lt;P&gt;client x.x.x.x server-key CSO@citc!&lt;/P&gt;&lt;P&gt;client y.y.y.y server-key CSO@citc!&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group ISE&lt;/P&gt;&lt;P&gt;aaa authorization network default group ISE&lt;/P&gt;&lt;P&gt;aaa accounting dot1x default start-stop group ISE&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group ISE&lt;/P&gt;&lt;P&gt;aaa accounting delay-start all&lt;/P&gt;&lt;P&gt;aaa accounting update newinfo periodic 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server attribute 25 access-request include&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;ip radius source-interface vlanxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip dhcp snooping &lt;/P&gt;&lt;P&gt;ip device tracking&lt;/P&gt;&lt;P&gt;epm logging&lt;/P&gt;&lt;P&gt;logging origin-id ip&lt;/P&gt;&lt;P&gt;logging source-interface Vlanxx&lt;/P&gt;&lt;P&gt;logging host 10.10.81.81 transport udp port 20514&lt;/P&gt;&lt;P&gt;logging host 20.10.81.81 transport udp port 20514&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;dot1x critical eapol&lt;/P&gt;&lt;P&gt;ip http server &lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended redirection &lt;/P&gt;&lt;P&gt;permit tcp any any eq 80&amp;nbsp; &lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;permit tcp any any eq 8905&lt;/P&gt;&lt;P&gt;permit ip any host 1.1.1.1&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;exit &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mac address-table notification change&lt;/P&gt;&lt;P&gt;mac address-table notification mac-move&lt;/P&gt;&lt;P&gt;snmp-server trap-source vlanxx&lt;/P&gt;&lt;P&gt;snmp-server community CSO@citc! RO&lt;/P&gt;&lt;P&gt;snmp-server enable traps mac-notification change move threshold&lt;/P&gt;&lt;P&gt;snmp-server enable traps errdisable&lt;/P&gt;&lt;P&gt;snmp-server enable traps vlan-membership&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;/P&gt;&lt;P&gt;snmp-server host 10.10.81.40 version 2c CSO@citc! mac-notification snmp&lt;/P&gt;&lt;P&gt;snmp-server host 20.10.81.40 version 2c CSO@citc! mac-notification snmp&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet w/x/y-z&lt;/P&gt;&lt;P&gt;switchport access vlan X&lt;/P&gt;&lt;P&gt;switchport voice vlan y&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;authentication event fail action next-method&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan X&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;dot1x port-control auto&lt;/P&gt;&lt;P&gt;authentication order dot1x mab&lt;/P&gt;&lt;P&gt;authentication priority dot1x mab&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt;authentication periodic&lt;/P&gt;&lt;P&gt;authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt;snmp trap mac-notification change added&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 10:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3585916#M538110</guid>
      <dc:creator>kareali@cisco.com</dc:creator>
      <dc:date>2018-04-09T10:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: how to authorize switch port when ISE is down</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3677285#M538112</link>
      <description>&lt;P&gt;Does this configuration allows both vlans ie data and voice? because i have same scenario but IP phone connects to the switch and PC connects to an IP phone.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2018 09:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-authorize-switch-port-when-ise-is-down/m-p/3677285#M538112</guid>
      <dc:creator>mohdg</dc:creator>
      <dc:date>2018-07-30T09:34:22Z</dc:date>
    </item>
  </channel>
</rss>

