<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE MAB Authentication Failed in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-mab-authentication-failed/m-p/3358147#M549459</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;From your configuration output it doesn't look like mab is configured under the interface, try this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/0/15&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;mab&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that doesn't work, please provide output from the switch:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;show authentication session interface Gig 1/0/15 detail&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Fri, 30 Mar 2018 16:55:23 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-03-30T16:55:23Z</dc:date>
    <item>
      <title>ISE MAB Authentication Failed</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-authentication-failed/m-p/3358137#M549456</link>
      <description>&lt;P&gt;I have installed Cisco ISE 3515 as a AAA dot1x server and I configured MAB and Dot1x to authentication for endpoint. I integrated ISE with my AD. I got an error which our endpoint cannot MAB authenticate with my Cisco ISE. My endpoint is Window 10 and using static IP address assigning. Please kindly see the ISE configuration and error screenshot as attach files. Please see the switch configuration as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt; client 10.24.64.50 server-key SeCrEt&lt;BR /&gt; auth-type any&lt;BR /&gt; &lt;BR /&gt;aaa group server radius ise-group&lt;BR /&gt; server name ise &lt;BR /&gt; &lt;BR /&gt;radius server ise&lt;BR /&gt; address ipv4 10.24.64.50 auth-port 1812 acct-port 1813&lt;BR /&gt; key SeCrEt&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa authentication dot1x default group ise-group&lt;BR /&gt;aaa authorization network default group ise-group&lt;BR /&gt;aaa authorization network auth-list group ise-group&lt;BR /&gt;aaa authorization auth-proxy default group ise-group&lt;BR /&gt;aaa accounting update periodic 2440&lt;BR /&gt;aaa accounting auth-proxy default start-stop group ise-group&lt;BR /&gt;aaa accounting dot1x default start-stop group ise-group&lt;BR /&gt;aaa accounting system default start-stop group ise-group&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;snmp-server community SeCrEt RO&lt;BR /&gt;snmp-server trap-source Vlan995&lt;BR /&gt;snmp-server source-interface informs Vlan955&lt;BR /&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;BR /&gt;snmp-server enable traps mac-notification change move threshold&lt;BR /&gt;snmp-server host 10.24.64.50 SeCrEt&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf upper-case&lt;BR /&gt;radius-server attribute 31 send nas-port-detail&lt;BR /&gt;radius-server dead-criteria time 5 tries 3&lt;BR /&gt;radius-server deadtime 30&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;BR /&gt;ip radius source-interface vlan995&lt;/P&gt;
&lt;P&gt;dot1x system-auth-control&lt;BR /&gt;dot1x critical eapol&lt;BR /&gt;authentication critical recovery delay 1000&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt; ip access-group ACL-DEFAULT in&lt;BR /&gt; authentication event fail action next-method&lt;BR /&gt; authentication event server dead action reinitialize &lt;BR /&gt; authentication event server dead action authorize voice&lt;BR /&gt; authentication event server alive action reinitialize&lt;BR /&gt; authentication host-mode multi-auth&lt;BR /&gt; authentication open&lt;BR /&gt; authentication order dot1x mab&lt;BR /&gt; authentication priority dot1x mab&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; authentication timer inactivity server&lt;BR /&gt; authentication violation restrict mab&lt;BR /&gt; snmp trap mac-notification change added&lt;BR /&gt; snmp trap mac-notification change removed&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 10&lt;BR /&gt; &lt;BR /&gt;ip device tracking probe auto-source override&lt;BR /&gt;ip device tracking probe delay 10&lt;BR /&gt;ip device tracking&lt;/P&gt;
&lt;P&gt;logging trap debugging&lt;BR /&gt;logging origin-id ip&lt;BR /&gt;logging source-interface Vlan995&lt;BR /&gt;logging monitor informational&lt;BR /&gt;logging host 10.24.64.50 transport udp port 20514&lt;/P&gt;
&lt;P&gt;mac address-table notification change&lt;BR /&gt;mac address-table notification mac-move&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt; ip access-list extended ACL-DEFAULT&lt;BR /&gt; permit udp any eq bootpc any eq bootps&lt;BR /&gt; permit udp any any eq domain&lt;BR /&gt; permit icmp any any&lt;BR /&gt; permit udp any any eq tftp&lt;BR /&gt; permit ip any host 10.24.64.31&lt;BR /&gt; permit ip any host 10.24.64.33&lt;BR /&gt; permit ip any host 10.20.64.50&lt;BR /&gt; deny ip any any&lt;/P&gt;
&lt;P&gt;ip access-list extended GUEST-REDIRECT&lt;BR /&gt; deny udp any any eq domain&lt;BR /&gt; deny icmp any any&lt;BR /&gt; deny udp any eq bootpc any eq bootps&lt;BR /&gt; deny tcp any any eq 8443&lt;BR /&gt; deny tcp any any eq 8905&lt;BR /&gt; deny ip any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-authentication-failed/m-p/3358137#M549456</guid>
      <dc:creator>PutmanoAIT</dc:creator>
      <dc:date>2020-02-21T18:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE MAB Authentication Failed</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-authentication-failed/m-p/3358147#M549459</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;From your configuration output it doesn't look like mab is configured under the interface, try this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/0/15&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;mab&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that doesn't work, please provide output from the switch:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;show authentication session interface Gig 1/0/15 detail&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 16:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-authentication-failed/m-p/3358147#M549459</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-03-30T16:55:23Z</dc:date>
    </item>
  </channel>
</rss>

