<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE auth assgin vlan problem, wireless problem, user problem and lan control problem in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3220676#M551183</link>
    <description>&lt;P&gt;The dynamic authorization failed when user logged into portal.&amp;nbsp; When user successfully logs into portal, then the ISE PSN will send a CoA (Change of Authorization) Radius packet to the NAS (i.e. your switch).&amp;nbsp; I suspect that your switch is not configured to&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;receive CoA on UDP/1700 (1700 is the Cisco default, but check your NAS to be sure)&lt;/LI&gt;
&lt;LI&gt;shared secret has to match with what you have configured in ISE for that Radius device&lt;/LI&gt;
&lt;LI&gt;Configure the switch to allow ISE IP address(es) to send CoA to it.&amp;nbsp; CoA is always initiated by the AAA server, and the NAS is the receiver in this case.&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Wed, 22 Nov 2017 06:05:36 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2017-11-22T06:05:36Z</dc:date>
    <item>
      <title>ISE auth assgin vlan problem, wireless problem, user problem and lan control problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3220641#M551181</link>
      <description>&lt;OL&gt;
&lt;LI&gt;Assign Gest Vlan successful but too long, below have some information for this problem&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3774iE5DCB9E99F06215C/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.PNG" alt="1.PNG" /&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.PNG" style="width: 652px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3766i9CB4D6EBB62186A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.PNG" alt="2.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.PNG" style="width: 487px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3767iBA098A9316AC88D8/image-size/large?v=v2&amp;amp;px=999" role="button" title="3.PNG" alt="3.PNG" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Wireless auth successful but live log have a error&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.PNG" style="width: 572px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3775i8DC6F69414F179D7/image-size/large?v=v2&amp;amp;px=999" role="button" title="4.PNG" alt="4.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.PNG" style="width: 732px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3768i5DA9E6D0D58BFAEB/image-size/large?v=v2&amp;amp;px=999" role="button" title="5.PNG" alt="5.PNG" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Wireless’s Guest can’t clean mac address record for schedule&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="6.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3770i45BBFC9F2477C7FA/image-size/large?v=v2&amp;amp;px=999" role="button" title="6.PNG" alt="6.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="7.PNG" style="width: 662px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3771i26AB988011603182/image-size/large?v=v2&amp;amp;px=999" role="button" title="7.PNG" alt="7.PNG" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Using web-auth for Lan control but it can't transfer to login portal&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;ISETEST#sh authentication sessions interface g1/0/5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet1/0/5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; f0de.f1eb.4142&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 192.168.3.54&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; F0-DE-F1-EB-41-42&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Success&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; both&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorized By:&amp;nbsp; Authentication Server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan Policy:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACS ACL:&amp;nbsp; xACSACLx-IP-Central_WEB_Auth-59f8469d&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect ACL:&amp;nbsp; WEB-REDIRECT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL Redirect:&amp;nbsp; &lt;A href="https://ciscoise.netcraft.com.mo:8443/portal/gateway?sessionId=C0A802F40000003C34CF384E&amp;amp;portal=4ba457d0-e371-11e6-92ce-005056873bd0&amp;amp;action=cwa&amp;amp;token=61c9177d0a2baa85346efd8057504f4c" target="_blank"&gt;https://ciscoise.netcraft.com.mo:8443/portal/gateway?sessionId=C0A802F40000003C34CF384E&amp;amp;portal=4ba457d0-e371-11e6-92ce-005056873bd0&amp;amp;action=cwa&amp;amp;token=61c9177d0a2baa85346efd8057504f4c&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; C0A802F40000003C34CF384E&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x0000009A&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0x2A00003D&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Runnable methods list:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&amp;nbsp;&amp;nbsp;&amp;nbsp; Failed over&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8.PNG" style="width: 700px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3773i867208CAA67EA313/image-size/large?v=v2&amp;amp;px=999" role="button" title="8.PNG" alt="8.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="9.PNG" style="width: 439px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3772iB1E23DF637E16081/image-size/large?v=v2&amp;amp;px=999" role="button" title="9.PNG" alt="9.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;anyone can me some suggest for these problem.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3220641#M551181</guid>
      <dc:creator>billywaiclassmate</dc:creator>
      <dc:date>2020-02-21T18:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE auth assgin vlan problem, wireless problem, user problem and lan control problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3220676#M551183</link>
      <description>&lt;P&gt;The dynamic authorization failed when user logged into portal.&amp;nbsp; When user successfully logs into portal, then the ISE PSN will send a CoA (Change of Authorization) Radius packet to the NAS (i.e. your switch).&amp;nbsp; I suspect that your switch is not configured to&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;receive CoA on UDP/1700 (1700 is the Cisco default, but check your NAS to be sure)&lt;/LI&gt;
&lt;LI&gt;shared secret has to match with what you have configured in ISE for that Radius device&lt;/LI&gt;
&lt;LI&gt;Configure the switch to allow ISE IP address(es) to send CoA to it.&amp;nbsp; CoA is always initiated by the AAA server, and the NAS is the receiver in this case.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 22 Nov 2017 06:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3220676#M551183</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-11-22T06:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE auth assgin vlan problem, wireless problem, user problem and lan control problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3220812#M551185</link>
      <description>&lt;P&gt;my aaa command :&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-10"&gt;aaa&amp;nbsp;new-model&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-0"&gt;aaa&amp;nbsp;authentication&amp;nbsp;dot1x&amp;nbsp;default&amp;nbsp;group&amp;nbsp;radius&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-0 reader-word-s5-11"&gt;aaa&amp;nbsp;authorization&amp;nbsp;network&amp;nbsp;default&amp;nbsp;group&amp;nbsp;radius&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-13"&gt;aaa&amp;nbsp;accounting&amp;nbsp;dot1x&amp;nbsp;default&amp;nbsp;start-stop&amp;nbsp;group&amp;nbsp;radius&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-14"&gt;aaa&amp;nbsp;server&amp;nbsp;radius&amp;nbsp;dynamic-author&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-15"&gt;client&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-16"&gt;192.168.2.205&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-0"&gt;&amp;nbsp;server-key&amp;nbsp;cisco&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-19"&gt;ip&amp;nbsp;device&amp;nbsp;tracking&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-0 reader-word-s5-7"&gt;dot1x&amp;nbsp;system-auth-control&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-0"&gt;radius-server&amp;nbsp;attribute&amp;nbsp;6&amp;nbsp;on-for-login-auth&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;radius-server&amp;nbsp;attribute&amp;nbsp;8&amp;nbsp;include-in-access-req&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-15"&gt;radius-server&amp;nbsp;attribute&amp;nbsp;25&amp;nbsp;access-request&amp;nbsp;include&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-14"&gt;radius-server&amp;nbsp;dead-criteria&amp;nbsp;time&amp;nbsp;5&amp;nbsp;tries&amp;nbsp;3&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-22"&gt;radius-server&amp;nbsp;host&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-16"&gt;192.168.2.205&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-10"&gt;&amp;nbsp;auth-port&amp;nbsp;1812&amp;nbsp;acct-port&amp;nbsp;1813&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-0"&gt;radius-server&amp;nbsp;key&amp;nbsp;cisco&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-19"&gt;radius-server&amp;nbsp;vsa&amp;nbsp;send&amp;nbsp;accounting&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;radius-server&amp;nbsp;vsa&amp;nbsp;send&amp;nbsp;authentication&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;and&amp;nbsp; I set below command, too&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;Device&amp;gt; enable&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;Device# configure terminal&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;aaa new-model&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;aaa server radius dynamic-author&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;client 192.168.2.205&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;server-key cisco&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;port 1700&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;auth-type all&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;ignore session-key&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;ignore server-key&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;end&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="reader-word-layer reader-word-s5-21"&gt;but the result also is this error, cloud you give me some suggest?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 11:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3220812#M551185</guid>
      <dc:creator>billywaiclassmate</dc:creator>
      <dc:date>2017-11-22T11:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE auth assgin vlan problem, wireless problem, user problem and lan control problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3221301#M551187</link>
      <description>&lt;P&gt;ok.&amp;nbsp; I don't have wired switches in my deployment but I am able to get aaa debugs on my Cisco wireless controllers.&amp;nbsp; I find this is an excellent place to see whether ISE is sending you a CoA, and to see how the NAS responds to it.&amp;nbsp; If you have a deployment involving load balancers, firewalls and NAT/SNAT, then analysing the IP header of those CoA's can give you a clue.&amp;nbsp; On Cisco WLC the commands are&amp;nbsp; "debug aaa event enable"&amp;nbsp; and "debug aaa packet enable".&amp;nbsp; IOS will have some equivalent commands.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you don't see the CoA in your switch debugs, then run a TCPdump on the ISE PSN that you suspect should be sending the CoA and see what's going on.&amp;nbsp; Analyse the .pcap in Wireshark.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 22:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3221301#M551187</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-11-22T22:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE auth assgin vlan problem, wireless problem, user problem and lan control problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3221986#M551294</link>
      <description>&lt;P&gt;I can't found&amp;nbsp; any about radiusCoASupportTransportThread: this type message when I enter command "debug aaa all enable"in the WLC. and I can found just like radius auth or radius accounting these type message in WLC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2017 07:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auth-assgin-vlan-problem-wireless-problem-user-problem-and/m-p/3221986#M551294</guid>
      <dc:creator>billywaiclassmate</dc:creator>
      <dc:date>2017-11-24T07:46:28Z</dc:date>
    </item>
  </channel>
</rss>

