<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access network when Cisco ISE down or switch can't connect to ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3219255#M556103</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;Can you share a debug aaa to see what's going on? Are you sure the switch isn't able to reach ise? Can you run a ping from the switch and test aaa command</description>
    <pubDate>Mon, 20 Nov 2017 05:02:35 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2017-11-20T05:02:35Z</dc:date>
    <item>
      <title>Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191905#M556098</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have this situation :&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Headquarter in City A with Cisco ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Office in City B with Switch, no local IT&lt;/P&gt;&lt;P&gt;If ISE down or connection between ISE and Switch lost and the switch cant communicate with ISE, user in Office can't access to network. They cann't even use the printer, ipphone in their office. They can do nothing. This is unacceptable cause it impact to business too much.&lt;/P&gt;&lt;P&gt;I want to ask are there any way to let user access to network when ISE down or switch can't communicate with ISE. But when ISE work fine and the Switch can connect to ISE. Every user must authentication to get access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;Quang&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191905#M556098</guid>
      <dc:creator>quangle1993</dc:creator>
      <dc:date>2020-02-21T18:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191909#M556099</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;When ISE server is not reachable from the switch, the switch will put the status dead to its radius server. &lt;BR /&gt;Then with the following commands you can give access to users trying to authenticate. Those commands are setup on the interface config: &lt;BR /&gt;&lt;BR /&gt;authentication event server dead action authorize vlan vlan-id&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;</description>
      <pubDate>Fri, 29 Sep 2017 23:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191909#M556099</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-29T23:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191911#M556100</link>
      <description>&lt;P&gt;Thanks Francesco&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Then with the following commands you can give access to users trying to authenticate.&amp;nbsp;" I don't really get your point. You mean we can only configure the command after the issue happen or can enter it before. Cause in office, there is no Local IT&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Sep 2017 00:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191911#M556100</guid>
      <dc:creator>quangle1993</dc:creator>
      <dc:date>2017-09-30T00:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191913#M556101</link>
      <description>&lt;P&gt;Sorry if i misspelled something.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can configure it remotely now and when the radius server won't be reachable those commands will be used. You have to get configured before an issue arrives.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Sep 2017 00:41:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3191913#M556101</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-30T00:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3219207#M556102</link>
      <description>&lt;P&gt;Hi i already try commands above but it not working. Switch keep trying to reauthentication. And syslog on Switch say :&lt;/P&gt;
&lt;P&gt;Radius server is responding again ....&lt;/P&gt;
&lt;P&gt;Radisus server is mark alive ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;But this is impossible cause i was unplug the cable between Sw and ISE. How can Sw receive ISE respond.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2017 01:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3219207#M556102</guid>
      <dc:creator>quangle1993</dc:creator>
      <dc:date>2017-11-20T01:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3219255#M556103</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Can you share a debug aaa to see what's going on? Are you sure the switch isn't able to reach ise? Can you run a ping from the switch and test aaa command</description>
      <pubDate>Mon, 20 Nov 2017 05:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3219255#M556103</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-11-20T05:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3219301#M556104</link>
      <description>&lt;P&gt;Here is some logs. Interface f0/23 is the interface that connect to ISE.&lt;/P&gt;
&lt;P&gt;SW1(config)#int f0/23&lt;BR /&gt;SW1(config-if)#shu&lt;BR /&gt;SW1(config-if)#shutdown&lt;BR /&gt;SW1(config-if)#&lt;BR /&gt;*Mar 4 01:01:03.978: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan195, changed state to down&lt;BR /&gt;*Mar 4 01:01:03.978: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan14, changed state to down&lt;BR /&gt;*Mar 4 01:01:04.968: %LINK-5-CHANGED: Interface FastEthernet0/23, changed state to administratively down&lt;BR /&gt;SW1(config-if)#&lt;BR /&gt;*Mar 4 01:01:05.974: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/23, changed state to down&lt;BR /&gt;SW1(config-if)#exit&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:01:16.099: %ILPOWER-5-POWER_GRANTED: Interface Fa0/3: Power granted&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:01:20.059: %LINK-3-UPDOWN: Interface FastEthernet0/3, changed state to up&lt;BR /&gt;*Mar 4 01:01:21.065: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/3, changed state to up&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:01:33.179: %AUTHMGR-5-START: Starting 'dot1x' for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:01:49.058: %DOT1X-5-FAIL: Authentication failed for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;*Mar 4 01:01:49.058: %AUTHMGR-5-START: Starting 'mab' for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:01:54.226: %RADIUS-4-RADIUS_DEAD: RADIUS server 192.168.20.250:1812,1813 is not responding.&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:02:13.486: %RADIUS-3-ALLDEADSERVER: Group radius: No active radius servers found. Id 46.&lt;BR /&gt;*Mar 4 01:02:13.486: %MAB-5-FAIL: Authentication failed for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:02:13.486: %AUTHMGR-5-FAIL: Authorization failed for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:02:54.229: %RADIUS-6-SERVERALIVE: Group radius: Radius server 192.168.20.250:1812,1813 is responding again (previously dead).&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:02:54.229: %RADIUS-4-RADIUS_ALIVE: RADIUS server 192.168.20.250:1812,1813 is being marked alive.&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:03:14.194: %AUTHMGR-5-START: Starting 'dot1x' for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:03:45.081: %DOT1X-5-FAIL: Authentication failed for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;*Mar 4 01:03:45.081: %AUTHMGR-5-START: Starting 'mab' for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:03:54.342: %RADIUS-4-RADIUS_DEAD: RADIUS server 192.168.20.250:1812,1813 is not responding.&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:04:14.206: %RADIUS-3-ALLDEADSERVER: Group radius: No active radius servers found. Id 47.&lt;BR /&gt;*Mar 4 01:04:14.206: %MAB-5-FAIL: Authentication failed for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:04:14.206: %AUTHMGR-5-FAIL: Authorization failed for client (0007.0e6c.e32c) on Interface Fa0/3 AuditSessionID C0A81414000000150FAB3376&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:04:54.346: %RADIUS-6-SERVERALIVE: Group radius: Radius server 192.168.20.250:1812,1813 is responding again (previously dead).&lt;BR /&gt;SW1(config)#&lt;BR /&gt;*Mar 4 01:04:54.346: %RADIUS-4-RADIUS_ALIVE: RADIUS server 192.168.20.250:1812,1813 is being marked alive.&lt;BR /&gt;SW1(config)#&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2017 07:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3219301#M556104</guid>
      <dc:creator>quangle1993</dc:creator>
      <dc:date>2017-11-20T07:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220164#M556105</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;On your output we see that authentication fails and your server radius is going dead and right after alive again. &lt;BR /&gt;&lt;BR /&gt;How you're testing it? If it's in lab, then simply shutdown the server. If it's in prod, use a username that doesn't exists in your database and configure your radius to do the authentication in case user isn't found</description>
      <pubDate>Tue, 21 Nov 2017 14:04:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220164#M556105</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-11-21T14:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220498#M556106</link>
      <description>&lt;P&gt;It a Lab, i install ISE on my laptop, i have a Sw and IP-phone. Physical topology just like this :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ISE(my laptop)----SW----IPphone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For testing, i unplug the cable between my laptop or on Sw i shutdown the port connect to ISE, the SW and ISE never can communication when i do this right ? Really have no idea why Radius Server alive again.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2017 21:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220498#M556106</guid>
      <dc:creator>quangle1993</dc:creator>
      <dc:date>2017-11-21T21:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220643#M556107</link>
      <description>If the cable is unplugged or the port shutdown, ISE should not be reachable.&lt;BR /&gt;If the switch see it alive that means it's still connected. &lt;BR /&gt;&lt;BR /&gt;What are you trying to authenticate when ise is down? Phone or your machine?&lt;BR /&gt;&lt;BR /&gt;You can do the test by shutting down the VM</description>
      <pubDate>Wed, 22 Nov 2017 04:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220643#M556107</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-11-22T04:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220655#M556108</link>
      <description>&lt;P&gt;It a IP-phone but same result with laptop. Ok i will try shutdown the VM. Last time, after shutdown portorr unplug cable to ISE. I plug IP=phone to Switch&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 05:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220655#M556108</guid>
      <dc:creator>quangle1993</dc:creator>
      <dc:date>2017-11-22T05:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220656#M556109</link>
      <description>&lt;P&gt;It a IP-phone but same result with laptop. Ok i will try shutdown the VM. Last time, after shutdown portorr unplug cable to ISE. I plug IP=phone to Switch.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 05:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3220656#M556109</guid>
      <dc:creator>quangle1993</dc:creator>
      <dc:date>2017-11-22T05:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3761948#M556110</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just looking in these old threads about ISE getting dead and i would like to ask about the following command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;authentication event server dead action authorize vlan vlan-id&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case the port is already configured with access vlan i.e. vlan 50 do i need to configure the above command?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or the above command is needed in case you want to override the port configured access vlan?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 13:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3761948#M556110</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2018-12-12T13:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762068#M556111</link>
      <description>Hi,&lt;BR /&gt;Yes, your thinking is correct. In my previous experience you don't need to specify "vlan x" and the end of the command, as if the radius server is marked dead it will authorize in the current configured vlan.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 12 Dec 2018 15:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762068#M556111</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-12-12T15:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762893#M556112</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also noticed that you can also configure the following interface commands:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;authentication event fail action next-method&lt;/P&gt;&lt;P&gt;authentication event fail action authorize vlan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How are these two commands above&amp;nbsp; different from :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should they also be configured on the interface or the "authentication event server dead action authorize vlan" will suffice?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2018 11:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762893#M556112</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2018-12-13T11:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762900#M556113</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;"authentication event fail action next-method" - if first authentication method fails, try the next method if configured. Useful if you are using dot1x and mab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"authentication event fail action authorize vlan" - if authentication fails move the port into the fail auth vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "authentication event server dead action authorize vlan" command instructed the interface what to do when the RADIUS server was unreachable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2018 12:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762900#M556113</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-12-13T12:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: Access network when Cisco ISE down or switch can't connect to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762931#M556114</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;"authentication event fail action next-method" - if first authentication method fails, try the next method if &amp;gt;configured. Useful if you are using dot1x and mab&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still don't understand the meaning of the above command, as you can configure&lt;/P&gt;&lt;P&gt;"authentication order mab dot1x webauth" and "authentication priority mab dot1x webauth"&lt;/P&gt;&lt;P&gt;which (i think) try all methods in sequence.... so what the meaning of the "authentication event fail action next-method"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2018 12:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-network-when-cisco-ise-down-or-switch-can-t-connect-to/m-p/3762931#M556114</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2018-12-13T12:49:45Z</dc:date>
    </item>
  </channel>
</rss>

