<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Node Failure and Pre-Auth ACL best practices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3354278#M556411</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a best practice about how to give access to the users when the ISE node fails and the user ports have a Pre-Auth ACL configured?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've been working on this but I can't find a way to do it, I have this configuration for radius, port and Pre-Auth ACL:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Radius:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 5 tries 3&lt;BR /&gt;radius-server host 192.168.0.211 auth-port 1645 acct-port 1646 test username test-radius key 7 XXXXXXXXXXXX&lt;BR /&gt;radius-server deadtime 2&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;User Port:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;interface FastEthernet1/0/1&lt;BR /&gt; switchport access vlan 100&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan 200&lt;BR /&gt; ip access-group PRE-Auth in&lt;BR /&gt; authentication event fail action next-method&lt;BR /&gt; authentication event server dead action reinitialize vlan 100&lt;BR /&gt; authentication event server dead action authorize voice&lt;BR /&gt; authentication event server alive action reinitialize &lt;BR /&gt; authentication host-mode multi-auth&lt;BR /&gt; authentication open&lt;BR /&gt; authentication order dot1x mab webauth&lt;BR /&gt; authentication priority dot1x mab webauth&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication violation protect&lt;BR /&gt; mab&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 2&lt;BR /&gt; storm-control broadcast level 25.00&lt;BR /&gt; storm-control action shutdown&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Pre-Auth ACL:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended PRE-Auth&lt;BR /&gt; remark DHCP&lt;BR /&gt; permit udp any eq bootpc any eq bootps&lt;BR /&gt; remark DNS and Domain Controllers&lt;BR /&gt; permit ip any host 192.168.0.215&lt;BR /&gt; remark Deny All&lt;BR /&gt; deny ip any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the ISE node is down, this is the status of the auth in the port:&lt;/P&gt;
&lt;P&gt;ISE-SW#sh authentication sessions int f1/0/1&lt;BR /&gt; Interface: FastEthernet1/0/1&lt;BR /&gt; MAC Address: f0de.f1b2.a0a6&lt;BR /&gt; IP Address: 172.16.1.2&lt;BR /&gt; Status: Authz Success&lt;BR /&gt; Domain: DATA&lt;BR /&gt; Security Policy: Should Secure&lt;BR /&gt; Security Status: Unsecure&lt;BR /&gt; Oper host mode: multi-auth&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Authorized By: Critical Auth&lt;BR /&gt; Vlan Policy: 100&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Idle timeout: N/A&lt;BR /&gt; Common Session ID: C0A800DC0000002B009E2129&lt;BR /&gt; Acct Session ID: 0x00000030&lt;BR /&gt; Handle: 0x7500002B&lt;/P&gt;
&lt;P&gt;Runnable methods list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Authc Failed&lt;BR /&gt; mab Not run&lt;/P&gt;
&lt;P&gt;Critical Authorization is in effect for domain(s) DATA and VOICE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The device is authorized but it has no access no the network unless I remove the Pre-Auth ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found this post from 2013&amp;nbsp;&lt;A href="https://supportforums.cisco.com/t5/aaa-identity-and-nac/ise-node-failure-pre-auth-acl/td-p/2235177" target="_blank"&gt;https://supportforums.cisco.com/t5/aaa-identity-and-nac/ise-node-failure-pre-auth-acl/td-p/2235177&lt;/A&gt; but the&amp;nbsp;authentication event server dead action reinitialize vlan X does not allow the traffic when the Pre-Auth ACL is there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:51:41 GMT</pubDate>
    <dc:creator>alfonso.cornejo</dc:creator>
    <dc:date>2020-02-21T18:51:41Z</dc:date>
    <item>
      <title>ISE Node Failure and Pre-Auth ACL best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3354278#M556411</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a best practice about how to give access to the users when the ISE node fails and the user ports have a Pre-Auth ACL configured?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've been working on this but I can't find a way to do it, I have this configuration for radius, port and Pre-Auth ACL:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Radius:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 5 tries 3&lt;BR /&gt;radius-server host 192.168.0.211 auth-port 1645 acct-port 1646 test username test-radius key 7 XXXXXXXXXXXX&lt;BR /&gt;radius-server deadtime 2&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;User Port:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;interface FastEthernet1/0/1&lt;BR /&gt; switchport access vlan 100&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan 200&lt;BR /&gt; ip access-group PRE-Auth in&lt;BR /&gt; authentication event fail action next-method&lt;BR /&gt; authentication event server dead action reinitialize vlan 100&lt;BR /&gt; authentication event server dead action authorize voice&lt;BR /&gt; authentication event server alive action reinitialize &lt;BR /&gt; authentication host-mode multi-auth&lt;BR /&gt; authentication open&lt;BR /&gt; authentication order dot1x mab webauth&lt;BR /&gt; authentication priority dot1x mab webauth&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication violation protect&lt;BR /&gt; mab&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 2&lt;BR /&gt; storm-control broadcast level 25.00&lt;BR /&gt; storm-control action shutdown&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Pre-Auth ACL:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended PRE-Auth&lt;BR /&gt; remark DHCP&lt;BR /&gt; permit udp any eq bootpc any eq bootps&lt;BR /&gt; remark DNS and Domain Controllers&lt;BR /&gt; permit ip any host 192.168.0.215&lt;BR /&gt; remark Deny All&lt;BR /&gt; deny ip any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the ISE node is down, this is the status of the auth in the port:&lt;/P&gt;
&lt;P&gt;ISE-SW#sh authentication sessions int f1/0/1&lt;BR /&gt; Interface: FastEthernet1/0/1&lt;BR /&gt; MAC Address: f0de.f1b2.a0a6&lt;BR /&gt; IP Address: 172.16.1.2&lt;BR /&gt; Status: Authz Success&lt;BR /&gt; Domain: DATA&lt;BR /&gt; Security Policy: Should Secure&lt;BR /&gt; Security Status: Unsecure&lt;BR /&gt; Oper host mode: multi-auth&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Authorized By: Critical Auth&lt;BR /&gt; Vlan Policy: 100&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Idle timeout: N/A&lt;BR /&gt; Common Session ID: C0A800DC0000002B009E2129&lt;BR /&gt; Acct Session ID: 0x00000030&lt;BR /&gt; Handle: 0x7500002B&lt;/P&gt;
&lt;P&gt;Runnable methods list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Authc Failed&lt;BR /&gt; mab Not run&lt;/P&gt;
&lt;P&gt;Critical Authorization is in effect for domain(s) DATA and VOICE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The device is authorized but it has no access no the network unless I remove the Pre-Auth ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found this post from 2013&amp;nbsp;&lt;A href="https://supportforums.cisco.com/t5/aaa-identity-and-nac/ise-node-failure-pre-auth-acl/td-p/2235177" target="_blank"&gt;https://supportforums.cisco.com/t5/aaa-identity-and-nac/ise-node-failure-pre-auth-acl/td-p/2235177&lt;/A&gt; but the&amp;nbsp;authentication event server dead action reinitialize vlan X does not allow the traffic when the Pre-Auth ACL is there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3354278#M556411</guid>
      <dc:creator>alfonso.cornejo</dc:creator>
      <dc:date>2020-02-21T18:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Node Failure and Pre-Auth ACL best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3354379#M556424</link>
      <description>&lt;P&gt;Unfortunately there is no straightforward solution for this, at least not with IBNS 1.0 (that is using the traditional "authentication" interface level commands). One possible solution is to move to &lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/whitepaper_C11-729965.html" target="_self"&gt;IBNS 2.0 configurations&lt;/A&gt;&amp;nbsp;(look for&amp;nbsp;Critical ACL on AAA Failure in that document, that is the feature you need). IBNS 2.0 is much more flexible and powerful, but also very different in terms of configuration.&lt;/P&gt;
&lt;P&gt;With the classic style configs, there is also an option to get around that problem. You can use EEM scripts to look for "All RADIUS servers dead" events and add "permit ip any any" to your pre-auth ACL, then when the ISE nodes are reachable again you can remove the rule. Something like this:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;event manager applet default-acl-fallback&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;event syslog pattern "%RADIUS-3-ALLDEADSERVER" maxrun 5&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 1.0 cli command "enable"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 1.1 cli command "conf t" pattern "CNTL/Z."&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 2.0 cli command "ip access-list extended ACL-DEFAULT"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 3.0 cli command "1 permit ip any any"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 4.0 cli command "end"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;event manager applet default-acl-recovery&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;event syslog pattern "%RADIUS-4-RADIUS_ALIVE" maxrun 5&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 1.0 cli command "enable"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 1.1 cli command "conf t" pattern "CNTL/Z."&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 2.0 cli command "ip access-list extended ACL-DEFAULT"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 3.0 cli command "no 1 permit ip any any"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;action 4.0 cli command "end"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Both optoions are platform/IOS version dependant though&lt;/P&gt;</description>
      <pubDate>Sat, 24 Mar 2018 10:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3354379#M556424</guid>
      <dc:creator>agrissimanis</dc:creator>
      <dc:date>2018-03-24T10:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Node Failure and Pre-Auth ACL best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3355160#M556442</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank's alot for your suggestion! I'll try both of them to see wich one is better for my enviroment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do you think about using closed mode?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advanced.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 14:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3355160#M556442</guid>
      <dc:creator>alfonso.cornejo</dc:creator>
      <dc:date>2018-03-26T14:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Node Failure and Pre-Auth ACL best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3355201#M556463</link>
      <description>&lt;P&gt;In addition to what was already suggested, I would also recommend you check the following thread:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/aaa-identity-and-nac/ise-aaa-failures-for-2960s-switches-in-low-impact-mode/td-p/2892430" target="_self"&gt;https://supportforums.cisco.com/t5/aaa-identity-and-nac/ise-aaa-failures-for-2960s-switches-in-low-impact-mode/td-p/2892430&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;There are a few other options that you could use.&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3355201#M556463</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2018-03-26T15:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Node Failure and Pre-Auth ACL best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3355202#M556479</link>
      <description>&lt;P&gt;The move to IBNS 2.0 will require some effort to get it right I think, but in future the classic style configs will probably be deprecated anyway, so it needs to be done at some point &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;EEM wold be a quick win, if your switches support it.&lt;/P&gt;
&lt;P&gt;I never really seriously considered closed mode, but I guess it depends on the environment. We have wide range of devices and access requirements so closed mode is just not a good fit in our scenario.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:04:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-failure-and-pre-auth-acl-best-practices/m-p/3355202#M556479</guid>
      <dc:creator>agrissimanis</dc:creator>
      <dc:date>2018-03-26T15:04:54Z</dc:date>
    </item>
  </channel>
</rss>

