<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 15039 Rejected per authorization profile in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4034879#M558290</link>
    <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am testing one use case in ISE, where the ise is not authorizing the AD user. when I&amp;nbsp; am testing this AD user from switch with command : test aaa group radius username@AD.com Password new-code, then its saying :&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;User successfully authenticated&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;USER ATTRIBUTES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username 0 "Username"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;tunnel-type 1 13 [vlan]&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;tunnel-medium-type 1 6 [ALL_802]&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;tunnel-private-group 1 "IT"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Means, its successfully authenticated&amp;nbsp;and getting authorization as well. But when I am testing from end point its giving me below error, please provide the workaround where I am missing something.&lt;/P&gt;&lt;P&gt;its ACCESS_ACCEPT in authorization profile, dont know why its saying in root cause:&amp;nbsp;&lt;STRONG&gt;Authorization Profile with ACCESS_REJECT attribute&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Event&lt;/TD&gt;&lt;TD&gt;5400 Authentication failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Failure Reason&lt;/TD&gt;&lt;TD&gt;15039 Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Resolution&lt;/TD&gt;&lt;TD&gt;Authorization Profile with ACCESS_REJECT attribute was selected as a result of the matching authorization rule. Check the appropriate Authorization policy rule-results.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Root cause&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile contains ACCESS_REJECT attribute&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Also mentioning all the steps , which its Performing during this process.&lt;/STRONG&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="3"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11017&lt;/TD&gt;&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11027&lt;/TD&gt;&lt;TD&gt;Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15049&lt;/TD&gt;&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15008&lt;/TD&gt;&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - DEVICE.Device Type&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15041&lt;/TD&gt;&lt;TD&gt;Evaluating Identity Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Normalised Radius.RadiusFlowType&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15013&lt;/TD&gt;&lt;TD&gt;Selected Identity Source - Internal Endpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24209&lt;/TD&gt;&lt;TD&gt;Looking up Endpoint in Internal Endpoints IDStore - 00:50:56:5D:D5:2A&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24211&lt;/TD&gt;&lt;TD&gt;Found Endpoint in Internal Endpoints IDStore&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;22037&lt;/TD&gt;&lt;TD&gt;Authentication Passed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24715&lt;/TD&gt;&lt;TD&gt;ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15036&lt;/TD&gt;&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24432&lt;/TD&gt;&lt;TD&gt;Looking up user in Active Directory - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24325&lt;/TD&gt;&lt;TD&gt;Resolving identity - 00-50-56-5D-D5-2A&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24313&lt;/TD&gt;&lt;TD&gt;Search for matching accounts at join point - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24318&lt;/TD&gt;&lt;TD&gt;No matching account found in forest - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24322&lt;/TD&gt;&lt;TD&gt;Identity resolution detected no matching account&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24352&lt;/TD&gt;&lt;TD&gt;Identity resolution failed - ERROR_NO_SUCH_USER&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24412&lt;/TD&gt;&lt;TD&gt;User not found in Active Directory - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - AD.com.ExternalGroups (3 times)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15016&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile - DenyAccess&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15039&lt;/TD&gt;&lt;TD&gt;Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11003&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Feb 2020 18:46:08 GMT</pubDate>
    <dc:creator>gurbinder.kabbay</dc:creator>
    <dc:date>2020-02-24T18:46:08Z</dc:date>
    <item>
      <title>15039 Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4034879#M558290</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am testing one use case in ISE, where the ise is not authorizing the AD user. when I&amp;nbsp; am testing this AD user from switch with command : test aaa group radius username@AD.com Password new-code, then its saying :&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;User successfully authenticated&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;USER ATTRIBUTES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username 0 "Username"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;tunnel-type 1 13 [vlan]&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;tunnel-medium-type 1 6 [ALL_802]&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;tunnel-private-group 1 "IT"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Means, its successfully authenticated&amp;nbsp;and getting authorization as well. But when I am testing from end point its giving me below error, please provide the workaround where I am missing something.&lt;/P&gt;&lt;P&gt;its ACCESS_ACCEPT in authorization profile, dont know why its saying in root cause:&amp;nbsp;&lt;STRONG&gt;Authorization Profile with ACCESS_REJECT attribute&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Event&lt;/TD&gt;&lt;TD&gt;5400 Authentication failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Failure Reason&lt;/TD&gt;&lt;TD&gt;15039 Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Resolution&lt;/TD&gt;&lt;TD&gt;Authorization Profile with ACCESS_REJECT attribute was selected as a result of the matching authorization rule. Check the appropriate Authorization policy rule-results.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Root cause&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile contains ACCESS_REJECT attribute&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Also mentioning all the steps , which its Performing during this process.&lt;/STRONG&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="3"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11017&lt;/TD&gt;&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11027&lt;/TD&gt;&lt;TD&gt;Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15049&lt;/TD&gt;&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15008&lt;/TD&gt;&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - DEVICE.Device Type&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15041&lt;/TD&gt;&lt;TD&gt;Evaluating Identity Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Normalised Radius.RadiusFlowType&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15013&lt;/TD&gt;&lt;TD&gt;Selected Identity Source - Internal Endpoints&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24209&lt;/TD&gt;&lt;TD&gt;Looking up Endpoint in Internal Endpoints IDStore - 00:50:56:5D:D5:2A&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24211&lt;/TD&gt;&lt;TD&gt;Found Endpoint in Internal Endpoints IDStore&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;22037&lt;/TD&gt;&lt;TD&gt;Authentication Passed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24715&lt;/TD&gt;&lt;TD&gt;ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15036&lt;/TD&gt;&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24432&lt;/TD&gt;&lt;TD&gt;Looking up user in Active Directory - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24325&lt;/TD&gt;&lt;TD&gt;Resolving identity - 00-50-56-5D-D5-2A&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24313&lt;/TD&gt;&lt;TD&gt;Search for matching accounts at join point - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24318&lt;/TD&gt;&lt;TD&gt;No matching account found in forest - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24322&lt;/TD&gt;&lt;TD&gt;Identity resolution detected no matching account&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24352&lt;/TD&gt;&lt;TD&gt;Identity resolution failed - ERROR_NO_SUCH_USER&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24412&lt;/TD&gt;&lt;TD&gt;User not found in Active Directory - AD.com&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - AD.com.ExternalGroups (3 times)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15016&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile - DenyAccess&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15039&lt;/TD&gt;&lt;TD&gt;Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11003&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 18:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4034879#M558290</guid>
      <dc:creator>gurbinder.kabbay</dc:creator>
      <dc:date>2020-02-24T18:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: 15039 Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4034993#M558297</link>
      <description>&lt;P&gt;As per Step Data:&lt;/P&gt;
&lt;TABLE cellpadding="3" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24325&lt;/TD&gt;
&lt;TD&gt;Resolving identity - 00-50-56-5D-D5-2A&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE is trying to resolve identity for the endpoint MAC address, so this is MAB. As such, the session is falling to the Default AuthZ Policy, which is Deny Access (with a result of ACCESS-REJECT).&lt;/P&gt;
&lt;P&gt;There is likely an issue with your 802.1x configuration and the client is either not responding or failing 802.1x and falling back to MAB.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest reviewing the &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;ISE Secure Wired Access Prescriptive Guide&lt;/A&gt; and comparing it against your environment. If all else fails, you might need to open a TAC case to get assistance with taking debugs and packet captures to investigate the end-to-end flow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Greg&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 21:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4034993#M558297</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-02-24T21:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: 15039 Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4035284#M558317</link>
      <description>&lt;P&gt;Thanks Greg,&lt;/P&gt;&lt;P&gt;you are right, its doing MAB only. because of CPL, dot1x and MAB is happening at same time and i am getting ACCESS_REJECT.&lt;/P&gt;&lt;P&gt;I am using below CPL config, could you please give me sample of CPL config , in which i can only do dot1x. because its something&amp;nbsp;&lt;SPAN&gt;CSCuy05270 is hitting this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CPL config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;class-map type control subscriber match-any AAA-DOWN&lt;BR /&gt;match result-type aaa-timeout&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-all DOT1X-FAILED&lt;BR /&gt;match method dot1x&lt;BR /&gt;match result-type method dot1x authoritative&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-ALLOW&lt;BR /&gt;permit ip any any&lt;BR /&gt;!&lt;BR /&gt;service-template CRITICAL&lt;BR /&gt;access-group ACL-ALLOW&lt;BR /&gt;!&lt;BR /&gt;policy-map type control subscriber DOT1X-DEFAULT&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 authenticate using dot1x priority 10&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 restrict&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 authenticate using dot1x&lt;BR /&gt;event authentication-failure match-all&lt;BR /&gt;10 class AAA-DOWN do-all&lt;BR /&gt;10 authorize&lt;BR /&gt;20 activate service-template CRITICAL&lt;BR /&gt;30 terminate dot1x&lt;BR /&gt;40 terminate mab&lt;BR /&gt;20 class DOT1X-FAILED do-all&lt;BR /&gt;10 authenticate using mab&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Interface Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface range g2/0/24&lt;BR /&gt;switchport host&lt;BR /&gt;switchport access vlan 100&lt;BR /&gt;service-policy type control subscriber DOT1X-DEFAULT&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;mab&lt;BR /&gt;access-session host-mode multi-auth&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Result&lt;/H3&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;RadiusPacketType&lt;/TD&gt;&lt;TD&gt;AccessReject&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;AuthenticationResult&lt;/TD&gt;&lt;TD&gt;Passed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;UserName&lt;/TD&gt;&lt;TD&gt;00:50:56:5D:D5:2A&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Tue, 25 Feb 2020 13:12:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4035284#M558317</guid>
      <dc:creator>gurbinder.kabbay</dc:creator>
      <dc:date>2020-02-25T13:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: 15039 Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4035762#M558337</link>
      <description>&lt;P&gt;When using Concurrent Auth, you will always see a MAB session followed by a dot1x session when the switch sees an EAPOL from the client. With the correct C3PL policy, the dot1x session will override the initial MAB session for the same MAC address.&lt;/P&gt;
&lt;P&gt;If you are not using the C3PL configuration recommended in the Prescriptive Guide, I would suggest having a look at this example that uses Concurrent Auth.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-x-series-switches/207193-Configure-IBNS-2-0-for-Single-Host-and-M.html" target="_self"&gt;Configure IBNS 2.0 for Single-Host and Multi-Domain Scenarios&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing that stands out is that your first 'class' command should be:&lt;/P&gt;
&lt;P&gt;10 class always &lt;STRONG&gt;do-until-failure&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are many variables here, so I'm not sure if that is causing your specific issue but it should definitely changed.&lt;/P&gt;
&lt;P&gt;If you're using the same C3PL policy as the example above and still having issue, you will likely need to start looking at what's happening on the client side via logs and packet captures.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4035762#M558337</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-02-25T22:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: 15039 Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4036075#M558363</link>
      <description>&lt;P class="lia-align-left"&gt;Thanks very much Greg,&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-left"&gt;its working now after giving the command "dot1x pae authenticator" under interface (to which end point is connected). I am able to assign the IPs to AD users according to their groups like IT group will get vlan 10 IP and Sales will get 20.&lt;/P&gt;&lt;P class="lia-align-left"&gt;the only doubt I have that: in ISE (live logs) the IP information is not coming against end points.&lt;/P&gt;&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-left"&gt;Regards,&lt;/P&gt;&lt;P class="lia-align-left"&gt;Garry&lt;/P&gt;&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 12:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4036075#M558363</guid>
      <dc:creator>gurbinder.kabbay</dc:creator>
      <dc:date>2020-02-26T12:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: 15039 Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4036229#M558377</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Do you have RADIUS accounting and device tracking configured?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 14:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4036229#M558377</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-02-26T14:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: 15039 Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4036373#M558391</link>
      <description>&lt;P&gt;Hi Cristian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;where and how i should enable (&lt;SPAN&gt;RADIUS accounting and device tracking&lt;/SPAN&gt;) it? could you please guide me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Garry&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 18:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/15039-rejected-per-authorization-profile/m-p/4036373#M558391</guid>
      <dc:creator>gurbinder.kabbay</dc:creator>
      <dc:date>2020-02-26T18:24:14Z</dc:date>
    </item>
  </channel>
</rss>

