<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE server not accepting RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122088#M561803</link>
    <description>&lt;P&gt;working on a ISE migration from 2.3 to 2.7 p1&amp;nbsp;&amp;nbsp; virtual environment where i did a full backup and restore to the new virtual servers...no issues reported with restore....working to test AAA on a couple switches before migrating the entire environment and have run into an issue.&amp;nbsp; the devices are in ISE and reporting under the proper NDG, TACACS+ is working.&amp;nbsp; RADIUS and TACACS+ is enabled in ISE and keys are correctly configured for the devices.&amp;nbsp; when i Configured the switch to point to the new RADIUS server IP Address, im not getting any RADIUS authentication messages to be accepted.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in Live logs for the RADIUS transactions this is the error message:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11001&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Received RADIUS Access-Request&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11017&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;RADIUS created a new session&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11027&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;15049&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Evaluating Policy Group&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;15008&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11019&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Selected DenyAccess Service&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyone understand what is happening?&amp;nbsp; the Selected DenyAccess Service is an old ACS thing i get...but why isnt the server accepting RADIUS requests.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jul 2020 19:43:43 GMT</pubDate>
    <dc:creator>brirodg76</dc:creator>
    <dc:date>2020-07-20T19:43:43Z</dc:date>
    <item>
      <title>ISE server not accepting RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122088#M561803</link>
      <description>&lt;P&gt;working on a ISE migration from 2.3 to 2.7 p1&amp;nbsp;&amp;nbsp; virtual environment where i did a full backup and restore to the new virtual servers...no issues reported with restore....working to test AAA on a couple switches before migrating the entire environment and have run into an issue.&amp;nbsp; the devices are in ISE and reporting under the proper NDG, TACACS+ is working.&amp;nbsp; RADIUS and TACACS+ is enabled in ISE and keys are correctly configured for the devices.&amp;nbsp; when i Configured the switch to point to the new RADIUS server IP Address, im not getting any RADIUS authentication messages to be accepted.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in Live logs for the RADIUS transactions this is the error message:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11001&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Received RADIUS Access-Request&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11017&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;RADIUS created a new session&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11027&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;15049&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Evaluating Policy Group&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;15008&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;11019&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Selected DenyAccess Service&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyone understand what is happening?&amp;nbsp; the Selected DenyAccess Service is an old ACS thing i get...but why isnt the server accepting RADIUS requests.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 19:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122088#M561803</guid>
      <dc:creator>brirodg76</dc:creator>
      <dc:date>2020-07-20T19:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE server not accepting RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122096#M561804</link>
      <description>&lt;OL&gt;&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authentication &amp;gt; Allowed Protocols&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Default Network Access&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;See if host lookup is enabled or not.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;It could be the reason why this is not working&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 19:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122096#M561804</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2020-07-20T19:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE server not accepting RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122100#M561805</link>
      <description>&lt;P&gt;HOST LOOKUP is enabled...was enabled on the previous deployment and the setting is also enabled on the new deployment&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 20:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122100#M561805</guid>
      <dc:creator>brirodg76</dc:creator>
      <dc:date>2020-07-20T20:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE server not accepting RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122119#M561807</link>
      <description>&lt;P&gt;Then its your policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anything for host lookup? can you share the log file for the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It could be hitting your default policy which can be access deny&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 20:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122119#M561807</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2020-07-20T20:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE server not accepting RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122125#M561809</link>
      <description>&lt;P&gt;I am working with Brian on this one and it is odd.&amp;nbsp; If there was policy set evaluation going on you would see PIP queries.&amp;nbsp; The entirety of the step data is what Brian posted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;11001&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Received RADIUS Access-Request&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;11017&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;RADIUS created a new session&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;11027&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;15049&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Evaluating Policy Group&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;15008&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Evaluating Service Selection Policy&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;11019&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Selected DenyAccess Service&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you look at normal step data once it hands it off for policy set matching it starts querying PIPs to match policy set conditions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="content_table_steps" style="width: 500px;" cellpadding="3" border="0"&gt;
&lt;TBODY&gt;
&lt;TR class=""&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11017&lt;/TD&gt;
&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11027&lt;/TD&gt;
&lt;TD&gt;Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15049&lt;/TD&gt;
&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15008&lt;/TD&gt;
&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="content_table_steps_highlight"&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - Radius.Called-Station-ID&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case it is like ISE is saying "Ohh this is RADIUS, then deny service".&amp;nbsp; We checked the deployment to make sure policy service was enabled.&amp;nbsp; I am sure I am missing something obvious but this is a stumper for me.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 21:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122125#M561809</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2020-07-20T21:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE server not accepting RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122224#M561814</link>
      <description>&lt;P&gt;Have you looked at the RADIUS output of a tcpdump to see what the NAS is sending to your PSN? Does it look ok? So the NAS would have been re-configured with the new RADIUS server IP address, as far as I can see that is the only change here.&lt;/P&gt;
&lt;P&gt;Is there anything in the policy set that would be relating to the ISE node hostname at all?&lt;/P&gt;
&lt;P&gt;Tried an ise application restart?&lt;/P&gt;
&lt;P&gt;How about creating a new Policy Set and putting it right at the top and forcing the NAS to use that by NDG settings?&lt;/P&gt;
&lt;P&gt;Does sound weird.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 23:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4122224#M561814</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-07-20T23:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE server not accepting RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4130930#M562122</link>
      <description>&lt;P&gt;so I do not have a concrete definitive answer on this one as of yet, but we got it working.&amp;nbsp; We submitted a TAC case and they gathered logs and did their things and still waiting to hear back.&amp;nbsp; in order to overcome our issue, we tested authentications individually to each of the two nodes in the deployment by setting switches to point directly at it.&amp;nbsp; we built a new MAB policy and created a new protocol group for radius (as we observed during the migration it actually called it "migrated default radius protocol") and tested.&amp;nbsp; Initially we were seeing the same result of ISE just not accepting the RADIUS response, so we bounced the secondary node and tested again.&amp;nbsp; this time our test were successful and so we tested against the primary node with the same negative results.&amp;nbsp; Bounced that node as well and ISE accepted and processed RADIUS requests like it should.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We validated all migrated settings against their production ISE deployment and every option was in fact checked upon the restore to the new servers.&amp;nbsp; Only thing we suspect is that something happened under the hood with those RADIUS protocol sequences.&amp;nbsp; We changed every policy set to utilize the newly created RADIUS sequence and every set worked.&amp;nbsp; The migrated default network access policy actually probably came from an old ACS to ISE migration that was performed did and was just carried along for years...somehow that piece may have been corrupting ISE.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 17:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-server-not-accepting-radius/m-p/4130930#M562122</guid>
      <dc:creator>brirodg76</dc:creator>
      <dc:date>2020-08-05T17:52:11Z</dc:date>
    </item>
  </channel>
</rss>

