<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange events after upgrade of Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129511#M562062</link>
    <description>&lt;P&gt;In an ISE deployment all nodes with the PSN role are active and able to handle authentications. That's independent of which node is in the primary or secondary PAN or MnT role.&lt;/P&gt;
&lt;P&gt;Some NADs (e.g. ASAs) will fall back to using the second configured aaa server (= ISE PSN) when it sees a failure of the first one and not fail back unless you manually change it (or it sees a subsequent failure of the second node).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Aug 2020 12:01:59 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-08-03T12:01:59Z</dc:date>
    <item>
      <title>Strange events after upgrade of Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129086#M562046</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My 802.1x environment consist of 2x Cisco ISE (primary and secondary) units with windows AD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My AD is configured with GPO which is applied to my users machine to dictate how they would authenticate against my cisco ISE as shown below.&lt;/P&gt;&lt;P&gt;1) using user certificate for authentication for users who are assigned individual PCs.&lt;/P&gt;&lt;P&gt;PC would be authorized to access the network once user cert authentication/authorization succeeds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) using machine certificate for authentication for machines which are shared among multiple users.&lt;/P&gt;&lt;P&gt;PC would be authorized to access the network once machine cert authentication/authorization succeeds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have upgraded my cisco ISE (cluster of 2x nodes) from v2.4 patch 8 to v2.4 patch 12 (25th july) and then to v2.6 patch 6 on 1st August.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With reference to attached i notice the following peculiar log events in cisco ise that was not there before i embark on my upgrade prior to 25th July.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) My secondary ISE unit ISE02 was never&amp;nbsp;involved in the authentication or authorization as long as my primary unit ISE01 is working.&amp;nbsp; Ever since the upgrade conducted on 25th July, I started to see "dynamic authorization" by my secondary unit ISE02 in my ISE logs even though ISE01 is working as the active unit.&amp;nbsp;Is this behavior normal?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) The attached logs shows "Dynamic authorization" succeeded for machine authentication but not user authentication. Is this a concern?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this moment my users do not feel any impact (lag or disconnectivity) when they authenticate (be it user or machine cert authentication) to my network through 802.1x against my cisco ISE. Please advise what i should do with regards to the dynamic authorization which starts to appear in my logs ever since upgrading my cisco ISE. TIA!&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2020 00:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129086#M562046</guid>
      <dc:creator>donnie</dc:creator>
      <dc:date>2020-08-02T00:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: Strange events after upgrade of Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129141#M562049</link>
      <description>Start by confirming that your NAD devices aren't sending authentication&lt;BR /&gt;requests to ISE02. This can be one of the causes. Also, ensure that both&lt;BR /&gt;ISE nodes are having the same system certificates.&lt;BR /&gt;&lt;BR /&gt;If user authentication is failing on ISE02 this will be a problem in case&lt;BR /&gt;of the failover (or ISE01 is down) cause users won't be able to connect.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts.&lt;BR /&gt;</description>
      <pubDate>Sun, 02 Aug 2020 07:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129141#M562049</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-08-02T07:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: Strange events after upgrade of Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129511#M562062</link>
      <description>&lt;P&gt;In an ISE deployment all nodes with the PSN role are active and able to handle authentications. That's independent of which node is in the primary or secondary PAN or MnT role.&lt;/P&gt;
&lt;P&gt;Some NADs (e.g. ASAs) will fall back to using the second configured aaa server (= ISE PSN) when it sees a failure of the first one and not fail back unless you manually change it (or it sees a subsequent failure of the second node).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 12:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129511#M562062</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-03T12:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: Strange events after upgrade of Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129856#M562077</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With reference to my attached logs, there were no failure of any kind for my primary node. But "dynamic authorization failed" is still seen on my secondary node which is puzzling.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 03:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4129856#M562077</guid>
      <dc:creator>donnie</dc:creator>
      <dc:date>2020-08-04T03:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Strange events after upgrade of Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4134185#M562289</link>
      <description>&lt;P&gt;"Dynamic Authorization" is referring to the RADIUS CoA process.&lt;/P&gt;
&lt;P&gt;I did a quick Excel Pivot Table with your CSV and found that all of the failures are happening on ISE02 with your NAD @ &lt;STRONG&gt;192.168.210.51&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;Fail&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;Pass&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;192.168.164.95&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;1&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;21&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&amp;nbsp; Authentication failed&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;1&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISE01&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;1&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&amp;nbsp; Authentication succeeded&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;21&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISE01&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;21&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&lt;STRONG&gt;192.168.210.51&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;70&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; Dynamic Authorization failed&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;70&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="247px"&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISE02&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="123px"&gt;
&lt;P&gt;&lt;STRONG&gt;70&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="48px"&gt;
&lt;P&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest verifying your NAD configs match with respect to RADIUS CoA:&lt;/P&gt;
&lt;PRE&gt;aaa server radius dynamic-author
 client {ISE01_IP} server-key {key} &lt;BR /&gt; client {ISE02_IP} server-key {key&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 22:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/strange-events-after-upgrade-of-cisco-ise/m-p/4134185#M562289</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-08-11T22:31:44Z</dc:date>
    </item>
  </channel>
</rss>

