<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UnAuthorized even after adding mac address in group bypass MAC list. d:NA UZ in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4132518#M562218</link>
    <description>Take the packet capture on ISE Node to check the RADIUS Access-Request packets from the switch and simultaneous debugs for aaa authentication and radius  on the switch to correlate the issue.&lt;BR /&gt;Also provide the HW/SW of the switch along with the port configuration.</description>
    <pubDate>Sat, 08 Aug 2020 15:40:09 GMT</pubDate>
    <dc:creator>poongarg</dc:creator>
    <dc:date>2020-08-08T15:40:09Z</dc:date>
    <item>
      <title>UnAuthorized even after adding mac address in group bypass MAC list. d:NA UZ</title>
      <link>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4128202#M562010</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I found a very strange issue here. I have &lt;STRONG&gt;included the mac address in the bypass list&lt;/STRONG&gt; but however it doesnt seems to get authenticated , always remain as UZ. Therefore once CLOSED mode enforced, the device port Gi1/0/46 gets &lt;STRONG&gt;DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Anyone has any idea please? I am really stuck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CMX003#sh auth br&lt;BR /&gt;Interface MAC Address AuthC AuthZ Fg Uptime&lt;BR /&gt;-----------------------------------------------------------------------------&lt;BR /&gt;Gi1/0/46 084f.a566.a118&lt;STRONG&gt; d:NA&lt;/STRONG&gt; UZ: SA- FA- X 43s&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh mac address-table&lt;/P&gt;&lt;P&gt;804 084f.a566.a118 DYNAMIC&lt;STRONG&gt; Drop&lt;/STRONG&gt;&lt;BR /&gt;804 084f.a9b6.a11f DYNAMIC Gi1/0/48&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 17:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4128202#M562010</guid>
      <dc:creator>getaway51</dc:creator>
      <dc:date>2020-07-30T17:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: UnAuthorized even after adding mac address in group bypass MAC list. d:NA UZ</title>
      <link>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4128861#M562041</link>
      <description>&lt;P&gt;Please see &lt;STRONG&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_blank"&gt;How to Ask the Community for Help&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;to provide more details.&lt;/P&gt;
&lt;P&gt;Unclear what you are doing, why you are doing it, switch model, software version, switchport config, ISE matching authorization rule,&amp;nbsp; result, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 20:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4128861#M562041</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-07-31T20:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: UnAuthorized even after adding mac address in group bypass MAC list. d:NA UZ</title>
      <link>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4128937#M562043</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question(s):&amp;nbsp;&lt;/STRONG&gt;Even after adding MAC address of device in MAB group, the switch still shows UZ&amp;nbsp;(status Unauthorized in switch-sh auth br) and&amp;nbsp;ISE doesnt shows any info the MAC address attached to a switch like usual (just have a record of MAC address under context visibility).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Goal&lt;/STRONG&gt;&lt;SPAN&gt;:A&lt;/SPAN&gt;ny device MAC address added into the MAB group in ISE policy will be AZ (status authorized in switch-sh auth br).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Errors&lt;/STRONG&gt;&lt;SPAN&gt;: sh auth br - d:NA&amp;nbsp; UZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2020 03:55:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4128937#M562043</guid>
      <dc:creator>getaway51</dc:creator>
      <dc:date>2020-08-01T03:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: UnAuthorized even after adding mac address in group bypass MAC list. d:NA UZ</title>
      <link>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4132518#M562218</link>
      <description>Take the packet capture on ISE Node to check the RADIUS Access-Request packets from the switch and simultaneous debugs for aaa authentication and radius  on the switch to correlate the issue.&lt;BR /&gt;Also provide the HW/SW of the switch along with the port configuration.</description>
      <pubDate>Sat, 08 Aug 2020 15:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/unauthorized-even-after-adding-mac-address-in-group-bypass-mac/m-p/4132518#M562218</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2020-08-08T15:40:09Z</dc:date>
    </item>
  </channel>
</rss>

