<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISCO ISE Devices failing authorization policy randomly in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4308947#M566214</link>
    <description>&lt;P&gt;Having an issue with several hosts. Periodically, they will try to reference their host mac address, instead of using the computer’s AD account. I am reviewing the radius logs, and comparing a failed authorization attempt and a successful one. On the failed one, I will get the following&lt;BR /&gt;&lt;BR /&gt;15013 Selected Identity Source - Internal Endpoints&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - D8:CB:8A:87:E9:22&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;22037 Authentication Passed&lt;BR /&gt;24715 ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;BR /&gt;15036 Evaluating Authorization Policy&lt;BR /&gt;15048 Queried PIP - EndPoints.LogicalProfile&lt;BR /&gt;15048 Queried PIP - EndPoints.EndPointPolicy&lt;BR /&gt;15048 Queried PIP - DEVICE.Phase&lt;BR /&gt;15016 Selected Authorization Profile - Wired_Deny_All&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Currently using ISE version 2.6.0.156&lt;/P&gt;</description>
    <pubDate>Wed, 17 Mar 2021 13:56:39 GMT</pubDate>
    <dc:creator>FrankH31494</dc:creator>
    <dc:date>2021-03-17T13:56:39Z</dc:date>
    <item>
      <title>CISCO ISE Devices failing authorization policy randomly</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4308947#M566214</link>
      <description>&lt;P&gt;Having an issue with several hosts. Periodically, they will try to reference their host mac address, instead of using the computer’s AD account. I am reviewing the radius logs, and comparing a failed authorization attempt and a successful one. On the failed one, I will get the following&lt;BR /&gt;&lt;BR /&gt;15013 Selected Identity Source - Internal Endpoints&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - D8:CB:8A:87:E9:22&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;22037 Authentication Passed&lt;BR /&gt;24715 ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;BR /&gt;15036 Evaluating Authorization Policy&lt;BR /&gt;15048 Queried PIP - EndPoints.LogicalProfile&lt;BR /&gt;15048 Queried PIP - EndPoints.EndPointPolicy&lt;BR /&gt;15048 Queried PIP - DEVICE.Phase&lt;BR /&gt;15016 Selected Authorization Profile - Wired_Deny_All&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Currently using ISE version 2.6.0.156&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 13:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4308947#M566214</guid>
      <dc:creator>FrankH31494</dc:creator>
      <dc:date>2021-03-17T13:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISE Devices failing authorization policy randomly</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4308980#M566219</link>
      <description>&lt;P&gt;IMO to me this sounds like 802.1x is terminating on the respective clients, and then attempting to onboard via mab.&amp;nbsp; During the onboard attempt via mab the hosts are not matching any mab authz policies, and therefore hitting deny all.&amp;nbsp; I think for the community to better assist we need more information such as:&lt;/P&gt;
&lt;P&gt;-Supplicant used (native/nam)?&lt;/P&gt;
&lt;P&gt;-Supplicant configuration&lt;/P&gt;
&lt;P&gt;-802.1x configuration/Interface configuration&lt;/P&gt;
&lt;P&gt;-Any other notable discrepancies between the troubled clients versus the other working clients&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 14:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4308980#M566219</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-03-17T14:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISE Devices failing authorization policy randomly</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4308998#M566222</link>
      <description>&lt;P&gt;Host is windows 10 Enterprise. using the Native supplicant.&lt;/P&gt;&lt;P&gt;set for Microsoft: smartcard or other certificate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;wired connection.&amp;nbsp; service wired autoconfig is enabled and running.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;switchport access vlan 8675&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport nonegotiate&lt;BR /&gt;switchport voice vlan 309&lt;BR /&gt;device-tracking attach-policy device-tracking&lt;BR /&gt;no logging event link-status&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer inactivity server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;trust device cisco-phone&lt;BR /&gt;no snmp trap link-status&lt;BR /&gt;mab&lt;BR /&gt;storm-control broadcast level 20.00&lt;BR /&gt;storm-control action trap&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;auto qos voip cisco-phone&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;service-policy input AutoQos-4.0-CiscoPhone-Input-Policy&lt;BR /&gt;service-policy output AutoQos-4.0-Output-Policy&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 14:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4308998#M566222</guid>
      <dc:creator>FrankH31494</dc:creator>
      <dc:date>2021-03-17T14:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISE Devices failing authorization policy randomly</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4309629#M566258</link>
      <description>&lt;P&gt;Are you doing 'Computer Auth' only and is that configured on native supp? Have you attempted to run any debugs on the switch?&lt;/P&gt;
&lt;P&gt;debug dot1x all&lt;/P&gt;
&lt;P&gt;debug radius authentication&lt;/P&gt;
&lt;P&gt;debug eap all&lt;/P&gt;
&lt;P&gt;Something is causing 802.1x to terminate to then fallover to mab.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 13:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4309629#M566258</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-03-18T13:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ISE Devices failing authorization policy randomly</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4309761#M566265</link>
      <description>&lt;P&gt;I figured it out. it looks like the host, had Jumbo packets turned on for the ethernet adapter. I disabled it, and it's now working. Thanks for your help and input.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 15:55:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-devices-failing-authorization-policy-randomly/m-p/4309761#M566265</guid>
      <dc:creator>FrankH31494</dc:creator>
      <dc:date>2021-03-18T15:55:46Z</dc:date>
    </item>
  </channel>
</rss>

