<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with TrustSec ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4433418#M568469</link>
    <description>&lt;P&gt;See the &lt;A href="https://community.cisco.com/t5/security-documents/trustsec-troubleshooting-guide/ta-p/3647576" target="_blank" rel="noopener"&gt;TrustSec Troubleshooting Guide&lt;/A&gt;. The error you're seeing in the ISE detailed logs indicates that the PAC is not being provisioned. This is normally due to an error in the credential matching between ISE and the switch.&lt;/P&gt;
&lt;P&gt;I would suggest the following:&lt;/P&gt;
&lt;P&gt;On the switch clear your CTS credentials, remove your CTS authorization and aaa configuration.&lt;/P&gt;
&lt;PRE&gt;clear cts credentials
!
no cts authorization list CTS-LIST
no aaa authorization network CTS-LIST group ISE+PAC&lt;/PRE&gt;
&lt;P&gt;In ISE, ensure your NAD is configured with the name MOITCHPTEST, under the Advanced TrustSec Settings section, you have ticked the 'Use Device ID for TrustSec Identification' and re-apply the password is correct for the Device ID (ensuring that no special characters are used). In the TrustSec Notifications and Updates section, use the 'Test Connection' button to verify connectivity.&lt;/P&gt;
&lt;P&gt;On the switch, re-apply the pac key in the RADIUS server configuration (using 'pac key 0' for non-encrypted string and again ensuring no special characters are used). Ensure this key string matches the one configured for RADIUS auth in ISE.&lt;/P&gt;
&lt;P&gt;Re-apply the 'aaa authorization' and 'cts authorization' config. Re-apply the 'cts credentials' config ensuring that it matches the TrustSec Device ID and password configured in the NAD on ISE (no special characters).&lt;/P&gt;
&lt;P&gt;Use the 'show cts pacs' command to ensure that the PAC is provisioned.&lt;/P&gt;
&lt;P&gt;If all else fails, you might need to open a TAC case to investigate further.&lt;/P&gt;
&lt;P&gt;If you're using a Cat9k switch, another option is to use the newer method of HTTP REST API as it removes the need for a EAP-FAST and PAC.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/17-1/configuration_guide/cts/b_171_cts_9500_cg/cts_sgacl_env_data_dwnload.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/17-1/configuration_guide/cts/b_171_cts_9500_cg/cts_sgacl_env_data_dwnload.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jul 2021 23:18:06 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-07-14T23:18:06Z</dc:date>
    <item>
      <title>Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4430392#M568383</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i am trying implement trustsec at the company.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have started by setting up ISE 3.0 Patch 1,2 and a singel switch.&lt;/P&gt;&lt;P&gt;I used this guide:&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/trustsec-troubleshooting-guide/ta-p/3647576#toc-hId-1865711122" target="_blank"&gt;https://community.cisco.com/t5/security-documents/trustsec-troubleshooting-guide/ta-p/3647576#toc-hId-1865711122&lt;/A&gt;&lt;BR /&gt;And a few Youtube videos by Kataherine&amp;nbsp;&lt;A href="https://www.youtube" target="_blank"&gt;https:/ /www.youtube&lt;/A&gt; .com/watch?v=j2i7U5StOYE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jul 9 11:00:26.137 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.4.174:1812,1813 is being marked alive.&lt;BR /&gt;Jul 9 11:00:36.177 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.5.9:1812,1813 is being marked alive.&lt;BR /&gt;Jul 9 11:00:40.838 MET-DST: %CTS-3-PAC_PROVI_FAIL: PAC Provisioning failed for 10.0.4.174&lt;BR /&gt;Jul 9 11:01:16.087 MET-DST: %CTS-6-ENV_DATA_WAIT_RESP_STATE: Environment Data Download in wait response state&lt;BR /&gt;Jul 9 11:01:26.154 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.4.174:1812,1813 is not responding.&lt;BR /&gt;Jul 9 11:01:36.262 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.5.9:1812,1813 is not responding.&lt;BR /&gt;Jul 9 11:02:16.093 MET-DST: %CTS-6-ENV_DATA_START_STATE: Environment Data Download in start state&lt;BR /&gt;Jul 9 11:02:16.093 MET-DST: %CTS-6-ENV_DATA_WAIT_RESP_STATE: Environment Data Download in wait response state&lt;BR /&gt;Jul 9 11:02:16.093 MET-DST: %CTS-3-AAA_NO_RADIUS_SERVER: No RADIUS servers available for CTS AAA request for CTS env-data SM&lt;BR /&gt;Jul 9 11:02:16.680 MET-DST: %RADIUS-3-ALLDEADSERVER: Group ISE: No active radius servers found. Id 2.&lt;BR /&gt;Jul 9 11:02:25.851 MET-DST: %CTS-3-PAC_PROVI_FAIL: PAC Provisioning failed for 10.0.4.174&lt;BR /&gt;Jul 9 11:02:26.160 MET-DST: %RADIUS-6-SERVERALIVE: Group ISE: Radius server 10.0.4.174:1812,1813 is responding again (previously dead).&lt;BR /&gt;Jul 9 11:02:26.160 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.4.174:1812,1813 is being marked alive.&lt;BR /&gt;Jul 9 11:02:36.268 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.5.9:1812,1813 is being marked alive.&lt;BR /&gt;Jul 9 11:03:16.099 MET-DST: %CTS-6-ENV_DATA_WAIT_RESP_STATE: Environment Data Download in wait response state&lt;BR /&gt;Jul 9 11:03:26.203 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.4.174:1812,1813 is not responding.&lt;BR /&gt;Jul 9 11:03:36.243 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.5.9:1812,1813 is not responding.&lt;BR /&gt;Jul 9 11:04:10.857 MET-DST: %CTS-3-PAC_PROVI_FAIL: PAC Provisioning failed for 10.0.4.174&lt;BR /&gt;Jul 9 11:04:16.100 MET-DST: %CTS-6-ENV_DATA_START_STATE: Environment Data Download in start state&lt;BR /&gt;Jul 9 11:04:16.100 MET-DST: %CTS-6-ENV_DATA_WAIT_RESP_STATE: Environment Data Download in wait response state&lt;BR /&gt;Jul 9 11:04:16.100 MET-DST: %CTS-3-AAA_NO_RADIUS_SERVER: No RADIUS servers available for CTS AAA request for CTS env-data SM&lt;BR /&gt;Jul 9 11:04:16.509 MET-DST: %RADIUS-3-ALLDEADSERVER: Group ISE: No active radius servers found. Id 3.&lt;BR /&gt;Jul 9 11:04:26.209 MET-DST: %RADIUS-6-SERVERALIVE: Group ISE: Radius server 10.0.4.174:1812,1813 is responding again (previously dead).&lt;BR /&gt;Jul 9 11:04:26.209 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.4.174:1812,1813 is being marked alive.&lt;BR /&gt;Jul 9 11:04:36.249 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.5.9:1812,1813 is being marked alive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before this config i was useing a Radius config also via ISE, so i know that the server and the switch has connecction and the ports are open thrue the Firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i checked and re checked the Password and the device-ID and they match&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch config:&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa group server radius ISE&lt;BR /&gt;server name vaclscise01&lt;BR /&gt;server name vaclscise03&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group ISE local&lt;BR /&gt;aaa authentication enable default group ISE enable&lt;BR /&gt;aaa authentication dot1x default group ISE&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group ISE local&lt;BR /&gt;aaa authorization network default group ISE&lt;BR /&gt;aaa authorization network VASYD-CTS-LIST group ISE&lt;BR /&gt;aaa accounting update newinfo periodic 2440&lt;BR /&gt;aaa accounting dot1x default start-stop group ISE&lt;BR /&gt;aaa accounting network default start-stop group ISE&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt;client x.x.x.x server-key 7 120901344A29260C2E1D&lt;BR /&gt;client x.x.x.x server-key 7 051B022C796E64011D33&lt;BR /&gt;auth-type any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf upper-case&lt;BR /&gt;radius-server attribute 31 send nas-port-detail mac-only&lt;BR /&gt;radius-server dead-criteria time 30 tries 2&lt;BR /&gt;radius-server host x.x.x.x key 7 073C0F7F7E5B2E1C414A2716307922062C01340043&lt;BR /&gt;radius-server deadtime 1&lt;BR /&gt;radius-server accounting system host-config&lt;BR /&gt;!&lt;BR /&gt;radius server vaclscise01&lt;BR /&gt;address ipv4 x.x.x.x auth-port 1812 acct-port 1813&lt;BR /&gt;pac key 7 105E0D3A5D3538030832&lt;BR /&gt;!&lt;BR /&gt;radius server vaclscise03&lt;BR /&gt;address ipv4 x.x.x.x auth-port 1812 acct-port 1813&lt;BR /&gt;pac key 7 13151331532E2E222F12&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 09:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4430392#M568383</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-07-09T09:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4431083#M568404</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/826303"&gt;@Niklas.D&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have the cts authorisation list command configured?I don't see it in your output above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;cts authorization list &amp;lt;LIST NAME&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jul 2021 07:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4431083#M568404</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-07-11T07:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4432063#M568416</link>
      <description>&lt;P&gt;Hi Rob&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i do indeed have the line&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cts authorization list CTS-LIST&lt;/P&gt;&lt;P&gt;also:&amp;nbsp;aaa authorization network CTS-LIST group ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 06:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4432063#M568416</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-07-13T06:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4432672#M568432</link>
      <description>&lt;P&gt;It's difficult to say without more info on what the ISE detailed logs show, what switch hardware/software, what the switch debugs show, etc. However, one of the issues I've seen with older switch code is that you cannot use the same RADIUS server for PAC and non-PAC communications. The ISE detailed logs would usually point to an issue with 'pac-opaque'&lt;/P&gt;
&lt;P&gt;You might try the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reconfigure your original RADIUS server to use a non-PAC key&lt;/P&gt;
&lt;PRE&gt;radius server vaclscise01
address ipv4 x.x.x.x auth-port 1812 acct-port 1813
key xxx&lt;/PRE&gt;
&lt;P&gt;Configure a new RADIUS server using the same IP but different ports and a PAC key&lt;/P&gt;
&lt;PRE&gt;radius server vaclscise01-PAC
address ipv4 x.x.x.x auth-port 1645 acct-port 1646
pac key xxx&lt;/PRE&gt;
&lt;P&gt;Create a new aaa server group for the PAC-based RADIUS server and update your aaa authz to use that group&lt;/P&gt;
&lt;PRE&gt;aaa group server radius ISE+PAC
server name vaclscise01-PAC
!
aaa authorization network CTS-LIST group ISE+PAC&lt;/PRE&gt;
&lt;P&gt;Clear your cts credentials and reapply&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 00:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4432672#M568432</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-07-14T00:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4432802#M568443</link>
      <description>&lt;P&gt;Hey Greg thank you for the time!&amp;nbsp;&lt;/P&gt;&lt;P&gt;radius server vaclscise01&lt;BR /&gt;address ipv4 10.0.4.174 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 107D272A363453&lt;BR /&gt;!&lt;BR /&gt;radius server vaclscise03&lt;BR /&gt;address ipv4 10.0.5.9 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 097F46&lt;BR /&gt;!&lt;BR /&gt;radius server pac-vaclscise01&lt;BR /&gt;address ipv4 10.0.4.174 auth-port 1645 acct-port 1646&lt;BR /&gt;pac key 7 12E1D&lt;BR /&gt;!&lt;BR /&gt;radius server pac-vaclscise03&lt;BR /&gt;address ipv4 10.0.5.9 auth-port 1645 acct-port 1646&lt;BR /&gt;pac key 7 07324&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ISE&lt;BR /&gt;server name vaclscise01&lt;BR /&gt;server name vaclscise03&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ISE+PAC&lt;BR /&gt;server name pac-vaclscise03&lt;BR /&gt;server name pac-vaclscise01&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group ISE local&lt;BR /&gt;aaa authentication enable default group ISE enable&lt;BR /&gt;aaa authentication dot1x default group ISE&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group ISE local&lt;BR /&gt;aaa authorization network default group ISE&lt;BR /&gt;aaa authorization network CTS-LIST group ISE+PAC&lt;BR /&gt;aaa accounting update newinfo periodic 2440&lt;BR /&gt;aaa accounting dot1x default start-stop group ISE&lt;BR /&gt;aaa accounting network default start-stop group ISE&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;CTS password is defined in keystore, device-id = MOITCHPTEST&lt;BR /&gt;cts authorization list CTS-LIST&lt;BR /&gt;cts logging verbose&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.0.5.9 server-key 7 107D272A53&lt;BR /&gt;client 10.0.4.174 server-key 7 3E05087B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This at least lets me use radius to login again that is nice &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But still same problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jul 14 08:39:11.204 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.5.9:1645,1646 is not responding.&lt;BR /&gt;Jul 14 08:39:21.281 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.4.174:1645,1646 is not responding.&lt;BR /&gt;Jul 14 08:40:01.128 MET-DST: %CTS-6-ENV_DATA_START_STATE: Environment Data Download in start state&lt;BR /&gt;Jul 14 08:40:01.128 MET-DST: %CTS-6-ENV_DATA_WAIT_RESP_STATE: Environment Data Download in wait response state&lt;BR /&gt;Jul 14 08:40:01.128 MET-DST: %CTS-3-AAA_NO_RADIUS_SERVER: No RADIUS servers available for CTS AAA request for CTS env-data SM&lt;BR /&gt;Jul 14 08:40:01.579 MET-DST: %RADIUS-3-ALLDEADSERVER: Group ISE+PAC: No active radius servers found. Id 7.&lt;BR /&gt;Jul 14 08:40:11.211 MET-DST: %RADIUS-6-SERVERALIVE: Group ISE+PAC: Radius server 10.0.5.9:1645,1646 is responding again (previously dead).&lt;BR /&gt;Jul 14 08:40:11.211 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.5.9:1645,1646 is being marked alive.&lt;BR /&gt;Jul 14 08:40:15.515 MET-DST: %CTS-3-PAC_PROVI_FAIL: PAC Provisioning failed for 10.0.4.174&lt;BR /&gt;Jul 14 08:40:21.298 MET-DST: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.0.4.174:1645,1646 is being marked alive.&lt;BR /&gt;Jul 14 08:41:01.140 MET-DST: %CTS-6-ENV_DATA_WAIT_RESP_STATE: Environment Data Download in wait response state&lt;BR /&gt;Jul 14 08:41:11.180 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.5.9:1645,1646 is not responding.&lt;BR /&gt;Jul 14 08:41:21.231 MET-DST: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.0.4.174:1645,1646 is not responding.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 06:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4432802#M568443</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-07-14T06:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4433418#M568469</link>
      <description>&lt;P&gt;See the &lt;A href="https://community.cisco.com/t5/security-documents/trustsec-troubleshooting-guide/ta-p/3647576" target="_blank" rel="noopener"&gt;TrustSec Troubleshooting Guide&lt;/A&gt;. The error you're seeing in the ISE detailed logs indicates that the PAC is not being provisioned. This is normally due to an error in the credential matching between ISE and the switch.&lt;/P&gt;
&lt;P&gt;I would suggest the following:&lt;/P&gt;
&lt;P&gt;On the switch clear your CTS credentials, remove your CTS authorization and aaa configuration.&lt;/P&gt;
&lt;PRE&gt;clear cts credentials
!
no cts authorization list CTS-LIST
no aaa authorization network CTS-LIST group ISE+PAC&lt;/PRE&gt;
&lt;P&gt;In ISE, ensure your NAD is configured with the name MOITCHPTEST, under the Advanced TrustSec Settings section, you have ticked the 'Use Device ID for TrustSec Identification' and re-apply the password is correct for the Device ID (ensuring that no special characters are used). In the TrustSec Notifications and Updates section, use the 'Test Connection' button to verify connectivity.&lt;/P&gt;
&lt;P&gt;On the switch, re-apply the pac key in the RADIUS server configuration (using 'pac key 0' for non-encrypted string and again ensuring no special characters are used). Ensure this key string matches the one configured for RADIUS auth in ISE.&lt;/P&gt;
&lt;P&gt;Re-apply the 'aaa authorization' and 'cts authorization' config. Re-apply the 'cts credentials' config ensuring that it matches the TrustSec Device ID and password configured in the NAD on ISE (no special characters).&lt;/P&gt;
&lt;P&gt;Use the 'show cts pacs' command to ensure that the PAC is provisioned.&lt;/P&gt;
&lt;P&gt;If all else fails, you might need to open a TAC case to investigate further.&lt;/P&gt;
&lt;P&gt;If you're using a Cat9k switch, another option is to use the newer method of HTTP REST API as it removes the need for a EAP-FAST and PAC.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/17-1/configuration_guide/cts/b_171_cts_9500_cg/cts_sgacl_env_data_dwnload.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/17-1/configuration_guide/cts/b_171_cts_9500_cg/cts_sgacl_env_data_dwnload.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 23:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4433418#M568469</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-07-14T23:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4433721#M568481</link>
      <description>&lt;P&gt;Yeah tried this now, made a easy password. still same problem, marked as not alive. going to TAC&lt;/P&gt;&lt;P&gt;thank you!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 12:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4433721#M568481</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-07-15T12:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4631052#M575445</link>
      <description>&lt;P&gt;I think I figured out what your issue is as I am having the same one, I even used Katherine Mcnamaras videos to setup trustsec.&amp;nbsp; Pac provisioning uses TLS 1.0 so if you don't support that in ISE than the pac provision will fail causing the entire process to fail.&amp;nbsp; If you have switched over to CAT9000s then you will need to use the Rest API method, if you still have 3k switches well your only choice is support TLS 1.0.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 19:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/4631052#M575445</guid>
      <dc:creator>Blackhawk1278</dc:creator>
      <dc:date>2022-06-13T19:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/5216821#M592779</link>
      <description>&lt;P&gt;This is a great suggestion.&lt;/P&gt;
&lt;P&gt;I've found that switch configuration that worked without issue using ISE 2.6 no longer works with ISE 3.3 because TLS1.0 was not enabled. Enabling TLS1.0 via Administation &amp;gt; System &amp;gt; Settings &amp;gt; Security Settings allow the switch to retrieve its PAC and download environment settings.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 14:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/5216821#M592779</guid>
      <dc:creator>dddd2</dc:creator>
      <dc:date>2024-10-29T14:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with TrustSec ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/5217073#M592803</link>
      <description>&lt;P&gt;I'm also eagerly trying to disable TLS 1.0 in ISE but ran into the same gotcha with customers who provision their IOS-XE devices with DNAC/Cat Center.&lt;/P&gt;
&lt;P&gt;ISE 3.4 supports PAC-less provisioning for IOS-XE 17.15.12 and later.&amp;nbsp; &amp;nbsp;But there is no version of DNAC/Catalyst Center that supports PAC-less provisioning. Therefore if you are provisioning IOS-XE devices with DNAC/Cat Center, then you will still get the old style PAC based configs for your RADIUS server configs.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 22:31:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-with-trustsec-ise/m-p/5217073#M592803</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-29T22:31:52Z</dc:date>
    </item>
  </channel>
</rss>

