<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Users not able to login after password reset in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438622#M568687</link>
    <description>&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;The default DACL is a deny all.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;So, if I apply DACL along with just the use auth being used from NAM, will that also work?&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jul 2021 05:21:11 GMT</pubDate>
    <dc:creator>dgaikwad</dc:creator>
    <dc:date>2021-07-26T05:21:11Z</dc:date>
    <item>
      <title>Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4432761#M568438</link>
      <description>&lt;P&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Hi Experts,&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;We have the following deployment:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;NAM - EAP-FAST using EAP-GTC, user authentication, authentication done from LDAP directory.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;ISE version 2.7&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;AnyConnect 4.6&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Posture service is also being used.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Configured the following ACL&lt;BR /&gt;Extended IP access list CISCO-CWA-URL-REDIRECT-ACL&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny udp any eq bootpc any eq bootps&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny udp any any eq domain&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny udp any host &amp;lt;ISE Server&amp;gt; eq 8905&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny tcp any host &amp;lt;ISE Server&amp;gt; eq 8905&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny tcp any host &amp;lt;ISE Server&amp;gt; eq 8443&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny ip any host &amp;lt;LDAP Server&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny ip any host &amp;lt;LDAP Server&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny ip any host &amp;lt;LDAP Server&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;permit ip any host 72.163.1.80&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;permit ip any any&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Issue:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;User password is reset from LDAP directory, and when the user tries to login using this new password, he gets an error saying that the "Domain not available".&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;As always, when dot1x config is removed from the port, the user is able to login with the new password...&lt;BR /&gt;&lt;BR /&gt;I was also thinking that if the permit ip any any could be causing the issue and remove it from the statement, would make any sense?&lt;BR /&gt;&lt;BR /&gt;Any suggestions?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 06:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4432761#M568438</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-07-14T06:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4435614#M568548</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is your default policy? the above policy cwa_url_redirect is mostly used for posture redirection.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 20:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4435614#M568548</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2021-07-19T20:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4435766#M568551</link>
      <description>&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;The default policy has a deny access authorization profile attached to it.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;And would adding a pre-auth ACL make any difference here?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 04:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4435766#M568551</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-07-20T04:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438249#M568676</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you need to push a dacl on computer authentication authorization policy to allow the traffic to the AD and other services for the user to authenticate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jul 2021 17:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438249#M568676</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2021-07-24T17:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438609#M568685</link>
      <description>&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;Here, the config is as follows, EAP-FAST with EAP-GTC and using only user authentication using NAM.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;Will this be possible using the above idea?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2021 04:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438609#M568685</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-07-26T04:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438617#M568686</link>
      <description>&lt;P&gt;what is your default dacl if you are not using computer authentication?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2021 05:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438617#M568686</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2021-07-26T05:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438622#M568687</link>
      <description>&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;The default DACL is a deny all.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;So, if I apply DACL along with just the use auth being used from NAM, will that also work?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2021 05:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438622#M568687</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-07-26T05:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438635#M568688</link>
      <description>&lt;P&gt;that is your problem how will the machine contact your AD to login if you have not given permission in the default acl as this would be there also, the ip address and dhcp, dns all the services need to be allowed to have access to get the PC on boarded to the network.&lt;/P&gt;&lt;P&gt;If you are doing user authentication, the dot1x policy DACL will get applied after successful user login so you need to allow that.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2021 05:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4438635#M568688</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2021-07-26T05:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Users not able to login after password reset</title>
      <link>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4439392#M568725</link>
      <description>&lt;P&gt;&lt;FONT face="verdana,geneva"&gt;As suggested I did change the deny policy and pushed in a DACL to allow for LDAP servers to be reachable.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;The other additional inform that I missed out on this was that all the interfaces in open authentication.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;and what I observed is that, post password change, ISE is able to see the auth success and then applied the authorization profile as well for posture check. But the Windows endpoint pops up saying that the domain is not reachable.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;To troubleshoot this further, I just pushed a DALC containing nothing but permit any any. Still the endpoint tells me that domain is unavailable and does not allow the user to login at all.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva"&gt;The only way I can allow the user to login is by removing dot1x configuration from the interface and login with the new password and put back dot1x config on the interface, till next time the user changes the password.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 07:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-not-able-to-login-after-password-reset/m-p/4439392#M568725</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-07-27T07:23:58Z</dc:date>
    </item>
  </channel>
</rss>

