<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CIsco C3850 + ISE reauthentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4562824#M573101</link>
    <description>&lt;P&gt;The problem was Device-tracking comman under the interface . And now every thing is working fine&lt;/P&gt;</description>
    <pubDate>Thu, 03 Mar 2022 08:58:47 GMT</pubDate>
    <dc:creator>Veysaloglu</dc:creator>
    <dc:date>2022-03-03T08:58:47Z</dc:date>
    <item>
      <title>CIsco C3850 + ISE reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4560629#M573042</link>
      <description>&lt;P&gt;I neew switch to send authetication link to host , so i can check is there antivirus and any connect on host&lt;/P&gt;&lt;P&gt;So every thing working fine even fater connection user gets special vlan, then switch gets link ( i can see it in session infprmation) but this link doesn`t go to host so i it can be authenticated.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thats config that i made&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.10.13.13&lt;BR /&gt;server-key 7 15514F2E05282E2F7E6A637B36131E2F537618&lt;BR /&gt;auth-type any&lt;BR /&gt;ignore session-key&lt;BR /&gt;ignore server-key&lt;BR /&gt;!&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.10.13.13&lt;BR /&gt;server-key 7 15514F2E05282E2F7E6A637B36131E2F537618&lt;BR /&gt;auth-type any&lt;BR /&gt;ignore session-key&lt;BR /&gt;ignore server-key&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended CISCOCWAURLREDIRECTACL&lt;/P&gt;&lt;P&gt;deny ip any host 10.10.13.13&lt;BR /&gt;deny ip any host 10.10.13.14&lt;BR /&gt;deny udp any any eq domain&lt;BR /&gt;deny tcp any any eq domain&lt;BR /&gt;deny udp any eq bootps any&lt;BR /&gt;deny udp any any eq bootpc&lt;BR /&gt;deny udp any eq bootpc any&lt;BR /&gt;permit tcp any any eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;BR /&gt;ip http banner&lt;BR /&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport nonegotiate&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;mab&lt;BR /&gt;snmp trap mac-notification change added&lt;BR /&gt;snmp trap mac-notification change removed&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;ip dhcp snooping limit rate 25&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Interseting thing that same config works on&amp;nbsp;WS-C2960L-24TS-LL&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 09:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4560629#M573042</guid>
      <dc:creator>Rovshan91</dc:creator>
      <dc:date>2022-02-28T09:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco C3850 + ISE reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4560684#M573043</link>
      <description>&lt;P&gt;Are the endpoints getting an IP address from the DHCP server? on the redirect ACL you shared above it doesn't seem to have a deny rule to not to redirect the DHCP traffic! you should have an entry similar to "deny udp any eq bootpc any eq bootps". Also, do you have any dACL applied to those ports? if so, make sure this traffic is allowed on the dACL, otherwise it won't hit the redirect ACL.&lt;/P&gt;&lt;P&gt;Although it is not the case here but just as a side note, please keep in mind that the 2960-X switches order of operation when it comes to the redirect ACLs is totally different than the switches running the IOS XE code such as the C3850. Take a look at this post of mine for more info on this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://bluenetsec.com/redirect-acl-with-c9300-switches/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://bluenetsec.com/redirect-acl-with-c9300-switches/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 12:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4560684#M573043</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-28T12:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco C3850 + ISE reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4560689#M573044</link>
      <description>&lt;P&gt;Please ignore my note about the DHCP redirect traffic, re-reading your shared configs you have already the entry to not to redirect the DHCP traffic which is "&lt;SPAN&gt;deny udp any eq bootpc any&lt;/SPAN&gt;".&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 12:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4560689#M573044</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-28T12:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco C3850 + ISE reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4561824#M573045</link>
      <description>&lt;P&gt;Yes , they get ip from isolated vlan, but after İt they didn't get Reauthentication link and so cant authenticate&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 06:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4561824#M573045</guid>
      <dc:creator>Rovshan91</dc:creator>
      <dc:date>2022-03-02T06:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco C3850 + ISE reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4562110#M573059</link>
      <description>&lt;P&gt;&lt;SPAN&gt;A couple of things to try/consider.&amp;nbsp; If you wish for the switch to send an eap-request to initiate reauthentication:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Under your port config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#authentication periodic --default value is 3600 seconds; if you want to change this add the command below too:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#authentication timer reauthenticate &amp;lt;###&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note that you can also dynamically push reauth values via ISE policy if you wish.&amp;nbsp; Lastly, this may help you too:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;ISE Secure Wired Access Prescriptive Deployment Guide - Cisco Community&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 13:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4562110#M573059</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-03-02T13:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco C3850 + ISE reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4562824#M573101</link>
      <description>&lt;P&gt;The problem was Device-tracking comman under the interface . And now every thing is working fine&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 08:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4562824#M573101</guid>
      <dc:creator>Veysaloglu</dc:creator>
      <dc:date>2022-03-03T08:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco C3850 + ISE reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4565083#M573246</link>
      <description>&lt;P&gt;See &lt;LI-MESSAGE title="ISE Secure Wired Access Prescriptive Deployment Guide" uid="3641515" url="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/m-p/3641515#U3641515"&gt;&lt;/LI-MESSAGE&gt; for best practice configurations.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 00:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c3850-ise-reauthentication/m-p/4565083#M573246</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-03-07T00:00:58Z</dc:date>
    </item>
  </channel>
</rss>

