<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: authentication failed, Error 15039 rejected per authorization prof in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590168#M574047</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Can anyone advise if I am facing a bug or something that I can try to do to avoid this problem,?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-These clients seem to be hitting the default authz policy for onboarding.&amp;nbsp; I would look into why these clients are not matching on the authz condition that you intend on them matching for your desired authz profile result by verifying your policy buildout/structure.&amp;nbsp; Are all clients having this issue or just the 15 mentioned?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Apr 2022 13:13:11 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2022-04-11T13:13:11Z</dc:date>
    <item>
      <title>authentication failed, Error 15039 rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590160#M574046</link>
      <description>&lt;P&gt;On ISE version&amp;nbsp;3.0.0.458 - Patch 2, I have 15 clients facing this issue :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Port config :-&lt;/P&gt;&lt;P&gt;authentication periodic&lt;/P&gt;&lt;P&gt;authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt;access-session control-direction in&lt;/P&gt;&lt;P&gt;access-session port-control auto&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber DOT1X-DEFAULT&lt;/P&gt;&lt;P&gt;event session-started match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-until-failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using mab priority 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using dot1x priority 10&lt;/P&gt;&lt;P&gt;event violation match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 restrict&lt;/P&gt;&lt;P&gt;event authentication-failure match-first&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class AAA-DOWN do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authorize&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 activate service-template CRITICAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 30 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 40 terminate mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20 class DOT1X-FAILED do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22 class DOT1X_TIMEOUT do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24 class DOT1X_NO-RESP do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30 class MAB-FAILED do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 activate service-template QUARANTINE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authorize&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 30 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 40 terminate mab&lt;/P&gt;&lt;P&gt;event agent-found match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate mab&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using dot1x&lt;/P&gt;&lt;P&gt;service-policy type control subscriber DOT1X-DEFAULT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;another profile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber DOT1X-RETRY&lt;/P&gt;&lt;P&gt;event session-started match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-until-failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using mab priority 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using dot1x priority 10&lt;/P&gt;&lt;P&gt;event violation match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 restrict&lt;/P&gt;&lt;P&gt;event authentication-failure match-first&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class AAA-DOWN do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authorize&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 activate service-template CRITICAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 30 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 40 terminate mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20 class DOT1X-FAILED do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22 class DOT1X_TIMEOUT do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24 class DOT1X_NO-RESP do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30 class MAB-FAILED do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 set-timer WAIT 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 30 activate service-template QUARANTINE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 40 authorize&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 50 terminate dot1x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 60 terminate mab&lt;/P&gt;&lt;P&gt;event agent-found match-all&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10 class always do-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10 terminate mab&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone advise if I am facing a bug or something that I can try to do to avoid this problem,?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 12:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590160#M574046</guid>
      <dc:creator>Amen</dc:creator>
      <dc:date>2022-04-11T12:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: authentication failed, Error 15039 rejected per authorization prof</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590168#M574047</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Can anyone advise if I am facing a bug or something that I can try to do to avoid this problem,?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-These clients seem to be hitting the default authz policy for onboarding.&amp;nbsp; I would look into why these clients are not matching on the authz condition that you intend on them matching for your desired authz profile result by verifying your policy buildout/structure.&amp;nbsp; Are all clients having this issue or just the 15 mentioned?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 13:13:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590168#M574047</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-04-11T13:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: authentication failed, Error 15039 rejected per authorization prof</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590192#M574052</link>
      <description>&lt;P&gt;only 15 client from more than a 100 are facing this issue.&lt;/P&gt;&lt;P&gt;and it was working fine before.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem occurs sporadically.&lt;BR /&gt;After deactivating 802.1x on this network port, the problem disappears, then it can be activated again, then it works for a certain time.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 13:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590192#M574052</guid>
      <dc:creator>Amen</dc:creator>
      <dc:date>2022-04-11T13:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: authentication failed, Error 15039 rejected per authorization prof</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590195#M574054</link>
      <description>&lt;P&gt;I would recommend doing the following:&lt;/P&gt;
&lt;P&gt;-Take a known good and known bad client, and then do a step by step comparison of the onboarding workflow for each.&amp;nbsp; This should narrow down the issue.&amp;nbsp; I am assuming that the issue is in your ISE authz policies with the 15 clients not matching on the desired policy.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 13:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590195#M574054</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-04-11T13:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: authentication failed, Error 15039 rejected per authorization prof</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590201#M574056</link>
      <description>&lt;P&gt;the policies/configurations are the same for all 700-750 clients.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 13:43:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590201#M574056</guid>
      <dc:creator>Amen</dc:creator>
      <dc:date>2022-04-11T13:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: authentication failed, Error 15039 rejected per authorization prof</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590535#M574070</link>
      <description>&lt;P&gt;You are hitting an &lt;STRONG&gt;Authorization Police&lt;/STRONG&gt;&amp;nbsp;- &lt;STRONG&gt;Rule Name&lt;/STRONG&gt;: &lt;STRONG&gt;&lt;U&gt;Default&lt;/U&gt;&lt;/STRONG&gt;,&amp;nbsp;that has a &lt;STRONG&gt;Results Profiles&lt;/STRONG&gt; - &lt;U&gt;&lt;STRONG&gt;DenyAccess&lt;/STRONG&gt;&lt;/U&gt;.&lt;/P&gt;&lt;P&gt;in &lt;STRONG&gt;Policy &amp;gt; Policy Set &amp;gt;&lt;/STRONG&gt; &lt;EM&gt;select the Policy Sets&lt;/EM&gt;, double check the &lt;STRONG&gt;Authorization Policy&amp;nbsp;&lt;/STRONG&gt;configuration.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 21:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590535#M574070</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-11T21:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: authentication failed, Error 15039 rejected per authorization prof</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590554#M574073</link>
      <description>&lt;P&gt;It's tough to say without more detail on how your policies are configured, but you might be running into an issue with how Concurrent Auth works (which, technically, ISE does not understand).&lt;/P&gt;&lt;P&gt;At reauth, the switch may be trying MAB first. If you have a default AuthZ Policy that sends an ACCESS_REJECT, it will cause a race condition (since MAB happens faster than dot1x) where the supplicant fails auth and stops trying for a retry period. A best practice when using Concurrent Auth is to have a default AuthZ Policy that sends an ACCESS_ACCEPT with a restrictive DACL. That will keep the supplicant happy until dot1x completes and successfully reauths.&lt;/P&gt;&lt;P&gt;Using Sequential Auth as per the configuration in the &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank" rel="noopener"&gt;Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt; will resolve this issue.&lt;/P&gt;&lt;P&gt;You can also try using the 'termination-action-modifier=1' attribute to mitigate the reauth issue as described in this post:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/cpl-template-mab-dot1x-simultaneously/td-p/3749539" target="_blank" rel="noopener"&gt;CPL Template MAB/Dot1x Simultaneously&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 22:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-error-15039-rejected-per-authorization/m-p/4590554#M574073</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-04-11T22:45:31Z</dc:date>
    </item>
  </channel>
</rss>

