<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp;amp; ISE) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4733664#M578676</link>
    <description>&lt;P&gt;I will add on to all the good things&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;posted above. We just had an issue with this in a customers lab that's running cts manual on the uplinks. The configuration was all correct, we scanned the network devices and ISE with a fine tooth comb only to come up with nothing. We reloaded the controllers, still nothing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then my peer tried to ping ISE at the configured MTU, 1500 bytes in this case. The same ping failed to the gateway.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;From the WLC CLI,&amp;nbsp;&lt;EM&gt;ping x.x.x.x size 1500&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The pings failed, all the way down to 1492 bytes where it worked. We were missing eight bytes, a crucial eight bytes that was causing packets to get silently discarded by the interfaces. The eventual fix was to completely remove the cts manual and port channel config from both controllers and rebuild the uplinks. It worked after that. This has been a common problem I've seen in the past with cts manual links having some kind of internal MTU mismatch not visible in the startup/running configuration.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Dec 2022 01:01:13 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2022-12-07T01:01:13Z</dc:date>
    <item>
      <title>Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719818#M578180</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I'm getting my moneys worth from the community this week &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I have a 9800-40 WLC running&amp;nbsp;17.3.4c which is integrated with DNAC for SDA.&lt;/P&gt;
&lt;P&gt;Fabric wireless works fine apart from micro-segmentation with SGTs.&lt;/P&gt;
&lt;P&gt;If I log into the WLC and run a "show cts environment-data" it does not show the SGTs&lt;/P&gt;
&lt;P&gt;ISE RADIUS live logs report "&lt;SPAN&gt;5417 Dynamic Authorization failed&lt;/SPAN&gt;" (see attached).&lt;/P&gt;
&lt;P&gt;All the AAA/RADIUS/COA/etc config was pushed to the WLC from DNAC so &lt;EM&gt;should&lt;/EM&gt; be correct.&lt;/P&gt;
&lt;P&gt;Any ideas how I can resolve this?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 13:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719818#M578180</guid>
      <dc:creator>mattw</dc:creator>
      <dc:date>2022-11-11T13:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719901#M578181</link>
      <description>&lt;P&gt;Sorry, I'm not opening a *.docx or *.pdf file posted to a community site.&lt;/P&gt;
&lt;P&gt;Consider attaching plain text files for long configs or debug output and attaching images inline directly.&lt;/P&gt;
&lt;P&gt;You may also use the Insert Code feature of the editor.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 184px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/167701i889081283D34EB5F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If COA failed it's probably a lack of COA configuration on your WLC.&lt;/P&gt;
&lt;P&gt;See ▶ &lt;A class="" title="https://youtu.be/1JREdDCRH3c" href="https://youtu.be/1JREdDCRH3c" data-from-md="" target="_blank"&gt;Securing Cisco Catalyst Wireless with ISE using mPSK / iPSK / 802.1X&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="" title="https://youtu.be/1JREdDCRH3c&amp;amp;t=410s" href="https://youtu.be/1JREdDCRH3c&amp;amp;t=410s" data-from-md="" target="_blank"&gt;06:50&lt;/A&gt; AAA RADIUS Config&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/167702i0BC50DAFC2C0F25B/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 17:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719901#M578181</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-11-11T17:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719905#M578182</link>
      <description>&lt;P&gt;Have a look through this new 9800 guide specifically written for SGT support. Before the env data can be downloaded, the platform needs a PAC. Start at the section entitled 'C9800 CTS Provisioning and Device Enrollment'. The doc doesn't cater for DNAC automation but you should be able to compare: &lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/tech-notes/Wireless_9800_Group-Based_Policy_Guide_edited.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/tech-notes/Wireless_9800_Group-Based_Policy_Guide_edited.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 17:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719905#M578182</guid>
      <dc:creator>jeaves@cisco.com</dc:creator>
      <dc:date>2022-11-11T17:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719910#M578183</link>
      <description>&lt;P&gt;No worries&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The config should be correct because it's all been pushed by DNAC and you'd hope DNAC knows what it's doing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Here is the output from debug aaa coa:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;AAA request is from proxycoa proxy create aaa protocol :radius coa proxy relay coa resp(iosd)coa proxy create aaa protocol ,size required to flatten attr list : 199coa proxy create aaa protocol :attr list flattened filled buf size : 199coa proxy create aaa protocol :CoA Response Detailscoa proxy create aaa protocol :Attr list : 
&amp;lt;&amp;lt;  username             0   "#CTSREQUEST#"&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  nas-ip-address       0   10.201.0.196&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  Event-Timestamp      0   1668187180 (0x636E842C)&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  ssg-command-code     0   38 23 43 54 53 52 45 51 55 45 53 54 23 &amp;gt;&amp;gt;
&amp;lt;&amp;lt;  reply-message        0   "Req init fail"&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  error-cause          0   15 [Resource Unavailable]&amp;gt;&amp;gt;coa proxy create aaa protocol :server:160.0.201.10 cfg_saddr:196.0.201.10 udpport:10318 sport:0, tableid:0iden:14 rad_code:43 msg_auth_rcvd:TRUE coa_resp:NACKE40AF95190C1704BB473C1D4DA039C36coa proxy create aaa protocol,msg send to end point 'SMD' succeededAAA request is from proxycoa proxy create aaa protocol :radius coa proxy relay coa resp(iosd)coa proxy create aaa protocol ,size required to flatten attr list : 199coa proxy create aaa protocol :attr list flattened filled buf size : 199coa proxy create aaa protocol :CoA Response Detailscoa proxy create aaa protocol :Attr list : 
&amp;lt;&amp;lt;  username             0   "#CTSREQUEST#"&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  nas-ip-address       0   10.201.0.196&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  Event-Timestamp      0   1668187181 (0x636E842D)&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  ssg-command-code     0   38 23 43 54 53 52 45 51 55 45 53 54 23 &amp;gt;&amp;gt;
&amp;lt;&amp;lt;  reply-message        0   "Req init fail"&amp;gt;&amp;gt;
&amp;lt;&amp;lt;  error-cause          0   15 [Resource Unavailable]&amp;gt;&amp;gt;coa proxy create aaa protocol :server:160.0.201.10 cfg_saddr:196.0.201.10 udpport:10318 sport:0, tableid:0iden:15 rad_code:43 msg_auth_rcvd:TRUE coa_resp:NACK5FC0D0847F5871B01CBED0948F021F41coa proxy create aaa protocol,msg send to end point 'SMD' succeeded&lt;/LI-CODE&gt;
&lt;P&gt;And screenshots of the RADIUS live logs:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mattw_0-1668188355446.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/167703i6EF56153BFCB0E60/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mattw_0-1668188355446.png" alt="mattw_0-1668188355446.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mattw_1-1668188389337.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/167704i42D27EB70AA603C0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mattw_1-1668188389337.png" alt="mattw_1-1668188389337.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mattw_2-1668188403088.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/167705i71D15926633E2830/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mattw_2-1668188403088.png" alt="mattw_2-1668188403088.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 17:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719910#M578183</guid>
      <dc:creator>mattw</dc:creator>
      <dc:date>2022-11-11T17:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719912#M578184</link>
      <description>&lt;P&gt;In the CTS debug output, in a couple of places it's writing the NAD and Server IPs with the octets 'backwards'.&lt;/P&gt;
&lt;P&gt;I don't know if this is by design or some really weird bug??&lt;/P&gt;
&lt;P&gt;E.g. :&amp;nbsp;&lt;/P&gt;
&lt;PRE class="lia-code-sample  language-markup"&gt;&lt;CODE&gt;server:160.0.201.10&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;The IP of the server is actually: 10.201.0.160 (and .161)&lt;/P&gt;
&lt;P&gt;And:&lt;/P&gt;
&lt;PRE class="lia-code-sample  language-markup"&gt;&lt;CODE&gt;cfg_saddr:196.0.201.10&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;The IP of the WLC is actually: 10.201.0.196&lt;/P&gt;
&lt;P&gt;Weird huh??&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 17:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719912#M578184</guid>
      <dc:creator>mattw</dc:creator>
      <dc:date>2022-11-11T17:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719934#M578185</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/358741"&gt;jeaves@cisco.com&lt;/a&gt;.&amp;nbsp;Weirdly, the PAC has been downloaded to the WLC but it just won't download the cts environment data. I've cleared and re-added new cts credentials on the WLC and reflected this change in the NAD config on ISE but still no joy. I think I feel a TAC case coming &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 18:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4719934#M578185</guid>
      <dc:creator>mattw</dc:creator>
      <dc:date>2022-11-11T18:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4720509#M578203</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1214276"&gt;@mattw&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Since you are doing SD-Access, the wireless clients are enforced by the edge switches or others but NOT by WLC or AFAIK. See&amp;nbsp;&lt;A href="https://www.cisco.com/c/dam/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/deploy-guide/cisco-dna-center-sd-access-wl-dg.pdf" target="_blank" rel="noopener"&gt;SD-Access Wireless Design and Deployment Guide - Cisco DNA Center 2.1.1&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thus far, I've NOT seen DNAC provisioned the complete CTS configurations to a 9800 WLC. Please do follow Joff's guide.&lt;/P&gt;
&lt;P&gt;In one of WLC's I checked, DNAC provisioned several AAA radius server groups even though the deployment has only one ISE as the AAA RADIUS server. As a result, I created a new group and use that for the CTS server list and in the AAA method list for CTS. Below are the diff:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;!! Define a new radius server group with the existing ISE server dnac-radius_10.1.100.3
aaa group server radius ctsRadGroup
 server name dnac-radius_10.1.100.3
 ip radius source-interface Vlan100
 deadtime 5
!
!! Add a new method list
aaa authorization network ctsAuthZList group ctsRadGroup
!
!! Tell CTS to use the new method list
cts authorization list ctsAuthZList
cts sgt 2
!&lt;/LI-CODE&gt;
&lt;P&gt;After that, I had to refresh the environment data with the command below to get the environment data&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;cts refresh env&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Nov 2022 18:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4720509#M578203</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-11-13T18:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4720829#M578222</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;.&amp;nbsp;I had already done what you suggested (added the authz method and list) but I still get the authz failed message which is somewhat frustrating. I think TAC will need to get involved in this one.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 10:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4720829#M578222</guid>
      <dc:creator>mattw</dc:creator>
      <dc:date>2022-11-14T10:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4721092#M578233</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1214276"&gt;@mattw&lt;/a&gt;&amp;nbsp; Yes, definitely good to engage TAC. Do let us know if we may assist.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 14:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4721092#M578233</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-11-14T14:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4733661#M578675</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1214276"&gt;@mattw&lt;/a&gt;&amp;nbsp;FYI&lt;/P&gt;
&lt;P&gt;Last week Joff worked with us on a similar issue for Over-the-Top (OOT) wireless. We found the following&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;All ISE nodes in the TrustSec AAA server list should be configured in the NADs' allowed-CoA list. Also, each NAD in ISE should be configured to use one of these ISE nodes to perform CoA requests for TrustSec policy updates. By default, ISE uses the primary ISE node for such CoA requests so likely we need to ensure NADs accepting CoA requests from the primary ISE node&lt;/LI&gt;
&lt;LI&gt;On 9800 WLC, at least one policy profile should be enabled for TrustSec policy enforcement; for example,
&lt;UL&gt;
&lt;LI&gt;&lt;LI-CODE lang="python"&gt;my9800-WLC#show wireless cts summary
Local Mode CTS Configuration
 
Policy Profile Name               SGACL Enforcement     Inline-Tagging   Default-Sgt      
----------------------------------------------------------------------------------------
pp-open                           DISABLED              DISABLED         0                
pp-dot1x                          ENABLED               ENABLED          777              
asim43-policy                     DISABLED              DISABLED         0                
guest-policy-tag                  DISABLED              DISABLED         0                
default-policy-profile            DISABLED              DISABLED         0                
 
Flex Mode CTS Configuration
 
Flex Profile Name                 SGACL Enforcement     Inline-Tagging   
-----------------------------------------------------------------------
named-flex-profile                DISABLED              DISABLED         
default-flex-profile              DISABLED              DISABLED         
asim43-flex-profile-7             DISABLED              DISABLED   &lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;My setup did not have any so Joff created one for me as&amp;nbsp;&lt;LI-CODE lang="markup"&gt;wireless profile policy sampleTestPolicy
 aaa-override
 cts role-based enforcement
 cts sgt 2
 nac
 vlan 100
 no shutdown&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These two above were what we missed. Other things to check for are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Check if PACs downloaded:&amp;nbsp;&lt;LI-CODE lang="markup"&gt;show cts pacs​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Check if bindings&amp;nbsp;&lt;LI-CODE lang="markup"&gt;show cts role-based sgt-map all​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Check if the aaa server connectivity is fine&amp;nbsp;&lt;LI-CODE lang="markup"&gt;test aaa group radius someUser somePass new-code​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Check if the client is assigned with sgt&amp;nbsp;&lt;LI-CODE lang="markup"&gt;show wireless client mac-address &amp;lt;&amp;gt; detail​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Check if the NAD added in ISE with TrustSec configuration&lt;/LI&gt;
&lt;LI&gt;Check if the NAD's device name and ip are consistent between ISE and NADs.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 07 Dec 2022 00:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4733661#M578675</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-12-07T00:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4733664#M578676</link>
      <description>&lt;P&gt;I will add on to all the good things&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;posted above. We just had an issue with this in a customers lab that's running cts manual on the uplinks. The configuration was all correct, we scanned the network devices and ISE with a fine tooth comb only to come up with nothing. We reloaded the controllers, still nothing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then my peer tried to ping ISE at the configured MTU, 1500 bytes in this case. The same ping failed to the gateway.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;From the WLC CLI,&amp;nbsp;&lt;EM&gt;ping x.x.x.x size 1500&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The pings failed, all the way down to 1492 bytes where it worked. We were missing eight bytes, a crucial eight bytes that was causing packets to get silently discarded by the interfaces. The eventual fix was to completely remove the cts manual and port channel config from both controllers and rebuild the uplinks. It worked after that. This has been a common problem I've seen in the past with cts manual links having some kind of internal MTU mismatch not visible in the startup/running configuration.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 01:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4733664#M578676</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2022-12-07T01:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization Failed #CTSREQUEST# (SDA 9800 WLC &amp; ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4946773#M584808</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;I had the exact same issue and i spent hours looking into debugs, but my solution was pretty simple:&lt;/P&gt;
&lt;P&gt;My CLI settings were:&lt;BR /&gt;wifi-hq#sh run cts&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;cts authorization list ISE-SXP-Nodes&lt;/STRONG&gt;&lt;BR /&gt;cts sxp enable&lt;BR /&gt;cts sxp connection &amp;lt;ip&amp;gt; source &amp;lt;ip&amp;gt; password default mode local listener hold-time 0 0&lt;BR /&gt;cts sxp connection&amp;nbsp; &amp;lt;ip&amp;gt; source &amp;lt;ip&amp;gt; password default mode local listener hold-time 0 0&lt;BR /&gt;cts sxp default source-ip &amp;lt;ip&amp;gt;&lt;BR /&gt;cts sxp default password &amp;lt;password&amp;gt;&lt;BR /&gt;cts sxp retry period 30&lt;BR /&gt;cts role-based enforcement&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;And in the GUI, the cts authorization list was empty:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SzantaiNorbert_0-1698142436864.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/200522i3217E51C0DEDCD16/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SzantaiNorbert_0-1698142436864.png" alt="SzantaiNorbert_0-1698142436864.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After debugging I found out that the "&lt;STRONG&gt; ISE-SXP-Nodes" object was not an authorization list, but an AAA server group. But WLC allowed me on the CLI to use it as an authorization list.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I created a cts authorization list where i referenced that AAA server group and it started working immediately.:&lt;/P&gt;
&lt;P&gt;aaa authorization network ISE-SXP-Nodes group ISE-SXP-Nodes&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If there would be some kind of object type validation in the WLC CLI, that would be great.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Norbert&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 10:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-failed-ctsrequest-sda-9800-wlc-amp-ise/m-p/4946773#M584808</guid>
      <dc:creator>SzantaiNorbert</dc:creator>
      <dc:date>2023-10-24T10:22:58Z</dc:date>
    </item>
  </channel>
</rss>

