<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Switch login attempt in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863840#M582566</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="warning.JPG" style="width: 665px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188804i0BBD0489462D3F4E/image-size/large?v=v2&amp;amp;px=999" role="button" title="warning.JPG" alt="warning.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Should it restart the whole machine?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jun 2023 11:37:55 GMT</pubDate>
    <dc:creator>Moudar</dc:creator>
    <dc:date>2023-06-28T11:37:55Z</dc:date>
    <item>
      <title>Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863798#M582558</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;When we check the authorization policy on ISE which is resposible for switch logins, we could se a log like this one:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise-id.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188797iFEB8F1C9F408495A/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise-id.JPG" alt="ise-id.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Why the username is &lt;STRONG&gt;Id;&lt;/STRONG&gt;? Where does this (Id;) come from?&lt;/P&gt;&lt;P&gt;What does "&lt;STRONG&gt;11014 RADIUS packet contains invalid attribute(s)&lt;/STRONG&gt; " mean? We don't have any issue on our Radius server ISE!&lt;/P&gt;&lt;P&gt;If i try on a switch to login with username &lt;STRONG&gt;Id;&lt;/STRONG&gt; the log in ISE will be like this one:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise-id.JPG" style="width: 731px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188801i0AD2391498F6A614/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise-id.JPG" alt="ise-id.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there someone trying to login to our switch or what is the case?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 10:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863798#M582558</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T10:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863805#M582559</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;It could be some tools trying to access the switch. Do you have monitoring tools? Maybe DNAC doing discovery?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863805#M582559</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-28T11:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863806#M582560</link>
      <description>&lt;P&gt;I have a tool that logs in all switches and make backups. But that tool uses my AD account and nothing else.&lt;/P&gt;&lt;P&gt;I can see logs from the tool in ISE which are green and accept&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863806#M582560</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T11:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863810#M582561</link>
      <description>&lt;P&gt;It seems something else is trying and failing.&amp;nbsp; Take a look on the switch logs, which probably will not be helpful but worth it to try.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;You can also try to ping the IP 10.34.0.74 and track it down using ARP.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863810#M582561</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-28T11:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863815#M582562</link>
      <description>&lt;P&gt;10.340.74 is my laptop, in the second image i did a test to login with username Id; to see what would the log looks like. And i looks like the second image.&lt;/P&gt;&lt;P&gt;I mean even if i try to use Id; as a username the log in ISE does not comeback with Id; username but with INVALID;INVALID as you can see in the scond image&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:22:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863815#M582562</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T11:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863826#M582563</link>
      <description>&lt;P&gt;If you get the real fail log, which IP address will be there as Endpoint ID?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863826#M582563</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-28T11:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863831#M582564</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/759057"&gt;@Moudar&lt;/a&gt;&amp;nbsp;you can force Cisco ISE to display the invalid usernames. To do this, check the &lt;SPAN class="ph uicontrol"&gt;Disclose Invalid Usernames&lt;/SPAN&gt; check box under &lt;STRONG&gt;&lt;SPAN class="ph menucascade"&gt;&lt;SPAN class="ph uicontrol"&gt;Administration&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;System&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Settings&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Security Settings&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863831#M582564</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-28T11:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863836#M582565</link>
      <description>&lt;P&gt;That is the problem there is nothing in the log about Endpoint!! You can check the log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log1.JPG" style="width: 704px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188802iE6D07AE269F886CD/image-size/large?v=v2&amp;amp;px=999" role="button" title="log1.JPG" alt="log1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log2.JPG" style="width: 735px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188803i329350EB6F4C041F/image-size/large?v=v2&amp;amp;px=999" role="button" title="log2.JPG" alt="log2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863836#M582565</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T11:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863840#M582566</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="warning.JPG" style="width: 665px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188804i0BBD0489462D3F4E/image-size/large?v=v2&amp;amp;px=999" role="button" title="warning.JPG" alt="warning.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Should it restart the whole machine?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:37:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863840#M582566</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T11:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863846#M582568</link>
      <description>&lt;P&gt;What is under INVALID is not important just in this case! the important is to know what is that Id; user?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863846#M582568</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T11:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863848#M582569</link>
      <description>&lt;P&gt;Another alternative would be use sniffer on the switch side.&lt;/P&gt;
&lt;P&gt;span one port to you laptop, run wireshark and try do dig into the logs when the ISE notify the login attempt&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863848#M582569</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-28T11:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863855#M582571</link>
      <description>&lt;P&gt;There were 3 attmepts yesterday, i will&amp;nbsp;keep track and see if it happens again&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"span one port to you laptop, run wireshark and try do dig into the logs when the ISE notify the login attempt" maybe not happen in days who knows?!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any other suggestion?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863855#M582571</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T11:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863858#M582573</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/759057"&gt;@Moudar&lt;/a&gt; why are you changing the SHA1 cipher settings? thats not the setting that was suggested to change.&lt;/P&gt;
&lt;P&gt;Disclosing the invalid username would reveal the user identity in the logs, which might provide a clue. Disclosing the invalid username (as per above suggestion) will not require restarting services.&lt;/P&gt;
&lt;P&gt;What type of device is the NAD - 10.128.2.8?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can take a packet capture (tcpdump) on ISE, setup a filter on 10.128.2.8 and determine what attributes are being sent.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 11:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863858#M582573</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-28T11:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863862#M582574</link>
      <description>&lt;P&gt;&amp;nbsp;If you can keep the log running in a computer for this period you can use filter on the Wireshark. .&lt;/P&gt;
&lt;P&gt;If you filter on the port 1812 there will be just a few logs during the day. At least on the wireshark you will se the orign IP address.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 12:00:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863862#M582574</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-28T12:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863863#M582575</link>
      <description>&lt;P&gt;When i try to activate "&lt;SPAN&gt;Disclosing the invalid username&lt;/SPAN&gt;" click on Save then that about SHA1 came after!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10.128.2.8 is a router&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you write the syntax of tcpdump on ISE?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 12:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863863#M582575</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-28T12:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863866#M582576</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/759057"&gt;@Moudar&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;ip host 10.128.2.8&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 12:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4863866#M582576</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-28T12:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4864625#M582613</link>
      <description>&lt;P&gt;Now I maybe know the problem source.&lt;/P&gt;&lt;P&gt;It was Prime, I had changed my AD password. On Prime I have one test switch that used my old password.&lt;/P&gt;&lt;P&gt;Prime tried to login to the switch all the time with wrong password and everytime it did that, the user log on ISE was &lt;STRONG&gt;Id;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Not sure 100% yet, will be back if I discover something else.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 12:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4864625#M582613</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-06-29T12:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4864638#M582614</link>
      <description>&lt;P&gt;Classic problem. Saw many times.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;It is a good idea a user and password for prime and any monitoring tool.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 12:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4864638#M582614</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-29T12:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: Switch login attempt</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4996992#M586348</link>
      <description>&lt;P&gt;I was running into this error on a 2960cx switch for some of my admins. Most of us could login, but one or two couldn't and ISE was giving us this error.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We upgraded the firmware of the switch to 15.2 7(E9) and the users can now successfully login.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 18:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-login-attempt/m-p/4996992#M586348</guid>
      <dc:creator>Minnesotakid</dc:creator>
      <dc:date>2024-01-15T18:08:57Z</dc:date>
    </item>
  </channel>
</rss>

