<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE causes infinity login Windows 10 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987670#M585970</link>
    <description>&lt;P&gt;&lt;SPAN&gt;First happy new year&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Second you use multi-auth and then you use dead server event reinitialze vlan 5' I think this wrong you need to change it to &lt;STRONG&gt;authorize&lt;/STRONG&gt; vlan 5&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do this and monitor the auth/authz&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 31 Dec 2023 23:31:43 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-12-31T23:31:43Z</dc:date>
    <item>
      <title>ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987610#M585959</link>
      <description>&lt;P&gt;I been having issues with ISE on my Lan, I will try to give as many details as I can.&lt;/P&gt;&lt;P&gt;The main issue is an Infinity Login on windows 10 for every user, but if I remove all the authentication config from the switch then it log in just fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The desirable configuration on the ports is-&amp;gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;switchport mode access&lt;BR /&gt;switchport block unicast&lt;BR /&gt;switchport voice vlan 3&lt;BR /&gt;load-interval 30&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action reinitialize vlan 5&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 8&lt;BR /&gt;storm-control broadcast level bps 20m&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I remove all the " authentication + dot1x " configs on the switch, the login goes fine.&lt;/P&gt;&lt;P&gt;The logs on ISE when we attempt to login with the desirable configuration pretty much it says that the authentication was successful. We already opened all the ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After attempting to login it creates an "Unknown account" profile locally on the workstation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 15:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987610#M585959</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T15:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987617#M585960</link>
      <description>&lt;P&gt;This hard to tell what went to wrong ?&lt;/P&gt;
&lt;P&gt;how is your Windows 10 configured&amp;nbsp; - have Certificate&amp;nbsp; ?&lt;/P&gt;
&lt;P&gt;You do not have Access vlan for Data - are you using default VLAN 1 here for Data ?&lt;/P&gt;
&lt;P&gt;why do you need -&amp;nbsp;&lt;SPAN&gt;switchport block unicast (is this requirement ?)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;check the connected port information while authentication taking time :&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;show access-session interface gigabitEthernet 1/0/1 details &lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;there is big guide to troubleshoot&amp;nbsp; - Windows 10 PC / Switch and ISE side ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-troubleshoot-ise-failed-authentications-amp/ta-p/3630960#toc-hId-737186778" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-troubleshoot-ise-failed-authentications-amp/ta-p/3630960#toc-hId-737186778&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;check the deployment guide :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 16:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987617#M585960</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-12-31T16:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987624#M585961</link>
      <description>&lt;P&gt;Yes windows 10 has certificates, ISE is supposed to assign the correct VLAN ( in my case VLAN 5 )&lt;/P&gt;&lt;P&gt;block unicast is a requirement.&lt;/P&gt;&lt;P&gt;The authentication dot1x shows as&amp;nbsp; Authc Success&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems like the authentication process goes fine, have no clue why can't login&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obs: Its also going to the correct VLAN ( 5 ) , it shows on the Server Policies portion.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 16:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987624#M585961</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T16:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987635#M585962</link>
      <description>&lt;P&gt;Outcome from show authent sess inter .... I covered some info on purpose and the VLAN 55 is correct.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="show authenctaction port 25.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206161i008690A086533113/image-size/large?v=v2&amp;amp;px=999" role="button" title="show authenctaction port 25.png" alt="show authenctaction port 25.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 17:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987635#M585962</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T17:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987644#M585963</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657636"&gt;@guizerabc&lt;/a&gt; the output looks ok, except the short lifetimes, but I don't expect them to cause a problem with logging into windows.&lt;/P&gt;
&lt;P&gt;Do you mean the problem is despite succesful authentication to the network via ISE the user can never actually login to windows?&lt;/P&gt;
&lt;P&gt;What is the supplicant configuration on Windows 10? I assume it's deployed via GPO?.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 18:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987644#M585963</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-31T18:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987647#M585964</link>
      <description>&lt;P&gt;&amp;nbsp;That is correct, despite successful authentication, can't login... Stays at the " welcome " sign spinning forever. Yes the supplicant configuration on Win 10 is deployed via GPO, not sure the exact configuration but i can check. Anything specific on how does that has to be ?&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 19:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987647#M585964</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T19:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987649#M585965</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657636"&gt;@guizerabc&lt;/a&gt; Under normal circumstances I would not expect a problem logging into windows. Check the windows event logs at time of logging into the device for some clues.&lt;/P&gt;
&lt;P&gt;Are you performing machine authentication and/or user authentication?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 19:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987649#M585965</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-31T19:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987651#M585966</link>
      <description>&lt;P&gt;I will check the logs right now. Its set to authenticate via User OR Computer.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 20:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987651#M585966</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T20:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987652#M585967</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Found the error at the log.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error: Failed to get the user token; The system could not find the environment option that was entered.&lt;/P&gt;&lt;P&gt;Error: Couldn't retrieve user directory path.&lt;/P&gt;&lt;P&gt;Warning: Failed to get any user session after enumerating all sessions.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 20:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987652#M585967</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T20:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987655#M585968</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657636"&gt;@guizerabc&lt;/a&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657636"&gt;@guizerabc&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Error: Couldn't retrieve user directory path.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Do you have GPO that sets a user directory path that is a network location? Perhaps this is unreachable because the computer does not get the correct IP address or the DACL prevents access and this has a knock on affect staling the login process?&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 20:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987655#M585968</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-31T20:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987656#M585969</link>
      <description>&lt;P&gt;Sorry, that was because was trying with an ADM account. Yes, we have a GPO that sets that. Now i have tried with a regular user account and the errors are Failed to find an active session.../ Failed to find session after enumerating each session...&lt;/P&gt;&lt;P&gt;and a Warning: Failed to obtain loggedin user Info, aborting discovery...&lt;/P&gt;&lt;P&gt;( i left the computer trying to log in for 10 min to collect the logs )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Update.&lt;/P&gt;&lt;P&gt;AT 16:05 I tried to log in.&lt;/P&gt;&lt;P&gt;16:05 we had Failed to find an active session...+&amp;nbsp; Failed to find session after enumerating each session... and a Warning: Failed to obtain loggedin user Info, aborting discovery...&lt;/P&gt;&lt;P&gt;16:07 the errors about the path and Failed to get user token appears.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 21:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987656#M585969</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T21:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987670#M585970</link>
      <description>&lt;P&gt;&lt;SPAN&gt;First happy new year&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Second you use multi-auth and then you use dead server event reinitialze vlan 5' I think this wrong you need to change it to &lt;STRONG&gt;authorize&lt;/STRONG&gt; vlan 5&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do this and monitor the auth/authz&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 23:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987670#M585970</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-31T23:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987675#M585971</link>
      <description>&lt;P&gt;Happy new year!!!&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did change the reinitialize for authorize, it didn't work =/&lt;/P&gt;&lt;P&gt;Error: Failed to find an active session...&lt;/P&gt;&lt;P&gt;Error: Failed to find session after enumerating each session...&lt;/P&gt;&lt;P&gt;Warning: Failed to obtain loggedin user info, aborting discovery...&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 23:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987675#M585971</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2023-12-31T23:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987676#M585972</link>
      <description>&lt;P&gt;Can I see last port config&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 00:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987676#M585972</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-01T00:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987678#M585973</link>
      <description>&lt;P&gt;Sure,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport block unicast&lt;BR /&gt;switchport voice vlan 3&lt;BR /&gt;load-interval 30&lt;BR /&gt;duplex full&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action authorize vlan 5&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 8&lt;BR /&gt;storm-control broadcast level bps 20m&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 00:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987678#M585973</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2024-01-01T00:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987717#M585974</link>
      <description>&lt;P&gt;Can you confirm the below :&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;ISE is supposed to assign the correct VLAN ( in my case VLAN 5 )&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Vs&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I covered some info on purpose and the VLAN 55 is correct.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;can you also post the profile settings from ISE.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;what is the ISE version ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;what switch model and IOS Code running ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;what AD Server ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 09:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987717#M585974</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-01T09:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987735#M585975</link>
      <description>&lt;P&gt;there are two session the auth and account, the auth timeout is from server and It OK for me&amp;nbsp;&lt;BR /&gt;the account session timeout is so little&amp;nbsp;&lt;BR /&gt;so can you remove below command&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;switch(config)# aaa accounting update &lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;periodic&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;number &amp;lt;- or make it higher than the Server reauth timeout&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 11:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987735#M585975</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-01T11:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987809#M585977</link>
      <description>&lt;P&gt;Is the dACL permissive enough ? Have you done a&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show ip access-list XXXXX&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;on the string that is shown after the ACL ACL ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1704146478908.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206186i3017BBABC642E068/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ArneBier_0-1704146478908.png" alt="ArneBier_0-1704146478908.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 22:01:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987809#M585977</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-01T22:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987994#M585988</link>
      <description>&lt;BLOCKQUOTE&gt;...&lt;BR /&gt;
&lt;PRE&gt;Error: Failed to find an active session...
Error: Failed to find session after enumerating each session...
Warning: Failed to obtain loggedin user info, aborting discovery...
&lt;/PRE&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657636"&gt;@guizerabc&lt;/a&gt;&amp;nbsp;These messages seem from Cisco Secure Client (including AnyConnect) ISE posture module.&lt;/P&gt;
&lt;P&gt;I would suggest disabling such posture checks for now to make the use case simpler to debug.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 05:04:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4987994#M585988</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2024-01-02T05:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE causes infinity login Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4988324#M585997</link>
      <description>&lt;P&gt;Can you drive me thru on how to disable those posture module ?&amp;nbsp; This is how it looks like right now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Update: I had disabled the Posture Policy under Policy&amp;gt;Posture&amp;nbsp;&lt;/P&gt;&lt;P&gt;and also at the Client Provisioning Policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both disabled and still same issue. About to look at the logs right now.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="posture.JPG" style="width: 754px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206215i5CF2D1B2F38661F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="posture.JPG" alt="posture.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 13:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-causes-infinity-login-windows-10/m-p/4988324#M585997</guid>
      <dc:creator>guizerabc</dc:creator>
      <dc:date>2024-01-02T13:43:18Z</dc:date>
    </item>
  </channel>
</rss>

