<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE node forwards authen/author requests to the other node in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5090788#M589266</link>
    <description>&lt;P&gt;Thanks for the hint &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;indeed, by inspecting the XML file for the policy sets, I have noticed some inconsistencies.&lt;BR /&gt;I'm digging further.&lt;/P&gt;&lt;P&gt;Gio&lt;/P&gt;</description>
    <pubDate>Mon, 06 May 2024 13:25:18 GMT</pubDate>
    <dc:creator>Gioacchino</dc:creator>
    <dc:date>2024-05-06T13:25:18Z</dc:date>
    <item>
      <title>ISE node forwards authen/author requests to the other node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5088927#M589238</link>
      <description>&lt;P&gt;In a setup of two nodes,&amp;nbsp; I pointed our WLC to just to the ISE2 node.&lt;/P&gt;&lt;P&gt;Still I see in the RADIUS live logs of ISE1 (!) some processed requests, with Access-Accept/Access-Reject based on conditions.&lt;/P&gt;&lt;P&gt;Expanding one of the logs, I eventually I realized that the NAS (or NAD) was the ISE2, i.e. the request was forwarded from ISE2 to ISE1.&lt;/P&gt;&lt;P&gt;I know that ISE2 might be configured as a proxy, based on (&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/213239-configure-external-radius-servers-on-ise.html)" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/213239-configure-external-radius-servers-on-ise.html&lt;/A&gt;) but ISE1 is not listed among the EXTERNAL RADIUS servers.&lt;/P&gt;&lt;P&gt;I also tried to decrypt the policy sets on ISE2 to see which policy set, but I was not successful.&lt;/P&gt;&lt;P&gt;Is there a sort of tracker that based on conditions will tell me which policy set would be matched and what would bwe the result?&lt;/P&gt;&lt;P&gt;On the WLC, I also tried to use the "test aaa..." but after having configured the attrlist and defined some other settingsm I got on the CLI&lt;BR /&gt;...&lt;BR /&gt;TAAA CLIENT:AUTHENTICATION REQUEST INITIATED&lt;BR /&gt;...&lt;BR /&gt;and nothing else.&lt;/P&gt;&lt;P&gt;How can I figure out which policy set triggers that redirection from ISE2 to ISE1? Is there any tool like "policy set expander" that easily lists all the conditions and results in a plain diagram that I can analyse, instead of moving forth and back among the several tags on the ISE dashboard?&lt;/P&gt;&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 15:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5088927#M589238</guid>
      <dc:creator>Gioacchino</dc:creator>
      <dc:date>2024-05-03T15:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node forwards authen/author requests to the other node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5089330#M589247</link>
      <description>&lt;P&gt;ISE nodes do not directly forward RADIUS requests to other nodes in the deployment. The only way an ISE node shows as the processing node in the live logs is if the request was sent to that node.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The caveat to this is if you're doing guest access to endpoints and the redirect request you're sending back is to a shared URL instead of a specific PSN.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 May 2024 00:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5089330#M589247</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2024-05-04T00:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node forwards authen/author requests to the other node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5090788#M589266</link>
      <description>&lt;P&gt;Thanks for the hint &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;indeed, by inspecting the XML file for the policy sets, I have noticed some inconsistencies.&lt;BR /&gt;I'm digging further.&lt;/P&gt;&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 13:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5090788#M589266</guid>
      <dc:creator>Gioacchino</dc:creator>
      <dc:date>2024-05-06T13:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node forwards authen/author requests to the other node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5091130#M589272</link>
      <description>&lt;P&gt;[EDITED - please KEEP OFF THE MAIN DISCUSSION]&lt;BR /&gt;&lt;BR /&gt;I noticed that there was a misconfiguration in the policy set related to CWA. ISE was instructued to return an URL pointing just to one of the ISE nodes instead of an URL that would balance the load across all nodes (through DNS round-robin): the result used a network profile that pointed right to the ISE in question. After changing the profile to a load-balanced FQDN that, for the moment, has an A record to just the live ISE, I still see logs but less frequent. I guess I have to wait a little bit of time.&lt;BR /&gt;&lt;BR /&gt;Unfortunately, this catch has nothing to do with the problem described in the subject&lt;/P&gt;&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 13:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5091130#M589272</guid>
      <dc:creator>Gioacchino</dc:creator>
      <dc:date>2024-05-08T13:41:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node forwards authen/author requests to the other node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5092249#M589289</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;the weird setting I found on ISE2 was that a the end of the Authorization process, the guest users received in the Access-Permit the AV pair with the URL of ISE1, always.&lt;/P&gt;&lt;P&gt;But going back to the live logs, in the ISE1 RADIUS live logs, I see as NAS the other ISE2. Moreover, I see that the entire network (small /28) is allowed in the Network Devices (i.e. the RADIUS client), meaning the Cisco ISE can accept Access-Requests from that network.&lt;BR /&gt;&lt;BR /&gt;Yet, I don't see any configuration related to "External RADIUS Servers" AND "RADIUS Server Sequences".&lt;/P&gt;&lt;P&gt;I'm truly puzzled and I wonder:&lt;/P&gt;&lt;P&gt;1) about which policy set triggers the forward to the other node;&lt;/P&gt;&lt;P&gt;2) about the fact that ISE2 forwards some requests to ISE1, if ISE1 is NOT among the external RADIUS servers.&lt;/P&gt;&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 09:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5092249#M589289</guid>
      <dc:creator>Gioacchino</dc:creator>
      <dc:date>2024-05-07T09:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node forwards authen/author requests to the other node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5093729#M589307</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;, I took captures and I can clearly see that ISE2 sends Accept-Requests to the ISE1, then it gets back Access-Accept. I'm puzzled, working with the partner on this. I hit the rule where the conditions is Guest_Flow. The definition of Guest_Flow in the Library (Conditions Studio) is "Network Access-Use Case &lt;STRONG&gt;EQUALS&lt;/STRONG&gt; Guest Flow". I see that Guest Flow is a special term in ISE, but really I cannot go deeper in understanding what ISE does when hitting that "Guest Flow" condition.&lt;BR /&gt;&lt;BR /&gt;How may I proceed further?&lt;BR /&gt;&lt;BR /&gt;Gio&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 08:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-forwards-authen-author-requests-to-the-other-node/m-p/5093729#M589307</guid>
      <dc:creator>Gioacchino</dc:creator>
      <dc:date>2024-05-08T08:14:20Z</dc:date>
    </item>
  </channel>
</rss>

