<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wireless Controller - ISE - Microsoft Domain Controller in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5113855#M589576</link>
    <description>&lt;P&gt;Version 2.x ?&amp;nbsp; I guess that is anything from 2.0 to 2.7. Quite a difference. In any case, time to upgrade to 3.2 or later &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In most customer scenarios, where the ISE node is in the same data centre as the AD controllers, you'll get responses as low as 10ms in most cases. It depends on how quickly the AD controller can process your request.&lt;/P&gt;
&lt;P&gt;In ISE 3.x I also enable DNS caching to alleviate the constant DNS lookups that ISE is performing (because older ISE versions do not cache DNS results). That also helps a bit.&lt;/P&gt;</description>
    <pubDate>Thu, 23 May 2024 02:45:28 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-05-23T02:45:28Z</dc:date>
    <item>
      <title>Wireless Controller - ISE - Microsoft Domain Controller</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5112326#M589537</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;When using EAP-PEAP-GTC, the Active Directory (AD) response time is around 8 ms. Currently, NL_AUTH_SIGNATURE is being used. However, when using EAP-PEAP-MSCHAPv2, the Domain Controller (DC) response time increases to around 2-3 seconds, Is it ideal for Microsoft Active Directory and it causes wireless authentication to fail&lt;BR /&gt;Also How can I change to a more secure signature algorithm, such as NL_AUTH_SHA2_SIGNATURE?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 18:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5112326#M589537</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2024-05-21T18:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Controller - ISE - Microsoft Domain Controller</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5112577#M589543</link>
      <description>&lt;P&gt;What version and patch of ISE are you using?&amp;nbsp; I don't think we have any control over those algorithms within ISE - the best we can do is to run the latest versions of ISE.&amp;nbsp; There have been some discussions around Windows Server registry hacks set/prefer certain algorithms.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 23:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5112577#M589543</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-05-21T23:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Controller - ISE - Microsoft Domain Controller</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5112940#M589555</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for the reply .I am using &amp;nbsp;2.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;what could be the ideal Active Directory &amp;nbsp;challenge response time in&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 08:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5112940#M589555</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2024-05-22T08:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Controller - ISE - Microsoft Domain Controller</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5113855#M589576</link>
      <description>&lt;P&gt;Version 2.x ?&amp;nbsp; I guess that is anything from 2.0 to 2.7. Quite a difference. In any case, time to upgrade to 3.2 or later &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In most customer scenarios, where the ISE node is in the same data centre as the AD controllers, you'll get responses as low as 10ms in most cases. It depends on how quickly the AD controller can process your request.&lt;/P&gt;
&lt;P&gt;In ISE 3.x I also enable DNS caching to alleviate the constant DNS lookups that ISE is performing (because older ISE versions do not cache DNS results). That also helps a bit.&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 02:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-controller-ise-microsoft-domain-controller/m-p/5113855#M589576</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-05-23T02:45:28Z</dc:date>
    </item>
  </channel>
</rss>

