<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE denies MAB authentication after restart in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5144080#M590598</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;we have an issue with an ISE deployment for a customer and Cisco TAC is currently unable to help us...&lt;/P&gt;
&lt;P&gt;The customer is using 4 virtual ISE nodes with 2x PAN/Mnt and 2x PSN on Version 3.2 Patch 5.&lt;/P&gt;
&lt;P&gt;After an update or simple restart of the primary PSN (first on the switches) the switches do a failover to the second PSN as they should. But when the primary PSN is started again there is a small time frame where the PSN is accepting RADIUS requests again and is marked as alive but rejects our MAB request since the endpoint isn't found in the internal database. On the next reauthentication the request is accepted.&lt;/P&gt;
&lt;P&gt;So the PSN node is answering radius request even when the internal MAB database isn't available yet after rebooting. This causes devices that get reauthenticated to receive a wrong vlan which causes outages for our customer.&lt;/P&gt;
&lt;P&gt;Has anyone seen this before and has a solution for this problem? Cisco TAC told us to modify the dead-timer on the switch or block access to this node till it's full up again but thats not really a solution for the problem.&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jul 2024 10:27:04 GMT</pubDate>
    <dc:creator>TheUser27</dc:creator>
    <dc:date>2024-07-12T10:27:04Z</dc:date>
    <item>
      <title>ISE denies MAB authentication after restart</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5144080#M590598</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;we have an issue with an ISE deployment for a customer and Cisco TAC is currently unable to help us...&lt;/P&gt;
&lt;P&gt;The customer is using 4 virtual ISE nodes with 2x PAN/Mnt and 2x PSN on Version 3.2 Patch 5.&lt;/P&gt;
&lt;P&gt;After an update or simple restart of the primary PSN (first on the switches) the switches do a failover to the second PSN as they should. But when the primary PSN is started again there is a small time frame where the PSN is accepting RADIUS requests again and is marked as alive but rejects our MAB request since the endpoint isn't found in the internal database. On the next reauthentication the request is accepted.&lt;/P&gt;
&lt;P&gt;So the PSN node is answering radius request even when the internal MAB database isn't available yet after rebooting. This causes devices that get reauthenticated to receive a wrong vlan which causes outages for our customer.&lt;/P&gt;
&lt;P&gt;Has anyone seen this before and has a solution for this problem? Cisco TAC told us to modify the dead-timer on the switch or block access to this node till it's full up again but thats not really a solution for the problem.&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 10:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5144080#M590598</guid>
      <dc:creator>TheUser27</dc:creator>
      <dc:date>2024-07-12T10:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE denies MAB authentication after restart</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5144100#M590599</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;gt;...&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;Cisco TAC told us to modify the &lt;U&gt;&lt;FONT color="#008000"&gt;dead-timer&lt;/FONT&gt; &lt;/U&gt;on the switch or block access to this node till it's full up again but thats not really a solution for the problem.&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;I can assume that the blocking access solution is not feasible , but what's wrong with the &lt;STRONG&gt;dead-timer option&lt;/STRONG&gt; ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 10:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5144100#M590599</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-07-12T10:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE denies MAB authentication after restart</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5145013#M590638</link>
      <description>&lt;P&gt;Hi marce1000. Thanks for your reply.&lt;/P&gt;
&lt;P&gt;Of course it's an option and we already have 5 Minutes configured but we don't want to extend the dead-timer to an unreasonable value. If we increase the timer to 10 minutes and ISE needs 9.5 Minutes to reboot we'll experience the same issue.&lt;/P&gt;
&lt;P&gt;If we increase the dead-timer even further it could be a problem when upgrading/rebooting the nodes and we need to wait for the dead-timer to end.&lt;/P&gt;
&lt;P&gt;Also the automate-tester marks the ise alive even when ise isn't completely ready...&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5145013#M590638</guid>
      <dc:creator>TheUser27</dc:creator>
      <dc:date>2024-07-15T14:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE denies MAB authentication after restart</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5145016#M590640</link>
      <description>&lt;P&gt;For me what I think is happened is&amp;nbsp;&lt;/P&gt;
&lt;P&gt;User is auth via mab in one ise&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And other ise is auth via mab and guest policy set.&lt;/P&gt;
&lt;P&gt;The policy set must config with order and with conditions to eliminate this case&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Guest auth use mab as first authc and it add unknown mac to internal db of ise&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mab authc use known mac to authc.&lt;/P&gt;
&lt;P&gt;That why the ise re-authc mab device with authz wrong vlan&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5145016#M590640</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T14:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE denies MAB authentication after restart</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5146669#M590709</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;sorry but i don't really understand your response. Both PSN Nodes are in the same deployment and the MAC is present in the internal Database and assigned to the correct groups. There is only one MAB ruleset for internal devices and no "guest authentication".&lt;/P&gt;
&lt;P&gt;The nodes responds with "&lt;SPAN&gt;AuthenticationResult=UnknownUser&lt;/SPAN&gt;" for some time after reload. And works fine after some minutes.&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 12:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5146669#M590709</guid>
      <dc:creator>TheUser27</dc:creator>
      <dc:date>2024-07-18T12:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE denies MAB authentication after restart</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5146674#M590710</link>
      <description>&lt;P&gt;there is&amp;nbsp;&amp;nbsp;&lt;BR /&gt;1-Wireless Guest Authc which use two authc&amp;nbsp;&lt;BR /&gt;A- first MAB with unknownUser add to specific group&amp;nbsp;&lt;BR /&gt;B- portal&amp;nbsp;&lt;BR /&gt;2-Wired MAB&amp;nbsp;&lt;BR /&gt;which need user add to internal ISE&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I think the wired MAB is auth via guest Authc not via Wired MAB&amp;nbsp;&lt;BR /&gt;you need to separate wireless than wired&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;are you use wireless Guest ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 12:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5146674#M590710</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-18T12:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE denies MAB authentication after restart</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5213503#M592590</link>
      <description>&lt;P&gt;The Issue was accepted by cisco as a bug:&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm42629" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm42629&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;TAC told us that the following Versions will include the fix:&lt;BR /&gt;ISE 3.2 Patch 8 &lt;BR /&gt;ISE 3.3 Patch 5&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 09:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-denies-mab-authentication-after-restart/m-p/5213503#M592590</guid>
      <dc:creator>TheUser27</dc:creator>
      <dc:date>2024-10-23T09:09:36Z</dc:date>
    </item>
  </channel>
</rss>

