<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Domain Unknown in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/5196579#M591893</link>
    <description>&lt;P&gt;Why do these devices stay in the unknown domain after the radius server is back up? The sessions seem to reauthenticate to the critical VLAN they fell back to. Is there a way to have the unknown devices reauth when RADIUS comes back online?&lt;/P&gt;</description>
    <pubDate>Thu, 19 Sep 2024 19:50:33 GMT</pubDate>
    <dc:creator>Captain82</dc:creator>
    <dc:date>2024-09-19T19:50:33Z</dc:date>
    <item>
      <title>ISE Domain Unknown</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/3729598#M25122</link>
      <description>&lt;P&gt;We're currently doing a tech refresh and replacing older switches with 2960s and we're having an issue with our switches displaying UKNOWN when doing the command "sh auth sess". Here's an example of the command output. The switch I use in this example is allowing users to connect however sometimes this is not the case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sh auth sess&lt;/P&gt;
&lt;P&gt;Interface MAC Address Method Domain Status Fg Session ID&lt;BR /&gt;Gi1/0/18&amp;nbsp; xxxx.xxxx.xxxx dot1x UNKNOWN Auth 842A611B000000F31868AABC&lt;BR /&gt;Gi1/0/13&amp;nbsp; xxxx.xxxx.xxxx dot1x UNKNOWN Auth 842A611B000000EE1868A9ED&lt;BR /&gt;Gi2/0/5 xxxx.xxxx.xxxx mab UNKNOWN Auth 842A611B000000F61868B3AA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A detailed auth session&lt;/P&gt;
&lt;P&gt;sh auth sess int g1/0/18 det&lt;BR /&gt; Interface: GigabitEthernet1/0/18&lt;BR /&gt; MAC Address:&amp;nbsp;xxxx.xxxx.xxxx&lt;BR /&gt; IPv6 Address: Unknown&lt;BR /&gt; IPv4 Address: xxx.xxx.xxx.xxx&lt;BR /&gt; Status: Authorized&lt;BR /&gt; Domain: UNKNOWN&lt;BR /&gt; Oper host mode: multi-domain&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Common Session ID: 842A611B000000E91868A97E&lt;BR /&gt; Acct Session ID: 0x0000011B&lt;BR /&gt; Handle: 0xF30000CE&lt;BR /&gt; Current Policy: POLICY_Gi1/0/18&lt;/P&gt;
&lt;P&gt;Local Policies:&lt;BR /&gt; Service Template: CRITICAL_AUTH_VLAN_Gi1/0/18 (priority 150)&lt;BR /&gt; Vlan Group: Vlan:&amp;nbsp;&lt;BR /&gt; Service Template: DEFAULT_CRITICAL_VOICE_TEMPLATE (priority 150)&lt;BR /&gt; Voice Vlan:&lt;/P&gt;
&lt;P&gt;Method status list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Stopped&lt;BR /&gt; mab Authc Failed&lt;/P&gt;
&lt;P&gt;----------------------------------------&lt;BR /&gt; Interface: GigabitEthernet1/0/18&lt;BR /&gt; MAC Address:&amp;nbsp;xxxx.xxxx.xxxx&lt;BR /&gt; IPv6 Address: Unknown&lt;BR /&gt; IPv4 Address: xxx.xxx.xxx.xxx&lt;BR /&gt; Status: Authorized&lt;BR /&gt; Domain: UNKNOWN&lt;BR /&gt; Oper host mode: multi-domain&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Common Session ID: 842A611B000000F31868AABC&lt;BR /&gt; Acct Session ID: 0x000000DE&lt;BR /&gt; Handle: 0x040000D8&lt;BR /&gt; Current Policy: POLICY_Gi1/0/18&lt;/P&gt;
&lt;P&gt;Local Policies:&lt;BR /&gt; Service Template: CRITICAL_AUTH_VLAN_Gi1/0/18 (priority 150)&lt;BR /&gt; Vlan Group: Vlan:&lt;BR /&gt; Service Template: DEFAULT_CRITICAL_VOICE_TEMPLATE (priority 150)&lt;BR /&gt; Voice Vlan:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Method status list:&lt;BR /&gt; Method State&lt;BR /&gt; dot1x Authc Failed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's is what every port is configured with.&lt;/P&gt;
&lt;P&gt;description USER_Port&lt;BR /&gt; switchport access vlan&amp;nbsp;&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan&amp;nbsp;&lt;BR /&gt; authentication event fail action next-method&lt;BR /&gt; authentication event server dead action authorize vlan&amp;nbsp;&lt;BR /&gt; authentication event server dead action authorize voice&lt;BR /&gt; authentication event server alive action reinitialize&lt;BR /&gt; authentication host-mode multi-domain&lt;BR /&gt; authentication order dot1x mab&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; authentication violation restrict&lt;BR /&gt; mab&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 8&lt;BR /&gt; dot1x max-req 3&lt;BR /&gt; spanning-tree portfast&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Global commands we use for dot1x.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;dot1x critical eapol&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are our radius/aaa commands we're using for ISE.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;aaa authentication dot1x default group ISE&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;aaa authorization network default group ISE&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;aaa accounting dot1x default start-stop group ISE&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;aaa accounting update newinfo periodic 2880&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;!&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;aaa session-id common&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;!&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;radius-server attribute 25 access-request include&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;radius-server dead-criteria time 30 tries 3&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;radius-server vsa send accounting&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;radius-server vsa send authentication&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;!&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Finally here are the switches versions and models.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;1 52 WS-C2960X-48LPD-L 15.2(2)E3 C2960X-UNIVERSALK9-M&lt;BR /&gt; 2 52 WS-C2960X-48LPD-L 15.2(2)E3 C2960X-UNIVERSALK9-M&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/3729598#M25122</guid>
      <dc:creator>Ethan_Bray</dc:creator>
      <dc:date>2019-03-11T08:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Domain Unknown</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/3733195#M25123</link>
      <description>&lt;P&gt;For Cisco IOS, the domain is usually either data or voice and I do not believe there is a such thing as ISE domain.&lt;/P&gt;
&lt;P&gt;Anyhow, it looks the authentications are failing and that would be where to start the investigation. Please check whether the RADIUS auth requests are reaching ISE and, if so, what info available in ISE about these authentications.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 22:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/3733195#M25123</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-25T22:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Domain Unknown</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/3733201#M25124</link>
      <description>&lt;P&gt;This is expected as the endpoints are put into critical VLAN. Critical condition happens when none of the configured RADIUS servers are available or the switch management IP has not been added to ISE NAD list. When this happens the domain will show &lt;FONT face="courier new,courier"&gt;UNKNOWN&lt;/FONT&gt;. It is also evident from your output:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;Local Policies:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt; Service Template: &lt;STRONG&gt;CRITICAL_AUTH_VLAN&lt;/STRONG&gt;_Gi1/0/18 (priority 150)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt; Vlan Group: Vlan:&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt; Service Template: &lt;STRONG&gt;DEFAULT_CRITICAL_VOICE_TEMPLATE&lt;/STRONG&gt; (priority 150)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt; Voice Vlan:&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 22:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/3733201#M25124</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-10-25T22:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Domain Unknown</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/5196579#M591893</link>
      <description>&lt;P&gt;Why do these devices stay in the unknown domain after the radius server is back up? The sessions seem to reauthenticate to the critical VLAN they fell back to. Is there a way to have the unknown devices reauth when RADIUS comes back online?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 19:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-domain-unknown/m-p/5196579#M591893</guid>
      <dc:creator>Captain82</dc:creator>
      <dc:date>2024-09-19T19:50:33Z</dc:date>
    </item>
  </channel>
</rss>

