<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205479#M592302</link>
    <description>&lt;P&gt;Remove all the config off that interface and see how many MAC addresses are coming out of that port.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A PC hosting VM is one suspect for having two (or more) MAC addresses.&amp;nbsp; Another is laptop dock because the dock itself has one MAC address and the laptop has another.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2024 01:13:10 GMT</pubDate>
    <dc:creator>Leo Laohoo</dc:creator>
    <dc:date>2024-10-09T01:13:10Z</dc:date>
    <item>
      <title>Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205475#M592301</link>
      <description>&lt;P&gt;Hi Expert,&lt;/P&gt;&lt;P&gt;Recently, one port on our 9200 switch went to err-disable state and the status LEDs are all off.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The port configuration is as below: it is connected to a desktop PC&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728434470316.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230868i572F3CAA533984CC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="117222400_0-1728434470316.png" alt="117222400_0-1728434470316.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The logs is as below, it looks before it goes to err-disable state, the port up and down for many times. seems the user was rebooting the machine&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728441925852.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230880i45A3C132EB7295EF/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_0-1728441925852.png" alt="117222400_0-1728441925852.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;during error, checked the controller:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_3-1728434665278.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230871iCB007C35D02EAA0D/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_3-1728434665278.png" alt="117222400_3-1728434665278.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_4-1728434718331.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230872iEADB22908B14B946/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_4-1728434718331.png" alt="117222400_4-1728434718331.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_5-1728434751371.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230873iCE1870D333C73453/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_5-1728434751371.png" alt="117222400_5-1728434751371.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_7-1728434848657.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230875iBFA43D144B556B71/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_7-1728434848657.png" alt="117222400_7-1728434848657.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The machine authentication in ISE is not responded:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728436119355.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230877iB1EF9F5434AA22AB/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_0-1728436119355.png" alt="117222400_0-1728436119355.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just found this link seems the same issue, but not sure why the pc's MAC changed?&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/inverse-inc/packetfence/issues/1588" target="_blank" rel="noopener"&gt;https://github.com/inverse-inc/packetfence/issues/1588&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It occurred the second time, and can be resolved by shutdown/no shutdown to reset the port.&lt;/P&gt;&lt;P&gt;But we still need to find out the root cause. Any ideas about it?&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 05:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205475#M592301</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-09T05:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205479#M592302</link>
      <description>&lt;P&gt;Remove all the config off that interface and see how many MAC addresses are coming out of that port.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A PC hosting VM is one suspect for having two (or more) MAC addresses.&amp;nbsp; Another is laptop dock because the dock itself has one MAC address and the laptop has another.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 01:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205479#M592302</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2024-10-09T01:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205481#M592303</link>
      <description>&lt;P&gt;Thanks very much for your reply, the user is using a desktop and doesn't need a dock, I think he won't touch the network cable when it is working. It seems occured when he shut down/reboot the desktop.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set up a remote PS session to his desktop and only 2 adaptors found, no such MAC 0848.8905.3e52 found&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 02:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205481#M592303</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-09T02:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205500#M592304</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just found another port the same error at several days ago ( we moved the same desktop to the new port), but the MAC address is not the same&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728442761557.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230881i45A4B6CBA189BD6F/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_0-1728442761557.png" alt="117222400_0-1728442761557.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I checked the port-security, it seems not enabled,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728452578474.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230890iE08C48E874AA0A5E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="117222400_0-1728452578474.png" alt="117222400_0-1728452578474.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;but the MAC address learnt from this port is showing "STATIC"&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_1-1728452591306.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230891i94072A25578E4570/image-size/medium?v=v2&amp;amp;px=400" role="button" title="117222400_1-1728452591306.png" alt="117222400_1-1728452591306.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I assume the "sticky" is still on? or it is because below: authentication violation default is "shutdown"?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_2-1728452781832.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230892i5F617362E608A970/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_2-1728452781832.png" alt="117222400_2-1728452781832.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 05:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205500#M592304</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-09T05:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205629#M592311</link>
      <description>&lt;P&gt;I need to see log detail&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share it here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 08:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205629#M592311</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-09T08:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205714#M592318</link>
      <description>&lt;P&gt;"Date","Time","Facility","Level","Host Name","Message Text"&lt;BR /&gt;"2024-10-09","17:22:43","Local7","Notice","10.2.9.5","37464: Oct 9 17:22:43.162: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-09","17:22:43","Local7","Error","10.2.9.5","37463: Oct 9 17:22:42.162: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-09","17:22:39","Local7","Error","10.2.9.5","37462: Oct 9 17:22:38.936: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-09","17:22:38","Local7","Notice","10.2.9.5","37461: Oct 9 17:22:37.932: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-09","17:22:33","Local7","Notice","10.2.9.5","37460: Oct 9 17:22:33.894: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-09","17:22:33","Local7","Error","10.2.9.5","37459: Oct 9 17:22:32.893: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-09","17:22:28","Local7","Error","10.2.9.5","37458: Oct 9 17:22:27.552: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-09","17:22:27","Local7","Notice","10.2.9.5","37457: Oct 9 17:22:26.557: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-09","09:55:45","Local7","Notice","10.2.9.5","36587: Oct 9 09:55:44.726: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-09","09:55:44","Local7","Error","10.2.9.5","36586: Oct 9 09:55:43.724: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-09","09:55:36","Local7","Error","10.2.9.5","36583: Oct 9 09:55:35.900: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-09","09:55:33","Local7","Notice","10.2.9.5","36581: Oct 9 09:55:32.588: %LINK-5-CHANGED: Interface GigabitEthernet8/0/41, changed state to administratively down"&lt;BR /&gt;"2024-10-09","09:55:28","Local7","Notice","10.2.9.5","36579: Oct 9 09:55:27.970: %PARSER-5-CFGLOG_LOGGEDCMD: User:admin logged command:interface GigabitEthernet8/0/41 "&lt;BR /&gt;&lt;STRONG&gt;"2024-10-08","16:46:47","Local7","Notice","10.2.9.5","35580: Oct 8 16:46:46.048: %AUTHMGR-5-SECURITY_VIOLATION: Security violation on the interface GigabitEthernet8/0/41, new MAC address (0848.8905.3e52) is seen.AuditSessionID Unassigned"&lt;/STRONG&gt;&lt;BR /&gt;"&lt;STRONG&gt;2024-10-08","16:46:46","Local7","Warning","10.2.9.5","35579: Oct 8 16:46:46.031: %PM-4-ERR_DISABLE: security-violation error detected on Gi8/0/41, putting Gi8/0/41 in err-disable state"&lt;/STRONG&gt;&lt;BR /&gt;"2024-10-08","16:46:43","Local7","Error","10.2.9.5","35578: Oct 8 16:46:42.796: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-08","16:46:42","Local7","Notice","10.2.9.5","35577: Oct 8 16:46:41.794: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-08","16:46:38","Local7","Notice","10.2.9.5","35576: Oct 8 16:46:38.830: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-08","16:46:38","Local7","Error","10.2.9.5","35575: Oct 8 16:46:37.829: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-08","16:46:31","Local7","Error","10.2.9.5","35574: Oct 8 16:46:31.625: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-08","16:46:31","Local7","Notice","10.2.9.5","35573: Oct 8 16:46:30.627: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-08","09:39:51","Local7","Notice","10.2.9.5","35107: Oct 8 09:39:51.062: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-08","09:39:51","Local7","Error","10.2.9.5","35106: Oct 8 09:39:50.060: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-08","09:39:47","Local7","Error","10.2.9.5","35105: Oct 8 09:39:46.725: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-08","09:39:46","Local7","Notice","10.2.9.5","35104: Oct 8 09:39:45.721: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-08","09:39:38","Local7","Notice","10.2.9.5","35103: Oct 8 09:39:38.727: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-08","09:39:38","Local7","Error","10.2.9.5","35102: Oct 8 09:39:37.725: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-08","09:39:32","Local7","Error","10.2.9.5","35101: Oct 8 09:39:31.529: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-08","09:39:31","Local7","Notice","10.2.9.5","35100: Oct 8 09:39:30.572: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","17:11:08","Local7","Notice","10.2.9.5","32778: Oct 4 17:11:07.805: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","17:11:07","Local7","Error","10.2.9.5","32777: Oct 4 17:11:06.808: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","17:11:04","Local7","Error","10.2.9.5","32776: Oct 4 17:11:03.592: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","17:11:03","Local7","Notice","10.2.9.5","32775: Oct 4 17:11:02.589: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","17:10:58","Local7","Notice","10.2.9.5","32773: Oct 4 17:10:58.714: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","17:10:58","Local7","Error","10.2.9.5","32772: Oct 4 17:10:57.714: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","17:10:52","Local7","Error","10.2.9.5","32771: Oct 4 17:10:52.396: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","17:10:52","Local7","Notice","10.2.9.5","32770: Oct 4 17:10:51.397: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","14:31:50","Local7","Notice","10.2.9.5","32693: Oct 4 14:31:50.942: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","14:31:50","Local7","Error","10.2.9.5","32692: Oct 4 14:31:49.940: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","14:31:47","Local7","Error","10.2.9.5","32691: Oct 4 14:31:46.717: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","14:31:46","Local7","Notice","10.2.9.5","32690: Oct 4 14:31:45.712: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","14:31:41","Local7","Notice","10.2.9.5","32689: Oct 4 14:31:41.986: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","14:31:41","Local7","Error","10.2.9.5","32688: Oct 4 14:31:40.985: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-04","14:31:36","Local7","Error","10.2.9.5","32687: Oct 4 14:31:35.513: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-04","14:31:35","Local7","Notice","10.2.9.5","32686: Oct 4 14:31:34.509: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-03","16:49:23","Local7","Notice","10.2.9.5","31747: Oct 3 16:49:22.984: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-03","16:49:23","Local7","Error","10.2.9.5","31746: Oct 3 16:49:21.981: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to up"&lt;BR /&gt;"2024-10-03","16:49:19","Local7","Error","10.2.9.5","31745: Oct 3 16:49:18.744: %LINK-3-UPDOWN: Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-03","16:49:18","Local7","Notice","10.2.9.5","31744: Oct 3 16:49:17.740: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to down"&lt;BR /&gt;"2024-10-03","16:49:10","Local7","Notice","10.2.9.5","31743: Oct 3 16:49:10.859: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet8/0/41, changed state to up"&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 11:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205714#M592318</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-09T11:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205716#M592319</link>
      <description>&lt;P&gt;it stuck at 16:46 after the user left the office and then next day the admin run shutdown/no shutdown to resolve the issue.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 11:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205716#M592319</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-09T11:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205827#M592326</link>
      <description>&lt;P&gt;there Steps in detail explain the error in ISE share it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise+live+log+radius+dtls.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230932i0D6FFDF4DC97C4C3/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise+live+log+radius+dtls.png" alt="ise+live+log+radius+dtls.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5205827#M592326</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-09T14:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206151#M592345</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728514284619.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/231002i12E75CD329C43BC1/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_0-1728514284619.png" alt="117222400_0-1728514284619.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Steps&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session&lt;BR /&gt;15049 Evaluating Policy Group&lt;BR /&gt;15008 Evaluating Service Selection Policy&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType&lt;BR /&gt;15048 Queried PIP - DEVICE.Device Type&lt;BR /&gt;11507 Extracted EAP-Response/Identity&lt;BR /&gt;12500 Prepared EAP-Request proposing EAP-TLS with challenge&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12502 Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started&lt;BR /&gt;12545 Client requested EAP-TLS session ticket&lt;BR /&gt;12542 The EAP-TLS session ticket received from supplicant while the stateless session resume is disabled. Performing full authentication&lt;BR /&gt;12805 Extracted TLS ClientHello message&lt;BR /&gt;12806 Prepared TLS ServerHello message&lt;BR /&gt;12807 Prepared TLS Certificate message&lt;BR /&gt;12808 Prepared TLS ServerKeyExchange message&lt;BR /&gt;12809 Prepared TLS CertificateRequest message&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12504 Extracted EAP-Response containing EAP-TLS challenge-response&lt;BR /&gt;12505 Prepared EAP-Request with another EAP-TLS challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;12935 Supplicant stopped responding to ISE during EAP-TLS certificate exchange (step latency=120000 ms Step latency=120000 ms)&lt;BR /&gt;61025 Open secure connection with TLS peer&lt;BR /&gt;5411 Supplicant stopped responding to ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 22:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206151#M592345</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-09T22:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206239#M592347</link>
      <description>&lt;P&gt;The port security err-disable should only have kicked in because there was a violation in the number of MAC addresses seen in the DATA domain - and this restriction only applies to multi-domain&lt;BR /&gt;I am fairly sure that multi-auth is the default (hidden from show run) in IOS - but you could try to confiure it manually&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;conf t
interface gig 8/0/41
access-session host-mode multi-auth
end
&lt;/LI-CODE&gt;
&lt;P&gt;In multi-auth mode the switch will allow multiple MAC addresses in the DATA domain, and every MAC address is subject to RADIUS auth.&amp;nbsp; It doesn't explain WHY you get spurious MAC addresses on the switch, but I have never found multi-domain to be a reliable config method, simply because some phones can have the nasty ide effect of first landing their MAC in the DATA domain , before the flip over to the VOICE domain. If, at this time a PC is connected to the back of the phone, then you have 2 MAC addresses in the DATA domain, albeit for a split second - but this is enough to err-disable the interface.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 05:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206239#M592347</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-10T05:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206410#M592355</link>
      <description>&lt;H2 id="windows-gpo"&gt;&amp;amp;&amp;amp;Windows GPO&lt;/H2&gt;
&lt;P&gt;Your windows GPO for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;wireless&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;wired network&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is also important. Open your 802.1x GPO and navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Security Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Wired Network (802.3) Policies&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Network Profile&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;IEEE 802.1X Settings&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Check the following settings and set them accordingly:&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Setting&lt;/TH&gt;
&lt;TH&gt;Value&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Maximum Authentication Failures&lt;/TD&gt;
&lt;TD&gt;5&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Maximum EAPOL-Start Messages Sent&lt;/TD&gt;
&lt;TD&gt;5&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Held Period (seconds)&lt;/TD&gt;
&lt;TD&gt;1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Start Period (seconds)&lt;/TD&gt;
&lt;TD&gt;5&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Authentication Period (seconds)&lt;/TD&gt;
&lt;TD&gt;30&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;The values are suggestions to start with. They may need to be adjusted to fit your environment.&lt;/P&gt;
&lt;H2 id="client-firewall-and-antivirus"&gt;&amp;amp;&amp;amp;Client Firewall and Antivirus&lt;/H2&gt;
&lt;P&gt;Your clients firewall or antivirus could be the problem, especially if you are using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;authentication timeouts&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in your ISE policies. For testing purposes you can temporarily disable your firewall or antivirus and check if the problem persists.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 10:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206410#M592355</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-10T10:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206820#M592383</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks very much for your reply. Only this desktop PC has the issue and the others which are in the same domain with same settings don't have the issue. Also, it seems another new MAC triggered the security violation, which means not the failures. I've checked no other devices like ip phones, the cable connected to the PC directly and the other end is connected to data point under the desk. I've changed all the cables and changed another data point, to see if it happened again.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 00:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206820#M592383</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-11T00:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206822#M592384</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks very much for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It happened again today, with another new MAC address been seen. That's very strange, I can't find the new MAC coming from where...&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728608316340.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/231075iE6C114A3A0CB8E35/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_0-1728608316340.png" alt="117222400_0-1728608316340.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;We don't have IP phones or HUB or deck for the PC.&lt;/P&gt;&lt;P&gt;Maybe we can set it to&amp;nbsp; authentication violation restrict or replace, because we use Windows 10 machine certificate and user certificate for authentication, we don't mind what MAC address it is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 05:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206822#M592384</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-11T05:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206841#M592386</link>
      <description>&lt;P&gt;I tested again, the port doesn't have any "sticky" feature, as I used 2 different usb network adaptor to connect to the same port. They have different MAC addresses and both got DHCP IP and working properly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just suspect where is the new MAC coming from, only 2 adaptors on the PC, one is the normal one, another is the Zscaler adaptor, none of them have the above detected "new MAC is seen.." that's very odd.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 02:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206841#M592386</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-11T02:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206919#M592388</link>
      <description>&lt;P&gt;Today morning the issue happened again. The same issue same desktop, and we can see that there are some up and downs yesterday afternoon, the last state at yesterday is UP, and suddenly it went to err-disable at today morning, other new MAC address appeared. The user is working from home and RDP to the desktop. no other devices at all.. where is the MAC address from..&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="117222400_0-1728623818057.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/231079iBA6B191008B8FE4B/image-size/large?v=v2&amp;amp;px=999" role="button" title="117222400_0-1728623818057.png" alt="117222400_0-1728623818057.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found this bug:&amp;nbsp;&lt;A href="https://bst.cisco.com/quickview/bug/CSCus17694" target="_blank"&gt;https://bst.cisco.com/quickview/bug/CSCus17694&lt;/A&gt;&amp;nbsp;but our version is:&lt;/P&gt;&lt;P&gt;Cisco IOS XE Software, Version 17.09.04a&lt;BR /&gt;Cisco IOS Software [Cupertino], Catalyst L3 Switch Software (CAT9K_LITE_IOSXE), Version 17.9.4a, RELEASE SOFTWARE (fc3)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it possible to verify whether the&amp;nbsp; memory is leaky or not , when it happened or after I fixed it?&lt;/P&gt;&lt;P&gt;A work around might be setup the err-disable recovery to 5 seconds?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 05:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206919#M592388</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-11T05:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206923#M592389</link>
      <description>&lt;P&gt;Wow - I hope it's not a bug - I guess one way to find out is to reboot the switch and then observe - if it's a slow memory leak then you might not see this issue for a while. To be honest, I have never seen an err-disable on any of my NAC deployments, because I only use&amp;nbsp; host mode "multi-auth".&amp;nbsp; &amp;nbsp;The only time I have seen err-disable in NAC deployments, was in the lab when I configured host mode multi-domain and then provoked the switch to cause the issue.&lt;/P&gt;
&lt;P&gt;If you're 100% sure you have configured multi-auth, then you should NOT ever encounter err-disable.&amp;nbsp; Unless there is some other funky thing I didn't know about port security.&amp;nbsp; Have you opened a TAC case?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 05:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5206923#M592389</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-11T05:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9200 err-disable AUTHMGR-5-SECURITY_VIOLATION</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5210822#M592538</link>
      <description>&lt;P&gt;Thanks for your reply, we've opened a case to TAC, and they collected some packets on the port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also changed the data port on the user's desk and the network cable that connected to the user's PC, the issue didn't occur for a week now. not sure if it is a cable or patching panel issue.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 05:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-9200-err-disable-authmgr-5-security-violation/m-p/5210822#M592538</guid>
      <dc:creator>117222400</dc:creator>
      <dc:date>2024-10-18T05:40:44Z</dc:date>
    </item>
  </channel>
</rss>

