<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Lab deployment - Can't join ISE to Windows AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5230957#M593495</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Checkout the &lt;FONT color="#008000"&gt;&lt;EM&gt;Accepted Answer&lt;/EM&gt;&lt;/FONT&gt; from&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/answers/questions/1339208/how-to-solve-krb-err-response-too-big-error-at-ser" target="_blank"&gt;https://learn.microsoft.com/en-us/answers/questions/1339208/how-to-solve-krb-err-response-too-big-error-at-ser&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt; &amp;nbsp;Related&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/group-policy-add-maxtokensize-registry-entry" target="_blank"&gt;https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/group-policy-add-maxtokensize-registry-entry&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M&amp;gt;&lt;/P&gt;</description>
    <pubDate>Sun, 01 Dec 2024 11:13:55 GMT</pubDate>
    <dc:creator>Mark Elsen</dc:creator>
    <dc:date>2024-12-01T11:13:55Z</dc:date>
    <item>
      <title>Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5230852#M593494</link>
      <description>&lt;P&gt;I am trying to do some lab testing, and have deployed ISE and Windows AD.&amp;nbsp; They are Proxmox guest VMs, configured on the same subnet and on the same host. Server is 2025 version, ISE is 3.4.0.608. The user I am authenticating with is a domain and enterprise admin in AD. ISE is using the DC for NTP, which is using a NIST server for NTP.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Relevant logs I know of and have captured. (identifying info obfuscated with "x")&lt;/P&gt;&lt;P&gt;"show ntp" -&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configured NTP Servers:&lt;BR /&gt;dc1.xxx.xxx&lt;BR /&gt;Reference ID : 0A0A0A0A (DC1.xxx.xxx)&lt;BR /&gt;Stratum : 3&lt;BR /&gt;Ref time (UTC) : Sat Nov 30 17:30:33 2024&lt;BR /&gt;System time : 0.000000462 seconds slow of NTP time&lt;BR /&gt;Last offset : +0.000491446 seconds&lt;BR /&gt;RMS offset : 0.007088298 seconds&lt;BR /&gt;Frequency : 41.210 ppm fast&lt;BR /&gt;Residual freq : +0.756 ppm&lt;BR /&gt;Skew : 9.433 ppm&lt;BR /&gt;Root delay : 0.107027695 seconds&lt;BR /&gt;Root dispersion : 0.077161357 seconds&lt;BR /&gt;Update interval : 65.0 seconds&lt;BR /&gt;Leap status : Normal&lt;/P&gt;&lt;P&gt;MS Name/IP address Stratum Poll Reach LastRx Last sample&lt;BR /&gt;===============================================================================&lt;BR /&gt;^* DC1.xxxx.xxx 2 6 377 32 +286us[ +777us] +/- 142ms&lt;/P&gt;&lt;P&gt;"show clock" matches the clock on the DC to the second.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the GUI upon failing to join AD&lt;/P&gt;&lt;P&gt;Error Description: ASN.1 failed call to system time library&lt;BR /&gt;&lt;BR /&gt;Support Details...&lt;BR /&gt;Error Name: LW_ERROR_KRB5_ASN1_BAD_TIMEFORMAT&lt;BR /&gt;Error Code: 41701&lt;/P&gt;&lt;P&gt;From ISE&amp;nbsp;ad_agent.log;&lt;/P&gt;&lt;P&gt;2024-11-30 09:13:13,532 ERROR ,140372674062080,Failed to get lsass status -&amp;gt; error = 40074, symbol = LW_ERROR_NOT_JOINED_TO_AD, client pid = 8781,,lsass/server/api/status.c:226&lt;BR /&gt;2024-11-30 09:13:13,560 WARNING,140372674062080,DCPriorityList::isBestDC: dc=[DC1.xxxx.xxx], address=[10.10.10.10] was not found in score map,,lwadvapi/threaded/dc_pri_list.cpp:449&lt;BR /&gt;2024-11-30 09:13:13,560 WARNING,140372674062080,DCPriorityList::getDCScoreByAddress: dc=[DC1.xxxx.xxx], address=[10.10.10.10] not found,,lwadvapi/threaded/dc_pri_list.cpp:467&lt;BR /&gt;2024-11-30 09:13:13,570 WARNING,140372674062080,[LwKrb5GetTgtImpl ../../lwadvapi/threaded/krbtgt.c:329] KRB5 Error code: 1859794432 (Message: ASN.1 failed call to system time library),,lwadvapi/threaded/lwkrb5.c:892&lt;BR /&gt;2024-11-30 09:13:14,660 ERROR ,140372644554496,Failed to get lsass status -&amp;gt; error = 40074, symbol = LW_ERROR_NOT_JOINED_TO_AD, client pid = 8781,,lsass/server/api/status.c:369&lt;BR /&gt;2024-11-30 09:13:14,726 ERROR ,140372674062080,Failed to get lsass status -&amp;gt; error = 40074, symbol = LW_ERROR_NOT_JOINED_TO_AD, client pid = 8781,,lsass/server/api/status.c:226&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wireshark packet capture notable entries&lt;/P&gt;&lt;P&gt;290 09:23:33.103832 10.10.10.10 10.10.10.6 KRB5 299 KRB Error: KRB5KDC_ERR_PREAUTH_REQUIRED&lt;/P&gt;&lt;P&gt;292 09:23:33.107427 10.10.10.10 10.10.10.6 KRB5 130 KRB Error: KRB5KRB_ERR_RESPONSE_TOO_BIG&lt;/P&gt;&lt;P&gt;Other packets in the conversation look normal - query responses contain required records, etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Event Logs on the domain controller show two events for Kerberos Authentication Service that appear normal/successful - the "Response ticket hash" is shown.&lt;/P&gt;&lt;P&gt;Really not sure where to go here.&amp;nbsp; This is a lab and while I have licensed ISE at work this is a trial install so no TAC option I don't believe.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Nov 2024 17:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5230852#M593494</guid>
      <dc:creator>dpgator1975</dc:creator>
      <dc:date>2024-11-30T17:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5230957#M593495</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Checkout the &lt;FONT color="#008000"&gt;&lt;EM&gt;Accepted Answer&lt;/EM&gt;&lt;/FONT&gt; from&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/answers/questions/1339208/how-to-solve-krb-err-response-too-big-error-at-ser" target="_blank"&gt;https://learn.microsoft.com/en-us/answers/questions/1339208/how-to-solve-krb-err-response-too-big-error-at-ser&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt; &amp;nbsp;Related&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/group-policy-add-maxtokensize-registry-entry" target="_blank"&gt;https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/group-policy-add-maxtokensize-registry-entry&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M&amp;gt;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Dec 2024 11:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5230957#M593495</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-12-01T11:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5233932#M593646</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think the problem is this&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Server’s Kerberos authentication fails with Windows 2025 Canary beta public release as KRB_KDC_REP KerberosTime date over year 2038:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 21000914024805Z&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; September 14th 2100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I think we need to wait for a patch.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Dec 2024 17:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5233932#M593646</guid>
      <dc:creator>FireflyNemo</dc:creator>
      <dc:date>2024-12-08T17:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5234567#M593665</link>
      <description>&lt;P&gt;I'm not using a beta, but I have considered just wiping and starting over with Server 2022 or even 2019 just to rule out the bleeding edge factor&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 19:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5234567#M593665</guid>
      <dc:creator>dpgator1975</dc:creator>
      <dc:date>2024-12-09T19:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5234568#M593666</link>
      <description>&lt;P&gt;I tried this before.&amp;nbsp; No luck.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 19:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5234568#M593666</guid>
      <dc:creator>dpgator1975</dc:creator>
      <dc:date>2024-12-09T19:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5234770#M593675</link>
      <description>&lt;P&gt;I have the same trouble on final release version Windows 2025.&lt;/P&gt;&lt;P&gt;Windows 2025 Domain Controller - the same error - Error Name: LW_ERROR_KRB5_ASN1_BAD_TIMEFORMAT&lt;/P&gt;&lt;P&gt;Windows 2022 Domain Controller - work&lt;/P&gt;&lt;P&gt;This is trouble with ticket live time shift in Kerberos .&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 09:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5234770#M593675</guid>
      <dc:creator>FireflyNemo</dc:creator>
      <dc:date>2024-12-10T09:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5245084#M594100</link>
      <description>&lt;P&gt;&lt;A href="https://bst.cisco.com/quickview/bug/CSCwn62873" target="_blank"&gt;https://bst.cisco.com/quickview/bug/CSCwn62873&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 09:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5245084#M594100</guid>
      <dc:creator>FireflyNemo</dc:creator>
      <dc:date>2025-01-09T09:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5245835#M594133</link>
      <description>&lt;P&gt;Hello, &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1821127"&gt;@FireflyNemo&lt;/a&gt;&amp;nbsp;thank you for attaching the bug to the discussion.&lt;BR /&gt;I am a TAC AAA Engineer who submitted the defect, as I was researching and doing lab repro regarding this.&lt;BR /&gt;Also I wanted to mention very good log analysis done by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1515386"&gt;@dpgator1975&lt;/a&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 22:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5245835#M594133</guid>
      <dc:creator>twadolow</dc:creator>
      <dc:date>2025-01-10T22:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5263911#M595151</link>
      <description>&lt;P&gt;We ran into same issue. We're running ISE&amp;nbsp;&lt;SPAN&gt;3.1.0.518 patch 9 and our Windows team just upgraded the Windows domain controller to 2025. Bug&amp;nbsp;&lt;A href="https://bst.cisco.com/quickview/bug/CSCwn62873" target="_blank" rel="nofollow noopener noreferrer"&gt;CSCwn62873&lt;/A&gt;&amp;nbsp;says to downgrade to Windows 2022. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also affected is Firewall Management Center&amp;nbsp;Version&amp;nbsp;7.4.2.1 (build 30)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there an ETA for a bugfix?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 12:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5263911#M595151</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-02-23T12:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5265843#M595258</link>
      <description>&lt;P&gt;Is there a timeline to Patch ISE with a fix? We are in production and cannot downgrade.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 04:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5265843#M595258</guid>
      <dc:creator>th3r1dd1ck</dc:creator>
      <dc:date>2025-02-28T04:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5265848#M595259</link>
      <description>&lt;P&gt;Don't know an ETA either, but our workaround was to promote two new domain controllers running on Windows 2022 and then set those as preferred using advanced tuning settings:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;Here is the step by step guide on how to point the ISE server to only specific DCs in the AD domain:&lt;BR /&gt;Navigate to:&lt;BR /&gt;1. External-ID-Stores -&amp;gt; Active Directory -&amp;gt; Advanced Tools -&amp;gt; Advanced Tuning&lt;BR /&gt;2.Select the ISE node you want to change&lt;BR /&gt;3.The 'Name' field gets the specific REGISTRY string given below:&lt;BR /&gt;REGISTRY.Services\lsass\Parameters\Providers\ActiveDirectory\PreferredDCs\&amp;lt;Domain Name&amp;gt;&lt;BR /&gt;Example: REGISTRY.Services\lsass\Parameters\Providers\ActiveDirectory\PreferredDCs\cisco.com&lt;BR /&gt;4. The 'Value' field is where you indicate the DC, or list of DCs separated by a space&lt;BR /&gt;&amp;lt;The DC's hostname&amp;gt;&lt;BR /&gt;Example: dc1.cisco.com dc2.cisco.com&lt;BR /&gt;5.Update the value and after that restart the AD connector.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A title="https://community.cisco.com/t5/network-access-control/how-to-choose-the-priority-for-a-specific-ad-server-to-be-the/td-p/4423367" href="https://community.cisco.com/t5/network-access-control/how-to-choose-the-priority-for-a-specific-ad-server-to-be-the/td-p/4423367" target="_blank" rel="noreferrer noopener"&gt;https://community.cisco.com/t5/network-access-control/how-to-choose-the-priority-for-a-specific-ad-server-to-be-the/td-p/4423367&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also other Non-Windows systems using Active Directory are affected:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Cisco Firewall Management Center&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Netapp Cluster&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 28 Feb 2025 05:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5265848#M595259</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-02-28T05:33:53Z</dc:date>
    </item>
    <item>
      <title>[OUTGOING SUSPECTED SPAM] - Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5266006#M595268</link>
      <description>There is no way to join a new DC to an AD that is set at 2025 functional level and there is now way to back it down from 2025 to 2016 functional level.&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Feb 2025 12:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5266006#M595268</guid>
      <dc:creator>th3r1dd1ck</dc:creator>
      <dc:date>2025-02-28T12:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: [OUTGOING SUSPECTED SPAM] - Re: Lab deployment - Can't join ISE to</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5266012#M595269</link>
      <description>&lt;P&gt;Luckily our Windows admin noticed that he can't login with AnyConnect VPN anymore before he could continue to set the domain controller to functional level for 2025. And I fear to install any untested Cisco SOS hotifixes because usually they break something else.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 13:18:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5266012#M595269</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-02-28T13:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: [OUTGOING SUSPECTED SPAM] - Re: Lab deployment - Can't join ISE to</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5266229#M595276</link>
      <description>&lt;P&gt;We are also affected by this bug, unfortunately there is no way back from this functional level 2025:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels" target="_blank"&gt;https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 13:15:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5266229#M595276</guid>
      <dc:creator>JanWillems</dc:creator>
      <dc:date>2025-03-01T13:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5268512#M595361</link>
      <description>&lt;P&gt;Hi , im using WIN2022 DC still getting same error&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Error Name: LW_ERROR_KRB5_ASN1_BAD_TIMEFORMAT&lt;BR /&gt;Error Code: 41701&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any leads&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 06:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5268512#M595361</guid>
      <dc:creator>Mahesh Rena</dc:creator>
      <dc:date>2025-03-07T06:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5268536#M595362</link>
      <description>&lt;P&gt;This combination works in our environment:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco ISE&amp;nbsp;&lt;SPAN&gt;3.1.0.518, patch 9&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Windows 2022 DC +&amp;nbsp; 2025-02 cumulative update 21H2&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 07 Mar 2025 07:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5268536#M595362</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-03-07T07:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5272094#M595520</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Upgrade to Windows 2025 active directory has caused issues to our ISE environment as well. Have a TAC case opened&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 15:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5272094#M595520</guid>
      <dc:creator>jaydoer1</dc:creator>
      <dc:date>2025-03-17T15:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5284273#M596065</link>
      <description>&lt;P&gt;Reply from TAC:&lt;BR /&gt;&lt;BR /&gt;Currently, the only workaround for the bug CSCwn62873&amp;nbsp;is to install a hot patch on the deployment. However, this is only available for ISE version 3.3 patch 4 and 3.2 patch 7.&lt;BR /&gt;It is expected that this bug will be fixed in the following versions of ISE: 3.4 patch 2, 3.3 patch 6 and 3.2 patch 8. Unfortunately, I don't have any information regarding an estimated date for a fix for this bug for ISE 3.1.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;That being said, you can integrate ISE with Active Directory 2022, which is the latest version of AD that is compatible with ISE 3.1, or upgrade ISE to a newer version that already has a hot patch that can be applied.&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;You can check more detailed information regarding ISE compatibility with AD in this link:&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/compatibility_doc/b_ise_sdt_31.html" target="_blank" rel="nofollow noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/compatibility_doc/b_ise_sdt_31.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 12:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5284273#M596065</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-04-23T12:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5286470#M596156</link>
      <description>&lt;P&gt;FYI: Same Windows 2025 issue also affects AD integration of other non-Windows systems:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Red Hat Linux:&amp;nbsp;&lt;A title="Follow link" href="https://access.redhat.com/solutions/7100465" target="_blank" rel="nofollow noopener"&gt;https://access.redhat.com/solutions/7100465&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Netapp Filers: &lt;A href="https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-Issues/CONTAP-347583" target="_blank" rel="noopener"&gt;https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-Issues/CONTAP-347583&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Cisco Firewall Management Center&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;From Netapp support I've heard that a fix from Microsoft may come with the May patch day.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 05:52:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5286470#M596156</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2025-04-30T05:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: Lab deployment - Can't join ISE to Windows AD</title>
      <link>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5308490#M597233</link>
      <description>&lt;P&gt;This is working on Cisco ISE 3.4 Patch 2 and Windows Server 2025.&lt;/P&gt;&lt;P&gt;See this Bug ID and the available workarounds:&amp;nbsp;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwn62873?rfs=qvlogin" target="_blank"&gt;CSCwn62873 : Bug Search Tool&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You need to make a change to Group Policy for your Domain Controllers to get it working. So when you're on 3.4 Patch 2 with the appropriate Group Policy updates, it works immediately.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jul 2025 04:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/lab-deployment-can-t-join-ise-to-windows-ad/m-p/5308490#M597233</guid>
      <dc:creator>Shorty</dc:creator>
      <dc:date>2025-07-12T04:15:22Z</dc:date>
    </item>
  </channel>
</rss>

