<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: clients frequently re-authenticate with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253073#M594517</link>
    <description>&lt;P&gt;Oh, damn, thinking again of it, I mixed up my mind with Catalyst ...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are right, Meraki disables FastRoaming to make sure the RADIUS server can also send up to date AuthZ with every roam and always knows which AP should receive the CoA. IMO, a not optimal design decision, as the initial AP could always forward it. But for real life, most of the time 802.11r is what is typically needed.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2025 09:45:06 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2025-01-27T09:45:06Z</dc:date>
    <item>
      <title>clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252384#M594471</link>
      <description>&lt;P&gt;Hello friends&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have Cisco ISE and Meraki in place to authenticate wireless clients (windows and Apple iPads) using eap-tls and certificate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The authentication process seems to be working and I see clients auto join the new SSID when they get the new wifi profile and machine certificate. However in live logs I see many clients re-authenticate frequently on ISE and keep doing that for the whole day and some authenticate once and stay connected. I'm wondering what could cause this happening for them. could AP roaming cause this issue? I mean when client move ap to ap do they need to re-authenticate with ISE again? If this is not the case what else can be the root cause?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 18:52:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252384#M594471</guid>
      <dc:creator>cghaderpour</dc:creator>
      <dc:date>2025-01-24T18:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252386#M594472</link>
      <description>&lt;P&gt;Share live log detail of ISE&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 18:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252386#M594472</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-24T18:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252406#M594473</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1643842"&gt;@cghaderpour&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;"&lt;SPAN&gt;could AP roaming cause this issue?"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Nop.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"I mean when client move ap to ap do they need to re-authenticate with ISE again?"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;They shouldn´t. If they are disconnecting on roam, something is wrong with Meraki configuration.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"If this is not the case what else can be the root cause?"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You need to first identify if roaming is causing this. If so, you need to check the confiuguration on the Meraki.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Other possibilities would be RF problem, clients is actually disconnecting from the AP and not actually roaming. And you can also check for session timeout. Maybe your session time out is too small and clients are re-auhenticating too often.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 19:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252406#M594473</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-01-24T19:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252968#M594507</link>
      <description>&lt;P&gt;In my experience this is exactly what happens in 'standard wireless networks' (no optmizations in place), since the keying material is not cached or distributed amongst the APs - therefore each time a client associates to a new AP, the keying material must be generated from scratch (full 802.1X authentication).&lt;/P&gt;
&lt;P&gt;There are wireless standards that can assist with this (CCKM etc. - this one only helps to optimize the case where a client roams BACK to an AP where the keying material has been created previously - it does not help in cases of roaming to a new AP)&lt;/P&gt;
&lt;P&gt;I believe that 802.11r (Fast Roaming) will share this keying material across other APs in the same L2 domain. &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1643842"&gt;@cghaderpour&lt;/a&gt; check your SSID and enable 802.11r (Fast Roaming) and also ensure that you are running an up to date AP firmware.&amp;nbsp; Clients must support 802.11r to benefit from this.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2025 20:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252968#M594507</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-26T20:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252981#M594508</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;said. 802.11r (FT) is the ultimate tool to distribute the keys to the roaming candidate APs. With the Meraki Way of implementing it (activating simultaneously non Fast-Transition and Fast Transition) I have not seen many incompatibilities lately. At least not in office environments.&lt;/P&gt;
&lt;P&gt;But even without that, legacy OKC and SKC, which are enabled by default, can improve the situation.&lt;/P&gt;
&lt;P&gt;In the Meraki environment, it is also crucial that all APs that have a roaming path are part of the same dashboard network. If you have, for example, one network for Floor 1 and a different network for Floor 2, this will always be a slow roam if the client decides to change between APs of other floors.&lt;/P&gt;
&lt;P&gt;For troubleshooting: Pick the most active client in the ISE Live Log and compare the activity to the Meraki Client-Roaming-Analysis.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2025 23:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252981#M594508</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-01-26T23:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252988#M594509</link>
      <description>&lt;P&gt;Hello Arne,&lt;/P&gt;&lt;P&gt;Thanks for explaining this and recommendation.&lt;/P&gt;&lt;P&gt;I checked on 802.11r to see if I can make that work but due to COA being enabled on my SSID for change of authentication I won't be able to have 802.11r active at the same time.&lt;/P&gt;&lt;P&gt;I disabled client balancing and enabled&amp;nbsp;&lt;SPAN&gt;Band steering in RF profile. this actually helped reducing the number of authentication significantly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I wish there was a way to have this fully resolved and keep the clients connect during the roaming without re-authentication.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 02:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5252988#M594509</guid>
      <dc:creator>cghaderpour</dc:creator>
      <dc:date>2025-01-27T02:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253034#M594512</link>
      <description>&lt;P&gt;&lt;STRIKE&gt;CoA is supported with .11r for quite some time. Is there any specific reason that you run outdated firmware? I can only think of legacy APs like MR32 or older.&lt;/STRIKE&gt;&lt;/P&gt;
&lt;P&gt;But do you have any workflow configured that needs CoA, like Posturing or changed AuthZ after Profiling? Against common belief, you don't need CoA to send a VLAN or a Group-Policy.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 09:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253034#M594512</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-01-27T09:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253046#M594514</link>
      <description>&lt;P&gt;I send you PM&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 08:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253046#M594514</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-27T08:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253049#M594515</link>
      <description>&lt;P&gt;Is it?&lt;/P&gt;&lt;P&gt;In my Meraki environment we are running up to date firmware but 802.1R and CoA cannot be enabled at the same time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 08:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253049#M594515</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-27T08:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253073#M594517</link>
      <description>&lt;P&gt;Oh, damn, thinking again of it, I mixed up my mind with Catalyst ...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are right, Meraki disables FastRoaming to make sure the RADIUS server can also send up to date AuthZ with every roam and always knows which AP should receive the CoA. IMO, a not optimal design decision, as the initial AP could always forward it. But for real life, most of the time 802.11r is what is typically needed.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 09:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253073#M594517</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-01-27T09:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253075#M594518</link>
      <description>&lt;P&gt;What for and why?&amp;nbsp; It's more helpful to share your advice in a public forum, because it helps others. I'd be keen to know what advice you want to offer.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 09:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253075#M594518</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-27T09:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253104#M594524</link>
      <description>&lt;P&gt;Yes, I agree. In my environment I'm now facing the challenge: Do you want CoA or 802.1R, which kind off forces me to create a separate SSID for voice clients that roam a lot. So, the Catalyst series AP's actually do support both? Interesting, after speaking to Meraki support and reading about this, I thought that both CoA and 802.1R could not work together.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 10:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253104#M594524</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-27T10:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253135#M594526</link>
      <description>&lt;P&gt;Perhaps I was indeed thinking about the right platform, but I don't remember exactly. Even with CoA enabled on my Meraki SSID, 802.11r (small "r") keeps activated. I'll do some testing later to find out if the documentation and warnings are wrong or if CoA is just not working when 802.11r is enabled.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 11:21:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253135#M594526</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-01-27T11:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253137#M594527</link>
      <description>&lt;P&gt;In Catalyst environments, it is easy as the same device (the controller) typically controls both FT and CoA.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 11:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253137#M594527</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-01-27T11:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253175#M594529</link>
      <description>To he honest I don’t know this was even an issue. But according to the Meraki forums, the reason that roaming enhancements such as 802.11r and CoA, are mutually exclusive  is because the CoA must be sent to the AP on which the endpoint roamed to. And somehow due to 802.11r and other protocols, this is no longer possible. I have never come across this on Cisco wireless.  Meraki does have some weird product limitations that we take for granted in Cisco product. I remember how long it too Meraki to implement proper RADIUS Accounting support&lt;BR /&gt;</description>
      <pubDate>Mon, 27 Jan 2025 12:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253175#M594529</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-27T12:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: clients frequently re-authenticate with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253282#M594539</link>
      <description>&lt;P&gt;I did some tests with both 802.11r *and* CoA enabled. Conclusion: It doesn't work, but it is entirely different from what the documentation and the Dashboard state.&lt;/P&gt;
&lt;P&gt;If both are enabled, 802.11r will still be used and will work as expected. However, CoA only works when the client is connected to the AP, where the initial connection was made. When the client is connected to a different AP, the AP answers with CoA-NAK, "Session-Context-Not-Found".&lt;/P&gt;
&lt;P&gt;EDIT: I found out that this behavior is only valid for existing networks, that had specific settings before. For new networks, the behavior should align with the documentation (I didn't test that).&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 16:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/clients-frequently-re-authenticate-with-ise/m-p/5253282#M594539</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-01-28T16:58:51Z</dc:date>
    </item>
  </channel>
</rss>

