<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE ISSUE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-issue/m-p/5337905#M598505</link>
    <description>&lt;P&gt;After upgrading several corporate laptops from Windows 10 to Windows 11, the IT team begins to notice that many devices are being blocked by the Cisco Identity Services Engine (ISE) during network authentication. Upon investigation, they discover that the issue stems from session duplication caused by the OS upgrade.&lt;/P&gt;&lt;P&gt;When Windows 11 is installed over Windows 10, certain machine identifiers—such as the MAC address, hostname, and certificate—remain unchanged. However, the upgrade process triggers a re-registration of the device in Active Directory and the endpoint database used by ISE. This results in two conflicting sessions being created for the same physical device: one associated with the old Windows 10 profile and another with the new Windows 11 profile.&lt;/P&gt;&lt;P&gt;Cisco ISE, configured with strict posture and profiling policies, detects this duplication as a potential security risk. It flags the device as non-compliant due to inconsistent endpoint attributes and blocks network access. The NAC system interprets the duplicated session as a rogue device or a spoofing attempt.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Oct 2025 07:41:27 GMT</pubDate>
    <dc:creator>natixis</dc:creator>
    <dc:date>2025-10-13T07:41:27Z</dc:date>
    <item>
      <title>ISE ISSUE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-issue/m-p/5337905#M598505</link>
      <description>&lt;P&gt;After upgrading several corporate laptops from Windows 10 to Windows 11, the IT team begins to notice that many devices are being blocked by the Cisco Identity Services Engine (ISE) during network authentication. Upon investigation, they discover that the issue stems from session duplication caused by the OS upgrade.&lt;/P&gt;&lt;P&gt;When Windows 11 is installed over Windows 10, certain machine identifiers—such as the MAC address, hostname, and certificate—remain unchanged. However, the upgrade process triggers a re-registration of the device in Active Directory and the endpoint database used by ISE. This results in two conflicting sessions being created for the same physical device: one associated with the old Windows 10 profile and another with the new Windows 11 profile.&lt;/P&gt;&lt;P&gt;Cisco ISE, configured with strict posture and profiling policies, detects this duplication as a potential security risk. It flags the device as non-compliant due to inconsistent endpoint attributes and blocks network access. The NAC system interprets the duplicated session as a rogue device or a spoofing attempt.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2025 07:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-issue/m-p/5337905#M598505</guid>
      <dc:creator>natixis</dc:creator>
      <dc:date>2025-10-13T07:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ISSUE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-issue/m-p/5338144#M598517</link>
      <description>&lt;P&gt;Please share the exact errors and "strict posture and profiling policies" that cause non-compliance.&lt;BR /&gt;If you think it's an bug, call TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2025 21:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-issue/m-p/5338144#M598517</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2025-10-13T21:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ISSUE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-issue/m-p/5338446#M598536</link>
      <description>&lt;P&gt;11001 Received RADIUS Access-Request - AD&lt;BR /&gt;11017 RADIUS created a new session - zz@dz.zzbp.corp&lt;BR /&gt;15049 Evaluating Policy Group - dz.zzbp.corp&lt;BR /&gt;15008 Evaluating Service Selection Policy - dz.zzbp.corp&lt;BR /&gt;15048 Queried PIP - DEVICE.Device Type&lt;BR /&gt;15048 Queried PIP - dz.zzbp.corp&lt;BR /&gt;11507 Extracted EAP-Response/Identity - AD&lt;BR /&gt;12500 Prepared EAP-Request proposing EAP-TLS with challenge - dz.zzbp.corp&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received - AD&lt;BR /&gt;11006 Returned RADIUS Access-Challenge - AD&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12301 Extracted EAP-Response/NAK requesting to use PEAP instead&lt;BR /&gt;12300 Prepared EAP-Request proposing PEAP with challenge&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12302 Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated&lt;BR /&gt;12318 Successfully negotiated PEAP version 0&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started&lt;BR /&gt;12805 Extracted TLS ClientHello message&lt;BR /&gt;12806 Prepared TLS ServerHello message&lt;BR /&gt;12807 Prepared TLS Certificate message&lt;BR /&gt;12808 Prepared TLS ServerKeyExchange message&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12318 Successfully negotiated PEAP version 0&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12812 Extracted TLS ClientKeyExchange message&lt;BR /&gt;12803 Extracted TLS ChangeCipherSpec message&lt;BR /&gt;12804 Extracted TLS Finished message&lt;BR /&gt;12801 Prepared TLS ChangeCipherSpec message&lt;BR /&gt;12802 Prepared TLS Finished message&lt;BR /&gt;12816 TLS handshake succeeded&lt;BR /&gt;12310 PEAP full handshake finished successfully&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12313 PEAP inner method started&lt;BR /&gt;11521 Prepared EAP-Request/Identity for inner EAP method&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;11522 Extracted EAP-Response/Identity for inner EAP method&lt;BR /&gt;11806 Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12523 Extracted EAP-Response/NAK for inner method requesting to use EAP-TLS instead&lt;BR /&gt;12522 Prepared EAP-Request for inner method proposing EAP-TLS with challenge&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12524 Extracted EAP-Response containing EAP-TLS challenge-response for inner method and accepting EAP-TLS as negotiated&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started&lt;BR /&gt;12545 Client requested EAP-TLS session ticket&lt;BR /&gt;12546 The EAP-TLS session ticket received from supplicant. Inner EAP-TLS does not support stateless session resume. Performing full authentication&lt;BR /&gt;12805 Extracted TLS ClientHello message&lt;BR /&gt;12806 Prepared TLS ServerHello message&lt;BR /&gt;12807 Prepared TLS Certificate message&lt;BR /&gt;12808 Prepared TLS ServerKeyExchange message&lt;BR /&gt;12809 Prepared TLS CertificateRequest message&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12571 ISE will continue to CRL verification if it is configured for specific CA - certificate for&lt;BR /&gt;12571 ISE will continue to CRL verification if it is configured for specific CA - certificate for NATIXIS-ALG-DCRT01-CA&lt;BR /&gt;12811 Extracted TLS Certificate message containing client certificate&lt;BR /&gt;12812 Extracted TLS ClientKeyExchange message&lt;BR /&gt;12813 Extracted TLS CertificateVerify message&lt;BR /&gt;12803 Extracted TLS ChangeCipherSpec message&lt;BR /&gt;12804 Extracted TLS Finished message&lt;BR /&gt;12801 Prepared TLS ChangeCipherSpec message&lt;BR /&gt;12802 Prepared TLS Finished message&lt;BR /&gt;12816 TLS handshake succeeded&lt;BR /&gt;12509 EAP-TLS full handshake finished successfully&lt;BR /&gt;12527 Prepared EAP-Request for inner method with another EAP-TLS challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12526 Extracted EAP-Response for inner method containing TLS challenge-response&lt;BR /&gt;61025 Open secure connection with TLS peer&lt;BR /&gt;15041 Evaluating Identity Policy&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType&lt;BR /&gt;22072 Selected identity source sequence - zz_Cert_AD_Intern&lt;BR /&gt;22070 Identity name is taken from certificate attribute&lt;BR /&gt;22037 Authentication Passed&lt;BR /&gt;12528 Inner EAP-TLS authentication succeeded&lt;BR /&gt;11519 Prepared EAP-Success for inner EAP method&lt;BR /&gt;12314 PEAP inner method finished successfully&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;24715 ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;BR /&gt;15036 Evaluating Authorization Policy&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - zz@dz.zzbp.corp&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;15048 Queried PIP - Radius.User-Name&lt;BR /&gt;15048 Queried PIP - EndPoints.LogicalProfile&lt;BR /&gt;24432 Looking up user in Active Directory - xxx@dz.xxx.corp&lt;BR /&gt;24325 Resolving identity&lt;BR /&gt;24313 Search for matching accounts at join point&lt;BR /&gt;24319 Single matching account found in forest&lt;BR /&gt;24323 Identity resolution detected single matching account&lt;BR /&gt;24355 LDAP fetch succeeded&lt;BR /&gt;24416 User's Groups retrieval from Active Directory succeeded&lt;BR /&gt;24355 LDAP fetch succeeded&lt;BR /&gt;24420 User's Attributes retrieval from Active Directory succeeded&lt;BR /&gt;24100 Some of the expected attributes are not found on the subject record. The default values, if configured, will be used for these attributes&lt;BR /&gt;15048 Queried PIP - AD.ExternalGroups&lt;BR /&gt;15016 Selected Authorization Profile - zz_Users&lt;BR /&gt;11022 Added the dACL specified in the Authorization Profile&lt;BR /&gt;22081 Max sessions policy passed&lt;BR /&gt;22080 New accounting session created in Session cache&lt;BR /&gt;12306 PEAP authentication succeeded&lt;BR /&gt;11503 Prepared EAP-Success&lt;BR /&gt;11002 Returned RADIUS Access-Accep&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2025 15:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-issue/m-p/5338446#M598536</guid>
      <dc:creator>natixis</dc:creator>
      <dc:date>2025-10-14T15:06:24Z</dc:date>
    </item>
  </channel>
</rss>

