<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why do you want to use jumbo in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416634#M88515</link>
    <description>&lt;P&gt;Why do you want to use jumbo frames on the client?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why do you think ISE needs jumbo frames? It does not talk to the client directly. Please capture the RADIUS packets sent by&amp;nbsp;switch&amp;nbsp;and check if the size exceeds 1500 bytes. (I'd be surprised)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you have collected enough info to open a TAC case.&lt;/P&gt;&lt;P style="text-align: right;"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 29 Aug 2015 09:30:28 GMT</pubDate>
    <dc:creator>Peter Koltl</dc:creator>
    <dc:date>2015-08-29T09:30:28Z</dc:date>
    <item>
      <title>ISE v1.2 - Endpoint abandoned EAP session and started new</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416622#M88501</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;I have lots of clients that are not able to log on to both wired and wireless networks, and they always fails with these errors.&lt;/P&gt;&lt;P&gt;5411 Supplicant stopped responding to ISE&lt;/P&gt;&lt;P&gt;5440 Endpoint abandoned EAP session and started new&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is with certificate authentication, both for client and for machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The clients are for the most part Windows 7.&lt;/P&gt;&lt;P&gt;We use both Cisco and Aerohive for wireless, and the switch I have tested with is a Cisco2960S&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A few strange things:&lt;/P&gt;&lt;P&gt;It works perfectly for a lot of clients too, with the excact same configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One PC I'm testing with works fine when authenticating via wireless, but when I plug it into the switch, I get these errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I seems to be a timeout of some kind, either to short or too long, but where?&lt;/P&gt;&lt;P&gt;In the Win7 supplicant?&lt;/P&gt;&lt;P&gt;In the switch?&lt;/P&gt;&lt;P&gt;In the Cisco WLC&lt;/P&gt;&lt;P&gt;or in the Aerohive AP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have spent hours and hours on this problem, but I can't make it go away, it is very exhausting.&lt;/P&gt;&lt;P&gt;There surely must have been others with the same problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416622#M88501</guid>
      <dc:creator>dal</dc:creator>
      <dc:date>2019-03-11T04:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE v1.2 - Endpoint abandoned EAP session and started new</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416623#M88504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im a wireless guy .. On your WLC if you do a client debug in the cli .. If you see the WLC expiring the mobile it means the client isn't passing Eap in the time allowed and expires the session .. Only for the client to try again.&lt;BR /&gt;&lt;BR /&gt;You can expand those timers .. Check this out&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/docs/DOC-12110" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-12110&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 02:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416623#M88504</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2014-01-24T02:01:04Z</dc:date>
    </item>
    <item>
      <title>ISE v1.2 - Endpoint abandoned EAP session and started new</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416624#M88505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How many policy nodes is your switch or controller pointing to?&lt;/P&gt;&lt;P&gt;If it's more than one, can you change your switch to temporarily point to one (remove the second node) and see if the issue persists?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 20:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416624#M88505</guid>
      <dc:creator>Robert Salazar</dc:creator>
      <dc:date>2014-01-30T20:51:46Z</dc:date>
    </item>
    <item>
      <title>ISE v1.2 - Endpoint abandoned EAP session and started new</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416625#M88506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;The switch is pointing to only one policy node.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 22:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416625#M88506</guid>
      <dc:creator>dal</dc:creator>
      <dc:date>2014-01-30T22:05:36Z</dc:date>
    </item>
    <item>
      <title>ISE v1.2 - Endpoint abandoned EAP session and started new</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416626#M88507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A good tip. But the wireless authentication is mosty resolved. In that specific case I had, it was a MTU problem somewhere between the Accesspoint and ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problems I have with wired authentication through the switch is not resolved, though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 22:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416626#M88507</guid>
      <dc:creator>dal</dc:creator>
      <dc:date>2014-01-30T22:07:24Z</dc:date>
    </item>
    <item>
      <title>ISE v1.2 - Endpoint abandoned EAP session and started new</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416627#M88508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you exclude all potential cable problems?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the issue reproducible? Any improvement after you restart the Wired AutoConfig service on the Windows client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the switch:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;debug authentication all&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 20:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416627#M88508</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2014-01-31T20:12:45Z</dc:date>
    </item>
    <item>
      <title>ISE v1.2 - Endpoint abandoned EAP session and started new</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416628#M88509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Verify&amp;nbsp; that the supplicant is configured properly to conduct a full EAP&amp;nbsp; conversation with Cisco ISE. Verify that NAS is configured properly to&amp;nbsp; transfer EAP messages to/from the supplicant. Verify that the supplicant&amp;nbsp; or NAS does not have a short timeout for EAP conversation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 06:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416628#M88509</guid>
      <dc:creator>Saurav Lodh</dc:creator>
      <dc:date>2014-02-07T06:10:58Z</dc:date>
    </item>
    <item>
      <title>Thank for trying to help out,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416629#M88510</link>
      <description>&lt;P&gt;Thank for trying to help out, but this is.. insanely vague.&lt;/P&gt;&lt;P&gt;How can i verify that NAS (the C2960S) is properly configured?&lt;/P&gt;&lt;P&gt;What timers are we talking about here? There are many to choose from..&lt;/P&gt;&lt;P&gt;The problem is still here, even with the latest patch 7 for ISE 1.2. It works fine on wireless, but not with wired, from the same computer. So it is logic to assume it has something to do with the switch.&lt;/P&gt;&lt;P&gt;This is the configuration from the switch:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/20&lt;BR /&gt;&amp;nbsp; switchport mode access&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication open&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change added&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;sh dot1x int g1/0/20&lt;BR /&gt;Dot1x Info for GigabitEthernet1/0/20&lt;BR /&gt;-----------------------------------&lt;BR /&gt;PAE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = AUTHENTICATOR&lt;BR /&gt;QuietPeriod&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 60&lt;BR /&gt;ServerTimeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0&lt;BR /&gt;SuppTimeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 30&lt;BR /&gt;ReAuthMax&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 2&lt;BR /&gt;MaxReq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 2&lt;BR /&gt;TxPeriod&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 30&lt;/P&gt;&lt;P&gt;sh run aaa&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group radius local&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization exec default group radius local&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;&amp;nbsp;client 192.168.100.85&lt;BR /&gt;&amp;nbsp;server-key nope!&lt;BR /&gt;&amp;nbsp;auth-type any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius server hmz&lt;BR /&gt;&amp;nbsp;address ipv4 192.168.100.85 auth-port 1812 acct-port 1813&lt;BR /&gt;&amp;nbsp;key nope!&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Some debug from the switch:&lt;/P&gt;&lt;P&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] Create attr list, session 0x1E0000E0:&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding MAC d43d.7e97.1e26&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Swidb 0x4F8BAC8&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding AAA_ID=14B&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Audit_sid=C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Domain=DATA (1)&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Username=Dal@gaasdal.net&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: %AUTHMGR-5-START: Starting 'dot1x' for client (d43d.7e97.1e26) on Interface Gi1/0/20 AuditSessionID C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:07:01.745: AUTH-DETAIL: No default action(s) for event RX_METHOD_AGENT_FOUND.&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.182: %DOT1X-5-FAIL: Authentication failed for client (d43d.7e97.1e26) on Interface Gi1/0/20 AuditSessionID C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: %AUTHMGR-7-STOPPING: Stopping 'dot1x' for client d43d.7e97.1e26 on Interface Gi1/0/20 AuditSessionID C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: %AUTHMGR-5-FAIL: Authorization failed or unapplied for client (d43d.7e97.1e26) on Interface Gi1/0/20 AuditSessionID C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] Create attr list, session 0x1E0000E0:&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding MAC d43d.7e97.1e26&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Swidb 0x4F8BAC8&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding AAA_ID=14B&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Audit_sid=C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Domain=DATA (1)&lt;BR /&gt;Apr&amp;nbsp; 6 11:08:21.187: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Username=host/HovedPC.gaasdal.net&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] Create attr list, session 0x1E0000E0:&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding MAC d43d.7e97.1e26&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Swidb 0x4F8BAC8&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding AAA_ID=14B&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Audit_sid=C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Domain=DATA (1)&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: [d43d.7e97.1e26, Gi1/0/20] - adding Username=host/HovedPC.gaasdal.net&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: %AUTHMGR-5-START: Starting 'dot1x' for client (d43d.7e97.1e26) on Interface Gi1/0/20 AuditSessionID C0A864FA0000014B6983A2E0&lt;BR /&gt;Apr&amp;nbsp; 6 11:09:22.079: AUTH-DETAIL: No default action(s) for event SESSION_STARTED.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Apr 2014 11:11:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416629#M88510</guid>
      <dc:creator>dal</dc:creator>
      <dc:date>2014-04-06T11:11:26Z</dc:date>
    </item>
    <item>
      <title>I had a similar issue on</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416630#M88511</link>
      <description>&lt;P&gt;I had a similar issue on wired where most hosts could connect but some would not - with the above mentioned errors. Ultimately this issue is very much related to the supplicant and myself and TAC came to the conclusion there was nothing wrong with the configuration of the network with regards to EAP.&lt;/P&gt;&lt;P&gt;I think this is the nature of dot1x - sometimes there will be hosts that can't connect for some reason and the question is do you troubleshoot the issue or tell the client that the issue is with their PC?? In out case it was "contractor byod" machines that couldn't connect so the answer was not so simple.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Apr 2014 22:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416630#M88511</guid>
      <dc:creator>Stephen McBride</dc:creator>
      <dc:date>2014-04-06T22:23:59Z</dc:date>
    </item>
    <item>
      <title>Hi.I still have this problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416631#M88512</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;I still have this problem.&lt;/P&gt;&lt;P&gt;Or, it works fine on wireless now, but not on wired.&lt;/P&gt;&lt;P&gt;I use the same computer for testing with both wired and wireless. Same certificate, and the same authentication and authorization rules in ISE.&lt;/P&gt;&lt;P&gt;ISE is upgraded to v1.3 now, btw.&lt;/P&gt;&lt;P&gt;If I use Microsoft PEAP as auth metod, it works, but not if I use certificate as auth method (which is the way I prefer it, and that's the way it is done on wireless)&lt;/P&gt;&lt;P&gt;So in my opinion, it must be something with the switch configuration.&lt;/P&gt;&lt;P&gt;But what? Some kind of timeout that needs to be adjusted?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2014 19:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416631#M88512</guid>
      <dc:creator>dal</dc:creator>
      <dc:date>2014-11-19T19:00:14Z</dc:date>
    </item>
    <item>
      <title>For what it's worth, I see</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416632#M88513</link>
      <description>&lt;P&gt;For what it's worth, I see the same errors on our wired environment using PEAP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2015 17:04:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416632#M88513</guid>
      <dc:creator>Michael Thornton</dc:creator>
      <dc:date>2015-02-20T17:04:03Z</dc:date>
    </item>
    <item>
      <title>I finally figured this out.Or</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416633#M88514</link>
      <description>&lt;P&gt;I finally figured this out.&lt;/P&gt;&lt;P&gt;Or at least what's causing it: Jumbo frames.&lt;/P&gt;&lt;P&gt;As soon as jumbo frames is enabled on the switch, or system mtu is increased from 1500, the authentication stops working. Because the Framed-MTU being sent seems to use the jumbo frames setting.&lt;/P&gt;&lt;P&gt;By typing no system mtu and no system mtu jumbo, and the rebooting the switch, 802.1x with EAP-TLS started to work fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is of course, that I need jumbo frames enabled on the switch, because I have iSCSI connections enabled on some computers.&lt;/P&gt;&lt;P&gt;So some more testing revealed that jumbo frames CAN be enabled on the switch, as long as all the network nodes in the chain from switch to ISE-server has enabled jumbo frames as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like this:&lt;/P&gt;&lt;P&gt;Client (1500) - Switch (9198) - Switch2 (9198) - vSwitch (9198) - virtual ISE (1500)&lt;/P&gt;&lt;P&gt;This works fine, until I enable jumbo frames on the client. Then it stops working again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the question is: How to fix this?&lt;/P&gt;&lt;P&gt;There should be a way to enable jumbo frames on the ISE server, IMO&lt;/P&gt;&lt;P&gt;Or is there a way to decrease the Framed MTU being sent from the switch? Or on the client?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2015 09:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416633#M88514</guid>
      <dc:creator>dal</dc:creator>
      <dc:date>2015-08-25T09:48:31Z</dc:date>
    </item>
    <item>
      <title>Why do you want to use jumbo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416634#M88515</link>
      <description>&lt;P&gt;Why do you want to use jumbo frames on the client?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why do you think ISE needs jumbo frames? It does not talk to the client directly. Please capture the RADIUS packets sent by&amp;nbsp;switch&amp;nbsp;and check if the size exceeds 1500 bytes. (I'd be surprised)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you have collected enough info to open a TAC case.&lt;/P&gt;&lt;P style="text-align: right;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Aug 2015 09:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416634#M88515</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2015-08-29T09:30:28Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416635#M88516</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you solved it ?&lt;/P&gt;
&lt;P&gt;I have a similar issue&amp;nbsp;on eap_chaining with user and machine authentication.&lt;/P&gt;
&lt;P&gt;When the user has the certificate all works fine, but if the user not have it, I can see a very large latency and the Endpoint abandoned EAP session.&amp;nbsp;I need to complete the machine authentication to remediation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have windows 7 Enterprise, anyconnect 3.1.x and ISE 1.4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 14:16:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416635#M88516</guid>
      <dc:creator>mukka</dc:creator>
      <dc:date>2015-11-24T14:16:21Z</dc:date>
    </item>
    <item>
      <title>Hi mukka,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416636#M88517</link>
      <description>&lt;P&gt;Hi mukka,&lt;/P&gt;
&lt;P&gt;I had this same prolbem this week and I finally found that bug:&lt;/P&gt;
&lt;P&gt;https://quickview.cloudapps.cisco.com/quickview/bug/CSCuw91763&lt;/P&gt;
&lt;P&gt;Disabling AES Key wrap in WLC all my authentications started to work perfectly.&lt;/P&gt;
&lt;P&gt;I was debugging aaa in WLC finding this error "Rejecting Cisco MAC Attribute due to MAC mismatch" and googling it drived me to the bug.&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 10:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416636#M88517</guid>
      <dc:creator>alberx</dc:creator>
      <dc:date>2015-12-18T10:02:11Z</dc:date>
    </item>
    <item>
      <title>This worked for me.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416637#M88518</link>
      <description>&lt;P&gt;This worked for me.&lt;/P&gt;
&lt;P&gt;MTU on Cisco 3850 was changed from custom to default and EAP-TLS worked.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2016 15:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-endpoint-abandoned-eap-session-and-started-new/m-p/2416637#M88518</guid>
      <dc:creator>edwardonelife</dc:creator>
      <dc:date>2016-12-08T15:00:40Z</dc:date>
    </item>
  </channel>
</rss>

