<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: seems to be working I in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/3881480#M90480</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/301409"&gt;@Simon Laurendeau&lt;/a&gt;&amp;nbsp;/&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/274561"&gt;@nspasov&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what is the issue then? Is it because of the MAR? I am having the same issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jun 2019 13:35:36 GMT</pubDate>
    <dc:creator>fatalXerror</dc:creator>
    <dc:date>2019-06-28T13:35:36Z</dc:date>
    <item>
      <title>Cisco ISE Machine failed machine authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438174#M90426</link>
      <description>&lt;P&gt;Hi, Since we migrated to ISE 1.2 patch 7 we are having problems with our corporate SSID.&lt;/P&gt;&lt;P&gt;We have a rule that basically say :&lt;/P&gt;&lt;P&gt;User is Domain User.&lt;/P&gt;&lt;P&gt;Machine is in domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But for some reason some workstation are getting denied by this :&lt;/P&gt;&lt;P&gt;24423 &amp;nbsp;&amp;nbsp; &amp;nbsp;ISE has not been able to confirm previous successful machine authentication for user in Active Directory&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was wondering if I could force a sync ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:43:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438174#M90426</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2019-03-11T04:43:54Z</dc:date>
    </item>
    <item>
      <title>Have you tried to rejoin the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438175#M90429</link>
      <description>&lt;DIV class="discussion-body node-body"&gt;&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P&gt;Have you tried to rejoin the computer to the domain as some time the machine password gets expired and requires renewal and then do the ISE based authentication if you still gets this error then try to&amp;nbsp; to roll back to the previous ISE patch if it was working successfully.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;****Do rate helpful posts*****&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 20 May 2014 17:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438175#M90429</guid>
      <dc:creator>kaaftab</dc:creator>
      <dc:date>2014-05-20T17:43:22Z</dc:date>
    </item>
    <item>
      <title>Are you using EAP-Chaining</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438176#M90432</link>
      <description>&lt;P&gt;Are you using EAP-Chaining (EAP-TEAP) or are you utilizing MAR (machine access restriction)? Can you provide some screen shots of the rules that you have in place?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2014 22:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438176#M90432</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-22T22:54:52Z</dc:date>
    </item>
    <item>
      <title>We use MAR.Rule Screenshot</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438177#M90437</link>
      <description>&lt;P&gt;We use MAR.&lt;/P&gt;&lt;P&gt;Rule Screenshot :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i.imgur.com/WQHD9Ie.png" /&gt;&lt;/P&gt;&lt;P&gt;AD Settings :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i.imgur.com/XywvGDw.png" /&gt;&lt;/P&gt;&lt;P&gt;Allow Protocol :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i.imgur.com/2JrEzu1.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been workign with ISE for a month now and still trying to understand alot of it so thank you all for your help!&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2014 15:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438177#M90437</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-05-23T15:05:37Z</dc:date>
    </item>
    <item>
      <title>OK, thank you for the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438178#M90440</link>
      <description>&lt;P&gt;OK, thank you for the screenshots. So the machine authentication related to MAR only happens when:&lt;/P&gt;&lt;P&gt;1. The machine first boots up&lt;/P&gt;&lt;P&gt;2. The user logs off and logs back in to the computer&lt;/P&gt;&lt;P&gt;ISE then stores the machine's MAC address &amp;nbsp;information until the "Aging Time" expires. In your situation that is 8760 hours. Once that timer expires the user will have to either reboot the machine or log off/log back in. In addition, MAR comes with a couple of caveats:&lt;/P&gt;&lt;P&gt;1. The MAR information/state is not replicated between ISE nodes. Thus, if you are load balancing the sessions and/or you have a failover all of the previously MAR authenticated machines would have to either be rebooted or logged off/logged back on.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Since the method uses the MAC address of the machine the authentication process would have to be repeated if authenticating MAC address changes. For instance, a user comes comes to the office, boots the computer and authenticates on the wireless and everything works as expected. However, the user then goes to his/hers desk and connects to a wired port. At that point the machine will need to perform wired authentication, thus, it will be using the MAC address from its wired LAN adapter. That MAC address won't be in ISE's database and the machine will be marked as "not previously authenticated." At this point another restart/logg off/on will be required. The same will apply if the user for some reason uses a docking station. The docking station will have it's own MAC address that will be different than the one from the machine which won't be in the database of ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Overall, MAR is not be most elegant solution. There are some good alternatives out there. You can take a look at the following document:&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116516-problemsolution-technology-00.html&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2014 19:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438178#M90440</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-23T19:07:33Z</dc:date>
    </item>
    <item>
      <title>Hi,While using MAR to make</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438179#M90443</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;While using MAR to make sure that corporate users are actually using a domain computer to connect to the network was a discussion topic in several implementations, it was quickly scrapped due to the numerous issues:&lt;/P&gt;&lt;P&gt;- Sleeping computers may not perform machine authentication first&lt;/P&gt;&lt;P&gt;- Users with laptops going from wired to wireless wouldn't perform machine authentication first -&amp;gt; failed user auth&lt;/P&gt;&lt;P&gt;I suggest you try EAP-Chaining with the Anyconnect supplicant.&lt;/P&gt;</description>
      <pubDate>Sun, 25 May 2014 08:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438179#M90443</guid>
      <dc:creator>radu.ioncu</dc:creator>
      <dc:date>2014-05-25T08:01:44Z</dc:date>
    </item>
    <item>
      <title>Simon, were we able to solve</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438180#M90445</link>
      <description>&lt;P&gt;Simon, were we able to solve your issue? If not let us know if you need more clarifications. Otherwise, please mark the thread as closed/answered &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 17:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438180#M90445</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-28T17:37:29Z</dc:date>
    </item>
    <item>
      <title>I am still working on this I</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438181#M90449</link>
      <description>&lt;P&gt;I am still working on this I can't figure out how some PC just won't authenticate (No trace in ISE) I'm waiting on an internal signing request for ISE to see if that would help&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 17:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438181#M90449</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-05-28T17:40:25Z</dc:date>
    </item>
    <item>
      <title>Hmm, that is interesting. You</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438182#M90453</link>
      <description>&lt;P&gt;Hmm, that is interesting. You should be seeing hits in ISE weather they were for successful or unsuccessful authentications. Did you make sure that all of your NADs (Switches, WLCs) are added to ISE. Also, under Administration &amp;gt; Settings &amp;gt; Protocols &amp;gt; Radius, check and see if you have Suppression enabled. This will prevent ISE from showing up logs for "miss-behaving" clients. You can temporary disable it and troubleshoot the issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 17:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438182#M90453</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-28T17:58:03Z</dc:date>
    </item>
    <item>
      <title>Is this normal ?show radius</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438183#M90457</link>
      <description>&lt;P&gt;Is this normal ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show radius summary&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Authentication Servers&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Idx&amp;nbsp; Type&amp;nbsp; Server Address&amp;nbsp;&amp;nbsp;&amp;nbsp; Port&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tout&amp;nbsp; MgmtTout&amp;nbsp; RFC3576&amp;nbsp; IPSec - AuthMode/Phase1/Group/Lifetime/Auth/Encr&lt;BR /&gt;---&amp;nbsp; ----&amp;nbsp; ----------------&amp;nbsp; ------&amp;nbsp; --------&amp;nbsp; ----&amp;nbsp; --------&amp;nbsp; -------&amp;nbsp; ------------------------------------------------&lt;BR /&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp; NM&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.34&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1812&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; Disabled - none/unknown/group-0/0 none/none&lt;BR /&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp; NM&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.4.2.36&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1812&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; Disabled - none/unknown/group-0/0 none/none&lt;BR /&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp; NM&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.8.2.84&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1812&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; Disabled - none/unknown/group-0/0 none/none&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Accounting Servers&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;--More or (q)uit current module or &amp;lt;ctrl-z&amp;gt; to abort&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Idx&amp;nbsp; Type&amp;nbsp; Server Address&amp;nbsp;&amp;nbsp;&amp;nbsp; Port&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tout&amp;nbsp; MgmtTout&amp;nbsp; RFC3576&amp;nbsp; IPSec - AuthMode/Phase1/Group/Lifetime/Auth/Encr&lt;BR /&gt;---&amp;nbsp; ----&amp;nbsp; ----------------&amp;nbsp; ------&amp;nbsp; --------&amp;nbsp; ----&amp;nbsp; --------&amp;nbsp; -------&amp;nbsp; ------------------------------------------------&lt;BR /&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.34&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1813&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Disabled - none/unknown/group-0/0 none/none&lt;BR /&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.4.2.36&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1813&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Disabled - none/unknown/group-0/0 none/none&lt;BR /&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.8.2.84&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1813&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Disabled - none/unknown/group-0/0 none/none&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 19:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438183#M90457</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-05-28T19:02:21Z</dc:date>
    </item>
    <item>
      <title>Where are you pulling this</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438184#M90462</link>
      <description>&lt;P&gt;Where are you pulling this information from? I mean what type of device?&lt;/P&gt;&lt;P&gt;Also, is this for wired or wireless?&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 01:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438184#M90462</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-29T01:34:49Z</dc:date>
    </item>
    <item>
      <title>This is for wireless and it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438185#M90464</link>
      <description>&lt;P&gt;This is for wireless and it is from our WLC&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 13:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438185#M90464</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-05-29T13:53:05Z</dc:date>
    </item>
    <item>
      <title>From the WLC issue:debug</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438186#M90467</link>
      <description>&lt;P&gt;From the WLC issue:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;debug client&amp;nbsp;&lt;EM&gt;client_mac_address&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Then try to authenticate with the affected machine and post the output back here.&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 05:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438186#M90467</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-30T05:44:34Z</dc:date>
    </item>
    <item>
      <title>Sorry... i've been so busy</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438187#M90470</link>
      <description>&lt;P&gt;Sorry... i've been so busy with other stuff and since we just desactivated the machine auth it wasn`t a priority.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can find debug on pastebin :http://pastebin.com/UCL6p5CU&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2014 14:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438187#M90470</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-06-12T14:08:23Z</dc:date>
    </item>
    <item>
      <title>Your debug logs are showing</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438188#M90473</link>
      <description>&lt;P&gt;Your debug logs are showing that the client is getting an "access-reject" which is sent by the radius server. As a result, the WLC removes/deletes the client. Thus, there must be logs in ISE about this client. Can you please double check? If there are no logs paste screen shots of the following:&lt;/P&gt;&lt;P&gt;Administration &amp;gt; System &amp;gt; Settings &amp;gt; Protocols &amp;gt; Radius&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jun 2014 21:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438188#M90473</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-06-15T21:40:25Z</dc:date>
    </item>
    <item>
      <title>I can see the user in ISE "Au</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438189#M90474</link>
      <description>&lt;P&gt;I can see the user in ISE "Authentication" tab but not the computer.&lt;BR /&gt;&lt;BR /&gt;seems like 6 to 5% of our laptop are having this issue I think it's time I start working with our helpdesk here to check GPO and other hardware related issue. What I find weird is this happend right after migrating from ISE 1.1 to 1.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steps :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3 class="title"&gt;&lt;SPAN style="padding-left:22px"&gt;Steps&lt;/SPAN&gt;&lt;/H3&gt;&lt;TABLE border="0" cellpadding="3" class="content_table_steps" style="width: 500px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11017&lt;/TD&gt;&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15049&lt;/TD&gt;&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15008&lt;/TD&gt;&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15004&lt;/TD&gt;&lt;TD&gt;Matched rule&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11507&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response/Identity&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12300&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request proposing PEAP with challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12302&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12318&lt;/TD&gt;&lt;TD&gt;Successfully negotiated PEAP version 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12800&lt;/TD&gt;&lt;TD&gt;Extracted first TLS record; TLS handshake started&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12805&lt;/TD&gt;&lt;TD&gt;Extracted TLS ClientHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12806&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12807&lt;/TD&gt;&lt;TD&gt;Prepared TLS Certificate message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12810&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerDone message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12305&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12304&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12305&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12304&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12318&lt;/TD&gt;&lt;TD&gt;Successfully negotiated PEAP version 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12812&lt;/TD&gt;&lt;TD&gt;Extracted TLS ClientKeyExchange message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12804&lt;/TD&gt;&lt;TD&gt;Extracted TLS Finished message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12801&lt;/TD&gt;&lt;TD&gt;Prepared TLS ChangeCipherSpec message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12802&lt;/TD&gt;&lt;TD&gt;Prepared TLS Finished message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12816&lt;/TD&gt;&lt;TD&gt;TLS handshake succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12310&lt;/TD&gt;&lt;TD&gt;PEAP full handshake finished successfully&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12305&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12304&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12313&lt;/TD&gt;&lt;TD&gt;PEAP inner method started&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11521&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request/Identity for inner EAP method&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12305&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12304&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11522&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response/Identity for inner EAP method&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11806&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12305&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12304&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11808&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15041&lt;/TD&gt;&lt;TD&gt;Evaluating Identity Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15006&lt;/TD&gt;&lt;TD&gt;Matched Default Rule&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15013&lt;/TD&gt;&lt;TD&gt;Selected Identity Source - IdentityStore_AD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24430&lt;/TD&gt;&lt;TD&gt;Authenticating user against Active Directory&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24402&lt;/TD&gt;&lt;TD&gt;User authentication against Active Directory succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;22037&lt;/TD&gt;&lt;TD&gt;Authentication Passed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11824&lt;/TD&gt;&lt;TD&gt;EAP-MSCHAP authentication attempt passed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12305&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12304&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11810&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11814&lt;/TD&gt;&lt;TD&gt;Inner EAP-MSCHAP authentication succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11519&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Success for inner EAP method&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12314&lt;/TD&gt;&lt;TD&gt;PEAP inner method finished successfully&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12305&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12304&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;24423&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;ISE has not been able to confirm previous successful machine authentication for user in Active Directory&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15036&lt;/TD&gt;&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24432&lt;/TD&gt;&lt;TD&gt;Looking up user in Active Directory - DOMAIN\USER&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24416&lt;/TD&gt;&lt;TD&gt;User's Groups retrieval from Active Directory succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15004&lt;/TD&gt;&lt;TD&gt;Matched rule - AuthZBlock_DOT1X&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15016&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile - DenyAccess&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15039&lt;/TD&gt;&lt;TD&gt;Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12306&lt;/TD&gt;&lt;TD&gt;PEAP authentication succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11503&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Success&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11003&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Returned RADIUS Access-Reject&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Radius :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i58.tinypic.com/n1dwes.png" style="width: 1108px; height: 558px;" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2014 15:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438189#M90474</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-06-16T15:12:02Z</dc:date>
    </item>
    <item>
      <title>Hmm, you when you restart the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438190#M90475</link>
      <description>&lt;P&gt;Hmm, you when you restart the machine you should see an authentication entry that starts with " host/ " Let's try this:&lt;/P&gt;&lt;P&gt;1. Uncheck both the "Suppress Anomalous Clients" and "Suppress Repeated Successful Authentications"&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Wait 10 minutes&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Restart the machine and try again and let us know what happens&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2014 17:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438190#M90475</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-06-16T17:59:40Z</dc:date>
    </item>
    <item>
      <title>seems to be working I</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438191#M90476</link>
      <description>&lt;P&gt;seems to be working I restarded 3-4 laptop and they all authenticated after rebooting I am still monitoring but it's looking positive!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2014 13:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438191#M90476</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-06-18T13:36:28Z</dc:date>
    </item>
    <item>
      <title>Good to hear! Hopefully this</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438192#M90477</link>
      <description>&lt;P&gt;Good to hear! Hopefully this was resolved! Keep us posted &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2014 16:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438192#M90477</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-06-18T16:52:36Z</dc:date>
    </item>
    <item>
      <title>I can confirm it's now</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438193#M90478</link>
      <description>&lt;P&gt;I can confirm it's now working ! thanks for the help !&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2014 14:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-machine-failed-machine-authentication/m-p/2438193#M90478</guid>
      <dc:creator>Simon Laurendeau</dc:creator>
      <dc:date>2014-06-26T14:09:54Z</dc:date>
    </item>
  </channel>
</rss>

