<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connecting Grandstream IP Phones to Cisco Ise in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163387#M1074523</link>
    <description>&lt;P&gt;Yes i removed the DACL and still bringing up the same thing&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2020 10:53:25 GMT</pubDate>
    <dc:creator>Tutu</dc:creator>
    <dc:date>2020-10-08T10:53:25Z</dc:date>
    <item>
      <title>Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163363#M1074519</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Im trying to add grandstream IP phones to Cisco ISE, IT i as authenticating and i am even receiving an IP address but i can not make calls. Please help me.&lt;/P&gt;&lt;P&gt;Overview&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Username C0:74:AD:17:59:6B&lt;BR /&gt;Endpoint Id C0:74:AD:17:59:6B&lt;BR /&gt;Endpoint Profile Unknown&lt;BR /&gt;Authentication Policy Wired &amp;gt;&amp;gt; MAB&lt;BR /&gt;Authorization Policy Wired &amp;gt;&amp;gt; Employees&lt;BR /&gt;Authorization Result PermitAccess,Employee,IPPhones,Employees&lt;/P&gt;&lt;P&gt;Authentication Details&lt;BR /&gt;Source Timestamp 2020-10-08 09:14:19.605&lt;BR /&gt;Received Timestamp 2020-10-08 09:14:19.605&lt;BR /&gt;Policy Server ISE-PAN&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Username C0:74:AD:17:59:6B&lt;BR /&gt;User Type Host&lt;BR /&gt;Endpoint Id C0:74:AD:17:59:6B&lt;BR /&gt;Calling Station Id C0-74-AD-17-59-6B&lt;BR /&gt;Endpoint Profile Unknown&lt;BR /&gt;IPv4 Address 192.168.0.160&lt;BR /&gt;Authentication Identity Store Internal Endpoints&lt;BR /&gt;Identity Group Grandstream_IP_Phones&lt;BR /&gt;Audit Session Id 0AC8D064000000360DD05C21&lt;BR /&gt;Authentication Method mab&lt;BR /&gt;Authentication Protocol Lookup&lt;BR /&gt;Service Type Call Check&lt;BR /&gt;Network Device Test&lt;BR /&gt;Device Type All Device Types#Wired&lt;BR /&gt;Location All Locations#=HQ&lt;BR /&gt;NAS IPv4 Address 10.200.208.100&lt;BR /&gt;NAS Port Id GigabitEthernet1/0/10&lt;BR /&gt;NAS Port Type Ethernet&lt;BR /&gt;Authorization Profile PermitAccess,Employee,IPPhones,Employees&lt;BR /&gt;Security Group Employees&lt;BR /&gt;Response Time 101 milliseconds&lt;/P&gt;&lt;P&gt;Other Attributes&lt;BR /&gt;ConfigVersionId 112&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;Protocol Radius&lt;BR /&gt;NAS-Port 50110&lt;BR /&gt;Framed-MTU 1500&lt;BR /&gt;OriginalUserName c074ad17596b&lt;BR /&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;AcsSessionID ISE-PAN/391434383/9120&lt;BR /&gt;UseCase Host Lookup&lt;BR /&gt;SelectedAuthenticationIdentityStores AD&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Users&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Endpoints&lt;BR /&gt;AuthenticationStatus AuthenticationPassed&lt;BR /&gt;IdentityPolicyMatchedRule MAB&lt;BR /&gt;AuthorizationPolicyMatchedRule Employees&lt;BR /&gt;EndPointMACAddress C0-74-AD-17-59-6B&lt;BR /&gt;ISEPolicySetName Wired&lt;BR /&gt;IdentitySelectionMatchedRule MAB&lt;BR /&gt;IsMachineIdentity false&lt;BR /&gt;DTLSSupport Unknown&lt;BR /&gt;HostIdentityGroup Endpoint Identity Groups:Grandstream_IP_Phones&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;Location Location#All Locations#HQ&lt;BR /&gt;Device Type Device Type#All Device Types#Wired&lt;BR /&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;BR /&gt;RADIUS Username C0:74:AD:17:59:6B&lt;BR /&gt;Device IP Address 10.200.208.100&lt;BR /&gt;CPMSessionID 0AC8D064000000360DD05C21&lt;BR /&gt;Called-Station-ID 3C:41:0E:F2:25:0A&lt;BR /&gt;CiscoAVPair service-type=Call Check,&lt;BR /&gt;audit-session-id=0AC8D064000000360DD05C21,&lt;BR /&gt;method=mab&lt;/P&gt;&lt;P&gt;Result&lt;BR /&gt;UserName C0:74:AD:17:59:6B&lt;BR /&gt;User-Name C0-74-AD-17-59-6B&lt;BR /&gt;Class CACS:0AC8D064000000360DD05C21:TCRA-ISE-PAN/391434383/9120&lt;BR /&gt;Tunnel-Type (tag=0) VLAN&lt;BR /&gt;Tunnel-Medium-Type (tag=0) 802&lt;BR /&gt;Tunnel-Private-Group-ID (tag=0) 301&lt;BR /&gt;cisco-av-pair ACS:CiscoSecure-Defined-ACL=#ACSACL#-IP--Employee-5f6da441&lt;BR /&gt;cisco-av-pair device-traffic-class=voice&lt;BR /&gt;cisco-av-pair cts:security-group-tag=0004-00&lt;BR /&gt;cisco-av-pair profile-name=Unknown&lt;BR /&gt;LicenseTypes Base license consumed&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Steps&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session&lt;BR /&gt;11027 Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;BR /&gt;15049 Evaluating Policy Group&lt;BR /&gt;15008 Evaluating Service Selection Policy&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType&lt;BR /&gt;15048 Queried PIP - DEVICE.Device Type&lt;BR /&gt;15041 Evaluating Identity Policy&lt;BR /&gt;15048 Queried PIP - Network Access.EapAuthentication&lt;BR /&gt;22072 Selected identity source sequence - Basic_Internal&lt;BR /&gt;15013 Selected Identity Source -AD&lt;BR /&gt;24432 Looking up user in Active Directory - -AD&lt;BR /&gt;24325 Resolving identity - C0-74-AD-17-59-6B&lt;BR /&gt;24313 Search for matching accounts at join point - *****.go.tz&lt;BR /&gt;24318 No matching account found in forest - *****.go.tz&lt;BR /&gt;24322 Identity resolution detected no matching account&lt;BR /&gt;24352 Identity resolution failed - ERROR_NO_SUCH_USER&lt;BR /&gt;24412 User not found in Active Directory - -AD&lt;BR /&gt;15013 Selected Identity Source - Internal Users&lt;BR /&gt;24210 Looking up User in Internal Users IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24216 The user is not found in the internal users identity store&lt;BR /&gt;15013 Selected Identity Source - Internal Endpoints&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;22037 Authentication Passed&lt;BR /&gt;24715 ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;BR /&gt;15036 Evaluating Authorization Policy&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,Employee,IPPhones,Employees&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,Employee,IPPhones,Employees&lt;BR /&gt;11022 Added the dACL specified in the Authorization Profile&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,Employee,IPPhones,Employees&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,Employee,IPPhones,Employees&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;11002 Returned RADIUS Access-Accept&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="grandstreampolicy.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/85480iD6F297F733C8CA40/image-size/large?v=v2&amp;amp;px=999" role="button" title="grandstreampolicy.png" alt="grandstreampolicy.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="grandstreampolicy2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/85481i8F0884C0EA74C286/image-size/large?v=v2&amp;amp;px=999" role="button" title="grandstreampolicy2.png" alt="grandstreampolicy2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policiesgranstream1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/85482i6E7E0A01F0E712B4/image-size/large?v=v2&amp;amp;px=999" role="button" title="policiesgranstream1.png" alt="policiesgranstream1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 10:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163363#M1074519</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-08T10:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163371#M1074520</link>
      <description>&lt;P&gt;You are applying a DACL to the session, I don't know what is permitted/denied as you've not provided that information. Remove it, test again and see if that resolves the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have also applied an SGT of "Employees" to the session, if you aren't using TrustSec then remove it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you authorised the phone into the correct Voice VLAN?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 10:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163371#M1074520</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-10-08T10:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163374#M1074521</link>
      <description>&lt;P&gt;hello Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My voice vlan is 301&lt;/P&gt;&lt;P&gt;This is my Dacl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;permit tcp any any eq 9100&lt;BR /&gt;permit udp any any eq 68&lt;BR /&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="daclgrandstream.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/85484iBE8E809E02877769/image-size/large?v=v2&amp;amp;px=999" role="button" title="daclgrandstream.png" alt="daclgrandstream.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 10:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163374#M1074521</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-08T10:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163380#M1074522</link>
      <description>&lt;P&gt;Ok, but did you test without the DACL applied?&lt;/P&gt;
&lt;P&gt;Have you confirmed what ports are required for the IP phone to operate correctly? udp/68 is DHCP and tcp/9100 is used for printing and you are denying all remaining traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 10:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163380#M1074522</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-10-08T10:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163387#M1074523</link>
      <description>&lt;P&gt;Yes i removed the DACL and still bringing up the same thing&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 10:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163387#M1074523</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-08T10:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163397#M1074525</link>
      <description>&lt;P&gt;Its not even hitting the last authorization policy set&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 11:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163397#M1074525</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-08T11:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163398#M1074526</link>
      <description>&lt;P&gt;this is what im getting now&amp;nbsp; after removing the vlan tag and vlan from the authorization profile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There have been 1 repeated authentications with the same authentication result.&lt;BR /&gt;The authentication details of the first passed attempt is shown here.&lt;/P&gt;&lt;P&gt;Overview&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Username C0:74:AD:17:59:6B&lt;BR /&gt;Endpoint Id C0:74:AD:17:59:6B&lt;BR /&gt;Endpoint Profile Unknown&lt;BR /&gt;Authentication Policy Wired &amp;gt;&amp;gt; MAB&lt;BR /&gt;Authorization Policy Wired &amp;gt;&amp;gt; Employees&lt;BR /&gt;Authorization Result PermitAccess,Employee,IPPhones,Employees&lt;/P&gt;&lt;P&gt;Authentication Details&lt;BR /&gt;Source Timestamp 2020-10-08 10:51:16.266&lt;BR /&gt;Received Timestamp 2020-10-08 10:51:16.266&lt;BR /&gt;Policy Server ISE-PAN&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Username C0:74:AD:17:59:6B&lt;BR /&gt;User Type Host&lt;BR /&gt;Endpoint Id C0:74:AD:17:59:6B&lt;BR /&gt;Calling Station Id C0-74-AD-17-59-6B&lt;BR /&gt;Endpoint Profile Unknown&lt;BR /&gt;IPv4 Address 192.168.0.160&lt;BR /&gt;Authentication Identity Store Internal Endpoints&lt;BR /&gt;Identity Group Grandstream_IP_Phones&lt;BR /&gt;Audit Session Id 0AC8D0640000003C0E291D49&lt;BR /&gt;Authentication Method mab&lt;BR /&gt;Authentication Protocol Lookup&lt;BR /&gt;Service Type Call Check&lt;BR /&gt;Network Device Test&lt;BR /&gt;Device Type All Device Types#Wired&lt;BR /&gt;Location All Locations#HQ&lt;BR /&gt;NAS IPv4 Address 10.200.208.100&lt;BR /&gt;NAS Port Id GigabitEthernet1/0/10&lt;BR /&gt;NAS Port Type Ethernet&lt;BR /&gt;Authorization Profile PermitAccess,Employee,IPPhones,Employees&lt;BR /&gt;Security Group Employees&lt;BR /&gt;Response Time 38 milliseconds&lt;/P&gt;&lt;P&gt;Other Attributes&lt;BR /&gt;ConfigVersionId 113&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;Protocol Radius&lt;BR /&gt;NAS-Port 50110&lt;BR /&gt;Framed-MTU 1500&lt;BR /&gt;OriginalUserName c074ad17596b&lt;BR /&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;AcsSessionID -ISE-PAN/391434383/9726&lt;BR /&gt;UseCase Host Lookup&lt;BR /&gt;SelectedAuthenticationIdentityStores AD&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Users&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Endpoints&lt;BR /&gt;AuthenticationStatus AuthenticationPassed&lt;BR /&gt;IdentityPolicyMatchedRule MAB&lt;BR /&gt;AuthorizationPolicyMatchedRule _Employees&lt;BR /&gt;EndPointMACAddress C0-74-AD-17-59-6B&lt;BR /&gt;ISEPolicySetName Wired&lt;BR /&gt;IdentitySelectionMatchedRule MAB&lt;BR /&gt;IsMachineIdentity false&lt;BR /&gt;DTLSSupport Unknown&lt;BR /&gt;HostIdentityGroup Endpoint Identity Groups:Grandstream_IP_Phones&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;Location Location#All Locations#HQ&lt;BR /&gt;Device Type Device Type#All Device Types#Wired&lt;BR /&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;BR /&gt;RADIUS Username C0:74:AD:17:59:6B&lt;BR /&gt;Device IP Address 10.200.208.100&lt;BR /&gt;CPMSessionID 0AC8D0640000003C0E291D49&lt;BR /&gt;Called-Station-ID 3C:41:0E:F2:25:0A&lt;BR /&gt;CiscoAVPair service-type=Call Check,&lt;BR /&gt;audit-session-id=0AC8D0640000003C0E291D49,&lt;BR /&gt;method=mab&lt;/P&gt;&lt;P&gt;Result&lt;BR /&gt;UserName C0:74:AD:17:59:6B&lt;BR /&gt;User-Name C0-74-AD-17-59-6B&lt;BR /&gt;Class CACS:0AC8D0640000003C0E291D49:ISE-PAN/391434383/9726&lt;BR /&gt;Tunnel-Type (tag=0) VLAN&lt;BR /&gt;Tunnel-Medium-Type (tag=0) 802&lt;BR /&gt;Tunnel-Private-Group-ID (tag=0) 301&lt;BR /&gt;cisco-av-pair ACS:CiscoSecure-Defined-ACL=#ACSACL#-IP--Employee-5f6da441&lt;BR /&gt;cisco-av-pair device-traffic-class=voice&lt;BR /&gt;cisco-av-pair cts:security-group-tag=0004-00&lt;BR /&gt;cisco-av-pair profile-name=Unknown&lt;BR /&gt;LicenseTypes Base license consumed&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Steps&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session&lt;BR /&gt;11027 Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;BR /&gt;15049 Evaluating Policy Group&lt;BR /&gt;15008 Evaluating Service Selection Policy&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType&lt;BR /&gt;15048 Queried PIP - DEVICE.Device Type&lt;BR /&gt;15041 Evaluating Identity Policy&lt;BR /&gt;15048 Queried PIP - Network Access.EapAuthentication&lt;BR /&gt;22072 Selected identity source sequence - Basic_Internal&lt;BR /&gt;15013 Selected Identity Source - AD&lt;BR /&gt;24432 Looking up user in Active Directory - AD&lt;BR /&gt;24325 Resolving identity - C0-74-AD-17-59-6B&lt;BR /&gt;24313 Search for matching accounts at join point - .go.tz&lt;BR /&gt;24318 No matching account found in forest - .go.tz&lt;BR /&gt;24322 Identity resolution detected no matching account&lt;BR /&gt;24352 Identity resolution failed - ERROR_NO_SUCH_USER&lt;BR /&gt;24412 User not found in Active Directory - -AD&lt;BR /&gt;15013 Selected Identity Source - Internal Users&lt;BR /&gt;24210 Looking up User in Internal Users IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24216 The user is not found in the internal users identity store&lt;BR /&gt;15013 Selected Identity Source - Internal Endpoints&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;22037 Authentication Passed&lt;BR /&gt;24715 ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;BR /&gt;15036 Evaluating Authorization Policy&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,_Employee,_IPPhones,Employees&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,_Employee,_IPPhones,Employees&lt;BR /&gt;11022 Added the dACL specified in the Authorization Profile&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,_Employee,_IPPhones,Employees&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,_Employee,_IPPhones,Employees&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;11002 Returned RADIUS Access-Accept&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 11:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163398#M1074526</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-08T11:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163403#M1074527</link>
      <description>&lt;P&gt;On closer inspection, the screenshots you've provided are out of order and misleading.&lt;/P&gt;
&lt;P&gt;Your phone is matching on a local exception policy (which is applied before the Authorisation Policy), why are you using a local exception policy for this?&lt;/P&gt;
&lt;P&gt;Why do you have Wired_MAB or MSCHAPv2 or TLS? The reason why the IP Phone is matching this rule is because you've defined MAB, remove it and then it should match the expected Authorisation Policy - Grandstream IP Phone.&lt;/P&gt;
&lt;P&gt;What is the authentication session output on the switch?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 11:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4163403#M1074527</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-10-08T11:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4164986#M1074613</link>
      <description>&lt;P&gt;Hello Rob,&lt;/P&gt;&lt;P&gt;It is now matching the policy for which i created but i am still not able to make calls. I do no get any authentication session output on the switch.&lt;/P&gt;&lt;P&gt;Overview&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Username C0:74:AD:17:59:6B&lt;BR /&gt;Endpoint Id C0:74:AD:17:59:6B&lt;BR /&gt;Endpoint Profile Unknown&lt;BR /&gt;Authentication Policy Wired &amp;gt;&amp;gt; MAB&lt;BR /&gt;Authorization Policy Wired &amp;gt;&amp;gt; Grandstream IP Phone&lt;BR /&gt;Authorization Result PermitAccess,_IPPhones&lt;/P&gt;&lt;P&gt;Authentication Details&lt;BR /&gt;Source Timestamp 2020-10-12 07:45:58.675&lt;BR /&gt;Received Timestamp 2020-10-12 07:45:58.675&lt;BR /&gt;Policy Server -ISE-PAN&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Username C0:74:AD:17:59:6B&lt;BR /&gt;User Type Host&lt;BR /&gt;Endpoint Id C0:74:AD:17:59:6B&lt;BR /&gt;Calling Station Id C0-74-AD-17-59-6B&lt;BR /&gt;Endpoint Profile Unknown&lt;BR /&gt;IPv4 Address 192.168.0.160&lt;BR /&gt;Authentication Identity Store Internal Endpoints&lt;BR /&gt;Identity Group Grandstream_IP_Phones&lt;BR /&gt;Audit Session Id 0AC8D0640000000D1381A70C&lt;BR /&gt;Authentication Method mab&lt;BR /&gt;Authentication Protocol Lookup&lt;BR /&gt;Service Type Call Check&lt;BR /&gt;Network Device Test&lt;BR /&gt;Device Type All Device Types#Wired&lt;BR /&gt;Location All Locations#-HQ&lt;BR /&gt;NAS IPv4 Address 10.200.208.100&lt;BR /&gt;NAS Port Id GigabitEthernet1/0/10&lt;BR /&gt;NAS Port Type Ethernet&lt;BR /&gt;Authorization Profile PermitAccess,_IPPhones&lt;BR /&gt;Response Time 42 milliseconds&lt;/P&gt;&lt;P&gt;Other Attributes&lt;BR /&gt;ConfigVersionId 115&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;Protocol Radius&lt;BR /&gt;NAS-Port 50110&lt;BR /&gt;Framed-MTU 1500&lt;BR /&gt;OriginalUserName c074ad17596b&lt;BR /&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;AcsSessionID -ISE-PAN/391434383/43388&lt;BR /&gt;UseCase Host Lookup&lt;BR /&gt;SelectedAuthenticationIdentityStores -AD&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Users&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Endpoints&lt;BR /&gt;AuthenticationStatus AuthenticationPassed&lt;BR /&gt;IdentityPolicyMatchedRule MAB&lt;BR /&gt;AuthorizationPolicyMatchedRule Grandstream IP Phone&lt;BR /&gt;EndPointMACAddress C0-74-AD-17-59-6B&lt;BR /&gt;ISEPolicySetName Wired&lt;BR /&gt;IdentitySelectionMatchedRule MAB&lt;BR /&gt;IsMachineIdentity false&lt;BR /&gt;DTLSSupport Unknown&lt;BR /&gt;HostIdentityGroup Endpoint Identity Groups:Grandstream_IP_Phones&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;Location Location#All Locations#-HQ&lt;BR /&gt;Device Type Device Type#All Device Types#Wired&lt;BR /&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;BR /&gt;Name Endpoint Identity Groups:Grandstream_IP_Phones&lt;BR /&gt;RADIUS Username C0:74:AD:17:59:6B&lt;BR /&gt;Device IP Address 10.200.208.100&lt;BR /&gt;CPMSessionID 0AC8D0640000000D1381A70C&lt;BR /&gt;Called-Station-ID 3C:41:0E:F2:25:0A&lt;BR /&gt;CiscoAVPair service-type=Call Check,&lt;BR /&gt;audit-session-id=0AC8D0640000000D1381A70C,&lt;BR /&gt;method=mab&lt;/P&gt;&lt;P&gt;Result&lt;BR /&gt;UserName C0:74:AD:17:59:6B&lt;BR /&gt;User-Name C0-74-AD-17-59-6B&lt;BR /&gt;Class CACS:0AC8D0640000000D1381A70C:-ISE-PAN/391434383/43388&lt;BR /&gt;cisco-av-pair profile-name=Unknown&lt;BR /&gt;LicenseTypes Base license consumed&lt;/P&gt;&lt;P&gt;Session Events&lt;BR /&gt;&lt;BR /&gt;Steps&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session&lt;BR /&gt;11027 Detected Host Lookup UseCase (Service-Type = Call Check (10))&lt;BR /&gt;15049 Evaluating Policy Group&lt;BR /&gt;15008 Evaluating Service Selection Policy&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType&lt;BR /&gt;15048 Queried PIP - DEVICE.Device Type&lt;BR /&gt;15041 Evaluating Identity Policy&lt;BR /&gt;15048 Queried PIP - Network Access.EapAuthentication&lt;BR /&gt;22072 Selected identity source sequence - Basic_Internal&lt;BR /&gt;15013 Selected Identity Source - -AD&lt;BR /&gt;24432 Looking up user in Active Directory - -AD&lt;BR /&gt;24325 Resolving identity - C0-74-AD-17-59-6B&lt;BR /&gt;24313 Search for matching accounts at join point - .go.tz&lt;BR /&gt;24318 No matching account found in forest - .go.tz&lt;BR /&gt;24322 Identity resolution detected no matching account&lt;BR /&gt;24352 Identity resolution failed - ERROR_NO_SUCH_USER&lt;BR /&gt;24412 User not found in Active Directory - -AD&lt;BR /&gt;15013 Selected Identity Source - Internal Users&lt;BR /&gt;24210 Looking up User in Internal Users IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24216 The user is not found in the internal users identity store&lt;BR /&gt;15013 Selected Identity Source - Internal Endpoints&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;22037 Authentication Passed&lt;BR /&gt;24715 ISE has not confirmed locally previous successful machine authentication for user in Active Directory&lt;BR /&gt;15036 Evaluating Authorization Policy&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,_IPPhones&lt;BR /&gt;15016 Selected Authorization Profile - PermitAccess,_IPPhones&lt;BR /&gt;24209 Looking up Endpoint in Internal Endpoints IDStore - C0:74:AD:17:59:6B&lt;BR /&gt;24211 Found Endpoint in Internal Endpoints IDStore&lt;BR /&gt;11002 Returned RADIUS Access-Accept&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i Have removed the wired mab policies.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 08:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4164986#M1074613</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-12T08:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165006#M1074614</link>
      <description>&lt;P&gt;What do you see if you issue the command &lt;STRONG&gt;sh auth sess int&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;Gi1/0/10 det&lt;/STRONG&gt; on the switch?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 08:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165006#M1074614</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-12T08:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165022#M1074621</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the outcome,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh auth sess int Gi1/0/10 det&lt;BR /&gt;Interface: GigabitEthernet1/0/10&lt;BR /&gt;MAC Address: c074.ad17.596b&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 192.168.0.160&lt;BR /&gt;User-Name: C0-74-AD-17-59-6B&lt;BR /&gt;Status: Unauthorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-auth&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Session Uptime: 369s&lt;BR /&gt;Common Session ID: 0AC8D0640000001113CF2576&lt;BR /&gt;Acct Session ID: Unknown&lt;BR /&gt;Handle: 0xA8000004&lt;BR /&gt;Current Policy: POLICY_Gi1/0/10&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;dot1x Stopped&lt;BR /&gt;mab Authc Success&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 09:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165022#M1074621</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-12T09:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165065#M1074635</link>
      <description>&lt;P&gt;It seems as though it is not getting the correct ip.&lt;/P&gt;&lt;P&gt;Interface: GigabitEthernet1/0/10&lt;BR /&gt;MAC Address: c074.ad17.596b&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 192.168.0.160&lt;BR /&gt;User-Name: C0-74-AD-17-59-6B&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: VOICE&lt;BR /&gt;Oper host mode: multi-auth&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Session Uptime: 103s&lt;BR /&gt;Common Session ID: 0AC8D0640000001B14184E8C&lt;BR /&gt;Acct Session ID: 0x0000000F&lt;BR /&gt;Handle: 0x3E000008&lt;BR /&gt;Current Policy: POLICY_Gi1/0/10&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;/P&gt;&lt;P&gt;Server Policies:&lt;BR /&gt;Vlan Group: Vlan: 301&lt;BR /&gt;ACS ACL: xACSACLx-IP-PERMIT_ALL_IPV4_TRAFFIC-57f6b0d3&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;dot1x Stopped&lt;BR /&gt;mab Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 10:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165065#M1074635</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-12T10:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165340#M1074645</link>
      <description>&lt;P&gt;Is VLAN 301 the right VLAN? where the DHCP server is located?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 17:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165340#M1074645</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-12T17:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165358#M1074647</link>
      <description>&lt;P&gt;Yes it is the vlan for voice. Do i need to add ip helped for voice on the dhcp config ? Dhcp is configured on the windows server&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 18:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165358#M1074647</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-12T18:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165462#M1074657</link>
      <description>&lt;P&gt;Yes, if the DHCP server is not located within the same VLAN, you need ip helper under the VLAN301 SVI, otherwise, the DHCP traffic would never reach the DHCP server. Just make sure the DHCP server has a scope for VLAN301 as well. It is interesting though to know where the phone got the IP 192.168.0.160 from.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 20:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165462#M1074657</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-12T20:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Grandstream IP Phones to Cisco Ise</title>
      <link>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165785#M1074682</link>
      <description>&lt;P&gt;It seems like it is getting the IP address from here. i have disabled it.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dhcp.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/85775iECB8C37291B83FAD/image-size/large?v=v2&amp;amp;px=999" role="button" title="dhcp.png" alt="dhcp.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 09:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-grandstream-ip-phones-to-cisco-ise/m-p/4165785#M1074682</guid>
      <dc:creator>Tutu</dc:creator>
      <dc:date>2020-10-13T09:43:57Z</dc:date>
    </item>
  </channel>
</rss>

