<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Configuration 802.1x in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770449#M1097563</link>
    <description>&lt;P&gt;Modular_1#show auth session&lt;/P&gt;&lt;P&gt;Interface MAC Address Method Domain Status Fg Session ID&lt;BR /&gt;Gi2/0/36 7478.27a3.ea82 dot1x DATA Auth AC14FF2800001B8F0BB7B102&lt;BR /&gt;Gi2/0/29 7478.27df.a1d1 dot1x DATA Auth AC14FF2800001BB911455D6E&lt;BR /&gt;Gi2/0/15 7478.27ab.64ff dot1x DATA Auth AC14FF2800001BB71141C605&lt;BR /&gt;Gi2/0/30 7478.27df.a3b2 dot1x DATA Auth AC14FF2800001BAE1108BDC4&lt;BR /&gt;Gi2/0/28 6c2b.59dc.129d dot1x DATA Auth AC14FF2800001BBC11B7D1D6&lt;BR /&gt;Gi1/0/35 7478.27df.a2cd dot1x DATA Auth AC14FF2800001B8D0BAA7E96&lt;BR /&gt;Gi2/0/24 a44c.c892.60f3 dot1x DATA Auth AC14FF2800001BAB1100DF50&lt;BR /&gt;Gi2/0/34 cc48.3ac5.f8ab dot1x DATA Auth AC14FF2800001BBD11E51ABF&lt;BR /&gt;Gi1/0/25 7478.27ab.65ef dot1x DATA Auth AC14FF2800001BB5112F2A4F&lt;/P&gt;&lt;P&gt;Session count = 9&lt;/P&gt;&lt;P&gt;Key to Session Events Blocked Status Flags:&lt;/P&gt;&lt;P&gt;A - Applying Policy (multi-line status for details)&lt;BR /&gt;D - Awaiting Deletion&lt;BR /&gt;F - Final Removal in progress&lt;BR /&gt;I - Awaiting IIF ID allocation&lt;BR /&gt;N - Waiting for AAA to come up&lt;BR /&gt;P - Pushed Session&lt;BR /&gt;R - Removing User Profile (multi-line status for details)&lt;BR /&gt;U - Applying User Profile (multi-line status for details)&lt;BR /&gt;X - Unknown Blocker&lt;BR /&gt;Modular_1#&lt;/P&gt;</description>
    <pubDate>Tue, 07 Feb 2023 13:45:56 GMT</pubDate>
    <dc:creator>johnmcgrath29</dc:creator>
    <dc:date>2023-02-07T13:45:56Z</dc:date>
    <item>
      <title>ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770359#M1097554</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have configured the interfaces on a switch with a failed authorize for it to go into a blackhole vlan 999&lt;/P&gt;&lt;P&gt;see config below however it's still connecting to our domain even though the machine only has a local account setup I am wondering if there is something I have missed on the ISE configuration? There is an AD Policy on the ISE&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/33&lt;BR /&gt;description test port&lt;BR /&gt;switchport access vlan 200&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication event fail action authorize vlan 999&lt;BR /&gt;authentication event server dead action authorize vlan 999&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;mls qos trust dscp&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 11:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770359#M1097554</guid>
      <dc:creator>johnmcgrath29</dc:creator>
      <dc:date>2023-02-07T11:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770364#M1097556</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/861509"&gt;@johnmcgrath29&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Do you see anything in the live logs for that session?&lt;/P&gt;
&lt;P&gt;Does it affect all devices connected to that switch?&lt;/P&gt;
&lt;P&gt;If you run the command "show authentication session interface gi1/0/33" (you may need to append "details" to the end of that command, depending on IOS version). Does the output confirm Autorised By "Critical Auth" &lt;SPAN&gt;and Critical Authorization is in effect&lt;/SPAN&gt;? If so then the switch is unable to authenticate to the RADIUS server, check switch is defined as a NAD on ISE, check the shared secrets on the switch and ISE are identical, also ensure there is communication between the switch and ISE.&lt;/P&gt;
&lt;P&gt;If that isn't the case or doesn't resolve the issue, can you provide the output of "show authentication session interface gi1/0/33" and "show aaa servers" please.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 12:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770364#M1097556</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-07T12:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770412#M1097558</link>
      <description>&lt;P&gt;1078030: Feb 7 12:18:21.136: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0/43, changed state to up&lt;BR /&gt;1078031: Feb 7 12:18:22.798: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/33, changed state to up&lt;BR /&gt;1078032: Feb 7 12:18:23.800: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/33, changed state to up&lt;/P&gt;&lt;P&gt;However I do get logs like those below where it looks like it's doing what it's meant too so I am a bit confused&lt;/P&gt;&lt;P&gt;077825: Feb 7 11:41:19.734: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;1077826: Feb 7 11:41:19.734: dot1x-packet: length: 0x002E&lt;BR /&gt;1077827: Feb 7 11:41:19.734: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] Posting EAPOL_EAP for 0x5F000D7A&lt;BR /&gt;1077828: Feb 7 11:41:19.734: dot1x_auth_bend Gi2/0/34: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;1077829: Feb 7 11:41:19.739: @@@ dot1x_auth_bend Gi2/0/34: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;1077830: Feb 7 11:41:19.739: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:entering response state&lt;BR /&gt;1077831: Feb 7 11:41:19.739: dot1x-ev:[cc48.3ac5.f8ab, Gi2/0/34] Response sent to the server from 0x5F000D7A&lt;BR /&gt;1077832: Feb 7 11:41:19.739: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:request response action&lt;BR /&gt;1077833: Feb 7 11:41:19.755: dot1x-packet:[cc48.3ac5.f8ab, Gi2/0/34] Received an EAP Success&lt;BR /&gt;1077834: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] Posting EAP_SUCCESS for 0x5F000D7A&lt;BR /&gt;1077835: Feb 7 11:41:19.755: dot1x_auth_bend Gi2/0/34: during state auth_bend_response, got event 11(eapSuccess)&lt;BR /&gt;1077836: Feb 7 11:41:19.755: @@@ dot1x_auth_bend Gi2/0/34: auth_bend_response -&amp;gt; auth_bend_success&lt;BR /&gt;1077837: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:exiting response state&lt;BR /&gt;1077838: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:entering success state&lt;BR /&gt;1077839: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:response success action&lt;BR /&gt;1077840: Feb 7 11:41:19.755: dot1x_auth_bend Gi2/0/34: idle during state auth_bend_success&lt;BR /&gt;1077841: Feb 7 11:41:19.755: @@@ dot1x_auth_bend Gi2/0/34: auth_bend_success -&amp;gt; auth_bend_idle&lt;BR /&gt;1077842: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:entering idle state&lt;BR /&gt;1077843: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] Posting AUTH_SUCCESS on Client 0x5F000D7A&lt;BR /&gt;1077844: Feb 7 11:41:19.755: dot1x_auth Gi2/0/34: during state auth_authenticating, got event 12(authSuccess_portValid)&lt;BR /&gt;1077845: Feb 7 11:41:19.755: @@@ dot1x_auth Gi2/0/34: auth_authenticating -&amp;gt; auth_authc_result&lt;BR /&gt;1077846: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:exiting authenticating state&lt;BR /&gt;1077847: Feb 7 11:41:19.755: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:entering authc result state&lt;BR /&gt;1077848: Feb 7 11:41:19.760: dot1x-packet:[cc48.3ac5.f8ab, Gi2/0/34] EAP Key data detected adding to attribute list&lt;BR /&gt;1077849: Feb 7 11:41:20.714: dot1x-ev:[cc48.3ac5.f8ab, Gi2/0/34] Received Authz Success for the client 0x5F000D7A (cc48.3ac5.f8ab)&lt;BR /&gt;1077850: Feb 7 11:41:20.714: dot1x-redundancy:[cc48.3ac5.f8ab, Gi2/0/34] State for client successfully retrieved&lt;BR /&gt;1077851: Feb 7 11:41:20.720: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] Posting AUTHZ_SUCCESS on Client 0x5F000D7A&lt;BR /&gt;1077852: Feb 7 11:41:20.720: dot1x_auth Gi2/0/34: during state auth_authc_result, got event 23(authzSuccess)&lt;BR /&gt;1077853: Feb 7 11:41:20.720: @@@ dot1x_auth Gi2/0/34: auth_authc_result -&amp;gt; auth_authenticated&lt;BR /&gt;1077854: Feb 7 11:41:20.720: dot1x-sm:[cc48.3ac5.f8ab, Gi2/0/34] 0x5F000D7A:entering authenticated state&lt;BR /&gt;1077855: Feb 7 11:41:20.720: dot1x-ev:[cc48.3ac5.f8ab, Gi2/0/34] Sending EAPOL packet&lt;BR /&gt;1077856: Feb 7 11:41:20.720: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;1077857: Feb 7 11:41:20.720: dot1x-ev:[cc48.3ac5.f8ab, Gi2/0/34] Sending out EAPOL packet&lt;BR /&gt;1077858: Feb 7 11:41:20.720: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;1077859: Feb 7 11:41:20.720: dot1x-packet: length: 0x0004&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 12:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770412#M1097558</guid>
      <dc:creator>johnmcgrath29</dc:creator>
      <dc:date>2023-02-07T12:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770419#M1097559</link>
      <description>&lt;P&gt;Modular_1#show authentication session interface gi1/0/33&lt;BR /&gt;No sessions match supplied criteria.&lt;/P&gt;&lt;P&gt;Runnable methods list:&lt;BR /&gt;Handle Priority Name&lt;BR /&gt;10 5 dot1x&lt;BR /&gt;17 10 mab&lt;BR /&gt;15 15 webauth&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 12:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770419#M1097559</guid>
      <dc:creator>johnmcgrath29</dc:creator>
      <dc:date>2023-02-07T12:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770420#M1097560</link>
      <description>&lt;P&gt;Modular_1#show aaa servers&lt;/P&gt;&lt;P&gt;RADIUS: id 1, priority 1, host 149.155.251.60, auth-port 1645, acct-port 1646&lt;BR /&gt;State: current UP, duration 4294967s, previous duration 0s&lt;BR /&gt;Dead: total time 0s, count 4&lt;BR /&gt;Quarantined: No&lt;BR /&gt;Authen: request 39271, timeouts 2, failover 0, retransmission 2&lt;BR /&gt;Response: accept 2560, reject 0, challenge 36709&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 10ms&lt;BR /&gt;Transaction: success 39269, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Author: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Account: request 8490, timeouts 13, failover 0, retransmission 10&lt;BR /&gt;Request: start 2426, interim 0, stop 2417&lt;BR /&gt;Response: start 2426, interim 0, stop 2415&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 32ms&lt;BR /&gt;Transaction: success 8477, failure 3&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Elapsed time since counters last cleared: 43w19h9m&lt;BR /&gt;Estimated Outstanding Access Transactions: 0&lt;BR /&gt;Estimated Outstanding Accounting Transactions: 0&lt;BR /&gt;Estimated Throttled Access Transactions: 0&lt;BR /&gt;Estimated Throttled Accounting Transactions: 0&lt;BR /&gt;Maximum Throttled Transactions: access 0, accounting 0&lt;BR /&gt;Requests per minute past 24 hours:&lt;BR /&gt;high - 6 hours, 22 minutes ago: 20&lt;BR /&gt;low - 3 hours, 1 minutes ago: 0&lt;BR /&gt;average: 0&lt;/P&gt;&lt;P&gt;RADIUS: id 2, priority 2, host 149.155.251.61, auth-port 1645, acct-port 1646&lt;BR /&gt;State: current UP, duration 4294967s, previous duration 0s&lt;BR /&gt;Dead: total time 0s, count 4&lt;BR /&gt;Quarantined: No&lt;BR /&gt;Authen: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Author: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Account: request 12, timeouts 12, failover 3, retransmission 9&lt;BR /&gt;Request: start 0, interim 0, stop 2&lt;BR /&gt;Response: start 0, interim 0, stop 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 3&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Elapsed time since counters last cleared: 43w19h9m&lt;BR /&gt;Estimated Outstanding Access Transactions: 0&lt;BR /&gt;Estimated Outstanding Accounting Transactions: 0&lt;BR /&gt;Estimated Throttled Access Transactions: 0&lt;BR /&gt;Estimated Throttled Accounting Transactions: 0&lt;BR /&gt;Maximum Throttled Transactions: access 0, accounting 0&lt;BR /&gt;Requests per minute past 24 hours:&lt;BR /&gt;high - 3 hours, 1 minutes ago: 0&lt;BR /&gt;low - 3 hours, 1 minutes ago: 0&lt;BR /&gt;average: 0&lt;BR /&gt;&lt;BR /&gt;RADIUS: id 3, priority 3, host UNKNOWN, auth-port 1645, acct-port 1646&lt;BR /&gt;State: current UP, duration 4294967s, previous duration 0s&lt;BR /&gt;Dead: total time 0s, count 0&lt;BR /&gt;Quarantined: No&lt;BR /&gt;Authen: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Author: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Response: accept 0, reject 0, challenge 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Account: request 0, timeouts 0, failover 0, retransmission 0&lt;BR /&gt;Request: start 0, interim 0, stop 0&lt;BR /&gt;Response: start 0, interim 0, stop 0&lt;BR /&gt;Response: unexpected 0, server error 0, incorrect 0, time 0ms&lt;BR /&gt;Transaction: success 0, failure 0&lt;BR /&gt;Throttled: transaction 0, timeout 0, failure 0&lt;BR /&gt;Elapsed time since counters last cleared: 43w19h9m&lt;BR /&gt;Estimated Outstanding Access Transactions: 0&lt;BR /&gt;Estimated Outstanding Accounting Transactions: 0&lt;BR /&gt;Estimated Throttled Access Transactions: 0&lt;BR /&gt;Estimated Throttled Accounting Transactions: 0&lt;BR /&gt;Maximum Throttled Transactions: access 0, accounting 0&lt;BR /&gt;Requests per minute past 24 hours:&lt;BR /&gt;high - 3 hours, 1 minutes ago: 0&lt;BR /&gt;low - 3 hours, 1 minutes ago: 0&lt;BR /&gt;average: 0&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 12:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770420#M1097560</guid>
      <dc:creator>johnmcgrath29</dc:creator>
      <dc:date>2023-02-07T12:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770426#M1097561</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/861509"&gt;@johnmcgrath29&lt;/a&gt; so do some devices on the same switch authenticate succesfully? Provide the output of "show auth session" from the switch.&lt;/P&gt;
&lt;P&gt;Configure "authentication port-control auto" under the interface, this initiates authentication when the link state changes to the up state.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 13:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770426#M1097561</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-07T13:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770449#M1097563</link>
      <description>&lt;P&gt;Modular_1#show auth session&lt;/P&gt;&lt;P&gt;Interface MAC Address Method Domain Status Fg Session ID&lt;BR /&gt;Gi2/0/36 7478.27a3.ea82 dot1x DATA Auth AC14FF2800001B8F0BB7B102&lt;BR /&gt;Gi2/0/29 7478.27df.a1d1 dot1x DATA Auth AC14FF2800001BB911455D6E&lt;BR /&gt;Gi2/0/15 7478.27ab.64ff dot1x DATA Auth AC14FF2800001BB71141C605&lt;BR /&gt;Gi2/0/30 7478.27df.a3b2 dot1x DATA Auth AC14FF2800001BAE1108BDC4&lt;BR /&gt;Gi2/0/28 6c2b.59dc.129d dot1x DATA Auth AC14FF2800001BBC11B7D1D6&lt;BR /&gt;Gi1/0/35 7478.27df.a2cd dot1x DATA Auth AC14FF2800001B8D0BAA7E96&lt;BR /&gt;Gi2/0/24 a44c.c892.60f3 dot1x DATA Auth AC14FF2800001BAB1100DF50&lt;BR /&gt;Gi2/0/34 cc48.3ac5.f8ab dot1x DATA Auth AC14FF2800001BBD11E51ABF&lt;BR /&gt;Gi1/0/25 7478.27ab.65ef dot1x DATA Auth AC14FF2800001BB5112F2A4F&lt;/P&gt;&lt;P&gt;Session count = 9&lt;/P&gt;&lt;P&gt;Key to Session Events Blocked Status Flags:&lt;/P&gt;&lt;P&gt;A - Applying Policy (multi-line status for details)&lt;BR /&gt;D - Awaiting Deletion&lt;BR /&gt;F - Final Removal in progress&lt;BR /&gt;I - Awaiting IIF ID allocation&lt;BR /&gt;N - Waiting for AAA to come up&lt;BR /&gt;P - Pushed Session&lt;BR /&gt;R - Removing User Profile (multi-line status for details)&lt;BR /&gt;U - Applying User Profile (multi-line status for details)&lt;BR /&gt;X - Unknown Blocker&lt;BR /&gt;Modular_1#&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 13:45:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770449#M1097563</guid>
      <dc:creator>johnmcgrath29</dc:creator>
      <dc:date>2023-02-07T13:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770456#M1097564</link>
      <description>&lt;P&gt;I have just configured my test port with&lt;/P&gt;&lt;P&gt;Modular_1#conf t&lt;BR /&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;BR /&gt;Modular_1(config)#int gi1/0/33&lt;BR /&gt;Modular_1(config-if)#authentication port-control auto&lt;BR /&gt;Modular_1(config-if)#end&lt;BR /&gt;Modular_1#wri mem&lt;BR /&gt;Building configuration...&lt;BR /&gt;[OK]&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 13:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770456#M1097564</guid>
      <dc:creator>johnmcgrath29</dc:creator>
      <dc:date>2023-02-07T13:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770461#M1097565</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/861509"&gt;@johnmcgrath29&lt;/a&gt; well obviously other sessions are authenticated ok, so not a communication issue with ISE.&lt;/P&gt;
&lt;P&gt;You've not responded to all my questions, do you see any events in the ISE Live logs for the endpoint on Gi1/0/33?&lt;/P&gt;
&lt;P&gt;Does authentication fail?&lt;/P&gt;
&lt;P&gt;Do you not want authentication to failover to try MAB rather than place the user in VLAN 999? &lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 13:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770461#M1097565</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-07T13:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Configuration 802.1x</title>
      <link>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770471#M1097566</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;Just applied that "authentication port-control auto" and it has resolved the issue the test machine has now been kicked off Thanks mate&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 14:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-configuration-802-1x/m-p/4770471#M1097566</guid>
      <dc:creator>johnmcgrath29</dc:creator>
      <dc:date>2023-02-07T14:11:59Z</dc:date>
    </item>
  </channel>
</rss>

