<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks everyone for your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557548#M433121</link>
    <description>&lt;P&gt;Thanks everyone for your suggestions.&lt;/P&gt;&lt;P&gt;It turns out there were a couple of issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) I was using the wrong client to configure the MacBook supplicant. IPhone Configuration Utility did not work. Then another one was tried - I think it was Apple configurator. The one that worked was Mac Server (according to our Mac guy)&lt;/P&gt;&lt;P&gt;2) I was unknowingly hitting a bug on Cisco wireless LAN controller. I had to upgrade from&amp;nbsp;7.6.120.0&amp;nbsp;to&amp;nbsp;7.6.120.1&amp;nbsp;&amp;nbsp;&amp;nbsp; I only found out about this by performing a debug. I had to get the 7.6.120.1 file from the TAC Engineer. It is not available for download otherwise.&amp;nbsp;&lt;BR /&gt;The symptoms was that periodically no one could connect to one of the several SSID's on our WLC. However the other SSID's were fine; people were able to connect. However it cleared itself up - people would be able to connect again to all SSID, and then it start all over. There didn't seem to be a pattern.&lt;/P&gt;&lt;P&gt;Details of the bug are :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="background: white; margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt;"&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt;"&gt;&amp;nbsp;&lt;EM&gt;%APF-1-USER_ADD_FAILED&lt;/EM&gt;: Unable to create username [chars] for&amp;nbsp;&lt;BR /&gt;mobile[hex]:[hex]:[hex]:[hex]:[hex]:[hex]&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white; margin: 0.75pt 0in 4.5pt 0.25in; line-height: normal;"&gt;&lt;B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;&amp;nbsp;Could not create the associated username entry for a mobile due to internal error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white; margin: 0.75pt 0in 4.5pt 0.25in; line-height: normal;"&gt;&lt;B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;&amp;nbsp;Copy the message exactly as it appears on the console or in the system log. Research and attempt to resolve the issue using the tools and utilities provided at&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;&lt;A href="http://www.cisco.com/tac"&gt;&lt;U&gt;&lt;FONT color="#0000ff"&gt;http://www.cisco.com/tac&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;&lt;SPAN style="color: black;"&gt;. With some messages, these tools and utilities will supply clarifying information. Search for resolved software issues using the Bug Toolkit at&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: blue;"&gt;&lt;A href="http://tools.cisco.com/Support/BugToolKit/"&gt;&lt;SPAN style="color: rgb(51, 102, 204);"&gt;&lt;U&gt;http://tools.cisco.com/Support/BugToolKit/&amp;nbsp;&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;. If you still require assistance, open a case with the Technical Assistance Center via the Internet at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://tools.cisco.com/ServiceRequestTool/create/launch.do"&gt;&lt;U&gt;&lt;FONT color="#0000ff"&gt;http://tools.cisco.com/ServiceRequestTool/create/launch.do&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;&lt;SPAN style="color: black;"&gt;, or contact your Cisco technical support representative and provide the representative with the information you have gathered.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is resolved.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Aug 2014 19:46:27 GMT</pubDate>
    <dc:creator>rfreytag</dc:creator>
    <dc:date>2014-08-18T19:46:27Z</dc:date>
    <item>
      <title>Finding out root cause for ISE 802.1x failure ?</title>
      <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557543#M433105</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to get&amp;nbsp; a MacBook up on our internal Wifi.&lt;/P&gt;&lt;P&gt;For that, I create an XML file using IPhone Configuration Utility. Pretty straightforward. You tell it what SSID, PEAP, certs to use, then I import that file into the MacBook.&lt;/P&gt;&lt;P&gt;Bottom line is it never matches my ISE rules, so I get the default Deny.&lt;/P&gt;&lt;P&gt;This is the first attempt to get a Mac on this network. Windows machines are set up and working fine on the internal Wifi.&lt;/P&gt;&lt;P&gt;I confirmed with the AD administrator that this machine name is in their system. As you can see, it authenticates to AD.&lt;/P&gt;&lt;P&gt;So it appears that it 802.1x is failing. How do I find out *exactly* why? I cannot tell if it is a cert issue, or something else.&lt;/P&gt;&lt;P&gt;Any suggestions on finding the root cause?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From ISE, for my Mac's MAC address:&lt;/P&gt;&lt;P&gt;[snip]&lt;/P&gt;&lt;P&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12302 : Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12319 : Successfully negotiated PEAP version 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12800 : Extracted first TLS record; TLS handshake started&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12805 : Extracted TLS ClientHello message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12806 : Prepared TLS ServerHello message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12807 : Prepared TLS Certificate message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12810 : Prepared TLS ServerDone message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12319 : Successfully negotiated PEAP version 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12812 : Extracted TLS ClientKeyExchange message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12804 : Extracted TLS Finished message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12801 : Prepared TLS ChangeCipherSpec message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12802 : Prepared TLS Finished message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12816 : TLS handshake succeeded&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12310 : PEAP full handshake finished successfully&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12313 : PEAP inner method started&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11521 : Prepared EAP-Request/Identity for inner EAP method&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11522 : Extracted EAP-Response/Identity for inner EAP method&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11806 : Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11808 : Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15041 : Evaluating Identity Policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15006 : Matched Default Rule&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15013 : Selected Identity Source - AD-myconame&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;24430 : Authenticating user against Active Directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;24402 : User authentication against Active Directory succeeded&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;22037 : Authentication Passed&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11824 : EAP-MSCHAP authentication attempt passed&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11810 : Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11814 : Inner EAP-MSCHAP authentication succeeded&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11519 : Prepared EAP-Success for inner EAP method&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12314 : PEAP inner method finished successfully&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12305 : Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11006 : Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11001 : Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11018 : RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12304 : Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;24423 : ISE has not been able to confirm previous successful machine authentication for user in Active Directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15036 : Evaluating Authorization Policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;24432 : Looking up user in Active Directory -&amp;nbsp;myfirstname.mylastname&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;24416 : User's Groups retrieval from Active Directory succeeded&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15048 : Queried PIP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15048 : Queried PIP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15048 : Queried PIP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15048 : Queried PIP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15048 : Queried PIP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15004 : Matched rule - Default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15016 : Selected Authorization Profile - DenyAccess&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;15039 : Rejected per authorization profile&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;12306 : PEAP authentication succeeded&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11503 : Prepared EAP-Success&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;11003 : Returned RADIUS Access-Reject&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557543#M433105</guid>
      <dc:creator>rfreytag</dc:creator>
      <dc:date>2020-02-21T13:14:17Z</dc:date>
    </item>
    <item>
      <title>24423  ISE has not been able</title>
      <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557544#M433106</link>
      <description>&lt;P&gt;24423&amp;nbsp; ISE has not been able to confirm previous successful machine authentication for user in Active Directory.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you manually register the device, using the my devices portal, then you can get the user on.&lt;/P&gt;&lt;P&gt;It would look like its trying to authenticate their machine in the directory, which would fail since their device won't be in the directory.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jul 2014 10:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557544#M433106</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2014-07-17T10:47:55Z</dc:date>
    </item>
    <item>
      <title>Can you post a screen shot of</title>
      <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557545#M433110</link>
      <description>&lt;P&gt;Can you post a screen shot of your authorization rules?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2014 16:49:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557545#M433110</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-07-22T16:49:26Z</dc:date>
    </item>
    <item>
      <title>Adding a System profile-</title>
      <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557546#M433114</link>
      <description>&lt;P&gt;&lt;B&gt;Adding a &lt;/B&gt;&lt;B&gt;System profile--recommended method for adding an 802.1X System profile&lt;/B&gt;&lt;/P&gt;&lt;P&gt;If you will be using TLS authentication, before doing anything else you will need to install a user or system certificate/private key pair as appropriate. We recommend that this is done by your System Administrator.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Connect to the network and use the Directory Utility to make sure you're bound to an applicable Server such as Open Directory (OD), or Active Directory (AD) needed for your network homes and authentication.&lt;BR /&gt;This will normally be done over a wired ethernet Network connection.&lt;BR /&gt;For Open Directory you may not have to bind as Mac OS X supports Anonymous binding, and the OD information can be sent via DHCP. This means you can create the connection and log in with an OD account, providing the 802.1X authentication succeeds first and the DHCP server is configured to send the OD server data.&lt;/LI&gt;&lt;LI&gt;Choose Apple &amp;gt; System Preferences &amp;gt; Network.&lt;/LI&gt;&lt;LI&gt;From the Location pop-up menu select Edit Locations.&lt;/LI&gt;&lt;LI&gt;Click Add (+) at the bottom of the Locations, and create a new Location and name it to remind you of what this Location is for, then click Done.&lt;/LI&gt;&lt;LI&gt;Select the appropriate network service to set up, such as Ethernet or AirPort from the network connection services list, and then click Advanced.&lt;/LI&gt;&lt;LI&gt;Click the 802.1X tab.&lt;/LI&gt;&lt;LI&gt;Click Add (+) at the bottom of the profiles list, and choose Add System Profile. (If you wish, rename the Untitled profile to something else.)&lt;/LI&gt;&lt;LI&gt;Enter the User Name and Password&lt;/LI&gt;&lt;LI&gt;Choose a network from the Wireless Network pop-up menu. If you are setting up a 'wireless' 802.1X connection and your wireless network name (SSID) is hidden, you will need to manually type it in exactly. It is case sensitive.&lt;/LI&gt;&lt;LI&gt;Select and configure the appropriate EAP Authentication types for your network. The default is PEAP and TTLS.&lt;/LI&gt;&lt;LI&gt;Click OK to save the profile.&lt;/LI&gt;&lt;LI&gt;Click Apply to save the 802.1X configuration.&lt;/LI&gt;&lt;LI&gt;You may be prompted to trust a certificate from the server if it was issued from a non-trusted CA, in which case you will see a new entry added in Login keychain.&lt;/LI&gt;&lt;LI&gt;You'll be asked for your admin password so you can set the required level of trust on that certificate.&lt;/LI&gt;&lt;LI&gt;If you want to be able rejoin the network after waking from sleep you also have to ensure the network is checked in the Preferred Network list (or the Remember networks option is checked).&lt;BR /&gt;&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 01 Aug 2014 06:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557546#M433114</guid>
      <dc:creator>Saurav Lodh</dc:creator>
      <dc:date>2014-08-01T06:33:57Z</dc:date>
    </item>
    <item>
      <title>check if you are hitting</title>
      <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557547#M433116</link>
      <description>&lt;P&gt;check if you are hitting correct authorization rule, check if "ACCESS_REJECT " attribute is selected.The authorization profile with the ACCESS_REJECT attribute was selected as a result of the matching authorization rule. Check the appropriate authorization policy rule-results&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557547#M433116</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2014-08-01T16:21:55Z</dc:date>
    </item>
    <item>
      <title>Thanks everyone for your</title>
      <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557548#M433121</link>
      <description>&lt;P&gt;Thanks everyone for your suggestions.&lt;/P&gt;&lt;P&gt;It turns out there were a couple of issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) I was using the wrong client to configure the MacBook supplicant. IPhone Configuration Utility did not work. Then another one was tried - I think it was Apple configurator. The one that worked was Mac Server (according to our Mac guy)&lt;/P&gt;&lt;P&gt;2) I was unknowingly hitting a bug on Cisco wireless LAN controller. I had to upgrade from&amp;nbsp;7.6.120.0&amp;nbsp;to&amp;nbsp;7.6.120.1&amp;nbsp;&amp;nbsp;&amp;nbsp; I only found out about this by performing a debug. I had to get the 7.6.120.1 file from the TAC Engineer. It is not available for download otherwise.&amp;nbsp;&lt;BR /&gt;The symptoms was that periodically no one could connect to one of the several SSID's on our WLC. However the other SSID's were fine; people were able to connect. However it cleared itself up - people would be able to connect again to all SSID, and then it start all over. There didn't seem to be a pattern.&lt;/P&gt;&lt;P&gt;Details of the bug are :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="background: white; margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt;"&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt;"&gt;&amp;nbsp;&lt;EM&gt;%APF-1-USER_ADD_FAILED&lt;/EM&gt;: Unable to create username [chars] for&amp;nbsp;&lt;BR /&gt;mobile[hex]:[hex]:[hex]:[hex]:[hex]:[hex]&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white; margin: 0.75pt 0in 4.5pt 0.25in; line-height: normal;"&gt;&lt;B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;&amp;nbsp;Could not create the associated username entry for a mobile due to internal error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white; margin: 0.75pt 0in 4.5pt 0.25in; line-height: normal;"&gt;&lt;B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/B&gt;&lt;SPAN style="color: black; font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;&amp;nbsp;Copy the message exactly as it appears on the console or in the system log. Research and attempt to resolve the issue using the tools and utilities provided at&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;&lt;A href="http://www.cisco.com/tac"&gt;&lt;U&gt;&lt;FONT color="#0000ff"&gt;http://www.cisco.com/tac&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;&lt;SPAN style="color: black;"&gt;. With some messages, these tools and utilities will supply clarifying information. Search for resolved software issues using the Bug Toolkit at&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: blue;"&gt;&lt;A href="http://tools.cisco.com/Support/BugToolKit/"&gt;&lt;SPAN style="color: rgb(51, 102, 204);"&gt;&lt;U&gt;http://tools.cisco.com/Support/BugToolKit/&amp;nbsp;&lt;/U&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;. If you still require assistance, open a case with the Technical Assistance Center via the Internet at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://tools.cisco.com/ServiceRequestTool/create/launch.do"&gt;&lt;U&gt;&lt;FONT color="#0000ff"&gt;http://tools.cisco.com/ServiceRequestTool/create/launch.do&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;&lt;SPAN style="color: black;"&gt;, or contact your Cisco technical support representative and provide the representative with the information you have gathered.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is resolved.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2014 19:46:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557548#M433121</guid>
      <dc:creator>rfreytag</dc:creator>
      <dc:date>2014-08-18T19:46:27Z</dc:date>
    </item>
    <item>
      <title>Thanks for taking the time to</title>
      <link>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557549#M433126</link>
      <description>&lt;P&gt;Thanks for taking the time to come back and share the solution to the problem (+5 from me). Can you also share the bug ID that you were hitting?&lt;/P&gt;&lt;P&gt;Also, you should mark the thread as "Answered" if your issue is resolved &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2014 19:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/finding-out-root-cause-for-ise-802-1x-failure/m-p/2557549#M433126</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-08-18T19:46:28Z</dc:date>
    </item>
  </channel>
</rss>

