<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why ACS Ignore New Network Access Authorization Policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671305#M919191</link>
    <description>&lt;P&gt;I feel quite strange why ACS ignore my newly added authorization policy for vpn access. The ACS has been fully associated with Microsoft AD. I created the policy in the following steps:&lt;/P&gt;&lt;P&gt;1. Create AD group for VPN login on Microsoft AD.&lt;/P&gt;&lt;P&gt;2. Assign users to the new AD group. Users only belong to the new AD group and no relationship with other VPN group.&lt;/P&gt;&lt;P&gt;3. Select the newly added AD group into ACS with 'Active Directory'-&amp;gt; 'Directory Groups'&lt;/P&gt;&lt;P&gt;4. Greate Authorization Profile for the new VPN authorization policy in 'Policy Elements'-&amp;gt;'Authorization and Permission'-&amp;gt;'Network Access'-&amp;gt;'Authorization Profile'.&lt;/P&gt;&lt;P&gt;5. Create network access authorization policy in 'Access Policies'-&amp;gt; 'Access Services'-&amp;gt;'Default Network Access'-&amp;gt;'Authorization'. Clicking new and select 'Contains any' in the new VPN group and select the newly added authorization profile in step 4.&lt;/P&gt;&lt;P&gt;6. Save the changes.&lt;/P&gt;&lt;P&gt;7. Configure Cisco Firewall to listen the VPN connect request and authentication in Radius.&lt;/P&gt;&lt;P&gt;When I test the vpn connection, I found that there is no way when I enter correct username and password, the vpnclient always deny and prompt again and again.&lt;/P&gt;&lt;P&gt;I checked on the ACS log and found that ACS success the AD authentication but fail to find an Authorization Policy so it choose default deny access policy.&lt;/P&gt;&lt;P&gt;I am an newer to Cisco ACS, I don't have much idea on solve it, Could you help me? Thanks.&lt;/P&gt;&lt;TABLE _eventid="369" id="S2"&gt;&lt;TBODY&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;11001 &amp;nbsp;Received RADIUS Access-Request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;11017 &amp;nbsp;RADIUS created a new session&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Service Selection Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15004 &amp;nbsp;Matched rule&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15012 &amp;nbsp;Selected Access Service - VPN ACCESS&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Identity Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15006 &amp;nbsp;Matched Default Rule&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15013 &amp;nbsp;Selected Identity Store - AD1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;24430 &amp;nbsp;Authenticating user against Active Directory&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;24416 &amp;nbsp;User's Groups retrieval from Active Directory succeeded&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;24402 &amp;nbsp;User authentication against Active Directory succeeded&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;22037 &amp;nbsp;Authentication Passed&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Group Mapping Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Exception Authorization Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15042 &amp;nbsp;No rule was matched&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Authorization Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15006 &amp;nbsp;Matched Default Rule&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15016 &amp;nbsp;Selected Authorization Profile - DenyAccess&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15039 &amp;nbsp;Selected Authorization Profile is DenyAccess&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(255,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;11003 &amp;nbsp;Returned RADIUS Access-Reject&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
    <pubDate>Fri, 21 Feb 2020 13:28:32 GMT</pubDate>
    <dc:creator>Prin12345</dc:creator>
    <dc:date>2020-02-21T13:28:32Z</dc:date>
    <item>
      <title>Why ACS Ignore New Network Access Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671305#M919191</link>
      <description>&lt;P&gt;I feel quite strange why ACS ignore my newly added authorization policy for vpn access. The ACS has been fully associated with Microsoft AD. I created the policy in the following steps:&lt;/P&gt;&lt;P&gt;1. Create AD group for VPN login on Microsoft AD.&lt;/P&gt;&lt;P&gt;2. Assign users to the new AD group. Users only belong to the new AD group and no relationship with other VPN group.&lt;/P&gt;&lt;P&gt;3. Select the newly added AD group into ACS with 'Active Directory'-&amp;gt; 'Directory Groups'&lt;/P&gt;&lt;P&gt;4. Greate Authorization Profile for the new VPN authorization policy in 'Policy Elements'-&amp;gt;'Authorization and Permission'-&amp;gt;'Network Access'-&amp;gt;'Authorization Profile'.&lt;/P&gt;&lt;P&gt;5. Create network access authorization policy in 'Access Policies'-&amp;gt; 'Access Services'-&amp;gt;'Default Network Access'-&amp;gt;'Authorization'. Clicking new and select 'Contains any' in the new VPN group and select the newly added authorization profile in step 4.&lt;/P&gt;&lt;P&gt;6. Save the changes.&lt;/P&gt;&lt;P&gt;7. Configure Cisco Firewall to listen the VPN connect request and authentication in Radius.&lt;/P&gt;&lt;P&gt;When I test the vpn connection, I found that there is no way when I enter correct username and password, the vpnclient always deny and prompt again and again.&lt;/P&gt;&lt;P&gt;I checked on the ACS log and found that ACS success the AD authentication but fail to find an Authorization Policy so it choose default deny access policy.&lt;/P&gt;&lt;P&gt;I am an newer to Cisco ACS, I don't have much idea on solve it, Could you help me? Thanks.&lt;/P&gt;&lt;TABLE _eventid="369" id="S2"&gt;&lt;TBODY&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;11001 &amp;nbsp;Received RADIUS Access-Request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;11017 &amp;nbsp;RADIUS created a new session&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Service Selection Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15004 &amp;nbsp;Matched rule&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15012 &amp;nbsp;Selected Access Service - VPN ACCESS&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Identity Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15006 &amp;nbsp;Matched Default Rule&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15013 &amp;nbsp;Selected Identity Store - AD1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;24430 &amp;nbsp;Authenticating user against Active Directory&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;24416 &amp;nbsp;User's Groups retrieval from Active Directory succeeded&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;24402 &amp;nbsp;User authentication against Active Directory succeeded&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;22037 &amp;nbsp;Authentication Passed&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Group Mapping Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Exception Authorization Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15042 &amp;nbsp;No rule was matched&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; BACKGROUND-COLOR: rgb(217,227,233); FONT-STYLE: normal; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; TEXT-DECORATION: underline; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;Evaluating Authorization Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15006 &amp;nbsp;Matched Default Rule&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15016 &amp;nbsp;Selected Authorization Profile - DenyAccess&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(0,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;15039 &amp;nbsp;Selected Authorization Profile is DenyAccess&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="BORDER-BOTTOM: rgb(132,153,162) thin; BORDER-LEFT: rgb(132,153,162) thin solid; PADDING-BOTTOM: 1pt; PADDING-LEFT: 2pt; PADDING-RIGHT: 2pt; COLOR: rgb(255,0,0); BORDER-TOP: rgb(132,153,162) thin; FONT-WEIGHT: normal; BORDER-RIGHT: rgb(132,153,162) thin solid; PADDING-TOP: 1pt" valign="center"&gt;&lt;TD style="PADDING-BOTTOM: 2pt; PADDING-LEFT: 4pt; PADDING-RIGHT: 4pt; PADDING-TOP: 2pt" valign="center"&gt;&lt;DIV style="MARGIN-TOP: 0pt"&gt;11003 &amp;nbsp;Returned RADIUS Access-Reject&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:28:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671305#M919191</guid>
      <dc:creator>Prin12345</dc:creator>
      <dc:date>2020-02-21T13:28:32Z</dc:date>
    </item>
    <item>
      <title>You connections are passing</title>
      <link>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671306#M919192</link>
      <description>&lt;P&gt;You connections are passing "Authentication" but are failing "Authorization". The connections are&amp;nbsp;hitting the "default" authorization rule which which is to Deny Access. Thus, something is wrong with your Access Policy that you crated for the VPN based authentications. Something in the policy is not matching, thus the rule is skipped.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you post screen shots of your Access Policies screen and then screen shot of the actual policy details.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 May 2015 06:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671306#M919192</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-17T06:17:37Z</dc:date>
    </item>
    <item>
      <title>Thanks for your attention</title>
      <link>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671307#M919193</link>
      <description>&lt;P&gt;Thanks for your attention Neno.&lt;/P&gt;&lt;P&gt;The bug has been captured. It was caused by conflict between inner policies. For example, You have created an 'Access Service', for example "Cisco Access Control", and some Network Access Authentication Policy, for example "rule 1". Then some people thought the access service was no longer useful and disable it, but he forget to disable the active Authentication Policy 'rule 1' first. So when my problem happened, one of 'Access Service ' was disable, but the policy 'rule 1' was still enable. There was a conflct between Access Service and Access Policy.&lt;/P&gt;&lt;P&gt;When I restart the ACS, the main process runtime got into 'Not monitor' state, which means ACS start fail. I checked the log and found that RTDaemon start failure because can not read from policy database. After eliminating the conflicted error, and then start runtime. it successed.&lt;/P&gt;&lt;P&gt;I think there should be an imporvement from cisco developers to eliminate such kind of trouble happening. The bug caused our VPN service got down 2 hours.&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2015 01:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671307#M919193</guid>
      <dc:creator>Prin12345</dc:creator>
      <dc:date>2015-05-19T01:40:14Z</dc:date>
    </item>
    <item>
      <title>Thanks for the info! (+5 from</title>
      <link>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671308#M919194</link>
      <description>&lt;P&gt;Thanks for the info! (+5 from me). Did you actually get a bug/defect ID? If so can you please share it here?&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2015 02:01:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671308#M919194</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-19T02:01:27Z</dc:date>
    </item>
    <item>
      <title>Sorry, Neno, I didn't get the</title>
      <link>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671309#M919195</link>
      <description>&lt;P&gt;Sorry, Neno, I didn't get the bug/defect ID as I don't have the privilege to access some Cisco bug info. I wanted to get some log of errors for you but it has been over by the other logs.&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2015 03:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671309#M919195</guid>
      <dc:creator>Prin12345</dc:creator>
      <dc:date>2015-05-19T03:50:05Z</dc:date>
    </item>
    <item>
      <title>No problem! Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671310#M919196</link>
      <description>&lt;P&gt;No problem! Thanks for the info! If your issue is resolved, you should mark the thread as "answered" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 02:44:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-acs-ignore-new-network-access-authorization-policy/m-p/2671310#M919196</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-20T02:44:19Z</dc:date>
    </item>
  </channel>
</rss>

