02-21-2017 03:08 AM - edited 03-11-2019 12:28 AM
Solved! Go to Solution.
09-03-2018 05:52 PM
Hello,
You need to create a condition for authentication with these parameters too. Looking into my android logs I've seen the errors below: So there's no match in my Wireless 802.1x authentication or authorization rule, because for certificate to be installed it's used PAP/ASCII and HTTP authentication. Now everything works fine!
***EST [INFO][est_io_get_response:1221]-->
HTTP status 401 received
***EST [INFO][est_io_get_response:1253]-->
EST server requesting user authentication
***EST [WARNING][est_client_send_enroll_request:1358]-->
HTTP auth failure
***EST [INFO][est_client_enroll_req:1562]-->
HTTP Authorization failed. Requested auth mode = 3
**Insert this Conditions to your Authentication Rules**
Cisco: cisco-av-pair EQUALS est-csr-request=true
Network Access NetworkDeviceName EQUALS ISE_EST_Local_Host
09-26-2018 11:54 PM
Still experiencing same error... the authC and authZ did not work! :(
09-27-2018 08:10 AM - edited 09-27-2018 10:27 AM
Video of issue: https://www.youtube.com/watch?v=z0sRiffVdpg
@howon filed CSCvm62804 to get legacy flow back:
Currently, the dictionary attribute is broken, so here is another related defect: CSCvm62783
Please open SR with TAC
09-27-2018 07:23 PM
Hi Already did the config before since we encountered this issue last year December 2017, now that we are upgraded to 2.4 last August suddenly Android phone wasnt able to generate the certificate using NSP this week only. Im not sure if this is because of the 3rd party certificate but it will expire by December 2018. Is this a bug or anyone resolved this already with 2.4 path 1?
10-02-2018 08:48 PM
Hi,
Any feedback on this? Still experiencing same issue with 2.4 patch 1 for all android phones... Cisco TAC was not able to resolve the issue..
10-02-2018 10:32 PM
There is a workaround suggested in the 2nd defect -
Workaround:
Manually configure condition in-line using 'Cisco:cisco-av-pair EQUALS est-csr-request=true' instead
Can you please give it a try.
Thanks,
Nidhi
10-03-2018 01:07 AM
Hi Nidhi,
As I've said in my previous message, already encountered this before and did your recommendation. This was resolve in ISE 2.2. Now that I'm upgraded to 2.4 patch 1, this issue recur again without any changes in config. The BYOD is running smoothly before for more than a month with version 2.4.
Last week, suddenly "CERTIFICATE GENERATION FAILED" encountered again for Android phone. Already have TAC and recommended same issue. They re enter again the condition and still not working. Been engage with TAC for 6days and no resolution yet :( I ask if there's reported same issue (global) from their file and its first time they encountered this issue for Cisco ISE 2.4
They will try to replicate using my backup config and check if will work in their lab environment...
But I read some statement above that issue is not resolve.
11-12-2018 04:47 AM
Hi Cammy
I face the same problem with Cisco ISE 2.4 Patch 4; it worked with Cisco ISE 2.2 and Android 8, but now this fails after the upgrade to 2.4. I already created a new policy with "Cisco: cisco-av-pair Equals est-csr-request=true", but this didn't help, it does not get hit.
Did you get any news from Cisco TAC?
Best regards
Dominic
11-12-2018 07:40 AM
11-12-2018 11:09 PM
11-13-2018 05:29 AM
11-14-2018 06:43 AM
11-14-2018 12:08 PM
11-14-2018 12:16 PM
11-30-2018 02:39 AM
Hi cammy
have you been working on the TAC case lately and do you have a resolution for the problem with Cisco ISE 2.4 and the BYOD flow?
Thanks and best regards
Dominic
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide