ISE Operational Issues
ISE Operational Issues
Proprietary notice
Copyright © Orange Business Services 2016. All rights reserved.
Confidentiality
All information contained in this document is strictly confidential and is the property of
Orange Business Services. It is provided for the sole purpose of responding to the request
from LafargeHolcim and shall not be used for any other purpose.
LafargeHolcim shall not publish or disclose this information, in whole or in part, to any other
party without the prior written permission of Orange Business Services.
This document is subject to contract and does not constitute a binding offer from Orange
Business Services. In the event that any assumption on which Orange Business Services
has based its proposal or any information provided by LafargeHolcim changes or is
incorrect, Orange Business Services reserves the right to revise any portion of this
document accordingly.
Implementation of any services detailed in this document is subject to applicable
regulations in force on the date the services are to be implemented.
Orange, the Orange logo, Orange Business Services, and related marks are trademarks of
Orange Brand Services Limited. Many of the products, services, and company names
referred to in this document are registered trademarks of third parties. They are all hereby
acknowledged.
Orange Business Services is a trading name of the Orange Group.
Point of contact
1 Introduction 5
1.1 Overview 5
1.2 Intended audience 5
1.3 Scope 5
2 Troubleshooting 6
2.1 Impact Information template 6
2.2 High-Level Troubleshooting Flow 6
2.3 T-shoot Wired Network Access 7
2.3.1 Preliminary checks 7
2.3.2 How to check logs on ISE 7
2.3.3 Common issue 1 8
2.3.4 Common issue 2 8
2.3.5 Common issue 3 9
2.4 T-shoot Wireless Network Access 9
2.4.1 Web Auth Redirect process flow 9
2.4.2 Common issue 1 10
2.4.3 Common issue 2 11
.
History of document changes
Date Version Author Added/changed
10.08.2020 1.0 Ashish Agarwal Creation of document
1 Introduction
1.1 Overview
An ISE deployment relies on multiple components. When authentication fails in the AAA
environment, it may be challenging to find out root cause of the issue because you may
need to look at different components.
With recent enhancements, Cisco has put effort into providing a single point of view for
troubleshooting by correlating switch syslog events to internal ISE events, as well as by
providing interfaces on the ISE to poll for different authentication related information on
demand. Other enhancements on the ISE include a configuration validator, a TCP dump
utility.
1.3 Scope
This document describes the common issues and troubleshooting steps to counter
those issues. ISE controls network access to the LAN network. Four use cases are
supported, each with a different Network Access Control implementation.
Corporate Access
Wired Access
Corporate Access
BYOD Access
2 Troubleshooting
2.1 Impact Information template
To begin with troubleshooting we need to request following information from client.
Particular Information Remark
Site impacted Mandatory
User device impacted Wired/Wireless Mandatory
No. of user impacted Single/Multiple Mandatory
SSID Mandatory
Switch Detail Optional
Device MAC address Mandatory
Check ISE
Authentication
operation > live
logs by filtering
MAC in endpoint
ID
Validate applied
Check Pass Check DACL and make
status Authorization sure assigned IP
Policy is correct
Fail
Click on detail
image
Under
Authentication
Details > Failure
Reason will help to
identify the issue
2.3 T-shoot Wired Network Access
To start with the troubleshooting on Wired NAC (Network Access Control) we have to
observe logs on both authenticator (Switch) and authentication server (Cisco ISE).
2.3.1 Preliminary checks
Step1 Identify the switch port where client is connected.
Step2 Run command ”Show authentication session interface Gi x/x/x Detail”
Step3
Verify IP address
Step4 In case of the corporate user machine, If dot1x is coming up with Stopped then
bounce the port and check.
Even if it is giving same staus then suggest client to update windows
Group Policy.
2.3.2 How to check logs on ISE
Step5 Login to ISE GUI.
Step6 Go to Operations > Live Logs.
Step7 Now you have multiple option to filter the logs based on Endpoint ID (MAC
Address), IP address, Network Device and so on.
Step8 Filter the device for which you want to see logs.
Step9 Once filter the device, to get more elaborated information you need to select
icon .
2.3.3 Common issue 1
Problem description:
Client machine is unable to initiate dot1x though it is expected to have corporate
access.
Action:
Step1 First verify we have dot1x needed configuration on the switch.
Step2 Advice user to update group policy through command prompt.
Step3 If update get unsuccessful contact windows team to enable dot1x setting on
user machine.
Action:
Step1 Possible cause of this issue is shared RADIUS key does not match between ISE
and NAD.
Step2 Verify whether the Network Device or AAA client is configured in:
Step3 GO to Administration > Network Resources > Network Devices.
Step4 Verify Shared Secret under Radius authentication setting is correctly configured.
Step5 Match this key with key configured on the switch side.