Home
Monitoring and Troubleshooting
Contents
1. E Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Download Debug Logs i Download Debug Logs Step 1 Step 2 Step 3 Step 4 Before You Begin To perform the following task you must be a Super Admin or System Admin Procedure Choose Operations gt Troubleshoot gt Download Logs gt gt Appliance node list Click the node from which you want to download the debug logs Click the Debug Logs tab A list of debug log types and debug logs is displayed This list is based on your debug log configuration Click the log file that you want to download and save it to the system that is running your client browser You can repeat this process to download other log files as needed The following are additional debug logs that you can download from the Debug Logs page isebootstrap log Provides bootstrapping log messages e monit log Provides watchdog messages e pki log Provides the third party crypto library logs e iseLocalStore log Provides logs about the local store files e ad_agent log Provides Microsoft Active Directory third party library logs catalina log Provides third party logs Related Topics Debug Logs Monitoring Database The rate and amount of data that is utilized by Monitoring functions requires a separate database on a dedicated node that is used for these purposes Like Policy Service Monitoring has a dedicated database that requir
2. Replication Stopped ISE node could not replicate Login to the Cisco ISE GUI to perform configuration data from the PAN a manual syncup from the deployment page or de register and register back the affected ISE node with required field Endpoint certificates Endpoint certificates were marked Please re enroll the endpoint device to expired expired by daily scheduled job get a new endpoint certificate Endpoint certificates purged Expired endpoint certificates were purged by daily scheduled job No action needed this was an administrator initiated cleanup operation E Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Cisco ISE Alarms i Alarm Name Alarm Description Alarm Resolution Endpoints Purge Purge activities on endpoints for the past Review the purge activities under Activities 24 hours This alarm is triggered at Operations gt Reports gt Endpoints mid night and Users gt Endpoint Purge Activities Slow Replication Error Slow or a stuck replication is detected Please verify that the node is reachable and part of the deployment Slow Replication Info Slow or a stuck replication is detected Please verify that the node is reachable and part of the deployment Slow Replication Warning Slow or a stuck replication is detected Please verify that the node is reachable and part of the deployment ISE Serv
3. Choose a Format from the drop down list Human Readable is the default Click Download navigate to the desired location and then click Save To get rid of the previous dump file without saving it first clickDelete Compare Unexpected SGACL for an Endpoint or User Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt Trustsec Tools gt Egress SGACL Policy Enter the Network Device IP address of the Trustsec device whose SGACL policy you want to compare Click Run Click User Input Required and modify the fields as necessary Click Submit Click Show Results Summary to view the diagnosis and suggested resolution steps Related Topics Progress Details Settings Results Summary Egress Policy Diagnostic Flow The egress policy diagnostic tool uses the process described in the following table for its comparison Process Stage Description 1 Connects to the device with the IP address that you provided and obtains the access control lists ACLs for each source and destination SGT pair 2 Checks the egress policy that is configured in Cisco ISE and obtains the ACLs for each source and destination SGT pair 3 Compares the SGACL policy that is obtained from the network device with the SGACL policy that is obtained from Cisco ISE 4 Displays the source and destination SGT pair if there is a mismatch Also displays the matching entries as
4. ise cisco com 8443 feedserver feed serverinfo sun security validator ValidatorException PKIX path building failed Sun security provider certpath SunCertPathBuilderException Unable to find valid certification path to requested target Here are some possible error messages and actions to take e Unable to find valid certification path to requested target The certificate that the Feed server used is not valid Verify that you have enabled the Verisign certificates e No route to host Verify that you have a working connection to an outside network from the ISE server e UnknownHostException at the beginning of the error message Verify that you have a working connection to an outside network from the ISE server Posture Compliance The Posture Compliance dashlet provides information on the users who are accessing the network and whether they meet posture compliance Data is shown on the devices that are currently connected to the network The stack bars show noncompliance statistics that are arranged according to operating system and other criteria Sparklines represent the percentage of compliant versus noncompliant posture attempts Check Posture Compliance Step 1 Step 2 Step 3 Step 4 Procedure Go to the Cisco ISE Dashboard In the Posture Compliance dashlet hover your cursor over a stack bar or sparkline A tooltip provides detailed information Expand the data categories for more information Expand the Posture Comp
5. Admin portal You can use the support bundle to prepare diagnostic information for the Cisco Technical Assistance Center TAC to troubleshoot problems with Cisco ISE X Note The support bundles and debug logs provide advanced troubleshooting information for TAC and are difficult to interpret You can use the various reports and troubleshooting tools that Cisco ISE provides to diagnose and troubleshoot issues that you are facing in your network Cisco ISE Support Bundle You can configure the logs that you want to be part of your support bundle For example you can configure logs from a particular service to be part of your debug logs You can also filter the logs based on dates Cisco Identity Services Engine Administrator Guide Release 1 3 EEH l Monitoring and Troubleshooting Support Bundle i The logs that you can download are categorized as follows Full configuration database The Cisco ISE configuration database is downloaded in a human readable XML format When you are trying to troubleshoot issues you can import this database configuration in another Cisco ISE node to recreate the scenario Debug logs Captures bootstrap application configuration run time deployment public key infrastructure PKI information and monitoring and reporting Debug logs provide troubleshooting information for specific Cisco ISE components To enable debug logs see Chapter 11 Logging If you do not enable the debug
6. Engine Administrator Guide Release 1 3 EEN l Monitoring and Troubleshooting Execute 10S Show Commands to Check Configuration i Execute IOS Show Commands to Check Configuration Step 1 Step 2 Step 3 Step 4 Step 5 Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt General Tools gt Execute Network Device Command Enter the information in the appropriate fields Click Run to execute the command on the specified network device Click User Input Required and modify the fields as necessary Click Submit to run the command on the network device and view the output Related Topics Execute Network Device Command Settings Progress Details Settings Results Summary Evaluate Configuration Validator Tool You can use this diagnostic tool to evaluate the configuration of a network device and identify any configuration problems The Expert Troubleshooter compares the configuration of the device with the standard configuration Troubleshoot Network Device Configuration Issues Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt General Tools gt Evaluate Configuration Validator Enter the Network Device IP address of the device whose configuration you want to evaluate and specify other fields as necessary Select the configuration options to compare against the recommended template Click Run Click User Input Req
7. Host Name as the source for the TCP Dump utility Inline Posture nodes are not supported Choose a Network Interface to monitor from the drop down list Set Promiscuous Mode by clicking the radio button to On or Off The default is On Promiscuous mode is the default packet sniffing mode in which the network interface passes all traffic to the system s CPU We recommend that you leave it set to On In the Filter text box enter a boolean expression on which to filter Standard tcpdump filter expressions are supported such as the following host 10 0 2 1 and port 1812 Click Start to begin monitoring the network Click Stop when you have collected a sufficient amount of data or wait for the process to conclude automatically after accumulating the maximum number of packets which is 500 000 Related Topics TCP Dump Settings Save a TCP Dump File X Before You Begin You should have successfully completed the task as described in the Using TCP Dump to Monitor network Traffic section Note You can also access TCPdump through the Cisco ISE CLI For more information refer to the Cisco Identity Services Engine CLI Reference Guide Cisco Identity Services Engine Administrator Guide Release 1 3 E Monitoring and Troubleshooting Compare Unexpected SGACL for an Endpoint or User Step 1 Step 2 Step 3 Step 4 Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt General Tools gt TCP Dump
8. backup operation failed Check the network connectivity between Cisco ISE and the repository Ensure that The credentials used for the repository is correct There is sufficient disk space in the repository The repository user has write privileges CA Server is down CA server is down Check to make sure that the CA services are up and running on the CA server CA Server is Up CA server is up A notification to inform the administrator that the CA server is up Certificate Expiration This certificate will expire soon When it expires Cisco ISE may fail to establish secure communication with clients Replace the certificate For a trust certificate contact the issuing Certificate Authority CA For a CA signed local certificate generate a CSR and have the CA create a new certificate For a self signed local certificate use Cisco ISE to extend the expiration date You can delete the certificate if it is no longer used Certificate Revoked Administrator has revoked the certificate issued to an Endpoint by the Internal CA Go through the BYOD flow from the beginning to be provisioned with a new certificate Cisco Identity Services Engine Administrator Guide Release 1 3 a Monitoring and Troubleshooting Cisco ISE Alarms Alarm Name Alarm Description Alarm Resolution Certificate Provisioning Initialization Error Certificate provisioning in
9. logs all the informational messages INFO will be included in the support bundle Local logs Contains syslog messages from the various processes that run on Cisco ISE e Core files Contains critical information that would help identify the cause of a crash These logs are created when the application crashes and includes heap dumps e Monitoring and reporting logs Contains information about alerts and reports e System logs Contains Cisco Application Deployment Engine ADE related information e Policy configuration Contains policies configured in Cisco ISE in human readable format You can download these logs from the Cisco ISE CLI by using the backup logs command For more information refer to the Cisco Identity Services Engine CLI Reference Guide L Note For Inline Posture nodes you cannot download the support bundle from the Admin portal You must use the backup logs command from the Cisco ISE CLI to download logs for Inline Posture nodes If you choose to download these logs from the Admin portal you can do the following Download only a subset of logs based on the log type such as debug logs or system logs Download only the latest n number of files for the selected log type This option allows you to control the size of the support bundle and the time taken for download Monitoring logs provide information about the monitoring reporting and troubleshooting features Related Topics Debug Lo
10. C manager central web authentication NPF authentication and authorization generates a flow of events The events from the different sources are then collected by Cisco ISE monitoring and troubleshooting tools and summarized You can view the authentication and authorization results on the dashboard or choose to run any number of reports Related Topics Reports Cisco Identity Services Engine Administrator Guide Release 1 3 2 l Monitoring and Troubleshooting NPF Event Flow Process NPF Event Flow Process The NPF authentication and authorization event flow uses the process described in the following table Process Stage Description 1 NAD performs an authorization or flex authorization 2 An unknown agentless identity is profiled with web authorization 3 RADIUS server authenticates and authorizes the identity 4 Authorization is provisioned for the identity at the port 5 Unauthorized endpoint traffic is dropped User Roles and Permissions for Monitoring and Troubleshooting Capabilities Monitoring and troubleshooting capabilities are associated with default user roles The tasks you are allowed to perform are directly related to your assigned user role Related Topics Cisco ISE Administrator Groups Data Stored in Monitoring Database The Cisco ISE monitoring service collects and stores data in a specialized monitoring database The rate and amount of data utilized to monitor n
11. Monitoring and Troubleshooting e Monitoring and Troubleshooting Service in Cisco ISE page 1 e Device Configuration for Monitoring page 3 e Network Process Status page 4 e Network Authentications page 4 Profiler Activity and Profiled Endpoints page 5 Troubleshooting the Profiler Feed page 5 e Posture Compliance page 6 Cisco ISE Alarms page 6 e Log Collection page 17 e Live Authentications page 17 e Global Search for Endpoints page 19 e Session Trace for an Endpoint page 21 e Authentication Summary Report page 22 Diagnostic Troubleshooting Tools page 23 e TCP Dump Utility to Validate the Incoming Traffic page 26 Obtaining Additional Troubleshooting Information page 30 e Monitoring Database page 35 Monitoring and Troubleshooting Service in Cisco ISE The Monitoring and troubleshooting service is a comprehensive identity solution for all Cisco ISE run time services and uses the following components e Monitoring Provides a real time presentation of meaningful data representing the state of access activities on a network This insight allows you to easily interpret and affect operational conditions Cisco Identity Services Engine Administrator Guide Release 1 3 I Monitoring and Troubleshooting Cisco ISE Dashboard Troubleshooting Provides contextual guidance for resolving access issues on networks You can then address user concerns and provide a resolution in a timely manner e Repo
12. Step1 Choose Administration gt System gt Settings gt Alarm Settings Step2 Select an alarm from the list of default alarms and click Edit Step3 Select Enable or Disable Step4 Configure alarm threshold if applicable Step5 Click Submit Related Topics Configure SMTP Server to Support Notifications Cisco ISE Alarms for Monitoring Cisco ISE provides system alarms which notify you whenever any critical system condition occurs Alarms that are generated by Cisco ISE are displayed in the Alarm dashlet These notifications automatically appear in the alarm dashlet The Alarm dashlet displays a list of recent alarms which you can select from to view the alarm details You can also receive notification of alarms through e mail and syslog messages View Monitoring Alarms Procedure Step1 Go to the Cisco ISE Dashboard Step2 Click on an alarm in the Alarms dashlet A new window opens with the alarm details and a suggested action Step3 Click Refresh to refresh the alarms Step4 Click Acknowledge to acknowledge selected alarms You can select the alarms by clicking the check box available prior to the timestamp This reduces the alarm counters number of times an alarm is raised when marked as read Step5 Click the Details link corresponding to the alarm that you select A new window opens with the details corresponding to the alarm that you select Cisco Identity Services Engine Administrator Guide Release 1 3 16 l Moni
13. additional information E Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Troubleshoot Connectivity Issues in a Trustsec Enabled Network with SXP IP Mappings i Troubleshoot Connectivity Issues in a Trustsec Enabled Network with SXP IP Mappings Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt Trustsec Tools gt SXP IP Mappings Enter the network device IP address of the network device and click Select Click Run and then click User Input Required and modify the necessary fields The Expert Troubleshooter retrieves Trustsec SXP connections from the network device and again prompts you to select the peer SXP devices Click User Input Required and enter the necessary information Check the check box of the peer SXP devices for which you want to compare SXP mappings and enter the common connection parameters Click Submit Click Show Results Summary to view the diagnosis and resolution steps Related Topics SXP IP Mappings Troubleshoot Connectivity Issues in a Trustsec Enabled Network with IP SGT Mappings Step 1 Step 2 Step 3 Step 4 Step 5 Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt Trustsec Tools gt IP User SGT Enter the information in the fields as needed Click Run You are prompted for additional input Click User Inpu
14. an filter out information that you need and troubleshoot network authentication issues quickly You can filter records in the Authentication live logs page and view only those records that you are interested in The authentication logs contain many details and filtering the authentications from a particular user or location helps you scan the data quickly You can use several operators that are available on various fields in the Live Authentications page to filter out records based on your search criteria e abc Contains abc Cisco Identity Services Engine Administrator Guide Release 1 3 18 l Monitoring and Troubleshooting Step 1 Step 2 Global Search for Endpoints e abc Does not contain abc Is empty el Is not empty e abc Starts with abc e abc Ends with abc oN NEN V Escape The Escape option allows you to filter text with special characters including the special characters used as filters You must prefix the special character with a backward slash For example if you want to view the authentication records of users with identity Employee enter Employee in the identity filter text box In this example Cisco ISE considers the exclamation mark as a literal character and not as a special character In addition the Status field allows you to filter out only passed authentication records failed authentications live sessions and so on The green check mark filter
15. ardware Installation Guide NTP Service Failure The NTP service is down on this node This could be because there is a large time difference between NTP server and Cisco ISE node more than 1000s Ensure that your NTP server is working properly and use the ntp server lt servername gt CLI command to restart the NTP service and fix the time gap NTP Sync Failure All the NTP servers configured on this node are unreachable Execute show ntp command from the CLI for troubleshooting Ensure that the NTP servers are reachable from Cisco ISE If NTP authentication is configured ensure that the key ID and value matches with that of the server No Configuration Backup No Cisco ISE configuration backup is Create a schedule for configuration Scheduled scheduled backup Operations DB Purge Unable to purge older data from the Check the Data Purging Audit report Failed operations database This could occur if and ensure that the used_ space is lesser M amp T nodes are busy than the threshold_ space Login to M amp T nodes using CLI and perform the purge operation manually Profiler SNMP Request Either the SNMP request timed out or Ensure that SNMP is running on the Failure the SNMP community or user NAD and verify that SNMP authentication data is incorrect configuration on Cisco ISE matches with NAD Cisco Identity Services Engine Administrator Guide Release 1 3 m Monitoring an
16. d Troubleshooting Cisco ISE Alarms Alarm Name Alarm Description Alarm Resolution Replication Failed The secondary node failed to consume the replicated message Login to the Cisco ISE GUI and perform a manual syncup from the deployment page De register and register back the affected Cisco ISE node Restore Failed Cisco ISE restore operation failed Ensure the network connectivity between Cisco ISE and the repository Ensure that the credentials used for the repository is correct Ensure that the backup file is not corrupted Execute the reset config command from the CLI and restore the last known good backup Patch Failure A patch process has failed on the server Re install the patch process on the server Patch Success A patch process has succeeded on the server External MDM Server API Version Mismatch External MDM server API version does not match with what is configured in Cisco ISE Ensure that the MDM server API version is the same as what is configured in Cisco ISE Update Cisco ISE MDM server configuration if needed External MDM Server Connection Failure Connection to the external MDM server failed Ensure that the MDM server is up and Cisco ISE MDM API service is running on the MDM server External MDM Server Response Error External MDM Server response error Ensure that the Cisco ISE MDM API service is properly running on the MDM server
17. dentity Store Cisco ISE policy service nodes are Check the network connectivity Unavailable unable to reach the configured identity between Cisco ISE and identity store stores Misconfigured Network Cisco ISE has detected too many Too many duplicate RADIUS Device Detected RADIUS accounting information from NAS accounting information has been sent to ISE from NAS Configure NAS with accurate accounting frequency Misconfigured Supplicant Detected Cisco ISE has detected mis configured supplicant on the network Ensure that the configuration on Supplicant is correct No Accounting Start Cisco ISE policy service nodes have authorized a session but did not receive accounting start from the network device Ensure that RADIUS accounting is configured on the network device Check the network device configuration for local authorization Unknown NAD Cisco ISE policy service nodes are Check if the network device is a receiving authentication requests from genuine request and add it to the a network device that is not configured configuration Ensure that the secret in Cisco ISE matches SGACL Drops Secure Group Access SGACL drops Run the RBACL drop summary report occurred This occurs if a Trustsec and review the source causing the capable device drops packets due to SGACL drops Issue a CoA to the SGACL policy violations offending source to reauthorize or disconnect the session RADIUS Req
18. e download process choose to download only the most recent n number of files Enter the From and To dates for which you want to generate the support bundle Enter and re enter the encryption key for the support bundle Click Create Support Bundle Click Download to download the newly created support bundle The support bundle is a tar gpg file that is downloaded to the client system that is running your application browser What to Do Next Download debug Logs for specific components Related Topics Cisco ISE Administrator Groups Cisco ISE Debug Logs Debug logs provide troubleshooting information for various Cisco ISE components Debug logs contain critical and warning alarms generated in the last 30 days and info alarms generated in the last 7 days While reporting problems you might be asked to enable these debug logs and send them for diagnosis and resolution of your problems Cisco Identity Services Engine Administrator Guide Release 1 3 32 l Monitoring and Troubleshooting Cisco ISE Debug Logs i Obtain Debug Logs Procedure Step1 Configure the components for which you want to obtain the debug logs on the Debug Log Configuration page Step2 Download the debug logs Related Topics Debug Logs Configure Debug Log Severity Level Cisco ISE Components and the Corresponding Debug Logs Table 3 Components and Corresponding Debug Logs Component Debug Lo
19. e live authentication entries corresponding to the authentication events as they happen In addition to authentication entries this page also shows the live session entries corresponding to the events You can also drill down the desired session to view a detailed report corresponding to that session The Live Authentications page provides a tabular account of recent RADIUS authentications in the order in which they happen The last update shown at the bottom of the Live Authentications page shows the date of the server time and timezone When a single endpoint authenticates successfully two entries appear in the Live Authentications page one corresponding to the authentication record and another corresponding to the session record pulled from session live view Subsequently when the device performs another successful authentication the repeat counter corresponding to the session record is incremented The Repeat Counter that appears in the Live Authentications page shows the number of duplicate radius authentication success messages that are suppressed Cisco Identity Services Engine Administrator Guide Release 1 3 E Monitoring and Troubleshooting Monitor Live Authentications See the Live Authentication data categories that are shown by default that are described in the Recent RADIUS Authentications section You can choose to view all of the columns or to display only selected data columns After selecting the columns tha
20. elease 1 3 Monitoring and Troubleshooting Purge Older Monitoring Data i Procedure Step1 Choose Administration gt System gt Maintenance gt Data Purging Step2 Specify the time period in months for which the data will be retained All the data prior to the specified time period will be purged For this option each month consists of 30 days The default of three months equals 90 days Note If the configured retention period is less than the existing retention thresholds corresponding to the diagnostics data then the configured value overrides the existing threshold values For example if you configure the retention period as 3 days and this value is less than the existing thresholds in the diagnostics tables for example a default of 5 days then data is purged according to the value that you configure 3 days in this page Step3 Click Submit Step4 Verify the success of the data purge by viewing the Data Purging Audit report What to Do Next Cisco ISE Log Collection Perform an On demand Backup Related Topics Cisco ISE Administrator Groups Perform an On Demand Backup Cisco Identity Services Engine Administrator Guide Release 1 3 I Monitoring and Troubleshooting A Purge Older Monitoring Data Cisco Identity Services Engine Administrator Guide Release 1 3 EEN l
21. es you to perform maintenance tasks such as the topics covered in this section Back Up and Restore of the Monitoring Database Monitoring database handles large volumes of data Over time the performance and efficiency of the monitoring node depends on how well you manage that data To increase efficiency we recommend that you back up the data and transfer it to a remote repository on a regular basis You can automate this task by scheduling automatic backups Cisco Identity Services Engine Administrator Guide Release 1 3 E Monitoring and Troubleshooting Monitoring Database Purge Note You should not perform a backup when a purge operation is in progress If you start a backup during a purge operation the purge operation stops or fails If you register a secondary Monitoring node we recommend that you first back up the primary Monitoring node and then restore the data to the new secondary Monitoring node This ensures that the history of the primary Monitoring node is in sync with the new secondary node as new changes are replicated Related Topics Perform an On Demand Backup Schedule a Backup Guidelines for Data Restoration Restoration of Monitoring Database Monitoring Database Purge The purging process allows you to manage the size of the Monitoring database by specifying the number of months to retain data during a purge The default is three months This value is utilized when the disk space usage thr
22. eshold for purging percentage of disk space is met For this option each month consists of 30 days A default of three months equals 90 days Guidelines for Purging the Monitoring Database The following are some guidelines to follow relating to monitoring database disk usage e If the Monitoring database disk usage is greater than 80 percent of the threshold setting critical alarm is generated indicating that the database size has exceeded the allocated disk size If the disk usage is greater than 90 percent another alarm is generated A purge process runs creating a status history report that you can view by choosing Operations gt Reports gt Deployment Status gt Data Purging Audit An information INFO alarm is generated when the purge completes Purging is also based on the percentage of consumed disk space for the database When the consumed disk space for the monitoring database is equal to or exceeds the threshold the default is 80 percent the purge process starts This process deletes only the last seven days of monitoring data irrespective of what is configured in the Admin portal It will continue this process in a loop until the disk space is below 80 percent Purging always checks the Monitoring database disk space limit before proceeding Purge Older Monitoring Data Before You Begin To perform the following task you must be a Super Admin or System Admin E Cisco Identity Services Engine Administrator Guide R
23. etwork functions may require a node dedicated solely to monitoring If your Cisco ISE network collects logging data at a high rate from Policy Service nodes or network devices a Cisco ISE node dedicated to monitoring is recommended To manage the information stored in the Monitoring database you are required to perform full and incremental backups of the database This includes purging unwanted data and then restoring the database Device Configuration for Monitoring The Monitoring node receives and uses data from devices on the network to populate the dashboard display To enable communication between the Monitoring node and the network devices switches and Network Access Devices NADs must be configured properly Related Topics Configure NADs for ISE Monitoring Cisco Identity Services Engine Administrator Guide Release 1 3 I Monitoring and Troubleshooting Network Process Status Network Process Status You can view process status for the network from the Cisco ISE dashboard using the System Summary dashlet For example when processes like the application server or database fail an alarm is generated and you can view the results using the System Summary dashlet The color of the system status icon indicates the health of your system e Green Healthy e Yellow Warning e Red Critical e Gray No information Related Topics Cisco ISE Monitoring Dashlets Not Visible with Internet Explorer 8 Monitor Networ
24. examine that the expected packet really reached a node For example when there is no incoming authentication or log indicated in the report you may suspect that there is no incoming traffic or that the incoming traffic cannot reach Cisco ISE In such cases you can run this tool to validate You can configure the TCP Dump options and then collect data from the network traffic to help you troubleshooting a network issue Caution Starting a TCP Dump automatically deletes a previous dump file To save a previous dump file perform the task as described in the Saving a TCP Dump File section before you begin a new TCP Dump session E Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Use TCP Dump to Monitor Network Traffic Use TCP Dump to Monitor Network Traffic Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Before You Begin The Network Interface drop down list in the TCP Dump page displays only the network interface cards NICs that have an IPv4 or IPv6 address configured By default all NICs are connected on a VMware and therefore NICs are configured with an IPv6 address and displayed in the Network Interface drop down list e You must have Adobe Flash Player installed on the Cisco ISE administration node to be able to view the tcpdump file Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt General Tools gt TCP Dump Choose a
25. failed authentications Check the authentication steps to identify the root cause Check the Cisco ISE NAD configuration for identity and secret mismatch Once the threshold is met the Excessive Authentication Attempts and Excessive Failed Attempts alarms are triggered The numbers displayed next to the Description column are the total number of authentications that are authenticated or failed against Cisco ISE in last 15 minutes AD Machine TGT refresh failed ISE server TGT Ticket Granting Ticket refresh has failed it is used for AD connectivity and services Check that the ISE machine account exists and is valid Also check for possible clock skew replication Kerberos configuration and or network errors AD ISE account password update failed ISE server has failed to update it s AD machine account password Check that the ISE machine account password is not changed and that the machine account is not disabled or restricted Check the connectivity to KDC E Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Alarm Name Alarm Description Cisco ISE Alarms Alarm Resolution Joined domain is unavailable Joined domain is unavailable and cannot be used for authentication authorization and group and attribute retrieval Check DNS configuration Kerberos configuration error conditions and network connectivity I
26. g Active Directory ad_agent log Cache Tracker tracking log Entity Definition Framework EDF edf log JMS ise psc log License ise psc log Notification Tracker tracking log Replication Deployment replication log Replication JGroup replication log Replication Tracker tracking log RuleEngine Attributes ise psc log RuleEngine Policy IDGroups ise psc log accessfilter ise psc log admin infra ise psc log boot strap wizard ise psc log cisco mnt ise psc log client ise psc log cpm clustering ise psc log cpm mnt ise psc log Cisco Identity Services Engine Administrator Guide Release 1 3 E Monitoring and Troubleshooting A Cisco ISE Debug Logs Component Debug Log epm pdp ise psc log epm pip ise psc log eps ise psc log ers ise psc log guest ise psc log guestauth ise psc log guestportal ise psc log identitystore AD ise psc log infrastructure ise psc log mdm ise psc log mdm pip ise psc log mnt alarm alarms log mnt report reports log mydevices ise psc log nsf ise psc log nsf session ise psc log org apache ise psc log org apache cxf ise psc log org apache digester ise psc log posture ise psc log profiler profiler log provisioning ise psc log prrt JNI prrt management log runtime AAA prrt management log runtime config prrt management log runtime logging prrt management log sponsorportal ise psc log swiss ise psc log
27. gs Support Bundle You can download the support bundle to your local computer as a simple tar gpg file The support bundle will be named with the date and time stamps in the format ise support bundle_ise support bundle mm dd yyyy hh mm tar gpg The browser prompts you to save the support bundle to an appropriate location You can extract the content of the support bundle and the view the README TXT file which describes the contents of the support bundle as well as how to import the contents of the ISE database if it is included in the support bundle Cisco Identity Services Engine Administrator Guide Release 1 3 I Monitoring and Troubleshooting Download Cisco ISE Log Files Download Cisco ISE Log Files Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 You can download the Cisco ISE log files to look for more information while troubleshooting issues in your network Before You Begin e You must have Super Admin or System Admin privileges to perform the following task e Configure debug logs and the debug log levels Procedure Choose Operations gt Troubleshoot gt Download Logs gt gt Appliance node list Click the node from which you want to download the support bundles In the Support Bundle tab choose the parameters that you want to be populated in your support bundle If you include all the logs your support bundle will be excessively large and the download will take a long time To optimize th
28. he top of the dashlet represent endpoint activity over the last 24 hours and last 60 minutes The Profiled Endpoint dashlet represents the total number of endpoints that have been profiled on the network for the last 24 hours including those that are unknown It is not a representation of how many endpoints are currently active on the network Sparkline metrics at the top of the dashlet show time specific values for the last 24 hours and 60 minutes Determine Profiler Activity and Profiled Endpoints Step 1 Step 2 Step 3 Step 4 Procedure Go to the Cisco ISE Dashboard In the Profiler Activity dashlet hover your cursor over a stack bar or sparkline A tooltip provides detailed information Expand the data categories for more information Expand the Profiler Activity dashlet A detailed real time report appears Troubleshooting the Profiler Feed If the Test was able to connect to the Cisco Feed server then you will see a popup that says that the test connection was successful Cisco Identity Services Engine Administrator Guide Release 1 3 ai Monitoring and Troubleshooting A Posture Compliance If the connection failed the test button area will contain a response from the server similar to the following example where the bold part of the message shows the important part of the message Test result Failure FeedService test connection failed Feed Service unavailable SocketTimeoutException invoking https
29. high disk I O utilization Check if the system has sufficient resources Check the actual amount of work on the system for example number of authentications profiler activity etc Add additional server to distribute the load High Disk Space Cisco ISE system is experiencing high Check if the system has sufficient Utilization disk space utilization resources Check the actual amount of work on the system for example number of authentications profiler activity etc Add additional server to distribute the load High Load Average Cisco ISE system is experiencing high Check if the system has sufficient load average resources Check the actual amount of work on the system for example number of authentications profiler activity etc Add additional server to distribute the load High Memory Utilization Cisco ISE system is experiencing high Check if the system has sufficient memory utilization resources Check the actual amount of work on the system for example number of authentications profiler activity etc Add additional server to distribute the load High Operations DB Cisco ISE monitoring nodes are Check and reduce the purge Usage experiencing higher volume of syslog configuration window for the data than expected operations data High Authentication Cisco ISE system is experiencing high Check if the system has sufficient Latency authentication latency resources Check the actual amount of work
30. ices AD Connector had to be restarted AD Connector stopped unexpectedly and had to be restarted If this issue persists contact the Cisco TAC for assistance Active Directory forest is unavailable Active Directory forest GC Global Catalog is unavailable and cannot be used for authentication authorization and group and attribute retrieval Check DNS configuration Kerberos configuration error conditions and network connectivity Authentication domain is unavailable Authentication domain is unavailable and cannot be used for authentication authorization and group and attribute retrieval Check DNS configuration Kerberos configuration error conditions and network connectivity ISE Authentication Inactivity Cisco ISE policy service nodes are not receiving authentication requests from the network devices Check the ISE NAD configuration Check the network connectivity of the ISE NAD infrastructure ID Map Authentication Inactivity No User Authentication events were collected by the Identity Mapping service in the last 15 minutes If this is a time when User Authentications are expected e g work hours then check the connection to Active Directory domain controllers COA Failed Network device has denied the Change of Authorization CoA request issued by Cisco ISE policy service nodes Ensure that the network device is configured to accept Change of Authorization C
31. itialization failed More than one certificate found with the same value of CN CommonName attribute in the subject cannot build certificate chain Check all the certificates in the system including those from the SCEP server Certificate Replication Failed Certificate replication to secondary node failed The certificate is not valid on the secondary node or there is some other permanent error condition Check the secondary node for a pre existing conflicting certificate If found delete the pre existing certificate on the secondary node and export the new certificate on the primary delete it and import it in order to reattempt replication Certificate Replication Temporarily Failed Certificate replication to secondary node temporarily failed The certificate was not replicated to a secondary node due to a temporary condition such as a network outage The replication will be retried until it succeeds Certificate Expired This certificate has expired Cisco ISE may fail to establish secure communication with clients Node to node communication may also be affected Replace the certificate For a trust certificate contact the issuing Certificate Authority CA For a CA signed local certificate generate a CSR and have the CA create a new certificate For a self signed local certificate use Cisco ISE to extend the expiration date You can delete the certificate if it is no longer used Cer
32. k Process Status Procedure Step1 Go to the Cisco ISE Dashboard Step2 Expand the System Summary dashlet A detailed real time report appears Step3 Review the following information for the processes that are running on the network e Name of the process e CPU and memory utilization e Time since process started running Network Authentications You can view the passed and failed network authentications from the Authentications dashlet It provides data on the user or type of device location and the identity group to which the user or device belongs The sparklines along the top of the dashlet represent distribution over the last 24 hours and the last 60 minutes Cisco Identity Services Engine Administrator Guide Release 1 3 4 l Monitoring and Troubleshooting Monitor Network Authentications Monitor Network Authentications Step 1 Step 2 Step 3 Step 4 Procedure Go to the Cisco ISE Dashboard Expand the Authentications dashlet A detailed real time report appears Review the information for the users or devices that are authenticated on the network Expand the data categories for more information Profiler Activity and Profiled Endpoints The Profiled Endpoint dashlet focuses on the endpoints on the network that have matched profiles providing profile data for each endpoint For example the statistics allow you to determine the type of device its location and its IP address The sparklines along t
33. lation Cisco ISE nodes have detected that you are exceeding or about to exceed the allowed license count Contact Cisco Accounts team to purchase additional licenses System Error Log Collection Error Cisco ISE monitoring collector process is unable to persist the audit logs generated from the policy service nodes This will not impact the actual functionality of the Policy Service nodes Contact TAC for further resolution Scheduled Report Export Failure Unable to copy the exported report CSV file to configured repository Verify the configured repository If it has been deleted add it back If it is not available or not reachable reconfigure the repository to a valid one Alarms are not triggered when you add users or endpoints to Cisco ISE Related Topics Configure SMTP Server to Support Notifications Configure Remote Syslog Collection Locations Cisco Identity Services Engine Administrator Guide Release 1 3 E Monitoring and Troubleshooting Cisco ISE Alarm Notifications and Thresholds Cisco ISE Alarm Notifications and Thresholds You can enable or disable Cisco ISE alarms and configure alarm notification behavior to notify you of critical conditions For certain alarms you can configure thresholds like maximum failed attempts for Excessive Failed Attempts alarm or maximum disk utilization for High Disk Utilization alarm Enable and Configure Alarms Procedure
34. liance dashlet A detailed real time report appears Cisco ISE Alarms Alarms notify you of critical conditions on a network and are displayed in the Alarms dashlet They also provide information on system activities such as data purge events You can configure how you want to be notified about system activities or disable them entirely You can also configure the threshold for certain alarms Alarms do not have an associated schedule and are sent immediately after an event occurs At any given point in time only the latest 15 000 alarms are retained Cisco Identity Services Engine Administrator Guide Release 1 3 6 l Monitoring and Troubleshooting Cisco ISE Alarms If the event re occurs then the same alarms are suppressed for a minimum duration of two hours During the time that the event re occurs depending up on the trigger it may take up to three hours for the alarms to re appear The following table lists all the Cisco ISE alarms descriptions and their resolution Table 2 Cisco ISE Alarms Alarm Name Alarm Description Administrative and Operational Audit Management Alarm Resolution Administrator account Administrator account is locked or Administrator password can be reset Locked Disabled disabled due to password expiration or by another administrator using the GUI incorrect login attempts For more or CLI details refer to the administrator password policy Backup Failed The ISE
35. oA from Cisco ISE Ensure if CoA is issued on a valid session Configured nameserver is down Configured nameserver is down or unavailable Check DNS configuration and network connectivity Cisco Identity Services Engine Administrator Guide Release 1 3 ail Monitoring and Troubleshooting Cisco ISE Alarms Alarm Name Alarm Description Alarm Resolution Supplicant Stopped Responding Cisco ISE sent last message to the client 120 seconds ago but there is no response from the client Verify that the supplicant is configured properly to conduct a full EAP conversation with Cisco ISE Verify that NAS is configured properly to transfer EAP messages to from the supplicant Verify that the supplicant or NAS does not have a short timeout for EAP conversation Excessive Authentication Attempts Cisco ISE policy service nodes are experiencing higher than expected rate of authentications Check the re auth timer in the network devices Check the network connectivity of the Cisco ISE infrastructure Once the threshold is met the Excessive Authentication Attempts and Excessive Failed Attempts alarms are triggered The numbers displayed next to the Description column are the total number of authentications that are authenticated or failed against Cisco ISE in last 15 minutes Excessive Failed Attempts Cisco ISE policy service nodes are experiencing higher than expected rate of
36. of the search result Figure 1 Search Result For Endpoints Search Results 27 conneced OFates 2Z3Bdxcornectes 265 Total Distribution Unknown amp QW rT a Gx Mireka WUC prePostze gt E Authorwation Protte 12 i no vave 21 bee ntama Endpoints 2 E Network Device 3 Il Network Device Type 2 gt W Cperaing Systom a Mi Posne Stans 4 gt El Seounty Group 1 gt Bi User Type 2 303322 You can use any of the properties in the left panel to filter the results You can also click on any endpoint to see more detailed information about the endpoint such as e Session trace e Authentication details e Accounting details e Posture details e Profiler details e Client Provisioning details e Guest accounting and activity J Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Session Trace for an Endpoint i Session Trace for an Endpoint AS You can use the global search box available at the top of the Cisco ISE home page to get session information for a particular endpoint When you search with a criteria you get a list of endpoints Click on any of these endpoints to see the session trace information for that endpoint The following figure shows an example of the session trace information displayed for an endpoint Note The dataset used for search is based on Endpoint ID as indexes Therefore when authentication occur
37. on the system for example number of authentications profiler activity etc Add additional server to distribute the load E Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Alarm Name Alarm Description Cisco ISE Alarms i Alarm Resolution Health Status Unavailable The monitoring node has not received health status from the Cisco ISE node Ensure that Cisco ISE nodes are up and running Ensure that Cisco ISE nodes are able to communicate with the monitoring nodes Process Down One of the Cisco ISE processes is not running Restart the Cisco ISE application Profiler Queue Size Limit Reached The ISE Profiler queue size limit has been reached Events received after reaching the queue size limit will be dropped Check if the system has sufficient resources and ensure EndPoint attribute filter is enabled OCSP Transaction The OCSP transaction threshold has Please check if the system has Threshold Reached been reached This alarm is triggered sufficient resources when internal OCSP service reach high volume traffic Licensing License About to Expire License installed on the Cisco ISE nodes are about to expire View the Licencing page in Cisco ISE to view the license usage License Expired License installed on the Cisco ISE nodes has expired Contact Cisco Accounts team to purchase new licenses License Vio
38. riteria If you are searching for AD related authentication and an Active Directory server is not configured in your deployment a message saying AD not configured is displayed Select a RADIUS authentication record from the table and click Troubleshoot If you need to troubleshoot AD related authentication go to the Diagnostics Tool under Administration gt Identity Management gt External Identity Sources gt Active Directory gt AD node Click User Input Required modify the fields as needed and then click Submit Click Done Click Show Results Summary after the troubleshooting is complete To view a diagnosis the steps to resolve the problem and a troubleshooting summary click Done Related Topics RADIUS Authentication Troubleshooting Settings Progress Details Settings Results Summary RADIUS Accounting Packets Attributes Not Coming from Switch RADIUS Server Error Message Entries Appearing in Cisco ISE RADIUS Server Connectivity Issues No Error Message Entries Appearing in Cisco ISE Execute Network Device Tool The Execute Network Device Command diagnostic tool allows you to run the show command on any network device The results are exactly what you would see on a console and can be used to identify problems in the configuration of the device You can use it when you suspect that the configuration is wrong you want to validate it or if you are just curious about how it is configured Cisco Identity Services
39. rting Provides a catalog of standard reports that you can use to analyze trends and monitor system performance and network activities You can customize reports in various ways and save them for future use Cisco ISE Dashboard The Cisco ISE dashboard or home page is the landing page that appears after you log in to the Cisco ISE administration console The dashboard is a centralized management console consisting of metric meters along the top of the window with dashlets below Dashboard s real time data provides an at a glance status of the devices and users that are accessing your network as well as the system health overview Note You must have Adobe Flash Player installed on the Administration node to be able to view the dashlets and metric meters on the dashboard Network Privilege Framework The dashboard shows the activity on the Network Privilege Framework NPF and provides detailed information on the various components The NPF is composed of the three tiers outlined in the following table Table 1 NPF Tiers Tier Specifications 1 Access control based on identity using 802 1x MAC authentication bypass MAB the Cisco ISE Profiler service 2 Access control based on identity using 802 1x MAB Profiler guest provisioning of the Network Admission Control NAC manager central web authentication 3 Access control based on identity and posture using 802 1x MAB Profiler guest provisioning of the NA
40. s it is mandatory to have Endpoint IDs for the endpoints for those authentications to include them in the search result set Figure 2 Session Trace of an Endpoint Search Results 1 11001 15049 Session Trace ey i Authenticated amp Authorized PermitAccess 5 13 48 10 04 15 13 48 10 04 15 21 12 Profiled Cisco Device Disconnected Session lasted 0 hrs 0 mins Authenticated amp Authorized PermitAccess Received RADIUS Access Request 11017 11049 11027 RADIUS created a new session Settings of RADIUS default network will be used Detected Host Lookup UseCase Service Type Call Check 10 Evaluating Policy Group 15004 15008 15048 J 15048 15004 15041 15006 15013 2470 Matched rule Evaluating Service Selection Policy Queried PIP Queried PIP Matched rule Evaluating Identity Policy Matched Default Rule Selected Identity Source Internal Endpoints Lankina iin Endnaint in Tntarnal Endinainte TYCtrre ARAARA Q0 1N Endpoint Details wx Search Results 10 04 15 13 48 Export Results 303323 You can use the clickable timeline at the top to see major authorization transitions You can also export the results in csv format by clicking the Export Results button The report gets downloaded to your browser Cisco Identity Services Engine Administrator Guide Release 1 3 JEJ Monitoring and Troubleshooting Ses
41. s all passed authentications that occurred in the past The red cross mark filters all failed authentications The blue i icon filters all live sessions You can also choose to view a combination of these options Procedure Choose Operations gt Authentications Filter data based on any of the fields in the Show Live Authentications page You can filter the results based on passed or failed authentications or live sessions Global Search for Endpoints You can use the global search box available at the top of the Cisco ISE home page to search for endpoints You can use any of the following criteria to search for an endpoint e User name e MAC Address e IP Address e Authorization Profile Endpoint Profile e Failure Reason e Identity Group e Identity Store e Network Device name e Network Device Type Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Global Search for Endpoints e Operating System e Posture Status e Location e Security Group e User Type You should enter at least three characters for any of the search criteria in the Search field to display data The search result provides a detailed and at a glance information about the current status of the endpoint which you can use for troubleshooting Search results display only the top 25 entries It is recommended to use filters to narrow down the results The following figure shows an example
42. sion Removal from the Directory You can click on the Endpoint Details link to see more authentication accounting and profiler information for a particular endpoint The following figure shows an example of endpoint details information displayed for an endpoint Figure 3 Endpoint Details Search Results ax Endpoint Details SessionTrace Search Results Authentication Accounting Profiler Name Value Source Timestamp 2012 11 07 10 54 40 688 Received Timestamp 2012 11 07 10 54 40 689 Policy Server ise230 Event 80002 Profiler EndPoint profiling event occurred i Mac Address 00 0C 29 95 A5 C1 Endpoint Policy WindowsXP Workstation Static Assignment Source Oui VMware Inc Hostname Property port 9 StaticAssignment false VlanName VLAN0030 if OperStatus 1 cafSessionAuthorizedBy Authentication Server ifIndex 10109 ifDescr GigabitEthernet1 0 9 cafS essionAuthUserName 00 0C 29 95 A5 C1 cafSessionDomain 2 BYODRegistration Unknown En dPointPolicyID a5f92810 be86 11e1 ba69 0050568e002b FirstCollection 1352205183395 Ti meToProfile 70 1 astNmanScanTime 0 cafSessionStatus Export Results 303319 Session Removal from the Directory Sessions are cleaned from the session directory on the Monitoring and Troubleshooting node as follows e Terminated sessions are cleaned 15 minutes after termination e If there is authentication but no accounting then such sessions are cleared after one hour e All inacti
43. t Required modify the fields as necessary and then click Submit Click Show Results Summary to view the diagnosis and resolution steps Related Topics IP User SGT Progress Details Settings Cisco Identity Services Engine Administrator Guide Release 1 3 E Monitoring and Troubleshooting Device SGT Tool Results Summary Device SGT Tool For devices that are enabled with the Trustsec solution each network device is assigned an SGT value through RADIUS authentication The Device SGT diagnostic tool connects to the network device with the IP address that you provide and obtains the network device SGT value It then checks the RADIUS authentication records to determine the SGT value that was assigned most recently Finally it displays the Device SGT pairs in a tabular format and identifies whether the SGT values are the same or different Troubleshoot Connectivity Issues ina Trustsec Enabled Network by Comparing Device SGT Mappings Procedure Step1 Choose Operations gt Troubleshoot gt Diagnostic Tools gt Trustsec Tools gt Device SGT Step2 Enter the information in the fields as needed The default port number for Telnet is 23 and SSH is 22 Step3 Click Run Step4 Click Show Results Summary to view the results of the device SGT comparison Related Topics Device SGT Settings Obtaining Additional Troubleshooting Information Cisco ISE allows you to download support and troubleshooting information from the
44. t you want to appear you can save your selections Related Topics Recent RADIUS Authentications Monitor Live Authentications Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Procedure Choose Operations gt Authentications Select a time interval from the Refresh drop down list to change the data refresh rate Click the Refresh icon to manually update the data Choose an option from the Show drop down list to change the number of records that appear Choose an option from the Within drop down list to specify a time interval Click Add or Remove Columns and choose the options from the drop down list to change the columns that are shown Click Save at the bottom of the drop down list to save your modifications Click Show Live Sessions to view live RADIUS sessions You can use the dynamic Change of Authorization CoA feature for the Live Sessions that allows you to dynamically control active RADIUS sessions You can send reauthenticate or disconnect requests to a Network Access Device NAD Related Topics Recent RADIUS Authentications RADIUS Accounting Packets Attributes Not Coming from Switch RADIUS Server Error Message Entries Appearing in Cisco ISE RADIUS Server Connectivity Issues No Error Message Entries Appearing in Cisco ISE Cisco ISE Active RADIUS Sessions Change Authorization for RADIUS Sessions Filter Data in Live Authentications Page With the filters in the Live Authentications page you c
45. tificate Request Forwarding Failed Certificate request forwarding failed Make sure that the certification request coming in matches with attributes from the sender Configuration Changed Cisco ISE configuration is updated This Check if the configuration change is alarm is not triggered for any expected configuration change in users and endpoints CRL Retrieval Failed Unable to retrieve CRL from the server Ensure that the download URL is This could occur if the specified CRL is unavailable correct and is available for the service E Cisco Identity Services Engine Administrator Guide Release 1 3 Monitoring and Troubleshooting Alarm Name Alarm Description Cisco ISE Alarms Alarm Resolution DNS Resolution Failure DNS resolution failed on the node Check ifthe DNS server configured by the command ip name server is reachable If you get the alarm as DNS Resolution failed for CNAME lt hostname of the node gt then ensure that you create CNAME RR along with the A record for each Cisco ISE node Firmware Update Required A firmware update is required on this host Contact Cisco Technical Assistance Center to obtain firmware update Insufficient Virtual Machine Resources Virtual Machine VM resources such as CPU RAM Disk Space or IOPS are insufficient on this host Ensure that a minimum requirements for the VM host as specified in the Cisco ISE H
46. tion for troubleshooting when there is an unexpected authentication result You might use this tool if you expected an authentication to pass but it failed or if you expected a user or machine to have a certain level of privileges and the user or machine did not have those privileges e Searching RADIUS authentications based on Username Endpoint ID Network Access Service NAS IP address and reasons for authentication failure for troubleshooting Cisco ISE displays authentications only for the system current date Searching RADIUS authentications based on NAS Port for troubleshooting Cisco ISE displays all NAS Port values since the beginning of the previous month to the current date amp Note When searching RADIUS authentications based on NAS IP address and Endpoint ID fields a search is first performed in the operational database and then in the configuration database Cisco Identity Services Engine Administrator Guide Release 1 3 I Monitoring and Troubleshooting Troubleshoot Unexpected RADIUS Authentication Results Troubleshoot Unexpected RADIUS Authentication Results Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt gt General Tools gt RADIUS Authentication Troubleshooting Specify the search criteria in the fields as needed Click Search to display the RADIUS authentications that match your search c
47. toring and Troubleshooting Log Collection i Note The Details link corresponding to the previous alarms that were generated prior to persona change shows no data Log Collection Monitoring services collect log and configuration data store the data and then process it to generate reports and alarms You can view the details of the logs that are collected from any of the servers in your deployment Alarm Syslog Collection Location If you configure monitoring functions to send alarm notifications as syslog messages you need a syslog target to receive the notification Alarm syslog targets are the destinations where alarm syslog messages are sent You must also have a system that is configured as a syslog server to be able to receive syslog messages You can create edit and delete alarm syslog targets Note Cisco ISE monitoring requires that the logging source interface configuration use the network access server NAS IP address You must configure a switch for Cisco ISE monitoring Related Topics Configure NADs for ISE Monitoring Configure Remote Syslog Collection Locations Configure SMTP Server to Support Notifications Live Authentications You can monitor recent RADIUS authentications as they happen from the Live Authentications page The page displays the top 10 RADIUS authentications in the last 24 hours This section explains the functions of the Live Authentications page The Live Authentications page shows th
48. uest The authentication accounting request Check that the NAD AAA client has a Dropped from a NAD is silently discarded This valid configuration in Cisco ISE Check may occur due to unknown NAD mismatched shared secrets or invalid packet content per RFC whether the shared secrets on the NAD AAA client and Cisco ISE matches Ensure that the AAA client and the network device have no hardware problems or problems with RADIUS compatibility Also ensure that the network that connects the device to Cisco ISE has no hardware problems EAP Session Allocation Failed A RADIUS request was dropped due to reaching EAP sessions limit This condition can be caused by too many parallel EAP authentication requests Wait for a few seconds before invoking another RADIUS request with new EAP session If system overload continues to occur try restarting the ISE Server Cisco Identity Services Engine Administrator Guide Release 1 3 a Monitoring and Troubleshooting Cisco ISE Alarms Alarm Name Alarm Description Alarm Resolution RADIUS Context A RADIUS request was dropped due to Wait for a few seconds before invoking Allocation Failed system overload This condition can be a new RADIUS request If system caused by too many parallel overload continues to occur try authentication requests restarting the ISE Server System Health High Disk I O Utilization Cisco ISE system is experiencing
49. uired and modify the fields as necessary Check the check boxes next to the interfaces that you want to analyze and click Submit Click Show Results Summary Related Topics Evaluate Configuration Validator Settings Cisco Identity Services Engine Administrator Guide Release 1 3 E Monitoring and Troubleshooting Posture Troubleshooting Tool Progress Details Settings Results Summary Posture Troubleshooting Tool The Posture Troubleshooting tool helps you find the cause of a posture check failure to identify the following e Which endpoints were successful in posture and which were not e If an endpoint failed in posture what steps failed in the posture process e Which mandatory and optional checks passed and failed You determine this information by filtering requests based on parameters such as username MAC address and posture status Troubleshoot Endpoint Posture Failure Step 1 Step 2 Step 3 Step 4 TCP Dump A Procedure Choose Operations gt Troubleshoot gt Diagnostic Tools gt General Tools gt Posture Troubleshooting Enter the information in the appropriate fields Click Search To find an explanation and determine a resolution for an event select the event in the list and click Troubleshoot Related Topics Posture Troubleshooting Settings Progress Details Settings Results Summary Utility to Validate the Incoming Traffic This is a tool to sniff the packet when you want to
50. ve sessions are cleaned after seven days Authentication Summary Report You can troubleshoot network access for a specific user device or search criteria based on attributes that are related to the authentication requests You do this by running an Authentication Summary report Cisco Identity Services Engine Administrator Guide Release 1 3 2 l Monitoring and Troubleshooting Troubleshoot Network Access Issues i Troubleshoot Network Access Issues Procedure Step1 Choose Operations gt Reports gt Authentication Summary Report Step2 Filter the report for Failure Reasons Step3 Review the data in the Authentication by Failure Reasons section of the report to troubleshoot your network access problem Note As the Authentication Summary report collects and displays the latest data corresponding to failed or passed authentications the contents of the report appear after a delay of a few minutes Related Topics Run and View Reports Diagnostic Troubleshooting Tools Diagnostic tools help you diagnose and troubleshoot problems on a Cisco ISE network and provide a detailed instructions on how to resolve problems You can use these tools to troubleshoot authentications and evaluate the configuration of any network device on your network including Trustsec devices RADIUS Authentication Troubleshooting Tool This tool allows you to search and select a RADIUS authentication or an Active Directory related RADIUS authentica
Download Pdf Manuals
Related Search
Related Contents
- Hecht 高速 15Mbps Logic Gate フォトカプラ 40280 - 20" Industrial Planer with 4 HSS Knife Cutterhead w/ Parts Wireless Optical Mouse Adaptec Serial ATA RAID 1210SA User`s Guide Manual de instrucciones Balanza para personas Panasonic 15000 Switch User Manual Copyright © All rights reserved.
Failed to retrieve file