Preview Tool

Cisco Bug: CSCuq19789 - ISE fails to reliably match Radius:service-type eq authorize-only

Last Modified

Jun 09, 2016

Products (1)

  • Cisco Identity Services Engine

Known Affected Releases


Description (partial)

VPN users are sometimes not able to pass traffic after a successful VPN connection.
The IPEP logs show the error "No enforceable Acl in Authorize AccessAccept: Drop request and block traffic for <session>"

1. VPN users are authenticated against ISE and VPN traffic goes through an Inline posture node (IPN/IPEP).
2. There is a authorization policy specifically for the IPEP authz profile, which is trying to match the attribute RADIUS:SERVICE-TYPE = AUTHORIZE-ONLY. Consequently there are separate authorization policies for the authentication part of it.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.