ISE Troubleshooting Patterns
ISE troubleshooting patterns I’ve actually used. Every entry has a date and context.
Entries
2026-04-02: Verify Endpoint Registration via DataConnect
Problem: After iPSK MAC registration, need to verify ISE has the endpoint and correct policy assignment.
Context: P16g deployment. iPSK registration for new device via iPSK Manager. Need to confirm ISE picked up the MAC via secure ODBC and assigned the correct policy set (Domus_MAB) and authorization profile (Domus-IoT-iPSK).
The Fix:
# Endpoint identity and profiler data
netapi ise dc endpoint <P16G-MAC>
netapi ise dc endpoint E0:D5:5D:6C:E1:66
# Authentication timeline -- confirm iPSK PASSED
netapi ise dc auth-history <P16G-MAC> --hours 1
# Active MnT session
netapi ise mnt session <P16G-MAC>
Raw DataConnect SQL for deeper investigation:
# Endpoint profiler data
netapi ise dc query "
SELECT mac_address, endpoint_profile, identity_group, create_time
FROM endpoints
WHERE mac_address = '<P16G-MAC>'
"
# Auth detail by MAC
netapi ise dc query "
SELECT username, mac_address, authentication_method,
nas_ip_address, passed, failed, timestamp
FROM radius_authentications
WHERE mac_address = '<P16G-MAC>'
AND timestamp > SYSDATE - 1
ORDER BY timestamp DESC
"
Rule: Always verify endpoint registration after MAC-based provisioning. Don’t assume — confirm with DataConnect or ERS API. Check both the endpoint table and radius_authentications.
Worklog: WRKLOG-2026-04-02
2026-04-03: Verify EAP-TLS Migration from iPSK
Problem: After migrating from iPSK to EAP-TLS, need to confirm ISE sees dot1x (not mab) as the authentication method.
Context: P16g deployment. Wired and WiFi connections switched from iPSK (MAB) to certificate-based 802.1X EAP-TLS. ISE should now show dot1x as authentication method, EAP-TLS as protocol, and the certificate CN as identity.
The Fix:
WIRED_MAC="a8:2b:dd:8f:23:e6"
WIFI_MAC="e0:d5:5d:6c:e1:66"
# Wired -- should show dot1x/EAP-TLS, not mab
netapi ise mnt session $WIRED_MAC
netapi ise dc auth-history $WIRED_MAC --hours 1
# WiFi -- should show dot1x/EAP-TLS
netapi ise mnt session $WIFI_MAC
netapi ise dc auth-history $WIFI_MAC --hours 1
# Raw SQL -- confirm method changed from mab to dot1x
netapi ise dc query "
SELECT mac_address, authentication_method, passed, timestamp
FROM radius_authentications
WHERE mac_address IN ('$WIRED_MAC', '$WIFI_MAC')
AND timestamp > SYSDATE - 1
ORDER BY timestamp DESC
"
Rule: After any authentication method migration, verify with ISE DataConnect that the method actually changed. Don’t trust the client side alone — check what ISE recorded.
Worklog: WRKLOG-2026-04-03
2026-04-03: Common EAP-TLS Failure Modes
Problem: Collection of EAP-TLS failure patterns and their fixes from P16g deployment.
Context: P16g deployment, both wired and wireless 802.1X EAP-TLS.
The Patterns:
| Issue | Fix |
|---|---|
"Secrets required but not provided" |
Missing |
"TLS handshake failed" |
CA chain incomplete — ensure CA chain PEM contains both ISSUING-CA and ROOT-CA |
"Authentication rejected" |
Certificate CN doesn’t match ISE identity — verify with |
WiFi "invalid property identity-flags" |
Remove |
Interface disappeared after disabling iwd |
Reload WiFi driver: |
Wrong VLAN assigned |
Check ISE authorization policy order — |
Live debugging:
# Live logs -- NetworkManager + wpa_supplicant
journalctl -u NetworkManager -t wpa_supplicant -f | grep -iE "eap|tls|auth|fail"
# Certificate chain verification
openssl verify -CAfile /etc/ssl/certs/DOMUS-CA-CHAIN.pem /etc/ssl/certs/$(hostname)-eaptls.pem
# Key/cert match (both hashes must be identical)
openssl x509 -in /etc/ssl/certs/$(hostname)-eaptls.pem -noout -modulus | md5sum
sudo openssl rsa -in /etc/ssl/private/$(hostname)-eaptls.key -noout -modulus | md5sum
Rule: EAP-TLS failures are usually one of: missing password-flags, incomplete CA chain, CN mismatch, or wrong WiFi backend. Check in that order.
Worklog: WRKLOG-2026-04-03