<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAB Authentication Failing for Client behind IP Phone in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846212#M473551</link>
    <description>&lt;P&gt;Since the PC is authorized on the DATA domain and the redirect URL and ACL are assigned to the session, that means that your ISE policy is ok.&amp;nbsp; So now we need to look at why the switch is not redirecting the traffic from the PC.&amp;nbsp; Make sure you have "ip http server" and "ip http secure-server" enabled globally.&amp;nbsp; Also, please post the contents of your redirect ACL and the dACL that is applied to the port.&amp;nbsp; To ensure the dACL is applied properly, copy the results from the "show ip access-list int g0/2" command.&amp;nbsp; It should have entries merged for the phone and the PC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general, your redirect ACL should be on the switch and have the following entries at a minimum:&lt;/P&gt;&lt;P&gt;deny udp any any eq domain&lt;/P&gt;&lt;P&gt;deny udp any any eq bootps&lt;/P&gt;&lt;P&gt;deny ip any host &amp;lt;ISE PSN address&amp;gt;&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can make the ACL more restrictive once you have it working.&amp;nbsp; Keep in mind, the redirect ACL is not a typical security ACL.&amp;nbsp; You are essentially denying redirection and permitting redirection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Colby&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2019 17:49:35 GMT</pubDate>
    <dc:creator>Colby LeMaire</dc:creator>
    <dc:date>2019-04-26T17:49:35Z</dc:date>
    <item>
      <title>MAB Authentication Failing for Client behind IP Phone</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846106#M473549</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;My customer has what may be a unique situation for endpoints that are used by guests.&amp;nbsp; We provide housing units for out of town family members of our patients.&amp;nbsp; In these units, we provide both wireless and wired Internet access.&amp;nbsp; We also have Mitel IP phones so they can dial any internal extension as well as make external calls.&amp;nbsp; Our requirement is to allow the DATA domain, which could be any wired device, to go through the hotspot guest flow where they only accept the AUP before getting access to the Internet.&amp;nbsp; The IP phone should not follow this flow but get full network access upon authenticating.&amp;nbsp; However, my phone gets the authz profile I set up for the policy but my PC is failing MAB authentication per the log message on the switch.&amp;nbsp; However, I am grabbing an IP address from DHCP and can ping it from another network based on the firewall rules I have set up but not getting redirected to the hotspot URL.&amp;nbsp; In addition, if I remove the IP phone from the port and just set it up for a single host, I get the redirect URL and can proceed as normal.&amp;nbsp; The issue occurs when I test with an IP phone on the same port.&amp;nbsp; Below is the info I felt would be a good start in pointing me in the right direction:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MAB log:&lt;/P&gt;&lt;P&gt;Apr 26 14:53:10.267: %MAB-5-FAIL: Authentication failed for client (a01d.48b1.0735) on Interface Gi0/2 AuditSessionID 0A6401220000006B1381FB20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Port Config (used for testing the policy):&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt;description *** LT22970 ***&lt;BR /&gt;switchport access vlan 60&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport nonegotiate&lt;BR /&gt;switchport voice vlan 30&lt;BR /&gt;ip device tracking probe count 1&lt;BR /&gt;ip device tracking probe interval 30&lt;BR /&gt;ip device tracking maximum 2&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order mab&lt;BR /&gt;authentication priority mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;mab&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IP Phone &amp;amp; Wired Guest Policy:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mab_policy.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/35638iEAB08A220067A675/image-size/large?v=v2&amp;amp;px=999" role="button" title="mab_policy.png" alt="mab_policy.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="phone_authc_rule.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/35639i780E12B2D1489BB2/image-size/large?v=v2&amp;amp;px=999" role="button" title="phone_authc_rule.png" alt="phone_authc_rule.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="phone_authz_rule.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/35640iBD505074B7F2D321/image-size/large?v=v2&amp;amp;px=999" role="button" title="phone_authz_rule.png" alt="phone_authz_rule.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wired_guest_authc_rule.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/35641iA8EF7296E0476EE4/image-size/large?v=v2&amp;amp;px=999" role="button" title="wired_guest_authc_rule.png" alt="wired_guest_authc_rule.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wired_guest_authz_rule.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/35642i415DFD30F62720B0/image-size/large?v=v2&amp;amp;px=999" role="button" title="wired_guest_authz_rule.png" alt="wired_guest_authz_rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure if it's my port config, the way I have the policies/rules set up in ISE, or a combination of both.&amp;nbsp; Any assistance would be greatly appreciated from the community.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 15:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846106#M473549</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2019-04-26T15:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authentication Failing for Client behind IP Phone</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846151#M473550</link>
      <description>&lt;P&gt;So I did a bit more digging and adding the following commands to my test port:&lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan 30&lt;BR /&gt;authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also disabled the Mitel IP Phone policy and added an AuthZ rule to the Wired Guest Internet Access policy and used the MITEL-ACCESS result profile.&amp;nbsp; Now, I'm authenticating both devices from the same port but my PC on the data domain still isn't getting the redirect URL.&amp;nbsp; Here is the output of the 'sh authentication sessions interface gi0/2 details' command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh authentication sessions interface gi0/2 details&lt;BR /&gt;Interface: GigabitEthernet0/2&lt;BR /&gt;MAC Address: 0800.0f74.846e&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 172.30.0.251&lt;BR /&gt;User-Name: 08-00-0F-74-84-6E&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: VOICE&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 172800s (local), Remaining: 172590s&lt;BR /&gt;Common Session ID: 0A6401220000008113C60B93&lt;BR /&gt;Acct Session ID: 0x000001FA&lt;BR /&gt;Handle: 0x0B00005A&lt;BR /&gt;Current Policy: POLICY_Gi0/2&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecure&lt;/P&gt;&lt;P&gt;Server Policies:&lt;BR /&gt;ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-57f6b0d3&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;mab Authc Success&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;BR /&gt;Interface: GigabitEthernet0/2&lt;BR /&gt;MAC Address: a01d.48b1.0735&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 192.168.58.106&lt;BR /&gt;User-Name: A0-1D-48-B1-07-35&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 172800s (local), Remaining: 172590s&lt;BR /&gt;Common Session ID: 0A6401220000008013C60A6E&lt;BR /&gt;Acct Session ID: 0x000001F9&lt;BR /&gt;Handle: 0x09000059&lt;BR /&gt;Current Policy: POLICY_Gi0/2&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecure&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Server Policies:&lt;BR /&gt;URL Redirect: &lt;A href="https://scisepsn.shepctr.org:8443/portal/gateway?sessionId=0A6401220000008013C60A6E&amp;amp;portal=c0e0b6e2-5e14-11e9-88d1-005056b04593&amp;amp;action=cwa&amp;amp;type=drw&amp;amp;token=d2f475af925ed4f2b774e5d953b53978" target="_blank" rel="noopener"&gt;https://scisepsn.shepctr.org:8443/portal/gateway?sessionId=0A6401220000008013C60A6E&amp;amp;portal=c0e0b6e2-5e14-11e9-88d1-005056b04593&amp;amp;action=cwa&amp;amp;type=drw&amp;amp;token=d2f475af925ed4f2b774e5d953b53978&lt;/A&gt;&lt;BR /&gt;URL Redirect ACL: WIRED-GUEST-REDIRECT&lt;BR /&gt;ACS ACL: xACSACLx-IP-WIRED-GUEST-REDIRECT-DACL-5cc0c194&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;mab Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any reasons why I'm not getting redirected?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 16:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846151#M473550</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2019-04-26T16:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authentication Failing for Client behind IP Phone</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846212#M473551</link>
      <description>&lt;P&gt;Since the PC is authorized on the DATA domain and the redirect URL and ACL are assigned to the session, that means that your ISE policy is ok.&amp;nbsp; So now we need to look at why the switch is not redirecting the traffic from the PC.&amp;nbsp; Make sure you have "ip http server" and "ip http secure-server" enabled globally.&amp;nbsp; Also, please post the contents of your redirect ACL and the dACL that is applied to the port.&amp;nbsp; To ensure the dACL is applied properly, copy the results from the "show ip access-list int g0/2" command.&amp;nbsp; It should have entries merged for the phone and the PC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general, your redirect ACL should be on the switch and have the following entries at a minimum:&lt;/P&gt;&lt;P&gt;deny udp any any eq domain&lt;/P&gt;&lt;P&gt;deny udp any any eq bootps&lt;/P&gt;&lt;P&gt;deny ip any host &amp;lt;ISE PSN address&amp;gt;&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can make the ACL more restrictive once you have it working.&amp;nbsp; Keep in mind, the redirect ACL is not a typical security ACL.&amp;nbsp; You are essentially denying redirection and permitting redirection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Colby&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 17:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846212#M473551</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-04-26T17:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authentication Failing for Client behind IP Phone</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846278#M473597</link>
      <description>&lt;P&gt;Hello Colby,&lt;/P&gt;&lt;P&gt;Both HTTP &amp;amp; HTTPS is enabled globally on the switch already.&amp;nbsp; I also have an SVI on the switch since the client subnet is separated by a firewall.&amp;nbsp; Also, keep in mind that wired redirect works when testing without an IP phone connected to the same port.&amp;nbsp; It's only when I have a phone on the same port that testing fails.&amp;nbsp; I'm also removing the endpoints from ISE to ensure it looks like a brand new endpoint initiating a session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the redirect ACL on the switch:&lt;/P&gt;&lt;P&gt;Extended IP access list WIRED-GUEST-REDIRECT&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny udp any any eq domain&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 deny ip any host 10.2.138.252&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 deny ip any host 10.2.138.253&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 deny ip any host 10.2.138.254&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 deny ip any host 10.2.138.255&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit tcp any any eq www (438 matches)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 permit tcp any any eq 443 (2174 matches)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80 permit tcp any any eq 8443&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 90 deny ip any any (59 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the dACL:&lt;/P&gt;&lt;P&gt;permit udp any any eq bootps&lt;BR /&gt;permit udp any any eq domain&lt;BR /&gt;permit ip any 192.168.56.0 255.255.248.0&lt;BR /&gt;permit tcp any eq 3389 host 10.100.2.52 &amp;lt;---This is used to RDP to the machines used for testing and will be removed&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;permit tcp any any eq 443&lt;BR /&gt;permit tcp any any eq 8443&lt;BR /&gt;deny ip any any log&lt;/P&gt;&lt;P&gt;The dACL for the Mitel phone is the default PERMIT_ALL_TRAFFIC dACL provided by ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the output of the 'show ip access-list int Gi0/2' command:&lt;/P&gt;&lt;P&gt;sh ip access-lists int gi0/2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp host 192.168.58.106 any eq bootps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp host 192.168.58.106 any eq domain&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit ip host 192.168.58.106 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 192.168.58.106 eq 3389 host 10.100.2.52&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 192.168.58.106 any eq www&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 192.168.58.106 any eq 443&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 192.168.58.106 any eq 8443&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; deny ip host 192.168.58.106 any log&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit ip host 172.30.0.251 any&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 20:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846278#M473597</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2019-04-26T20:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authentication Failing for Client behind IP Phone</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846298#M473600</link>
      <description>Remove the permit line in your redirect ACL for TCP 8443.&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Apr 2019 21:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846298#M473600</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-04-26T21:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authentication Failing for Client behind IP Phone</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846311#M473602</link>
      <description>For whatever reason, I can no longer see the content on the community page so I'm restricted to responding via email. It gave a message that the post is marked as spam. I removed the 8443 line from my redirect ACL but still same issue. No redirect to hotspot URL behind Mitel IP phone. My browser responds as if I have no connectivity whatsoever. It doesn't even look like it's attempting to reach the URL.&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Apr 2019 21:43:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846311#M473602</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2019-04-26T21:43:09Z</dc:date>
    </item>
    <item>
      <title>Re: MAB Authentication Failing for Client behind IP Phone</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846325#M473604</link>
      <description>Ok...I figured out my problem. IT WAS THE FLIPPING LAPTOP I WAS TESTING FROM!!!!&lt;BR /&gt;&lt;BR /&gt;I decided to disable the wired NIC and attempted to browse the Internet from the wifi of the same device but still couldn't get out. I can ping and traceroute but just couldn't browse the Internet. I rebooted the machine and tried my ISE policy again and lo and behold, I got the redirect URL!&lt;BR /&gt;&lt;BR /&gt;Geez!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Apr 2019 22:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-authentication-failing-for-client-behind-ip-phone/m-p/3846325#M473604</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2019-04-26T22:16:09Z</dc:date>
    </item>
  </channel>
</rss>

