<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dot1x radius request not reaching ise in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764380#M487040</link>
    <description>&lt;P&gt;I have created test user and radius is working fine. Hence i do not believe it is a vrf routing issue at all. According to the below document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-8/configuration_guide/int_and_hw/b_168_int_and_hw_9500_cg/b_168_int_and_hw_9500_cg_chapter_01.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-8/configuration_guide/int_and_hw/b_168_int_and_hw_9500_cg/b_168_int_and_hw_9500_cg_chapter_01.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco managment interfaces does not support features as dot1x.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe my issue is related to it. Do you have any opinion about that ? Because myself have not previous experience on ise dot1x.&lt;/P&gt;</description>
    <pubDate>Sat, 15 Dec 2018 17:56:22 GMT</pubDate>
    <dc:creator>michalis1234</dc:creator>
    <dc:date>2018-12-15T17:56:22Z</dc:date>
    <item>
      <title>Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764271#M487032</link>
      <description />
      <pubDate>Sat, 15 Dec 2018 09:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764271#M487032</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-15T09:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764275#M487034</link>
      <description>&lt;P&gt;I have c9300 16.6.4a everest ios xe.&lt;/P&gt;
&lt;P&gt;Ihave ise 2.4 patch 4.&lt;/P&gt;
&lt;P&gt;I have configured the mgmt interface g0/0 as the the source interface for radius requests, but it does not seem to send the requests to ise. Radius for device administration is working. Aaa servers are up, test user for radius request is working. The problem is dot1x or mab requests are not reaching ise.&lt;/P&gt;
&lt;P&gt;The switches are pure l2 no svi only mgmt interface. Rechability to ise is fine.&lt;/P&gt;
&lt;P&gt;Does mgmt interface support dot1x radius requests ?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Dec 2018 09:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764275#M487034</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-15T09:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764301#M487037</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This has been discussed in the past. Since the mgmt-interface is in a VRF of its own, you'll need to use ip vrf forwarding to move the RADIUS traffic back and forth between the MGMT interface and the other interfaces. It could also be that your AAA configuration is missing something.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Paste your configuration here (AAA, interfaces, ip routes, AAA groups...)&lt;/P&gt;
&lt;P&gt;2) Take a look at:&amp;nbsp;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/policy-and-access/3850-aaa-using-mgmt-vrf/td-p/3028097" target="_self"&gt;https://community.cisco.com/t5/policy-and-access/3850-aaa-using-mgmt-vrf/td-p/3028097&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Dec 2018 13:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764301#M487037</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-12-15T13:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764380#M487040</link>
      <description>&lt;P&gt;I have created test user and radius is working fine. Hence i do not believe it is a vrf routing issue at all. According to the below document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-8/configuration_guide/int_and_hw/b_168_int_and_hw_9500_cg/b_168_int_and_hw_9500_cg_chapter_01.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-8/configuration_guide/int_and_hw/b_168_int_and_hw_9500_cg/b_168_int_and_hw_9500_cg_chapter_01.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco managment interfaces does not support features as dot1x.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe my issue is related to it. Do you have any opinion about that ? Because myself have not previous experience on ise dot1x.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Dec 2018 17:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764380#M487040</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-15T17:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764386#M487045</link>
      <description>&lt;P&gt;Well it's like you said: your switch doesn't have any SVI's but only a Mgmt-Interface. Meaning your authenticatior's IP address for RADIUS communication with the RADIUS server must be the Mgmt interface's IP address. Can EAPOL from a switchport know how to route from the switchport to the Mgmt VRF&amp;nbsp;and route back the response from the Mgmt VRF to the switchport?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A test user tests a similar data-path as device administration, which as you've said works just fine. It wouldn't test end-to-end supplicant to switch, and then switch to RADIUS server. It's basically staying within the Mgmt VRF and therefore wouldn't need any vrf forwarding.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think you should give the vrf forwarding as it's been discussed in previous posts a shot. Also, it would be best if you could upload the relevant configuration to this thread so others can have a look. There might be a misconfiguration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Dec 2018 18:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764386#M487045</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-12-15T18:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764493#M487050</link>
      <description>&lt;P&gt;Below is the configuration elements you requested:&lt;/P&gt;
&lt;P&gt;aaa new-model&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;aaa group server&amp;nbsp;radius RADIUS&lt;BR /&gt; server x.x.10.52&lt;BR /&gt; server&amp;nbsp;x.x.10&lt;SPAN&gt;.53&lt;/SPAN&gt;&lt;BR /&gt; ip vrf forwarding Mgmt-vrf&lt;BR /&gt;&lt;BR /&gt;aaa authentication dot1x default group RADIUS&lt;BR /&gt;aaa authorization network default group RADIUS&lt;/P&gt;
&lt;P&gt;aaa accounting identity default start-stop group RADIUS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt; client x.x.10.52 vrf Mgmt-vrf server-key&amp;nbsp;cisco&lt;BR /&gt; client x.x.10.53 vrf Mgmt-vrf server-key&amp;nbsp;cisco&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; vrf forwarding Mgmt-vrf&lt;BR /&gt; ip address x.x.10.6 255.255.255.0 -&amp;gt; same asubnet as ISE-1, ISE-2&lt;BR /&gt;no ip route-cache&lt;BR /&gt; speed 1000&lt;BR /&gt; negotiation auto&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet1/0/10&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport nonegotiate&lt;BR /&gt; device-tracking&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; access-session host-mode multi-domain&lt;BR /&gt; access-session port-control auto&lt;BR /&gt; mab&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout quiet-period 5&lt;BR /&gt; dot1x timeout tx-period 3&lt;/P&gt;
&lt;P&gt;spanning-tree portfast&lt;BR /&gt; spanning-tree bpdufilter enable&lt;BR /&gt; spanning-tree bpduguard enable&lt;BR /&gt; spanning-tree guard root&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip default-gateway x.x.10.254&lt;/P&gt;
&lt;P&gt;ip route vrf Mgmt-vrf 0.0.0.0 0.0.0.0 x.x10.254&lt;/P&gt;
&lt;P&gt;ip radius source-interface GigabitEthernet0/0 vrf Mgmt-vrf&lt;/P&gt;
&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf &lt;BR /&gt;radius-server attribute 31 send nas-port-detail mac-only&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;/P&gt;
&lt;P&gt;radius server vsa&lt;BR /&gt;&lt;BR /&gt;radius server ISE-1&lt;BR /&gt; address ipv4 x.x.10.52 auth-port 1812 acct-port 1813&lt;BR /&gt; automate-tester username test probe-on&lt;BR /&gt; key&amp;nbsp;cisco&lt;BR /&gt;&lt;BR /&gt;radius server ISE-2&lt;BR /&gt; address ipv4 x.x.10.53 auth-port 1812 acct-port 1813&lt;BR /&gt; automate-tester username test probe-on&lt;BR /&gt; key&amp;nbsp;cisco&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Dec 2018 07:30:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764493#M487050</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-16T07:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764508#M487054</link>
      <description>&lt;P&gt;I have also configured an svi for mgmt vlan such that an eapol on a switchport can reach ise from main routing table. But still the request are not reaching ise... c9300 switches require the new style of dot1x configuration in order to operate correctly?&lt;/P&gt;</description>
      <pubDate>Sun, 16 Dec 2018 09:34:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764508#M487054</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-16T09:34:55Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764630#M487058</link>
      <description>&lt;P&gt;Maybe you just omitted it by accident, but where is "dot1x system-auth-control"? Without it port-based dot1x won't run.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The VRF handling seems ok as far as I can tell, assuming the gateway is reachable. You could connect to a non-dot1x port in the same VLAN and see if you can reach the Mgmt-interface from that port by ICMP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Dec 2018 20:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764630#M487058</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-12-16T20:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764633#M487061</link>
      <description>&lt;P&gt;IBNS 2.0 (the new form of AAA) isn't a requirement. You can still configure things in legacy mode.&lt;/P&gt;
&lt;P&gt;It would help you down the line to configure things in IBNS 2.0 though assuming you're using 16.x software for your access devices, since it has some useful features you may want in the future.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check out this guide for more:&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Dec 2018 21:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764633#M487061</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-12-16T21:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764743#M487064</link>
      <description>&lt;P&gt;I have the command for dot1x.&lt;/P&gt;
&lt;P&gt;It turns out that it should a firewalling issue to the management vlan, where vrf is connected.&lt;/P&gt;
&lt;P&gt;I need to speak with the firewall guy.&lt;/P&gt;
&lt;P&gt;We need to allow radius traffic to flow from user, voice vlans to ise, correct ?&lt;/P&gt;
&lt;P&gt;Because in a conversation that i had before the deployment we decided that the radius communication will be held between nad and ise and would not involve any endpoint vlan.&lt;/P&gt;
&lt;P&gt;According to your recommendations endpoint vlans need to have radius communication directly to ise , have i understood correctly?&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 04:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764743#M487064</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-17T04:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764795#M487067</link>
      <description>&lt;P&gt;Not quite,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RADIUS is between your NAD (switch) and the RADIUS server. The endpoints communicate with the switch in EAPOL, which is then encapsulated by the switch in RADIUS and sent to the RADIUS server. Here is an illustration:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/td/i/200001-300000/210001-220000/214001-215000/214095.eps/_jcr_content/renditions/214095.jpg" target="_self"&gt;https://www.cisco.com/c/dam/en/us/td/i/200001-300000/210001-220000/214001-215000/214095.eps/_jcr_content/renditions/214095.jpg&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're seeing RADIUS drops between the Mgmt interface and RADIUS servers, that's a problem. But endpoints cannot communicate directly with the RADIUS server during dot1x authentication.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 06:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764795#M487067</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-12-17T06:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764796#M487068</link>
      <description>&lt;P&gt;You need to allow the switch management svi/vlan/ip to communicate directly with the ise nodes for standard radius authentication. The switch acts as the proxy for the client during authentication.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You only have to allow user subnets if you are performing web authentication, for example using the ise guest portal. ISE will send a url redirect to the switch, the client will be redirected to a ISE node to enter credential on a web page.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 06:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3764796#M487068</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-12-17T06:50:05Z</dc:date>
    </item>
    <item>
      <title>Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3765084#M487070</link>
      <description>&lt;P&gt;Yes indeed you are correct.&lt;/P&gt;
&lt;P&gt;I will update you as soon as i have a solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 14:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3765084#M487070</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-17T14:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x radius request not reaching ise</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3765595#M487071</link>
      <description>&lt;P&gt;The solution to the problem was to source radius requests from main routing table through the management vlan, and correctly reference ta radius groups.&lt;/P&gt;
&lt;P&gt;aaa group server radius RADIUS_SRV&lt;BR /&gt; server name ISE-1&lt;BR /&gt; server name ISE-2&lt;BR /&gt; ip radius source-interface Vlan management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;radius server ISE-1&lt;BR /&gt; address ipv4 x.x.10.52 auth-port 1812 acct-port 1813&lt;BR /&gt; automate-tester username test probe-on&lt;BR /&gt; key&amp;nbsp;cisco&lt;BR /&gt;&lt;BR /&gt;radius server ISE-2&lt;BR /&gt; address ipv4 x.x.10.53 auth-port 1812 acct-port 1813&lt;BR /&gt; automate-tester username test probe-on&lt;BR /&gt; key&amp;nbsp;cisco&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on the aaa group i was not referencing radius servers with their name, thus the NAD did not initiate radius requests to ISE.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Dec 2018 06:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-request-not-reaching-ise/m-p/3765595#M487071</guid>
      <dc:creator>michalis1234</dc:creator>
      <dc:date>2018-12-18T06:53:15Z</dc:date>
    </item>
  </channel>
</rss>

