<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft Vendor Specific Attribute - Vendor-Type 4170? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543541#M535582</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried this with my local NPS. Tunnel-Tag is listed under standard attributes, not under Microsoft.&lt;/P&gt;&lt;P&gt;When I use it in the policy, it does not make it into the RADIUS response at all. Perhaps it's used for some other NPS function beside RADIUS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Jun 2017 22:27:48 GMT</pubDate>
    <dc:creator>vibobrov</dc:creator>
    <dc:date>2017-06-16T22:27:48Z</dc:date>
    <item>
      <title>Microsoft Vendor Specific Attribute - Vendor-Type 4170?</title>
      <link>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543538#M535577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a weird one. &lt;/P&gt;&lt;P&gt;But concerns me because I am migrating a customer's ACS 5.2 to ISE 2.2 and in one of their ACS Policy Results they include a VSA called MS-Tunnel-Tag inside the Microsoft VSA dictionary.&amp;nbsp; Customer performs a lot of dynamic VLAN assignments using 802.1X.&amp;nbsp; Microsoft mentions this VSA in this &lt;A href="https://technet.microsoft.com/en-us/library/cc754422(v=ws.10).aspx"&gt;TechNet&lt;/A&gt; posting as being possibly required by some vendors, and I also see reference to 4170 in &lt;A href="http://www.deepsoftware.com/iasviewer/attributeslist.html"&gt;this posting&lt;/A&gt; about IAS (predecessor to NPS). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The weird part is that the Vendor-Type is 4170 (decimal) and this is (to my knowledge) illegal since the Vendor-Type may only be 0-255 since it's an 8bit field (see &lt;A href="https://tools.ietf.org/html/rfc2548"&gt;RFC2548&lt;/A&gt;).&amp;nbsp; Both ISE 2.2 and latest Wireshark conform to the RFC.&amp;nbsp; But our friend ACS 5.2 below allows &amp;gt;32bit values, including 4170!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer also uses a large fleet of Microsoft NPS servers (Radius platform) alongside ACS, and Tunnel-Tag is also there!&lt;/P&gt;&lt;P&gt;There is also an &lt;A href="https://supportforums.cisco.com/discussion/9552051/yet-another-ias-8021x-dynamic-vlan-question"&gt;old Cisco Support posting &lt;/A&gt;where IAS is mentioned in context of this Vendor-Type.&amp;nbsp; I makes me think that it's not a complete fiction...&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ACS-MS-tunnel-tag.PNG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/108356_ACS-MS-tunnel-tag.PNG" style="width: 620px; height: 344px;" /&gt;&lt;/P&gt;&lt;P&gt;And used multiple with different VLAN values throughout their deployment&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.cisco.com/legacyfs/online/fusion/108359_pastedImage_7.png" style="max-height: 900px; max-width: 1200px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I started migrating ACS to ISE I tried this and ISE doesn't allow this value.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ISE-outofrange.PNG" class="jive-image image-2" src="https://community.cisco.com/legacyfs/online/fusion/108357_ISE-outofrange.PNG" style="width: 620px; height: 406px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I did a Wireshark trace of the ACS Access-Accept packet I see that the 4170 is not found.&amp;nbsp; 4170 is 0x104a (hex) and&amp;nbsp; it appears that even though it's configured as 0x104a, only the lower portion of the 32bit word is sent on the wire.&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-3" src="https://community.cisco.com/legacyfs/online/fusion/108358_pastedImage_3.png" style="max-height: 900px; max-width: 1200px;" /&gt;&lt;/P&gt;&lt;P&gt;So it seems that ACS wrongly accepts values greater than 255?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a test by removing the MS-Tunnel-Tag from their lab ACS and there was no detrimental impact (the NAD is a WX5004 from H3C).&lt;/P&gt;&lt;P&gt;The other attributes that one commonly finds in these return policies took care of the VLAN assignment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I am just wondering whether anyone knows if the &lt;SPAN style="text-decoration: underline;"&gt;MS-Tunnel-Tag&lt;/SPAN&gt; was something historical?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And how is it possible that ACS and NPS allowed that Vendor-Type to be configured in a Radius Access-Accept policy?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jun 2017 23:13:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543538#M535577</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-06-15T23:13:38Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Vendor Specific Attribute - Vendor-Type 4170?</title>
      <link>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543539#M535578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;4170 is an internal ID that NPS/IAS use to catalogue attributes. You can find in c:\windows\system32\ias\dnary.xml:&lt;/P&gt;&lt;P&gt;&amp;lt;Attribute&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;ID&amp;gt;4170&amp;lt;/ID&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Name&amp;gt;Tunnel-Tag&amp;lt;/Name&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Syntax&amp;gt;Integer&amp;lt;/Syntax&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;MultiValued&amp;gt;0&amp;lt;/MultiValued&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;VendorID&amp;gt;311&amp;lt;/VendorID&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Is-Security-Sensitive&amp;gt;0&amp;lt;/Is-Security-Sensitive&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;IsAllowedInProfile&amp;gt;1&amp;lt;/IsAllowedInProfile&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;IsAllowedInCondition&amp;gt;0&amp;lt;/IsAllowedInCondition&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;IsAllowedInProxyProfile&amp;gt;1&amp;lt;/IsAllowedInProxyProfile&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;IsAllowedInProxyCondition&amp;gt;0&amp;lt;/IsAllowedInProxyCondition&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;LDAPName&amp;gt;msTunnelTag&amp;lt;/LDAPName&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;IsTunnelAttribute&amp;gt;0&amp;lt;/IsTunnelAttribute&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/Attribute&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the packet capture in your screenshot, you're looking at VSA attribute (26/0x1a), Vendor Microsoft (311/0x137), Attribute 74 (0x4a). 6 is the length of the attribute, including ID, 00 00 00 02 is the value.&lt;/P&gt;&lt;P&gt;I can't find this attribute 74 in any Microsoft dictionaries i looked at.&lt;/P&gt;&lt;P&gt;ISE allows you to create custom attributes in the dictionary. Based on the length the type of the attribute should be UINT32.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Jun 2017 00:46:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543539#M535578</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2017-06-16T00:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Vendor Specific Attribute - Vendor-Type 4170?</title>
      <link>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543540#M535580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Viktor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the IAS c:\windows\system32\ias\dnary.xml reference.&lt;/P&gt;&lt;P&gt;Are you able to check&lt;/P&gt;&lt;P&gt;- whether &lt;STRONG&gt;IAS can return&lt;/STRONG&gt; this value in a radius Access-Accept message to a NAS? &lt;/P&gt;&lt;P&gt;- what the radius packet looks like when it does so?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes - attribute 74 (0x4a) is not valid at all, and it's a result of chopping the WORD 0x104a in half! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess my point was that ACS GUI allows the user to enter some &lt;EM&gt;bogus&lt;/EM&gt; value, and then the ACS UDP/Radius stack takes only the 8bits of that user-entered value (no bounds checking). &lt;/P&gt;&lt;P&gt;The Wireshark that I shared was taken from the ACS that sent the Access-Accept.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my conclusion is that even if the customer's intention was to send MS-Tunnel-Tag (x104a) to a NAS, and ACS GUI allows the value to be entered, the resulting VSA that ACS puts in the Radius packet is garbage (0x4a).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Garbage in, garbage out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Jun 2017 03:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543540#M535580</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-06-16T03:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Vendor Specific Attribute - Vendor-Type 4170?</title>
      <link>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543541#M535582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried this with my local NPS. Tunnel-Tag is listed under standard attributes, not under Microsoft.&lt;/P&gt;&lt;P&gt;When I use it in the policy, it does not make it into the RADIUS response at all. Perhaps it's used for some other NPS function beside RADIUS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Jun 2017 22:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543541#M535582</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2017-06-16T22:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Vendor Specific Attribute - Vendor-Type 4170?</title>
      <link>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543542#M535584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Victor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for verifying the effects of this in NPS.&amp;nbsp; It helped me greatly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jun 2017 23:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/microsoft-vendor-specific-attribute-vendor-type-4170/m-p/3543542#M535584</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-06-20T23:53:41Z</dc:date>
    </item>
  </channel>
</rss>

