<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dot1x/RADIUS server failure in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/4167318#M563330</link>
    <description>&lt;P&gt;HI&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have implemented something very similar to your suggestion and I am successfully assigning a vlan and acl to the port on AAA failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what does no see to be working is the process of when the AAA server recovers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have this as the event&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;event aaa-available match-first&lt;BR /&gt;10 class IN_AAA_Down_ST do-until-failure&lt;BR /&gt;10 clear-session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type control subscriber match-all IN_AAA_Down_ST&lt;BR /&gt;match activated-service-template AAA_Down&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;service-template AAA_Down&lt;BR /&gt;access-group AAA_DOWN_ACL_DATA&lt;BR /&gt;vlan 999&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show&amp;nbsp;policy-map type control subscriber detail&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Event: event aaa-available match-first&lt;BR /&gt;Class-map: 10 class IN_AAA_Down_ST do-until-failure&lt;BR /&gt;Action: 10 clear-session&lt;BR /&gt;Executed:0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Oct 2020 08:24:03 GMT</pubDate>
    <dc:creator>awinslade</dc:creator>
    <dc:date>2020-10-15T08:24:03Z</dc:date>
    <item>
      <title>Dot1x/RADIUS server failure</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3994806#M543385</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im looking for conformation of the default behavior of DOT1x in the event that no authentication servers are available and equally can this be controlled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am mid deployment and testing and expect that my customer will require the network to permit some basic connectivity in the even that the radius server is unavailable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for the removal of doubt this is not when authentication is rejected (fails) but when the authentication process fails.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS this is for a 9300 using&amp;nbsp;this type of config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber DOT1X-POL&lt;BR /&gt;&amp;nbsp;event session-started match-all&lt;BR /&gt;&amp;nbsp; 10 class always do-until-failure&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10 authenticate using dot1x priority 10&lt;BR /&gt;&amp;nbsp;event authentication-failure match-first&lt;BR /&gt;&amp;nbsp; 10 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using mab priority 20&lt;BR /&gt;&amp;nbsp; 20 class MAB_FAILED do-until-failure&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10 terminate mab&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 20 authenticate using webauth parameter-map WEBAUTH_FALLBACK priority 30&lt;BR /&gt;&amp;nbsp; 30 class always do-until-failure&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10 terminate dot1x&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 20 terminate mab&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 30 terminate webauth&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 40 authentication-restart 60&lt;BR /&gt;&amp;nbsp;event agent-found match-all&lt;BR /&gt;&amp;nbsp; 10 class always do-until-failure&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10 terminate mab&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 20 terminate webauth&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 30 authenticate using dot1x priority 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 14:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3994806#M543385</guid>
      <dc:creator>awinslade</dc:creator>
      <dc:date>2019-12-06T14:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x/RADIUS server failure</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3994980#M543386</link>
      <description>I am mid deployment and testing and expect that my customer will require the network to permit some basic connectivity in the even that the radius server is unavailable.&lt;BR /&gt;for the removal of doubt this is not when authentication is rejected (fails) but when the authentication process fails.&lt;BR /&gt;&lt;BR /&gt;-I assume you mean when the auth process fails due to the NAD identifying the AAA servers are dead, and not when dot1x fails and falls back to mab. If so, my suggestion would be to implement a separate class-map in your pmap that essentially pauses reauth, and authorizes your clients into your 'critical' vlan via activation of a service-template. The separate service template would include authz information such as vlan, sgt, etc. You will also need an event further down that will trigger when the NAD determines the AAA servers are alive. Could look something along the lines of this:&lt;BR /&gt;&lt;BR /&gt;Make it sequence 30 after attempting match first on flexauth options.&lt;BR /&gt;30 class ISE_Server_Down do-until-failure&lt;BR /&gt;10 active service-template Critical_Temp&lt;BR /&gt;20 authorize&lt;BR /&gt;30 pause reauthentication&lt;BR /&gt;&lt;BR /&gt;class-map type control subscriber match-all ISE_Server_Down&lt;BR /&gt;match authz-status authz&lt;BR /&gt;match result-type aaa-timeout&lt;BR /&gt;&lt;BR /&gt;service-template Critical_Temp&lt;BR /&gt;vlan XXXX&lt;BR /&gt;sgt 3&lt;BR /&gt;&lt;BR /&gt;event aaa-avail match-all&lt;BR /&gt;10 class If_Critical_VLAN do-until-fail&lt;BR /&gt;10 clear-session&lt;BR /&gt;&lt;BR /&gt;class-map type control subscriber match-all If_Critical_VLAN&lt;BR /&gt;match activated-service-template Critical_Temp&lt;BR /&gt;&lt;BR /&gt;I would check out config guides, and test tweaks in a lab prior to any implementation. Hopefully this helps you out on your journey.</description>
      <pubDate>Fri, 06 Dec 2019 17:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3994980#M543386</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-12-06T17:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x/RADIUS server failure</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3995619#M543387</link>
      <description>&lt;P&gt;IBNS 2.0 can be tricky - I am not an expert but I am cobbling together bits and pieces:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;see below - you need to match two separate cases&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Port not yet authorized and then AAA dies:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;class AAA_SVR_DOWN_UNAUTHD_HOST&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Port already authorized and then AAA dies:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;see below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;policy-map type control subscriber PORT-AUTH-POLICY-I
 event session-started match-all
  10 class always do-until-failure
   10 authenticate using mab priority 10
 event authentication-failure match-first
  10 class MAB_FAILED do-until-failure
   10 terminate mab
   20 authenticate using dot1x priority 10
  20 class DOT1X_FAILED do-until-failure
   10 terminate dot1x
   20 authentication-restart 60
  30 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure
   10 clear-authenticated-data-hosts-on-port
   20 activate service-template CRITICAL_AUTH_ACCESS
   30 activate service-template DEFAULT_CRITICAL_VOICE_TEMPLATE
   40 authorize
   50 pause reauthentication
  40 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure
   10 pause reauthentication
   20 authorize
  50 class DOT1X_NO_RESP do-until-failure
   10 terminate dot1x
   20 activate service-template CRITICAL_AUTH_ACCESS
   30 activate service-template DEFAULT_CRITICAL_VOICE_TEMPLATE
   40 authorize
   50 pause reauthentication
  70 class always do-until-failure
   10 terminate dot1x
   15 terminate mab
   20 activate service-template CRITICAL_AUTH_ACCESS
   30 activate service-template DEFAULT_CRITICAL_VOICE_TEMPLATE
   40 authorize
   50 pause reauthentication
 event agent-found match-all
  10 class always do-until-failure
   10 terminate mab
   20 authenticate using dot1x priority 10
 event aaa-available match-all
  10 class IN_CRITICAL_AUTH do-until-failure
   10 clear-session
  20 class NOT_IN_CRITICAL_AUTH do-until-failure
   10 resume reauthentication
 event inactivity-timeout match-all
  10 class always do-until-failure
   10 clear-session
 event authentication-success match-all
  10 class always do-until-failure
   10 activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE
&lt;/PRE&gt;</description>
      <pubDate>Mon, 09 Dec 2019 06:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3995619#M543387</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-12-09T06:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x/RADIUS server failure</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3996131#M543388</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;A few things I've come across with critical authentication are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The AAA_SVR_DOWN_UNAUTHD_HOST ibns 2 class is matched by policy if ISE is unavailable and the client is unauthorised (as you would expect)&lt;/LI&gt;&lt;LI&gt;The AAA_SVR_DOWN_AUTHD_HOST ibns 2 class is matched by policy if ISE is unavailable and the authenticated client's periodic reauthentication timer has expired (ie periodic authentication has to be configured for this class to be matched)&lt;/LI&gt;&lt;LI&gt;When using TrustSec for authorisation, cts environment data (SGTs and SGACLs downloaded from ISE) will eventually expire (default is 24 hours) and be deleted from the switch (3ks don't support caching and cts environment data is volatile - it won't survive a reload. I'm not sure if the 9ks support caching). I have periodic reauthentication enabled (timer set by ISE) to reauthenticate all clients before the cts environment data expires.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;BR /&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2019 23:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/3996131#M543388</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2019-12-09T23:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x/RADIUS server failure</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/4167318#M563330</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have implemented something very similar to your suggestion and I am successfully assigning a vlan and acl to the port on AAA failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what does no see to be working is the process of when the AAA server recovers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have this as the event&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;event aaa-available match-first&lt;BR /&gt;10 class IN_AAA_Down_ST do-until-failure&lt;BR /&gt;10 clear-session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type control subscriber match-all IN_AAA_Down_ST&lt;BR /&gt;match activated-service-template AAA_Down&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;service-template AAA_Down&lt;BR /&gt;access-group AAA_DOWN_ACL_DATA&lt;BR /&gt;vlan 999&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show&amp;nbsp;policy-map type control subscriber detail&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Event: event aaa-available match-first&lt;BR /&gt;Class-map: 10 class IN_AAA_Down_ST do-until-failure&lt;BR /&gt;Action: 10 clear-session&lt;BR /&gt;Executed:0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 08:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/4167318#M563330</guid>
      <dc:creator>awinslade</dc:creator>
      <dc:date>2020-10-15T08:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x/RADIUS server failure</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/4167338#M563331</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;What does the output of &lt;STRONG&gt;"show aaa servers&lt;/STRONG&gt;" show when your aaa server transitions from dead to alive? Do you see "&lt;STRONG&gt;State: current UP&lt;/STRONG&gt;" and "&lt;STRONG&gt;Platform State from SMD: current UP&lt;/STRONG&gt;"?&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 09:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/4167338#M563331</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2020-10-15T09:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x/RADIUS server failure</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/4167341#M563332</link>
      <description>&lt;P&gt;sh aaa servers&lt;/P&gt;&lt;P&gt;RADIUS: id 1, priority 1, host 10.10.10.5, auth-port 1812, acct-port 1813&lt;BR /&gt;State: current UP, duration 4661s, previous duration 0s&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 09:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-radius-server-failure/m-p/4167341#M563332</guid>
      <dc:creator>awinslade</dc:creator>
      <dc:date>2020-10-15T09:17:29Z</dc:date>
    </item>
  </channel>
</rss>

