<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Juniper EX Network Device Profile with CoA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4786941#M580234</link>
    <description>&lt;P&gt;Using Cisco AAA (Cisco prime Access registrar 9.2) and Juniper BNG, PoD is working find. With CoA 99% of times getting the error code 503: Session context not found. I have similar NAC configurations as yours. What could be wrong? Appreciate your response.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Mar 2023 23:46:42 GMT</pubDate>
    <dc:creator>szafar</dc:creator>
    <dc:date>2023-03-03T23:46:42Z</dc:date>
    <item>
      <title>Juniper EX Network Device Profile with CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4130553#M562111</link>
      <description>&lt;P&gt;I recently worked with a customer that is deploying Juniper EX switches with their existing ISE 2.6 cluster for NAC. We found that the currently available Network Device Profile for Juniper EX switches did not provide the ability to perform CoA actions against an active session.&lt;BR /&gt;After working with the customer and their Juniper resources, we confirmed that the Juniper switches being deployed do support the Cisco AV-Pair for 'subscriber:command=reauthenticate' to provide for basic CoA Reauth. Based on the customer testing, I have updated the XML file and attached it here for others to use. Please note that the Juniper switches do not support the additional Cisco AVP attributes for 'rerun' and 'last' so all three Re-authenticate attributes (Base, Rerun, Last) use only the single AV-Pair. As such, all three CoA actions have the same result.&lt;/P&gt;
&lt;P&gt;The Juniper resource also confirmed that the Juniper switches being deployed support CoA Port-Bounce based on &lt;A href="https://www.juniper.net/documentation/en_US/junos/topics/topic-map/802-1x-authentication-switching-devices.html#id-understanding-radius-initiated-changes-to-an-authorized-user-session" target="_self"&gt;this document&lt;/A&gt;. ISE does not have a default Dictionary for this AVP, so it requires manually adding the attribute and updating the Network Device Profile to use it (I could not include this in the attached XML as the import fails with a 'validation error' without the Dictionary being added first).&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Add the Dictionary:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-08-05 at 12.35.59 pm.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/80820i2E9F04A18314231C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-08-05 at 12.35.59 pm.png" alt="Screen Shot 2020-08-05 at 12.35.59 pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Update the Juniper Network Device Profile:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-08-05 at 12.53.05 pm.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/80821i54E7F71156FDEEEB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-08-05 at 12.53.05 pm.png" alt="Screen Shot 2020-08-05 at 12.53.05 pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This was validated by the customer using the following components:&lt;/P&gt;
&lt;P&gt;ISE 2.6 patch 6&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hardware EX4300-48P&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Junos:18.4R2-S2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The NAC-related configuration provided by the Juniper resources was:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;set access radius-server &amp;lt;ip&amp;gt; dynamic-request-port 3799
set access radius-server &amp;lt;ip&amp;gt; secret &amp;lt;secret&amp;gt;
set access profile 8021x-auth accounting-order radius
set access profile 8021x-auth authentication-order radius
set access profile 8021x-auth radius authentication-server &amp;lt;ip&amp;gt;
set access profile 8021x-auth radius accounting-server &amp;lt;ip&amp;gt;
set access profile 8021x-auth radius options nas-port-type ethernet ethernet
set access profile 8021x-auth radius-server &amp;lt;ip&amp;gt; port 1812
set access profile 8021x-auth radius-server &amp;lt;ip&amp;gt; dynamic-request-port 3799
set access profile 8021x-auth radius-server &amp;lt;ip&amp;gt; secret &amp;lt;secret&amp;gt;
set access profile 8021x-auth radius-server &amp;lt;ip&amp;gt; source-address &amp;lt;src-ip&amp;gt;
set access profile 8021x-auth accounting order radius
set access profile 8021x-auth accounting accounting-stop-on-failure
set access profile 8021x-auth accounting accounting-stop-on-access-deny
set access profile 8021x-auth accounting coa-immediate-update
set access profile 8021x-auth accounting update-interval 30
!
set firewall family inet filter v4_PROTECT_RE_FILTER term PERMIT_RADIUS_CoA from source-prefix-list MGMT_PREFIX
set firewall family inet filter v4_PROTECT_RE_FILTER term PERMIT_RADIUS_CoA from source-prefix-list NSM_PREFIX
set firewall family inet filter v4_PROTECT_RE_FILTER term PERMIT_RADIUS_CoA from protocol udp
set firewall family inet filter v4_PROTECT_RE_FILTER term PERMIT_RADIUS_CoA from destination-port 3799
set firewall family inet filter v4_PROTECT_RE_FILTER term PERMIT_RADIUS_CoA then policer radius-policer
set firewall family inet filter v4_PROTECT_RE_FILTER term PERMIT_RADIUS_CoA then count radius_coa
set firewall family inet filter v4_PROTECT_RE_FILTER term PERMIT_RADIUS_CoA then accept&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;I hope this helps others looking at a similar deployment.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 05:02:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4130553#M562111</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-08-05T05:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper EX Network Device Profile with CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4133230#M562242</link>
      <description>Thank you Greg! This is a great contribution!</description>
      <pubDate>Mon, 10 Aug 2020 17:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4133230#M562242</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-08-10T17:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper EX Network Device Profile with CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4629447#M575387</link>
      <description>&lt;P&gt;Thank you Greg&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 09:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4629447#M575387</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2022-06-10T09:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper EX Network Device Profile with CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4786941#M580234</link>
      <description>&lt;P&gt;Using Cisco AAA (Cisco prime Access registrar 9.2) and Juniper BNG, PoD is working find. With CoA 99% of times getting the error code 503: Session context not found. I have similar NAC configurations as yours. What could be wrong? Appreciate your response.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 23:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4786941#M580234</guid>
      <dc:creator>szafar</dc:creator>
      <dc:date>2023-03-03T23:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: Juniper EX Network Device Profile with CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4945864#M584773</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I believe, that attribute name of item 52 is "Juniper-AV-Pair". Value Port-Bounce seems to be OK. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;A href="https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/topic-map/802-1x-authentication-switching-devices.html" target="_blank"&gt;https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/topic-map/802-1x-authentication-switching-devices.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Jozef&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2023 08:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/juniper-ex-network-device-profile-with-coa/m-p/4945864#M584773</guid>
      <dc:creator>jozefklacko</dc:creator>
      <dc:date>2023-10-23T08:49:25Z</dc:date>
    </item>
  </channel>
</rss>

