cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2841
Views
5
Helpful
1
Replies

802.1X Authentication with restricted Vlan : re-authentication attempts not happening

rrsstefano
Level 1
Level 1

Hi all,

 

I have some doubts regarding  the real behavoiur of Cisco IOS and IOS XE when a device that failed dot1x authentication is put in the fail vlan.

 

From documentation I see that : 

 

Users who fail authentication remain in the restricted VLAN until the next re-authentication attempt. A port
in the restricted VLAN tries to re-authenticate at configured intervals (the default is 60 seconds). If
re-authentication fails, the port remains in the restricted VLAN. If re-authentication is successful, the port
moves either to the configured VLAN or to a VLAN sent by the RADIUS server. You can disable
re-authentication.

 

But what I see is that the reauthentication never happen; to force re-authentication I have to configure local reauthentication timers ( authentication timer reauthenticate …. ) , but this solution is not feasible in general because it ovverrides the timers pushed by radius in case device is authenticated.

 

The scope is that the device in restricted vlan after it is checked and fixed need to be reauthenticated and put the correct vlan.Is it possible ?

Thanks for all feedbacks !!

 

This is our typical config :

 

SW-RMCI1-P2-2-X#show run int gi1/0/19
Building configuration...
Current configuration : 915 bytes
!
interface GigabitEthernet1/0/19
 description verso presa Lan Telefono IP + PC
 switchport access vlan 22
 switchport mode access
 switchport voice vlan 122
 srr-queue bandwidth share 10 10 20 60
 queue-set 2
 priority-queue out
 authentication control-direction in
 authentication event fail action authorize vlan 22
 authentication event server dead action authorize vlan 22
 authentication event server dead action authorize voice
 authentication event no-response action authorize vlan 22
 authentication event server alive action reinitialize
 authentication host-mode multi-domain
 authentication port-control auto
 authentication periodic
 authentication timer reauthenticate server
 mab
 mls qos trust device cisco-phone
 mls qos trust cos
 dot1x pae authenticator
 dot1x timeout tx-period 3
 spanning-tree portfast edge
 spanning-tree bpduguard disable
 service-policy input PC-SoftPhone+HardPhone
end
 
SW-RMCI1-P2-2-X#show authentication sessions interface gigabitEthernet 1/0/19 details
            Interface:  GigabitEthernet1/0/19
          MAC Address:  2c41.38b0.d37b
         IPv6 Address:  Unknown
         IPv4 Address:  10.69.123.128
            User-Name:  host/IUSP9X3Z.hd00.UNICREDITGROUP.EU
               Status:  Authorized
               Domain:  DATA
       Oper host mode:  multi-domain
     Oper control dir:  in
      Session timeout:  N/A
      Restart timeout:  N/A
Periodic Acct timeout:  N/A
    Common Session ID:  0A4578850000003705DCBF6B
      Acct Session ID:  0x0000004C
               Handle:  0x7A00001D
       Current Policy:  POLICY_Gi1/0/19
Local Policies:
        Service Template: AUTH_FAIL_VLAN_Gi1/0/19 (priority 150)
           Vlan Group:  Vlan: 22
Method status list:
       Method           State
       dot1x            Authc Failed
 
 
1 Accepted Solution

Accepted Solutions

thomas
Cisco Employee
Cisco Employee

According to ISE Secure Wired Access Prescriptive Deployment Guide ,

 authentication timer reauthenticate server

Should allow any reauthentication timers assigned by ISE / RADIUS to override any local settings.

You did not show any ISE LiveLog details so it's unclear what you assigned the port from ISE and why.

Verify you are downloading reauthentication timers from ISE in your Authorization Profile under

Policy > Policy Elements > Results > Authorization > Authorization Profiles :

image.png

View solution in original post

1 Reply 1

thomas
Cisco Employee
Cisco Employee

According to ISE Secure Wired Access Prescriptive Deployment Guide ,

 authentication timer reauthenticate server

Should allow any reauthentication timers assigned by ISE / RADIUS to override any local settings.

You did not show any ISE LiveLog details so it's unclear what you assigned the port from ISE and why.

Verify you are downloading reauthentication timers from ISE in your Authorization Profile under

Policy > Policy Elements > Results > Authorization > Authorization Profiles :

image.png