09-28-2021 12:18 AM
Hi there,
I am facing some problems when implementing 802.1X in my environment (Catalyst 2960x).
802.1X is working fine so far and the config should be right. But sometimes, the switch is trying to authenticate the Cisco Phone and not the windows client. I then get the following message:
Sep 28 08:32:13.775 MESZ: %DOT1X-5-FAIL: Authentication failed for client (xxxx.xxxx.xxxx) on Interface Gi1/0/16 AuditSessionID XYZ.
But the xxxx.xxxx.xxxx mac-adress is the mac of the phone ... this causes the client to get unauthenticated.
What causes the switch to authenticate the phone and not the client?
Port Config:
switchport access vlan 11
switchport mode access
switchport voice vlan 152
authentication port-control auto
dot1x pae authenticator
storm-control broadcast level pps 100
storm-control multicast level bps 500k
storm-control action shutdown
spanning-tree portfast edge
spanning-tree bpduguard enable
AAA-Konfig:
aaa new-model
aaa authentication login default local
aaa authentication login CON local-case
aaa authentication login VTY group radius local
aaa authentication dot1x default group radius
aaa authorization exec VTY group radius if-authenticated
aaa authorization exec CON local
aaa authorization commands 15 VTY if-authenticated
aaa authorization commands 15 CON local
aaa authorization network default group radius
aaa accounting dot1x default start-stop group radius
Thanks in advance!
aaa session-id common
Solved! Go to Solution.
09-29-2021 03:56 PM
I would suggest reviewing your design and configuration against the IP Telephony for 802.1X Design Guide. This is an old document, but nothing much has changed around how the phones and PC get authenticated separately and the important mechanisms to understand and configure. These concepts would apply when using any RADIUS server.
Some key points based on what has been discussed in this thread:
For the latter two possibilities, see TrustSec 1.99 Deployment Note: FlexAuth Order, Priority, and Failed Authentication.
09-28-2021 01:28 AM - edited 09-28-2021 01:35 AM
Is that the full interface configuration? Potentially the host mode could be single-host mode (it's not defined and I don't know what the default is on your switch model/version), so only the phone would authenticate, not the PC.
Try configuring multi-domain "authentication host-mode multi-domain" under the interface, this will authenticate one device in the voice domain and one device in the data domain.
You are obviously also failing to authenticate the phone, so check the ISE logs to determine why that is failing.
Refer to the ISE Wired Guide for more information.
09-28-2021 02:50 AM
Yes, this is the full interface configuration.
In the first step we just want to authenticate the PC and not the phones ... so the phones should not take part in the authentication process. We have a RADIUS-server (no ISE) running which is authenticating the clients ... in 95% this works well. But sometimes the authentication is initalized by the phones mac adress. Is there a way to "ignore" the phone in the authentication process?
I think the single-host mode would be right, but the "single host" should then be the PC and not the phone. Is there a way to force this?
09-28-2021 03:03 AM
No unfortunately that's not possible, according to this post, there used to be a feature to bypass phone authentication, but this was depreciated years ago.
https://community.cisco.com/t5/network-access-control/802-1x-single-host-mode/td-p/2734265
You'll need to use multi-domain and authenticate both the PC and Phone.
09-28-2021 03:56 AM - edited 09-28-2021 04:00 AM
Okay, thanks for the information.
Since we have no ISE, is there a way to configure the host mode to multi-domain but authenticating the phone via MAB and the PC via EAP/802.1X?
09-28-2021 04:07 AM
If using MAB the endpoint will send it's MAC address as the username and password, so whatever RADIUS server/backend authentication identity store you are using will need a username/password defined for each phone.
09-28-2021 04:10 AM - edited 09-28-2021 04:10 AM
Yes, thats no problem. The mac adresses of the phones are all stored in our NAC (which is also the radius-server), so this should be fine.
I am just wondering about the port configuration to achieve this, because I have to use two different authentication types on one port.
09-28-2021 04:13 AM - edited 09-28-2021 04:13 AM
You configure "authentication host-mode multi-domain" under the interface.
interface gigabitethernet 1/0/1
authentication host-mode multi-domain
09-30-2021 08:31 AM
You should also add the line "mab" to the port config.
When using mab, the switch captures it and sends it to the radius server, the device isn't aware of any auth taking place.
Configure auth host-mode multi-domain also.
09-29-2021 03:01 AM
That doesn't solve the problem, because I want to authenticate the phone via MAB and the PC via 802.1X.
When configuing authentication host-mode multi-domain, the phone is also authenticated via 802.1X.
I tried to configure the following now:
authentication event fail action next-method
authentication priority dot1x mab
authentication host-mode multi-domain
authentication port-control auto
mab
dot1x pae authenticator
dot1x max-reauth-req 3
... but the phone does no fallback to MAB (or the port get in err-disabled state before it would fallback to mab).
09-29-2021 04:06 AM
you also need to configure
authentication order dot1x mab
09-29-2021 03:56 PM
I would suggest reviewing your design and configuration against the IP Telephony for 802.1X Design Guide. This is an old document, but nothing much has changed around how the phones and PC get authenticated separately and the important mechanisms to understand and configure. These concepts would apply when using any RADIUS server.
Some key points based on what has been discussed in this thread:
For the latter two possibilities, see TrustSec 1.99 Deployment Note: FlexAuth Order, Priority, and Failed Authentication.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide