cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5378
Views
6
Helpful
6
Replies

Behaviour of authentication alive action configuration

georgehewittuk1
Level 1
Level 1

Hello,

Regarding this statement "authentication event server alive action reinitialize" if it is not included in switchport configuration when dead events are configured to use for example a specifc VLAN only what will be the behaviour? Will it not go back to authentication from the ISE until restarted?

Thanks
George

1 Accepted Solution

Accepted Solutions

Hi, Assuming you have the command "authentication event server dead action authorize" this will authorise a session (re-authenticating or new) in the critical auth vlan, in the event the AAA servers are marked down.

When the AAA servers are alive again the command "authentication event server alive action reinitialize" will automatically re-authorise the session, removing the client from the critical auth vlan and assigning the correct vlan/dacl or whatever is pushed down when authorised from ISE.

If you don't have that command configured the client will just sit there in the critical auth vlan, until they manually reset their network connection, at which point authentication will be attempted again and they should be authenticated by ISE.

 

HTH

View solution in original post

6 Replies 6

Hi, Assuming you have the command "authentication event server dead action authorize" this will authorise a session (re-authenticating or new) in the critical auth vlan, in the event the AAA servers are marked down.

When the AAA servers are alive again the command "authentication event server alive action reinitialize" will automatically re-authorise the session, removing the client from the critical auth vlan and assigning the correct vlan/dacl or whatever is pushed down when authorised from ISE.

If you don't have that command configured the client will just sit there in the critical auth vlan, until they manually reset their network connection, at which point authentication will be attempted again and they should be authenticated by ISE.

 

HTH

In my test environment, using a C9300, version 17.6.5, after configuring the following commands, if the ISE goes down, although it can be assigned a crisis VLAN, the terminal will disconnect from the network every 60s and reacquire the crisis VLAN after 40s

Can anyone tell me how to fix the problem?
I want the terminal to not drop every 60s after getting the crisis VLAN authorization

TerenceJh_0-1691071290436.png

 

@Terence.Jh AFAIK only once the RADIUS servers are available again will the session reinitialize.

Are you sure Critical Auth has been applied to the session? Please provide the output of "show authentication session int gig1/0/1 detail"

hi rob

You can see that I used 2 null0 routes to simulate ISE downtime

and re-shutdown the interface to trigger a new authentication session for the client when ISE is down

TerenceJh_0-1691147165162.png

After about 30s, the authentication fails and the client gets the crisis vlan

TerenceJh_2-1691147195407.png

But after 60 seconds or so, the endpoint exits and a new authentication occurs, the reason seems to be that the switch doesn't think the ISE is dead, the switch looks at the AAA servers and they think the ISE is still running. In this cycle, the endpoint acquires the crisis VLAN for 60s, after which it triggers re-authentication and continues to acquire the crisis VLAN for 60s 。。。。。

TerenceJh_4-1691147235617.png

 

Do you have "dot1x critical eapol" configured on the switch - this will send the client an EAP-success during a critical authentication event.
hth
Andy

of course

my switch configuration has this commands

TerenceJh_0-1691147637424.png