cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5148
Views
10
Helpful
5
Replies

Cisco ISE: Changing the domain user doesn't trigger automatic reauthentication

Hello all,

I am working on authentication Dot1x with Cisco ISE 1.2 and Switches Catalyst 2960 and 2950.

I need to know if there is a command that can make the port reauthenticating when the user change his AD account on the host?

unpluging/pluging cables is frustrating :(

 

Many thanks.

 

1 Accepted Solution

Accepted Solutions

this would let both user and machine authenticate. for"5434Endpoint conducted several failed authentications of the same scenario" check  Suppress Anomalous Clients option.  This issue comes in to picture when endpoint attempts a couple of failed authentications and if Suppress Anomalous Clients option with Reject Requests After Detection is enabled then  ISE Policy nodes protect themselves from overwhelming numbers of authentication requests by sending an immediate reject for suppressed clients as opposed to processing all the steps in a normal authentication. So if that user did some authentication failure, he will be locked for 1 hours (bydefault).

View solution in original post

5 Replies 5

nspasov
Cisco Employee
Cisco Employee

How is the supplicant on the endpoint configured? Do you have "computer authentication" only? You should have it configured with "computer or user authentication"

 

Thank you for rating helpful posts!

Hello Neno, Yes It is configured with 'computer or user authentication' ..

Charles Hill
VIP Alumni
VIP Alumni

Here is a link on how to enable 802.1X on the end device for a wired or wireless network.

http://windows.microsoft.com/en-us/windows/enable-802-1x-authentication#1TC=windows-7

If the switch receives the EAP-Logoff message from the pc/supplicant, it should terminate the existing session.


To manually re-authenticate a client, enter:
dot1x re-authenticate interface g0/1

to configure a port to periodically re-authenticate enter:
dot1x re-authentication
dot1x timeout re-authperiod 4000

Here are two links on configuring 802.1x.

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-1_9_ea1/configuration/guide/scg/Sw8021x.html#wp1036106
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_8021x/configuration/15-2mt/sec-ieee-8021x-rad-supp-sess-t.html

 

 

 

 

Ooh !! My problem is bigger than that it seems, on seeing the logs of authentication I found that the access was permitted by the default rule 'if no matches' bacause the supplicant (Win7) use only PEAP for authentication. The ISE recognise the Identity store and locate the user succesfully but It doesn't grant access to user based on this rule. How can I make ISE Communicate succesfully with PEAP. Here are the Logs:

11001Received RADIUS Access-Request
 11017RADIUS created a new session
 15049Evaluating Policy Group
 15008Evaluating Service Selection Policy
 15048Queried PIP
 15048Queried PIP
 15004Matched rule
 11507Extracted EAP-Response/Identity
 12500Prepared EAP-Request proposing EAP-TLS with challenge
 12625Valid EAP-Key-Name attribute received
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12301Extracted EAP-Response/NAK requesting to use PEAP instead
 12300Prepared EAP-Request proposing PEAP with challenge
 12625Valid EAP-Key-Name attribute received
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12302Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated
 12318Successfully negotiated PEAP version 0
 12800Extracted first TLS record; TLS handshake started
 12805Extracted TLS ClientHello message
 12806Prepared TLS ServerHello message
 12807Prepared TLS Certificate message
 12810Prepared TLS ServerDone message
 12305Prepared EAP-Request with another PEAP challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12304Extracted EAP-Response containing PEAP challenge-response
 12318Successfully negotiated PEAP version 0
 12812Extracted TLS ClientKeyExchange message
 12804Extracted TLS Finished message
 12801Prepared TLS ChangeCipherSpec message
 12802Prepared TLS Finished message
 12816TLS handshake succeeded
 12310PEAP full handshake finished successfully
 12305Prepared EAP-Request with another PEAP challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12304Extracted EAP-Response containing PEAP challenge-response
 12313PEAP inner method started
 11521Prepared EAP-Request/Identity for inner EAP method
 12305Prepared EAP-Request with another PEAP challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12304Extracted EAP-Response containing PEAP challenge-response
 11522Extracted EAP-Response/Identity for inner EAP method
 11806Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge
 12305Prepared EAP-Request with another PEAP challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12304Extracted EAP-Response containing PEAP challenge-response
 11808Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated
 15041Evaluating Identity Policy
 15006Matched Default Rule
 15013Selected Identity Source - AD1
 24430Authenticating user against Active Directory
 24402User authentication against Active Directory succeeded
 22037Authentication Passed
 11824EAP-MSCHAP authentication attempt passed
 12305Prepared EAP-Request with another PEAP challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12304Extracted EAP-Response containing PEAP challenge-response
 11810Extracted EAP-Response for inner method containing MSCHAP challenge-response
 11814Inner EAP-MSCHAP authentication succeeded
 11519Prepared EAP-Success for inner EAP method
 12314PEAP inner method finished successfully
 12305Prepared EAP-Request with another PEAP challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12304Extracted EAP-Response containing PEAP challenge-response
 24422ISE has confirmed previous successful machine authentication for user in Active Directory
 15036Evaluating Authorization Policy
 24432

Looking up user in Active Directory - ********\*******

 24416User's Groups retrieval from Active Directory succeeded
 15048Queried PIP
 15048Queried PIP
 15048Queried PIP
 15004Matched rule - Default
 15016Selected Authorization Profile - DenyAccess
 15039Rejected per authorization profile
 12306PEAP authentication succeeded
 11503Prepared EAP-Success
 11003Returned RADIUS Access-Reject
 5434Endpoint conducted several failed authentications of the same scenario

this would let both user and machine authenticate. for"5434Endpoint conducted several failed authentications of the same scenario" check  Suppress Anomalous Clients option.  This issue comes in to picture when endpoint attempts a couple of failed authentications and if Suppress Anomalous Clients option with Reject Requests After Detection is enabled then  ISE Policy nodes protect themselves from overwhelming numbers of authentication requests by sending an immediate reject for suppressed clients as opposed to processing all the steps in a normal authentication. So if that user did some authentication failure, he will be locked for 1 hours (bydefault).