cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
227
Views
3
Helpful
5
Replies

Cisco ISE - MAB authorization behaviour

Jagermeister
Level 1
Level 1

Hi all,

I'm trying to setup ISE to perform a simple MAB profiling for a printer. For some reason ISE rejects the printer the first time I connect it:

Event5400 Authentication failed
Failure Reason15039 Rejected per authorization profile

 

I am using an authorization profile that contains a Logical Profile for printers. Within this logical profile I've added the a 'Ricoh-Device' Profiling Profile, which has a profiling condition to look if the Mac address OUI contains 'ricoh'. 

When i look up the device in the authentication endpoints I do see the printer with the 'Ricoh-Device' endpoint profile and the authentication failure reason, which is Rejected per authorization profile. Once i cycle the switchport manually, the device is getting accepted and placed into my printer VLAN.  After that the endpoint store is listing that it is using the correct authorization policy. 

I am hoping that someone can point me into the right direction. manually bouncing the port is not feasible, Can anyone help me finding out why this is happening?

 

Setup: 

- 2x ISE Node with all personas ( 3.4.0.608 ), hosted in Azure. 

- NAD: Various Cisco Meraki switches, my test lab is a MS120-8FP

Access policy:

Jagermeister_0-1728055283591.png

Authorization policy:

Jagermeister_1-1728055600813.png

 

1th attempt log:

Step IDDescriptionLatency (ms)
 11001Received RADIUS Access-Request
 11017RADIUS created a new session0
 11027Detected Host Lookup UseCase (Service-Type = Call Check (10))1
 15049Evaluating Policy Group0
 15008Evaluating Service Selection Policy0
 15041Evaluating Identity Policy1
 15048Queried PIP - Normalised Radius.RadiusFlowType1
 22072Selected identity source sequence - anonymized_AD_Sequence0
 15013Selected Identity Source - anonymized-AD1
 24432Looking up user in Active Directory - anonymized-AD0
 24325Resolving identity - <mac address anonymized>20
 24313Search for matching accounts at join point - anonymized.local1
 24318No matching account found in forest - anonymized.local0
 24367Skipping unusable domain - anonymized trust is one-way0
 24367Skipping unusable domain - anonymized trust is one-way0
 24367Skipping unusable domain - anonymized trust is one-way0
 24322Identity resolution detected no matching account0
 24352Identity resolution failed - ERROR_NO_SUCH_USER0
 24412User not found in Active Directory - anonymized-AD0
 15013Selected Identity Source - Internal Endpoints0
 24209Looking up Endpoint in Internal Endpoints IDStore - <mac address, anonymized>0
 24217The host is not found in the internal endpoints identity store2
 22016Identity sequence completed iterating the IDStores0
 22056Subject not found in the applicable identity store(s)1
 22058The advanced option that is configured for an unknown user is used0
 22060The 'Continue' advanced option is configured in case of a failed authentication request0
 15036Evaluating Authorization Policy0
 24209Looking up Endpoint in Internal Endpoints IDStore - <mac address anonymized>0
 24217The host is not found in the internal endpoints identity store2
 15048Queried PIP - EndPoints.EndPointPolicy6
 15048Queried PIP - EndPoints.LogicalProfile1
 15048Queried PIP - EndPoints.EndPointPolicy1
 15048Queried PIP - EndPoints.LogicalProfile1
 15048Queried PIP - EndPoints.EndPointPolicy1
 24432Looking up user in Active Directory - anonymized-AD1
 24325Resolving identity - <mac address, anonymized>4
 24313Search for matching accounts at join point - anonymized.domain0
 24318No matching account found in forest - anonymized.domain0
 24367Skipping unusable domain - anonymized,Domain trust is one-way0
 24367Skipping unusable domain - anonymizedDomain trust is one-way0
 24367Skipping unusable domain - anonymized,Domain trust is one-way0
 24322Identity resolution detected no matching account0
 24352Identity resolution failed - ERROR_NO_SUCH_USER0
 24412User not found in Active Directory - anonymized-AD0
 15048Queried PIP - anonymized-AD.ExternalGroups4
 15048Queried PIP - EndPoints.EndPointPolicy1
 15048Queried PIP - EndPoints.LogicalProfile1
 15048Queried PIP - EndPoints.LogicalProfile1
 15048Queried PIP - EndPoints.LogicalProfile0
 15048Queried PIP - EndPoints.LogicalProfile1
 15048Queried PIP - EndPoints.EndPointPolicy1
 15048Queried PIP - EndPoints.EndPointPolicy1
 15048Queried PIP - EndPoints.EndPointPolicy1
 15048Queried PIP - EndPoints.EndPointPolicy2
 15048Queried PIP - EndPoints.EndPointPolicy1
 15048Queried PIP - EndPoints.LogicalProfile1
 15016Selected Authorization Profile - DenyTest0
 15039Rejected per authorization profile0
 11003Returned RADIUS Access-Reject1

 

2th log after port bounce:

Steps

 Step IDDescriptionLatency (ms)
 11001Received RADIUS Access-Request
 11017RADIUS created a new session0
 11027Detected Host Lookup UseCase (Service-Type = Call Check (10))1
 15049Evaluating Policy Group0
 15008Evaluating Service Selection Policy0
 15041Evaluating Identity Policy1
 15048Queried PIP0
 22072Selected identity source sequence1
 15013Selected Identity Source - Internal Endpoints0
 24432Looking up user in Active Directory - <mac address, anonymized>0
 24325Resolving identity13
 24313Search for matching accounts at join point0
 24318No matching account found in forest0
 24367Skipping unusable domain0
 24367Skipping unusable domain0
 24367Skipping unusable domain0
 24322Identity resolution detected no matching account0
 24352Identity resolution failed0
 24412User not found in Active Directory1
 15013Selected Identity Source - Internal Endpoints0
 24209Looking up Endpoint in Internal Endpoints IDStore - <mac address, anonymized>0
 24211Found Endpoint in Internal Endpoints IDStore1
 22037Authentication Passed1
 15036Evaluating Authorization Policy0
 15048Queried PIP9
 15048Queried PIP0
 15016Selected Authorization Profile - anonymized-VLAN45-Printers1
 24209Looking up Endpoint in Internal Endpoints IDStore - <mac address>1
 24211Found Endpoint in Internal Endpoints IDStore1
 11002Returned RADIUS Access-Accept0
 5238Endpoint authentication problem was fixed0
5 Replies 5

In ISE

OUI is take from first three numbers of MAC.

MHM

Thanks,

I don't think that is unique to ISE, its well documented in IEEE 802 related RFC's that the first 24 bits from the 48 bits MAC address is the OUI. 

ricoh <<- this make me think that OUI is wrong are you sure mac address start with this ? 

Also MAB for printer dont use CoA' CoA mainly use when you have guest.

MAB is straight process' send call-back ISE use wired-mab policy and then send access-accept with vlan/dacl authz.

Why you have CoA for what ? 

MHM

Arne Bier
VIP
VIP

@Jagermeister what you're describing is a text book example of what happens when CoA (Change of Authorization) is not working. CoA allows the RADIUS server to send a message to the NAD to re-authorize the session it can do other things too but for profiling ISE will send a CoA Reauth). Therefore check that your Network Device in ISE has CoA/Dynamic Authorization checkbox ticked - Cisco uses UDP/1700 for this.  On the NAD, check that dynamic authorization is enabled - and also, ensure that the RADIUS shared secret matches that of the device define in ISE. And ... this caught me recently, if your RADIUS traffic run inside a VRF on the switch, then ensure that the dynamic authorization mentions the vrf name. This of course applies to all other RADIUS commands.

Once you have working CoA, you will see this in the ISE Live Logs, and then profiling becomes a plug-and-play experience.

@Arne Bier ,

Hi Arne, thanks for replying. 

I expected issues with CoA indeed so I already made sure that all the settings were correct. I checked again, and my NAD configuration seems OK. 

I currently am reproducing the situation in the following manner: 

1. I delete the endpoint from the endpoint store, this should trigger a CoA 

2. supplicant on switchport is deauthenticated 

3. Supplicant is appearing again in endpoint store now, hitting on my default deny authorization policy

4. After waiting quite some time (~15 minutes), the supplicant is granted access to the network and the Meraki switch event logs show "event type; RADIUS dynamic VLAN assignment"

The take a closer look i've made a pcap and I have let it run until the client got authenticated again (hiding first 2 octets for privacy):

 

Jagermeister_1-1728167128630.png

It seems that it does send the CoA that's triggered by the default 'Endpoint Delete' profiler exception action.  As you can see it gets acknowledged as well. After that I see a bunch of new CoA requests, all containing VSA: t=Cisco-AVPair(1) l=35 val=subscriber:command=reauthenticate, but the switch never sends an ACK on those.   Even though it doesn't acknowledge the last, the supplicant still gains access after waiting for ~15 minutes. Manually triggering CoA's from the end point store also seems to work (getting ack's on those) . 

Any idea?