cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3726
Views
0
Helpful
8
Replies

CoA ISE

SupportAC
Level 1
Level 1

Hi,

 

We are having an issue in user sessions behaviour since we enabled COA in WLC. If we enable "Support for CoA" in the WLC and the ISE sends" 'CoA-Disconnect-Request' the WLC disconnect the authenticated user".

So is there any paramether to configure in ISE in order to not happen this disconnections?

 

 

1 Accepted Solution

Accepted Solutions

You might be getting profiled and doing a COA because the profile is changing. Have you touched your global profile COA option?
https://community.cisco.com/t5/security-documents/ise-guest-access-prescriptive-deployment-guide/ta-p/3640475

https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010101.html#reference_A4FCC7A3F7FE49BFB06B01CF2FCBC45C

Needless to say this doesn’t seem to be the default behavior. Would recommend following above guides for more details and if still a problem contact the TAC

Please share your findings

View solution in original post

8 Replies 8

paul
Level 10
Level 10

What version of ISE and why are the CoAs happening?  Is this a guest portal process or because of profiling changes?

Surendra
Cisco Employee
Cisco Employee
The real question is why is ISE sending a CoA disconnect request? Are you using Posture over VPN or Hotspot portal?

What is your main intention to enable CoA on the WLC ?

For Security audit requirements, RFC 3576 is enabled in WLC. With a version 8.0.152. So far no problems were detected in the captive portal that gives access to Guests, authenticated correctly and the sessions were maintained at least enough to not identify a problem.

                Also for security requirements the WLC is updated to the current version 8.3.143; and as a consequence, the functionality associated with (RFC 3576 already obsolete and replaced by RFC5176, CoA) is applied to replace the previous one. And the problems of Access to the Guest network begin, which uses a captive Portal of the WLC. It does not affect other Wi-Fi services that use dot1x, for example.

                The Cause is that: "If we enable" Support for CoA "in the WLC and the ISE sends" 'CoA-Disconnect-Request' "the controller declined to the connected user."

But briefly, authentication occurs, but in a very short space, a disconnection is sent that the controller (CoA active) applies to the session. As a consequence there is no availability of the service.

                As the functionality that CoA offers us the option to disconnect active sessions, is recommended by Security (It is necessary to have control not only in the start of the access) and we need to enable CoA in the WLC. What options do we have to prevent this from happening "periodically and almost immediately" after a correct session start that allows access? Is this parameterizable in ISE?

You might be getting profiled and doing a COA because the profile is changing. Have you touched your global profile COA option?
https://community.cisco.com/t5/security-documents/ise-guest-access-prescriptive-deployment-guide/ta-p/3640475

https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010101.html#reference_A4FCC7A3F7FE49BFB06B01CF2FCBC45C

Needless to say this doesn’t seem to be the default behavior. Would recommend following above guides for more details and if still a problem contact the TAC

Please share your findings

This is what we see about the connection:

 

SESSION IS ESTABLISHED:

 

ise1.jpg

 

Its updated correctly:

 

ise2.jpg

But it fails several seconds later:

 

ise3.jpg

 

Is there any way to control the timers? or periodicity? we would like to solve it :)

 

thanks

 

If you scroll down more on the CoA event there should be CoASourceComponent, CoAReason, and CoAType entry under 'Other Attributes. What do those entries say for both events? Also, you masked the session ID on the screenshot, but is the session ID  identical or different between the two CoA events?

Yes, session ID is the same for 3 screenshots.

hslai
Cisco Employee
Cisco Employee

If I understood it correctly, the issue only surfaced after an upgrade of your WLC from 8.0.152 to 8.3.143. If that is true, you really need involve Cisco TAC to troubleshoot it, as Jason Kunst recommended. ISE and WLC have been working together with CoA support since ISE 1.0 and WLC 7.0.252.0, although CWA and BYOD hardened later with ISE 1.2 and WLC 7.3.113.100.

I hope your ISE is running ISE 2.3 or above, which provides "CoASourceComponent, CoAReason, and CoAType entry under 'Other Attributes", asked by howon.

Below showed an ISE deployment with CoA Type "Port Bounce" for ISE profiler.

Screen Shot 2018-12-17 at 2.08.35 PM.png

As a result, the endpoint got profiled, CoA-disconnect, and re-authenticated with a new session ID, before proceeding with guest auth. After guest completing the portal login, Co-A re-auth and then authorize-only with the same session ID.

Screen Shot 2018-12-17 at 10.08.02 AM.png

 

As the deployment is running ISE 2.5 beta, we got the CoASourceComponenent, CoAReason, and CoAType.

The first one has:

CoASourceComponent Profiler
CoAReason Change in endpoint identity group/policy/logical profile which are used in authorization policies
CoAType Disconnect

 

The 2nd one has: 

CoASourceComponent GUEST
CoAReason Guest authenticated for network access
CoAType Reauthentication - last