01-04-2019 01:46 PM
My customer is evaluating ISE 2.4 primarily for visibility. A large part of that is getting visibility about the wired endpoints on their network. We would like to set up Device Sensor probes for them on their switches. I've gone through the new ISE Profiling Design Guide and looked at the info about a deployment on switches that does not pre-suppose any previous configurations for RADIUS AAA. We've added what we think are the needed config lines on a test switch (2960X) and defined the switch to ISE. We've done the "test aaa group....." command and confirmed the switch can speak RADIUS to ISE. A running of the "show device-sensor cache all" command displays the expected output. However, we have not added any RADIUS port level commands on the switch (only global commands). The switch is not showing up in ISE (Context Visibility--> Network Devices) and we don't see any endpoints that are connected to the switch being reported in ISE. Also note that wireless visibility is working fine.
Any guidance on what we may be missing? We did not include any port level configs because we are not doing any authentication/authorization but I'm thinking that may be the problem. I'm wondering that I really need to apply the port level RADIUS configs to place the switch in "Monitor Mode" to get it to start sending the RADIUS info to ISE without forcing any access control. In my ISE 2.4 lab I have 2 switches defined along with all the global AND port level RADIUS configs and my switches are showing up and reporting on their attached endpoints via RADIUS probes.
Thanks for any assistance.
Solved! Go to Solution.
01-07-2019 10:00 AM
Hi,
Please refer to Device-Sensor section in the below deployment guide for configurations related to device-sensor and CLI are more or less same for 2960X as well.
https://community.cisco.com/t5/mcc-security-archive-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3759910
You need below configuration for Device-Sensor data
1. Enabling Accounting Augmentation under respective sections..
aaa new-model
aaa accounting dot1x default start-stop group radius
radius-server host{hostname|ip-address}[auth-port port-number][acct-port port-number][timeout seconds][retransmit retries][key string]
radius-server vsa send accounting
device-sensor accounting
device-sensor notify all-changes
2. Gather Raw Endpoint data from protocols such as CDP, LLDP, DHCP - Refer to the URL for configs..
Hope this helps..
01-04-2019 11:41 PM
01-06-2019 07:21 AM
01-07-2019 09:24 AM
01-05-2019 03:05 AM
curious if you have the right config. here what i remember.
=======================================
aaa new-model
aaa authentication dot1x default group ISE
aaa authorization network default group ISE
aaa accounting dot1x default start-stop group ISE
aaa group server radius ISE
radius name CISCO
aaa radius server dynamic author
client 1.1.1.1 server key cisco
radius server CISCO
address ipv4 1.1.1.1 auth-port 1812 acct-port 1813
key cisco
!
radius-server attributes 6 on
radius-server attributes 8
radius-server attriibutes 25
radius-server attributes 31
radius-server vsa sen auth
radius-server vsa sen acct
!
ip device tracking
!
epm logging
!
dot1x system auth
!
dot1x logg verb
!
======================================
kindly make sure you have radius port correctly configured on both ISE and the switch.
01-07-2019 10:00 AM
Hi,
Please refer to Device-Sensor section in the below deployment guide for configurations related to device-sensor and CLI are more or less same for 2960X as well.
https://community.cisco.com/t5/mcc-security-archive-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3759910
You need below configuration for Device-Sensor data
1. Enabling Accounting Augmentation under respective sections..
aaa new-model
aaa accounting dot1x default start-stop group radius
radius-server host{hostname|ip-address}[auth-port port-number][acct-port port-number][timeout seconds][retransmit retries][key string]
radius-server vsa send accounting
device-sensor accounting
device-sensor notify all-changes
2. Gather Raw Endpoint data from protocols such as CDP, LLDP, DHCP - Refer to the URL for configs..
Hope this helps..
01-07-2019 10:09 AM
01-07-2019 10:20 AM
port level config is only need when you doing dot1x authentication or doing mab etc. or unless you have cts running on to ports where you core is actiing as seed switch
01-07-2019 11:56 AM
Yes, thats right you need port-level authentication configs and yeah it can be in monitor-mode either..
Found this old doc.. Refer to the troubleshooting section..
01-07-2019 12:05 PM
I am sorry i mixed up my post. do apologies i thought this post if for cts trouble.
to many windows open in my browser. so please forgive me.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide