12-29-2023 08:02 AM - edited 12-29-2023 08:04 AM
Hi all;
Look at the following screenshot:
In the above scenario, the "Win-PC-02" is connected to an interface that belongs to VLAN 20. After authentication, proper authorization policy applied to that interface which changes the VLAN of it to 10. So, although the client has successfully assigned IP address in VLAN 20, after applying proper authorization policy it changed its address to something in VLAN 10.
Now I decide to see the detail authentication report for the following operation:
As you can see above, under the "IP Address" column, we see "192.168.10.15", but in the report:
I use ISE 3.2 Patch 4.
Any ideas?
Thanks
Solved! Go to Solution.
01-01-2024 09:21 PM
From what you described above, it looks expected. Before the PC authenticates, it receives the IP address from VLAN 20 so it sends this as part of the authentication request. After it authorizes, it moves to VLAN 10 and receives the new IP assignment. At this point, the switch sends the accounting request(s) to update the client IP address but not another authentication request so the authentication report will show the IP from VLAN 10 instead of VLAN 20. If you check the RADIUS accounting reports, you should be able to see one to update the client IP.
12-29-2023 08:23 AM
Is the timestamp correct on the report? it shows 20minutes past time of the Authz
12-30-2023 10:37 PM
Thanks for your reply;
Yes it is correct because the last picture is not related to the first picture. It is taken from a similar authentication and authorization flow, not just from the first picture in the post...
12-31-2023 02:28 AM
you use DHCP profiling ?
MHM
12-31-2023 05:22 AM
Yes
01-01-2024 03:13 PM
what is attribute you use in DHCP profile ?
01-01-2024 02:25 PM - edited 01-01-2024 02:34 PM
ISE learns about the endpoint's IPv4 address via the IOS Device Tracking feature (should always be enabled) - even if you are not using DHCP, device-tracking will issue a regular gratuitous ARP to get the IPv4 address of the endpoint. In the case of IPv6, it can glean addresses from the ND messages.
show ip device-tracking database int x/y/z
However, I agree with you @rezaalikhani , that when you click on the details of one of the rows in Live Logs, that the IP addressing data should correspond. I think that ISE does some caching behind the scenes and I know that the "blue dot" icon LiveLog entries (Session records) typically don't include updated RADIUS attribute data - they take their data from the original/first Authentication.
Have you tried the same test with Successful Repeated Auths suppression disabled? Worth a try - but like I said, the blue dot indicates an Accounting record was received, and then ISE cheats a little (or, it chooses to be lazy) with the data it chooses to present.
01-01-2024 09:21 PM
From what you described above, it looks expected. Before the PC authenticates, it receives the IP address from VLAN 20 so it sends this as part of the authentication request. After it authorizes, it moves to VLAN 10 and receives the new IP assignment. At this point, the switch sends the accounting request(s) to update the client IP address but not another authentication request so the authentication report will show the IP from VLAN 10 instead of VLAN 20. If you check the RADIUS accounting reports, you should be able to see one to update the client IP.
01-01-2024 09:33 PM
Can we see the switchport config
@hslai mention perfect point but I need to see port config to more sure.
MHM
01-02-2024 10:42 PM
sorry @rezaalikhani
can you share the SW port config
MHM
01-02-2024 10:44 PM
C3650#show run interface fastEthernet 0/2
Building configuration...
Current configuration : 834 bytes
!
interface FastEthernet0/2
switchport access vlan 20
switchport mode access
ip device tracking maximum 2
authentication control-direction in
authentication event fail action next-method
authentication event server dead action authorize
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-host
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication timer restart 30
authentication timer reauthenticate server
dot1x pae authenticator
dot1x timeout quiet-period 30
dot1x timeout tx-period 10
dot1x timeout ratelimit-period 300
dot1x timeout held-period 30
spanning-tree portfast
spanning-tree bpduguard enable
spanning-tree guard root
end
C3650#
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide