cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
143
Views
2
Helpful
3
Replies

do1x with IBNS2 authentication issue

keith-mk-li
Level 1
Level 1

Dear All, 

             I was trying to setup dot1x environment with IBNS2 in cisco c9200 switch, but its wasn't success, its still facing authenticate failure, below is the full configure, just wonder anything wrong with the class map and policy map setting, any help would be appreicated 

 

 

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2024.10.03 18:45:20 =~=~=~=~=~=~=~=~=~=~=~=
g f
% Incomplete command.

Testing-Switch#
Testing-Switch#sh tun   run
Building configuration...

Current configuration : 14379 bytes
!
! Last configuration change at 18:43:45 HKG Thu Oct 3 2024 by adm_klam
!
version 17.12
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
platform punt-keepalive disable-kernel-core
!
hostname Testing-Switch
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
aaa new-model
!
!
aaa group server radius ISE
server name ISE1
server name ISE2
deadtime 15
!
aaa authentication dot1x default group ISE
aaa authorization network default group ISE
aaa accounting update newinfo periodic 2880
aaa accounting identity default start-stop group ISE
aaa accounting network default start-stop group ISE
!
!
aaa server radius dynamic-author
client 10.11.102.2 server-key 7 0xxxxxxxxxxxxxxxx
client 10.11.102.1 server-key 7 0xxxxxxxxxxxxxxxx
!
aaa session-id common
!
!
!
clock timezone HKG 8 0
switch 1 provision c9200-24p
!
!
!
!
!
ip domain name ABC.COM
!
!
!
login on-success log
vtp mode transparent
vtp version 1
!
!
!
!
!
access-session mac-move deny
device-tracking tracking auto-source
!
device-tracking policy Disable_DT_Trunk
trusted-port
device-role switch
no protocol udp
!
device-tracking policy IP-Tracking
no protocol udp
tracking enable
!
!
crypto pki trustpoint TP-self-signed-3665828729
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3665828729
revocation-check none
rsakeypair TP-self-signed-3665828729
hash sha256
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
hash sha256
!
!
crypto pki certificate chain TP-self-signed-3665828729
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
31312F30 2D060355 04030C26 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33363635 38323837 3239301E 170D3234 30393237 30363536
33355A17 0D333430 39323730 36353633 355A3031 312F302D 06035504 030C2649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 36363538
32383732 39308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 010093F8 6269A831 04D7C9A2 5EEF85A4 C74D39B3 E78D43C6 1A211353
F8FEE367 5ED0A086 57AC1A23 B3513505 873C87C0 E4130554 983164BC 30C358BE
54E456F5 A858DD32 0BC4E744 79F55D32 D277CC62 90C30A40 54BB66C4 8D5206AD
A38D3C9A BC636645 4468FD67 CB1183BA 66B71058 4E28EFB0 F2CB37A3 42B73CE6
F57AD85F 7146F200 4161BB1F 80E9AD35 1EDE1165 0E9B4485 53B177A6 A5CDE634
A57624C3 89ECDA98 9E406FD8 8368AD60 47B8F2D8 69B7CB0D 6C0778A5 94B3C72E
9A70BC92 0A3492ED ECE9920B 1A4B6300 B27C0373 BC1FAB27 C0AEB276 E424ABBF
594BC71D F76F815C 29BD354C 4FB2333D 7C9A0B65 6F286D40 07EEC1AE 9807F8E2
EE06E220 7D270203 010001A3 53305130 1D060355 1D0E0416 04144E91 0B865E10
6F3E0ECC 2CF48600 D2F9EC00 832C301F 0603551D 23041830 1680144E 910B865E
106F3E0E CC2CF486 00D2F9EC 00832C30 0F060355 1D130101 FF040530 030101FF
300D0609 2A864886 F70D0101 0B050003 82010100 0D55ECA9 7801571E F2415DCB
7AB3B48E BAFD0462 651B73D0 5DE9CDFE C52C767A 76DF1CB8 172B85A7 D1F69C62
BD28AD60 2B823736 CE016FFC B15210ED 59C8BC1B 827AFF05 EDF8F665 ABFBFBB3
3FBE19DD F079DC3E 2F550836 066BD6E2 7C956377 644953B1 2D3DFD0D 6C98164B
8675908D 3AA6899B 176E959E 1E840D73 080819FD ADBAFA9B C9BF60B6 9E3ECF5A
F6A039AC 97C5A7F2 7AB26291 CFA628EC 9147C33C 3BA18A4B 26FCDEE9 8ED966B2
31D09963 EC34C149 6FE19891 5F00F939 8279E5FD 2616C473 91D64D69 DF311189
307C3D3D E0CC533D DC96E199 6B5C86EF 07E751EC A12D7D75 B9A4707F 175A649C
4A29447B FBD57FF7 03FCDAF6 73D1946B D2553FB3
quit
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
!
license boot level network-essentials addon dna-essentials
service-template DEFAULT_LINKSEC_POLICY_MUST_SECURE
linksec policy must-secure
service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE
linksec policy should-secure
service-template DEFAULT_CRITICAL_VOICE_TEMPLATE
voice vlan
service-template DEFAULT_CRITICAL_DATA_TEMPLATE
service-template webauth-global-inactive
inactivity-timer 3600
memory free low-watermark processor 21033
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
!
!
enable secret 9 $9xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
!
username adm secret 9 $9$0Uxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

!
redundancy
mode sso
crypto engine compliance shield disable
!
!
!
!
!
transceiver type all
monitoring
!
!
vlan 4
name terminal
!
vlan 100
name Voice
!
vlan 505
name Device
!
vlan 510
name User
!
class-map type control subscriber match-all AAA_SVR_DOWN_AUTHD_HOST
match result-type aaa-timeout
match authorization-status authorized
!
class-map type control subscriber match-all AAA_SVR_DOWN_UNAUTHD_HOST
match result-type aaa-timeout
match authorization-status unauthorized
!
class-map type control subscriber match-all DOT1X
match method dot1x
!
class-map type control subscriber match-all DOT1X_FAILED
match method dot1x
match result-type method dot1x authoritative
!
class-map type control subscriber match-all DOT1X_NO_RESP
match method dot1x
match result-type method dot1x agent-not-found
!
class-map type control subscriber match-all DOT1X_TIMEOUT
match method dot1x
match result-type method dot1x method-timeout
!
class-map type control subscriber match-all MAB
match method mab
!
class-map type control subscriber match-all MAB_FAILED
match method mab
match result-type method mab authoritative
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
class-map match-any system-cpp-default
description EWLC data, Inter FED Traffic
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
!
policy-map type control subscriber Dot1x-Default
event session-started match-all
10 class always do-until-failure
10 authenticate using dot1x priority 10
20 authenticate using dot1x priority 20
event authentication-failure match-first
10 class DOT1X_FAILED do-until-failure
10 terminate dot1x
20 authenticate using mab priority 20
20 class DOT1X_NO_RESP do-until-failure
10 terminate dot1x
20 authenticate using mab priority 20
30 class MAB_FAILED do-until-failure
10 terminate mab
20 authentication-restart 30
40 class always do-until-failure
10 terminate dot1x
20 terminate mab
30 authentication-restart 30
event agent-found match-all
10 class always do-until-failure
10 terminate mab
20 authenticate using dot1x priority 10
event violation match-all
10 class always do-until-failure
10 restrict
event inactivity-timeout match-all
10 class always do-until-failure
10 clear-session
event authentication-success match-all
10 class always do-until-failure
10 activate service-template DEFAULT_LINKSEC_POLICY-SECURE
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
template Port-Dot1x-Closed
dot1x pae authenticator
dot1x timeout tx-period 7
dot1x max-reauth-req 3
spanning-tree portfast
switchport access vlan 510
switchport mode access
switchport voice vlan 100
mab
access-session control-direction in
access-session closed
access-session port-control auto
authentication periodic
authentication timer reauthenticate server
service-policy type control subscriber Dot1x-Default
description *** User Access Port ***
!
template Port-Dot1x-Default
dot1x pae authenticator
dot1x timeout tx-period 7
dot1x max-reauth-req 3
spanning-tree portfast
switchport access vlan 510
switchport mode access
switchport voice vlan 100
mab
access-session control-direction in
access-session port-control auto
authentication periodic
authentication timer reauthenticate server
service-policy type control subscriber Dot1x-Default
description *** User Access Port ***
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
shutdown
!
interface GigabitEthernet1/0/1
device-tracking attach-policy IP-Tracking
source template Port-Dot1x-Closed
spanning-tree portfast
!
interface GigabitEthernet1/0/2
device-tracking attach-policy IP-Tracking
source template Port-Dot1x-Closed
spanning-tree portfast
!
interface GigabitEthernet1/0/3
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet1/0/24
device-tracking attach-policy Disable_DT_Trunk
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
no ip address
!
interface Vlan505
ip address 10.141.102.235 255.255.255.0
!
ip default-gateway 10.141.102.252
no ip http server
no ip http secure-server
ip forward-protocol nd
no ip ssh bulk-mode
!
!
!
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server attribute 31 mac format ietf upper-case
radius-server attribute 31 send nas-port-detail mac-only
radius-server dead-criteria time 15 tries 3
radius-server deadtime 60
!
radius server ISE1
address ipv4 10.11.102.2 auth-port 1812 acct-port 1813
automate-tester username test_user ignore-acct-port probe-on
key 7 04xxxxxxxxxxxxxxxxxx
!
radius server ISE2
address ipv4 10.11.102.1 auth-port 1812 acct-port 1813
automate-tester username test_user ignore-acct-port probe-on
key 7 0xxxxxxxxxxxxxxxx
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
stopbits 1
line vty 0 4
logging synchronous
transport input ssh
line vty 5 15
logging synchronous
transport input ssh
!
ntp server 10.11.101.15
!
!
!
!
!
!
end

Testing-Switch#

3 Replies 3

@keith-mk-li please provide more information.

Is the switch defined as a NAD in ISE, with the correct shared secret?

What do the ISE logs indicate?

What ISE policies are configured? TLS or PEAP?

How is the endpoint supplicant configured?

The switchport interfaces are configured in closed mode, so if authentication fails the device will not get access. Why not start in open mode?

Please provide the output of "show authenticatio session interface gig 1/0/1 detail"? - or whatever interface the endpoint is connected to.

 

thomas
Cisco Employee
Cisco Employee

Perfect timing!

Watch our latest ISE Webinar that was delivered this week and is now archived to our CiscoISE YouTube Channel:

▷ IBNS 2.0 Switch Templates for ISE Deployments 2024-10-01

02:45 IBNS (Identity Based Networking Services) Overview
03:40 IBNS 2.0 Features
05:48 Template Configurations
07:28 RADIUS Configuration
11:38 AAA Configuration
15:26 Demo: RADIUS Configuration and Test
17:02 Device Tracking Overview & Configuration
22:18 Device Sensors Overview & Configuration
26:37 Demo: Endpoint Before and After Device Tracking & Sensor
28:58 Service Templates and Class Maps
31:10 Policy Maps
33:03 Demo: Service Templates, Class Maps, Policy Maps
33:47 Converting to IBNS 2.0
34:35 Demo: Display and Convert Policy Maps
35:58 Demo: Convert without Per-Port Policy Maps
37:20 Switchport Templates: Monitor, Low-Impact, Closed Modes
40:34 Demo: Applying Port Templates
41:32 Concurrent MAB & 802.1X
42:50 Demo: Concurrent MAB & 802.1X with Different Clients
44:48 ISE Resources
45:42 Questions