- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-08-2020 05:09 AM
Hi all,
I'm trying to configure ports on switches Catalyst 2960 , 2960X and 9200L using host-mode multi-auth but leaving also the fail vlan because we want to maintain a recovery method to guarantee access to devices also in case MAB and dot1x fail.
We are using as authentication order mab and then dot1x ( because we have some issues with ip phones certificates so need to use mab as first attempt )
Problem arise during first test on 2960 using devices that are not able to use dot1x and mac address are not recognized by radius system.With multi-auth mode the port remain not authorized and mac addres go in drop state.
I found in some documentation ( not in all documentation ) that with multi-auth mode guest vlan and fail vlan are not enabled even if I can configure it.
In cat9200L the behaviour seems to be different as I see the device in authorized state, so my question is : do you have tried also this type of setup ? It is a Platform dependent behaviour or it correct that with multi-authentication mode is not permited to use guest and fail vlan ?
Below an example
on cat9200L C9200L-24P-4G 16.12.02 :
---------------------------------------
Building configuration...
!
interface GigabitEthernet1/0/21
description verso presa Lan Telefono IP + PC
switchport mode access
switchport voice vlan 101
switchport port-security maximum 3
switchport port-security violation restrict
switchport port-security aging time 10
switchport port-security aging type inactivity
switchport port-security
authentication control-direction in
authentication event fail action authorize vlan 1
authentication event server dead action authorize vlan 1
authentication event server dead action authorize voice
authentication event no-response action authorize vlan 1
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication order mab dot1x
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
mab
trust device cisco-phone
dot1x pae authenticator
dot1x timeout tx-period 3
spanning-tree portfast
spanning-tree bpduguard enable
service-policy input PC-SoftPhone+HardPhone
service-policy output AutoQos-4.0-Output-Policy
end
Interface: GigabitEthernet1/0/21
IIF-ID: 0x1A681F3E
MAC Address: d014.111f.f8e6
IPv6 Address: Unknown
IPv4 Address: 10.98.199.19
User-Name: d014111ff8e6
Status: Authorized
Domain: UNKNOWN
Oper host mode: multi-auth
Oper control dir: in
Session timeout: N/A
Common Session ID: 1530470A0000005908163060
Acct Session ID: 0x00000043
Handle: 0xf200004f
Current Policy: POLICY_Gi1/0/21
Local Policies:
Service Template: GUEST_VLAN_Gi1/0/21 (priority 150)
Vlan Group: Vlan: 1
Method status list:
Method State
dot1x Stopped
mab Stopped
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.98.199.19, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
SW-RM052-V-0-1#show mac ad
SW-RM052-V-0-1#show mac address-table int
SW-RM052-V-0-1#show mac address-table interface gi
SW-RM052-V-0-1#show mac address-table interface gigabitEthernet 1/0/21
Mac Address Table
-------------------------------------------
---- ----------- -------- -----
1 d014.111f.f8e6 STATIC Gi1/0/21
Total Mac Addresses for this criterion: 1
SW-test1#
On 2960 WS-C2960-24LT-L 12.2(55)SE12 :
-----------------------------------------
Building configuration...
!
interface FastEthernet0/2
description verso presa Lan Telefono IP + PC
switchport mode access
switchport voice vlan 101
srr-queue bandwidth share 10 10 60 20
priority-queue out
authentication control-direction in
authentication event fail action authorize vlan 1
authentication event server dead action authorize vlan 1
authentication event server dead action authorize voice
authentication event no-response action authorize vlan 1
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication order mab dot1x
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
mab
mls qos trust device cisco-phone
mls qos trust cos
dot1x pae authenticator
dot1x timeout tx-period 3
spanning-tree portfast
spanning-tree bpduguard enable
service-policy input PC-SoftPhone+HardPhone
end
Interface: FastEthernet0/2
MAC Address: 0023.1600.7a28
IP Address: 10.107.34.212
User-Name: 002316007a28
Status: Authz Failed
Domain: DATA
Oper host mode: multi-auth
Oper control dir: in
Session timeout: N/A
Idle timeout: N/A
Common Session ID: 0A5B3EA50000020937E83600
Acct Session ID: 0x000010C1
Handle: 0xBA000209
Method State
mab Failed over
dot1x Failed over
Mac Address Table
-------------------------------------------
---- ----------- -------- -----
1 0023.1600.7a28 DYNAMIC Drop
Total Mac Addresses for this criterion: 1
SW-VR034-0-1-NEW#
Solved! Go to Solution.
- Labels:
-
Multi-Domain
-
Other NAC
Accepted Solutions

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-12-2020 07:34 PM
The way I see it, I never fail a MAB auth. You have to configure ISE MAB Authentication to 'Continue if User not found' (default is to Reject). Then the user will be put into an access VLAN configured on the switch port. Make that VLAN a guest VLAN and enable profiling so that ISE can CoA that user/device into another VLAN if needed (e.g. ISE profiles the device as a printer etc. - if VLAN change is involved then the port should also be bounced via ISE CoA to force the device to perform DHCP again)

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-12-2020 07:34 PM
The way I see it, I never fail a MAB auth. You have to configure ISE MAB Authentication to 'Continue if User not found' (default is to Reject). Then the user will be put into an access VLAN configured on the switch port. Make that VLAN a guest VLAN and enable profiling so that ISE can CoA that user/device into another VLAN if needed (e.g. ISE profiles the device as a printer etc. - if VLAN change is involved then the port should also be bounced via ISE CoA to force the device to perform DHCP again)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-13-2020 04:38 AM
Auth fail VLAN is only available in single-host mode.
