cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
641
Views
0
Helpful
10
Replies

i have problem with 802.X

i have configure closed mode and i have authiz profile for any  Dynamic VLAN 50

and my authiz policy if user found in external Idi store then apply Auhiz profls  that  assigned the pc in vlan 50 

problem is the user hit for the default policy and deny acc 

Jan 29 15:06:01.998: %DOT1X-5-FAIL: Switch 1 R0/0: sessmgrd: Authentication failed for client (7486.e23c.1af3) with reason (Timeout) on Interface Gi6/0/23 AuditSessionID 01000C0A0000E845B2602950 Username: NIBHQ\6886
Jan 29 15:06:29.998: %DOT1X-5-FAIL: Switch 1 R0/0: sessmgrd: Authentication failed for client (7486.e23c.1af3) with reason (Timeout) on Interface Gi6/0/23 AuditSessionID 01000C0A0000E845B2602950 Username: NIBHQ\6886
Jan 29 15:06:30.009: %MAB-5-FAIL: Switch 1 R0/0: sessmgrd: Authentication failed for client (7486.e23c.1af3) with reason (Cred Fail) on Interface Gi6/0/23 AuditSessionID 01000C0A0000E845B2602950
Jan 29 15:06:30.011: %SESSION_MGR-5-FAIL: Switch 1 R0/0: sessmgrd: Authorization failed or unapplied for client (7486.e23c.1af3) on Interface GigabitEthernet6/0/23 AuditSessionID 01000C0A0000E845B2602950. Failure reason: Authc fail. Auth

 

saeedabdelhalimhamada_2-1738156887883.png

saeedabdelhalimhamada_0-1738156787364.png

saeedabdelhalimhamada_1-1738156853122.png

 

Authentication Details

Source Timestamp2025-01-29 15:04:51.351
Received Timestamp2025-01-29 15:04:51.351
Policy ServerISE-01
Event5400 Authentication failed
Failure Reason15039 Rejected per authorization profile
ResolutionAuthorization Profile with ACCESS_REJECT attribute was selected as a result of the matching authorization rule. Check the appropriate Authorization policy rule-results.
Root causeSelected Authorization Profile contains ACCESS_REJECT attribute
UsernameNIBHQ\6886
Endpoint Id74:86:E2:3C:1A:F3
Calling Station Id74-86-E2-3C-1A-F3
Endpoint ProfileDell-Device
Authentication Identity StoreNibHQ-AD
Identity GroupProfiled
Audit Session Id01000C0A0000E835B254D347
Authentication Methoddot1x
Authentication ProtocolPEAP (EAP-MSCHAPv2)
Service TypeFramed
Network DeviceEdge-F3-01-R.Nibhq.local
Device TypeAll Device Types#NAS Address
NAS IPv4 Address10.100.3.1
NAS Port IdGigabitEthernet6/0/23
NAS Port TypeEthernet
Authorization ProfileDenyAccess
Posture StatusPending
Response Time35 milliseconds

 

Other Attributes

ConfigVersionId309
Device Port64536
DestinationPort1812
RadiusPacketTypeAccessRequest
ProtocolRadius
NAS-Port50623
Framed-MTU1468
State37CPMSessionID=01000C0A0000E835B254D347;33SessionID=ISE-01/526818642/483011;
NetworkDeviceProfileIdb0699505-3150-4215-a80e-6753d45bf56c
IsThirdPartyDeviceFlowfalse
AcsSessionIDISE-01/526818642/483011
DetailedInfoAuthentication succeed
SelectedAuthenticationIdentityStoresNibHQ-AD
IdentityPolicyMatchedRuleWired 802.1x
AuthorizationPolicyMatchedRuleDefault
EndPointMACAddress74-86-E2-3C-1A-F3
ISEPolicySetNameWired-802.1x-POST_copy
IdentitySelectionMatchedRuleWired 802.1x
AD-User-Resolved-Identities6886@nibhq.local
AD-User-Candidate-Identities6886@nibhq.local
TotalAuthenLatency62
ClientLatency27
AD-User-Resolved-DNsCN=Saeed AbdelHalim,OU=Users,OU=50_General Department of Operations and Networks,OU=NIB-Sectors,DC=nibhq,DC=local
AD-User-DNS-Domainnibhq.local
AD-Groups-Namesnibhq.local/Builtin/Administrators
AD-Groups-Namesnibhq.local/Builtin/Remote Desktop Users
AD-Groups-Namesnibhq.local/Builtin/Users
AD-Groups-Namesnibhq.local/Users/Denied RODC Password Replication Group
AD-Groups-Namesnibhq.local/Users/DHCP Administrators
AD-Groups-Namesnibhq.local/Users/Domain Users
AD-Groups-Namesnibhq.local/Users/REMOTE_ACCESS_APPLICATIONS
AD-Groups-Namesnibhq.local/NIB-OUs/NIB-Sectors/guest/GUEST_GROUPE
AD-Groups-Namesnibhq.local/NIB-OUs/NIB-Sectors/الإدارة المركزية لتكنولوجيا المعلومات_50/الإدارة المركزية لتكنولوجيا المعلومات
AD-Groups-Namesnibhq.local/NIB Appliances Groups Authentication/ISE Admins
AD-Groups-Namesnibhq.local/NIB-OUs/fs-it-share
AD-Groups-Namesnibhq.local/Users/Domain Admins
AD-User-NetBios-NameNIBHQ
IsMachineIdentityfalse
UserAccountControl512
AD-User-SamAccount-Name6886
AD-User-Qualified-Name6886@nib.gov.eg
TLSCipherECDHE-RSA-AES256-GCM-SHA384
TLSVersionTLSv1.2
DTLSSupportUnknown
HostIdentityGroupEndpoint Identity Groups:Profiled
Network Device ProfileCisco
LocationLocation#All Locations
Device TypeDevice Type#All Device Types#NAS Address
IPSECIPSEC#Is IPSEC Device#No
ExternalGroupsnibhq.local/S-1-5-32-544
ExternalGroupsnibhq.local/S-1-5-32-555
ExternalGroupsnibhq.local/S-1-5-32-545
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-572
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-1114
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-513
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-11959
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-18860
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-18505
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-18503
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-14934
ExternalGroupsS-1-5-21-4129499605-3250610629-1857627236-512
IdentityAccessRestrictedfalse
RADIUS UsernameNIBHQ\6886
Device IP Address10.100.3.1
CPMSessionID01000C0A0000E835B254D347
Called-Station-ID7C:AD:4F:28:FD:97
CiscoAVPaircts-pac-opaque=****,service-type=Framed,audit-session-id=01000C0A0000E835B254D347,method=dot1x,client-iif-id=355275030,AuthenticationIdentityStore=NibHQ-AD,FQSubjectName=e0d4af20-de9d-11ed-ab69-7e7af6e903ec#6886@nibhq.local,UniqueSubjectID=98fc117dd5036c1a54791943b1971568ea822d48

 

Result

RadiusPacketTypeAccessReject

 

Steps

 Step IDDescriptionLatency (ms)
 11001Received RADIUS Access-Request - NibHQ-AD
 11017RADIUS created a new session - nibhq.local0
 15049Evaluating Policy Group - NibHQ-AD0
 15008Evaluating Service Selection Policy1
 15048Queried PIP - DEVICE.Device Type0
 15048Queried PIP - Radius.NAS-Port-Id0
 15048Queried PIP - DEVICE.Network Device Profile0
 15048Queried PIP - Normalised Radius.RadiusFlowType1
 11507Extracted EAP-Response/Identity0
 12500Prepared EAP-Request proposing EAP-TLS with challenge0
 12625Valid EAP-Key-Name attribute received1
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request3
 11018RADIUS is re-using an existing session0
 12301Extracted EAP-Response/NAK requesting to use PEAP instead0
 12300Prepared EAP-Request proposing PEAP with challenge0
 12625Valid EAP-Key-Name attribute received0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request3
 11018RADIUS is re-using an existing session0
 12302Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated0
 61025Open secure connection with TLS peer0
 12318Successfully negotiated PEAP version 01
 12800Extracted first TLS record; TLS handshake started0
 12805Extracted TLS ClientHello message0
 12806Prepared TLS ServerHello message0
 12807Prepared TLS Certificate message0
 12808Prepared TLS ServerKeyExchange message7
 12810Prepared TLS ServerDone message0
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request3
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response0
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request3
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response1
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request4
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response0
 12318Successfully negotiated PEAP version 00
 12810Prepared TLS ServerDone message0
 12812Extracted TLS ClientKeyExchange message3
 12803Extracted TLS ChangeCipherSpec message0
 12804Extracted TLS Finished message0
 12801Prepared TLS ChangeCipherSpec message0
 12802Prepared TLS Finished message0
 12816TLS handshake succeeded0
 12310PEAP full handshake finished successfully0
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request4
 11018RADIUS is re-using an existing session1
 12304Extracted EAP-Response containing PEAP challenge-response0
 12313PEAP inner method started0
 11521Prepared EAP-Request/Identity for inner EAP method0
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request2
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response1
 11522Extracted EAP-Response/Identity for inner EAP method0
 11806Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge0
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request4
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response0
 11808Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated0
 15041Evaluating Identity Policy0
 15013Selected Identity Source - NibHQ-AD1
 24430Authenticating user against Active Directory - NibHQ-AD0
 24325Resolving identity - NIBHQ\68862
 24313Search for matching accounts at join point - nibhq.local0
 24315Single matching account found in domain - nibhq.local0
 24323Identity resolution detected single matching account0
 24343RPC Logon request succeeded - 6886@nibhq.local2
 24402User authentication against Active Directory succeeded - NibHQ-AD0
 22037Authentication Passed0
 11824EAP-MSCHAP authentication attempt passed0
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request2
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response0
 11810Extracted EAP-Response for inner method containing MSCHAP challenge-response0
 11814Inner EAP-MSCHAP authentication succeeded0
 11519Prepared EAP-Success for inner EAP method0
 12314PEAP inner method finished successfully0
 12305Prepared EAP-Request with another PEAP challenge1
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request2
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response0
 24715ISE has not confirmed locally previous successful machine authentication for user in Active Directory0
 15036Evaluating Authorization Policy0
 24209Looking up Endpoint in Internal Endpoints IDStore - NIBHQ\68861
 24211Found Endpoint in Internal Endpoints IDStore1
 24432Looking up user in Active Directory - NIBHQ\6886
 24355LDAP fetch succeeded
 24416User's Groups retrieval from Active Directory succeeded
 15048Queried PIP - NibHQ-AD.ExternalGroups3
 15048Queried PIP - Network Access.AuthenticationStatus0
 15048Queried PIP - Session.PostureStatus1
 15048Queried PIP - Session.PostureStatus0
 15016Selected Authorization Profile - DenyAccess1
 15039Rejected per authorization profile0
 12306PEAP authentication succeeded0
 61026Shutdown secure connection with TLS peer1
 11503Prepared EAP-Success0
 11003Returned RADIUS Access-Reject0
1 Accepted Solution

Accepted Solutions

@Saeed Abd Elhalim Hamada scroll down where it lists the AD groups and provide a screenshot of the retrieve list of groups.

View solution in original post

10 Replies 10

@Saeed Abd Elhalim Hamada as per your output - "15039 Rejected per authorization profile" - so the user did not match your authorisation rules. Perhaps the user is not a member of the correct AD group (depending on your rule configuration).

What is the configuration of your authorisation policy rules? Can you provide screenshots?

User is identified by MAC

So it MAB not 802.1x 

Can I see authc and authz policy

MHM

@Saeed Abd Elhalim Hamada the output above confirms the AD groups that user is a member of

RobIngram_0-1738227137312.png

None of which seem to be

RobIngram_1-1738227196514.png

So the user won't match that rule and is hitting the default, which is rejecting.

Check the user is a member of the correct AD group. Or amend the rule to permit traffic from another group.

 

saeedabdelhalimhamada_0-1738229175339.png

what about the resolved group name ??? 

saeedabdelhalimhamada_1-1738229300117.png

when i made test user ?

user in the same group after test

saeedabdelhalimhamada_2-1738223301901.png

 

@Saeed Abd Elhalim Hamada scroll down where it lists the AD groups and provide a screenshot of the retrieve list of groups.

@Rob Ingram  thanks i just removed all AD groups and retived them again and it`s works for me ^_^

Sorry can you elaborate more about authc policy you use ?

There is unknown? What is unknown ? 

MHM