cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3925
Views
0
Helpful
14
Replies

ISE 2.4: Wireless guest failed: 5400 Authentication failed

ittechk4u1
Level 1
Level 1

Hello Experts,

 

I am facing a issue with guest access authentication. Old AIROS wlcs are working but now I have a installed a new 9800 wlc and its creating an issue.

 

Requesting help to troubleshoot below authentication fail error messages seen for wireless guest users.

 

Event5400 Authentication failed
Failure Reason15039 Rejected per authorization profile
ResolutionAuthorization Profile with ACCESS_REJECT attribute was selected as a result of the matching authorization rule. Check the appropriate Authorization policy rule-results.
Root causeSelected Authorization Profile contains ACCESS_REJECT attribute
UsernameUSERNAME

 

Its not hitting the right Authentication policy.

 

 

 

Thanks in advance.

 

Best Regards

14 Replies 14

Hi,

You need to check your authorization policy. Clearly you are not matching
the same rule after the change of WLC. The rule might be matching NAD
vendor or model, etc.

Check your rules.


**** please remember to rate useful posts

HI Mohammed,

 

Rules are same as before and NAD also has been update din ISE.

here are the rule:

 

Capture.PNG

 

 

Best Regards

 

Find the device in context visibility > endpoints. Then check the
authorization tab. Post the full output.

I hope that is what you asked:

 

Capture.PNG

 

Steps

 11001Received RADIUS Access-Request
 11017RADIUS created a new session
 15049Evaluating Policy Group
 15008Evaluating Service Selection Policy
 15048Queried PIP
 15041Evaluating Identity Policy
 15013Selected Identity Source -
 22043Current Identity Store does not support the authentication method; Skipping it
 22064Authentication method is not supported by any applicable identity store(s)
 22058The advanced option that is configured for an unknown user is used
 22060The 'Continue' advanced option is configured in case of a failed authentication request
 24715ISE has not confirmed locally previous successful machine authentication for user in Active Directory
 15036Evaluating Authorization Policy
 15048Queried PIP
 15048Queried PIP
 15048Queried PIP
 15016Selected Authorization Profile - DenyAccess
 15039Rejected per authorization profile
 11003Returned RADIUS Access-Reject
 5434Endpoint conducted several failed authentications of the same scenario

 

Best Regards

 

 

 

Greg Gibbs
Cisco Employee
Cisco Employee

There is not enough information on your policy or WLC configuration to provide much useful help here.

You mention that "Its not hitting the right Authentication policy". Is the session hitting the correct Policy Set? If not, you need to look at what your 'WLC_Web_Authentication' condition includes and determine what is not matching from the RADIUS traffic sent by the WLC.

Unless I'm mistaken, it looks like this is a separate Policy Set for the user auth that happens after the CWA redirect (not a common policy design). Is that correct?

If the session is hitting the correct Policy Set and passing Authentication but skipping your Authorization Policy, then you need to look at the matching conditions there. You're using the 'RADIUS Called Station ID' attribute in your AuthZ Policy. Is the 9800 WLC configured to send that? See the Step 5 in the following configuration guide showing how this can be configured.

Central Web Authentication (CWA) on Catalyst 9800 Wireless Controllers and ISE Configuration Example 

 

As always, if this is an urgent issue please open a case with TAC to investigate further.

Hi Greg,

 

Its not hitting the correct Guest policy set. Its hitting Default (Deny) POLICY.

 

I am using authentication on ISE and custom webauth portal is on WLC itself.  AirOS WLCs are working normally ...only 9800 series WLC is creating issue.

here are the overview of the policies:

 

1.png

 

Authentication:

authentication.png

 

 

AuthZ:

 

 

Best Regards

 

AuthZ Policy:

 

AuthZ.png

 

Called Station ID is also matching on cisco wlc 9800:

 

Called_station.PNG

 

The default condition for 'WLC_Web_Authentication' uses the following attributes and is mainly used to simplify multi-vendor environments.

Radius:NAS-Port-Type = Wireless - IEEE 802.11	
Radius:Service-Type = Login

If you're using Local Web Auth (LWA) on the WLC, have you configured the service type 'login' as per the Configure a Web Authentication SSID on Catalyst 9800 Wireless Controllers guide?

If so, there may be some other issue with the Normalised RADIUS match on the WLC 9800 traffic.

You could take a packet capture from the WLC RADIUS traffic to ensure the above av-pairs are sent or try changing your Policy Set matching conditions to something more generic like:

Screen Shot 2021-08-11 at 8.49.16 am.png

 

 

 

HI Greg,

I cant change in Policy set as at least 20 other locations are working fine with same config.

I suspect we we have to change config on 9800 WLC.

Here is the WLAN config on 9800:

 

wlan CorpGuest 1 CorpGuest
peer-blocking drop
no security wpa
no security wpa wpa2
no security wpa wpa2 ciphers aes
no security wpa akm dot1x
security dot1x authentication-list ISE --> Under AAA Tab of the WLAN
security web-auth
security web-auth authentication-list ISE_Login ---> Under Layer 3 Tab
security web-auth parameter-map global

 

 

I am missing something here or ?

Regards

 

 

 

As per the last guide I shared, if you're using LWA with an external RADIUS server, you need to ensure the login authentication type is configured.

# aaa authentication login <login-local-name> local

If this is how you have it configured, I suggest opening a case with TAC.

Still same issue....Please find my complete config here:

 

---------------------------------------

aaa new-model
!
!
aaa group server radius ISE
server name ISE1
server name ISE2
deadtime 5
mac-delimiter hyphen
!
aaa group server radius CLOUD
server name CLOUD1
server name CLOUD2
deadtime 5
!
aaa authentication login ISE_Login group ISE
aaa authentication dot1x ISE group ISE
aaa authentication dot1x CLOUD group CLOUD
aaa authorization network ISE group ISE
aaa authorization network CLOUD group CLOUD
aaa accounting identity ISE start-stop group ISE
aaa accounting identity CLOUD start-stop group CLOUD
!
!
aaa attribute list wlan_lobby_access
!
!
!
!
aaa server radius dynamic-author
client 10.18.21.14 server-key 7 <key>
client 10.18.21.15 server-key 7 <key>
client 188.166.194.133 server-key 7 <key>
client 67.207.78.164 server-key 7 <key>
!
parameter-map type webauth global
type webauth
sleeping-client
virtual-ip ipv4 192.0.2.1 virtual-host guest.corp.com
redirect for-login guest.corp.com
redirect portal ipv4 192.0.2.1
intercept-https-enable
trustpoint TP-self-signed-1227611375
webauth-http-enable
!
radius server ISE2
address ipv4 10.18.21.15 auth-port 1812 acct-port 1813
key 7 <key>
!
radius server CLOUD1
address ipv4 188.166.194.133 auth-port 1866 acct-port 1867
key 7 <key>
!
radius server CLOUD2
address ipv4 67.207.78.164 auth-port 1866 acct-port 1867
key 7 <key>
!
wireless aaa policy Called_Station_ID
nas-id option1 ssid
!
wireless profile policy Guest
aaa-policy Called_Station_ID
accounting-list ISE
description Guest
ipv4 dhcp required
ipv4 dhcp server 172.18.80.1
vlan CorpGuest
no shutdown
!
wlan CorpGuest 1 CorpGuest
peer-blocking drop
no security wpa
no security wpa wpa2
no security wpa wpa2 ciphers aes
no security wpa akm dot1x
security web-auth
security web-auth authentication-list ISE_Login
security web-auth parameter-map global
no shutdown

---------------------------------------

 

Can you please suggest now, what is wrong in this config.

 

 

Best Regards

 

 

hslai
Cisco Employee
Cisco Employee

Check the Other Attributes section of ISE auth detail report for Called-Station-ID and see what is captured.

Usually the default suffices. If changed in the AAA Advanced Settings under Configuration > Security > AAA > AAA Advanced, they would be shown as radius-server attribute wireless; e.g.,

radius-server attribute wireless accounting call-station-id 
radius-server attribute wireless authentication call-station-id ap-macaddress-ssid

Wireless AAA policy appears for NAS-ID but not for called-station, per Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Bengaluru 17.6.x > WLAN > Network Access Server Identifier.

Hi,

Here are the radius attribite sin my config:

 

WLC1#sh run | in radius-server attribute
radius-server attribute wireless accounting mac-delimiter hyphen
radius-server attribute wireless accounting username-delimiter none
radius-server attribute wireless accounting username-case lower
radius-server attribute wireless accounting call-station-id ap-macaddress-ssid
radius-server attribute wireless accounting callStationIdCase upper
radius-server attribute wireless authentication callStationIdCase upper
radius-server attribute wireless authentication mac-delimiter hyphen
radius-server attribute wireless authentication call-station-id ap-macaddress-ssid

 

Best Regards

hslai
Cisco Employee
Cisco Employee

Check the auth detail reports and see whether they have the attributes that you intend to match in your policy conditions.