11-21-2017 08:36 PM - edited 02-21-2020 10:39 AM
ISETEST#sh authentication sessions interface g1/0/5
Interface: GigabitEthernet1/0/5
MAC Address: f0de.f1eb.4142
IP Address: 192.168.3.54
User-Name: F0-DE-F1-EB-41-42
Status: Authz Success
Domain: DATA
Oper host mode: multi-auth
Oper control dir: both
Authorized By: Authentication Server
Vlan Policy: N/A
ACS ACL: xACSACLx-IP-Central_WEB_Auth-59f8469d
URL Redirect ACL: WEB-REDIRECT
Session timeout: N/A
Idle timeout: N/A
Common Session ID: C0A802F40000003C34CF384E
Acct Session ID: 0x0000009A
Handle: 0x2A00003D
Runnable methods list:
Method State
dot1x Failed over
mab Authc Success
anyone can me some suggest for these problem.
11-21-2017 10:05 PM
The dynamic authorization failed when user logged into portal. When user successfully logs into portal, then the ISE PSN will send a CoA (Change of Authorization) Radius packet to the NAS (i.e. your switch). I suspect that your switch is not configured to
11-22-2017 03:34 AM
my aaa command :
aaa new-model
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa accounting dot1x default start-stop group radius
aaa server radius dynamic-author
client
192.168.2.205
server-key cisco
ip device tracking
dot1x system-auth-control
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server dead-criteria time 5 tries 3
radius-server host
192.168.2.205
auth-port 1812 acct-port 1813
radius-server key cisco
radius-server vsa send accounting
radius-server vsa send authentication
and I set below command, too
Device> enable
Device# configure terminal
aaa new-model
aaa server radius dynamic-author
client 192.168.2.205
server-key cisco
port 1700
auth-type all
ignore session-key
ignore server-key
end
but the result also is this error, cloud you give me some suggest?
11-22-2017 02:02 PM
ok. I don't have wired switches in my deployment but I am able to get aaa debugs on my Cisco wireless controllers. I find this is an excellent place to see whether ISE is sending you a CoA, and to see how the NAS responds to it. If you have a deployment involving load balancers, firewalls and NAT/SNAT, then analysing the IP header of those CoA's can give you a clue. On Cisco WLC the commands are "debug aaa event enable" and "debug aaa packet enable". IOS will have some equivalent commands.
If you don't see the CoA in your switch debugs, then run a TCPdump on the ISE PSN that you suspect should be sending the CoA and see what's going on. Analyse the .pcap in Wireshark.
11-23-2017 11:46 PM
I can't found any about radiusCoASupportTransportThread: this type message when I enter command "debug aaa all enable"in the WLC. and I can found just like radius auth or radius accounting these type message in WLC.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide