09-10-2018 04:43 AM - edited 09-10-2018 04:45 AM
Hi guys,
we got a strange situation where ISE shows Accesspoints (2702 / PAC provisioned) as authenticated but the switch (mainly cat3650 / 16.3.6) does not. We do have the same issue on different switches, also on 9300 with 16.6.3. I compared switch dot1x session ID with audit session ID in ISE, excactly the same. Might we hit a bug or is there something other wrong? We're using ISE internal user for the AP supplicant. APs are controller based, controller version is 8.3.140.0. When we close the port, no traffic flows. I attached show sess int gx/x/x + ISE auth details for reference. Can someone please advice?
Thank you!
09-10-2018 05:06 AM
Can you please share what your Authorization profile looks like?
09-10-2018 06:52 AM
The auth profile is simly set to permit access. The auth policy currently looks like that:
Under condition we're using predefined set of Wired_802.1X, source sequence contains AD lookup + internal identity store. Allowed protocols contain several like EAP-TLS and PEAP MSCHAPv2 but also EAP-FAST (with inner MSCHAPv2, EAP-GTC and EAP-TLS). Use PACs is enabled with anonymous and authenticated in-band PAC provisioning.
According to the hit counter you can see it is/was working several times but not for the specific AP mentioned in the earlier attached debug info. Several others are not working either.
09-10-2018 06:56 AM
Hello,
That is the Authentication profile. I am interested in what your Authorization profile (Result) looks like.
Thanks!
09-10-2018 07:01 AM
The result is the standard permit access.
09-10-2018 07:02 AM
Do you have a Pre-auth ACL on the switch ports? Or is this only in monitor mode?
09-10-2018 08:51 AM - edited 09-10-2018 08:52 AM
Don't know if pre-auth ACL are set, I only know pre-auth ACLs for web authentictaion at our guest wifi. Is there maybe the supplicant wrong on these APs?
09-10-2018 07:10 AM - edited 09-10-2018 07:11 AM
PAC provisioned is not authentication. When you are using EAP-FAST the client will first connect to ISE to do PAC provisioning then it will authenticate. So the AP is only doing the first part. You should see a Dot1x authentication attempt closely following the PAC provisioning.
09-10-2018 07:19 AM
Also if the step data you posted is from the actual authentication and not the PAC provisioning log entry it looks like you are passing authentication but failing authorization. I see an authentication succeeded, but the selected authorization profile is blank.
22037 Authentication Passed
15036 Evaluating Authorization Policy
15016 Selected Authorization Profile -
11401 Prepared RADIUS Access-Reject after the successful in-band PAC provisioning
09-10-2018 08:52 AM
I just restarted one AP to watch the behavoir. PAC suceeded but no authentication session followed.
Is it normal that it got rejected at the end of the PAC prov:
11018 | RADIUS is re-using an existing session |
12104 | Extracted EAP-Response containing EAP-FAST challenge-response |
11401 | Prepared RADIUS Access-Reject after the successful in-band PAC provisioning |
61025 | Open secure connection with TLS peer |
11504 | Prepared EAP-Failure |
11003 | Returned RADIUS Access-Reject |
Honestly I don't know how to proceed.
09-11-2018 12:38 AM - edited 09-11-2018 01:33 AM
New finding, I recognized that only access points with trunk ports and wlan-vlan mapping are not working properly but only on IOS XE. Got some ISE 3750v2 with IOS 15.0.2SEx, using same static trunk port config for APs where authentication works as expected.
Port config looks like this:
switchport trunk native vlan 2
switchport trunk allowed vlan 2,100
switchport mode trunk
device-tracking
authentication host-mode multi-host
authentication open
authentication port-control auto
dot1x pae authenticator
spanning-tree portfast trunk
spanning-tree bpduguard enable
Auth open ofc as it is not working atm. VLAN 2 is the standard 'client' VLAN used for the internal ssid while 100 is for voice.
Any clue? While researching I stumbled over the following article:https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/200492-Securing-a-flexconnect-AP-switchport-wit.html
Do I have to go for NEAT? Or can we get it working with static port config?
09-11-2018 02:02 AM
01-31-2025 01:53 AM
Hello,
Did you ever get to the bottom of this one, please? I too have an issue where some MAB devices are showing as authenticated in the ISE RADIUS Live Logs but showing as un-auth on the switch.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide