05-01-2018 12:42 PM - edited 02-21-2020 10:54 AM
Hi,
I have a PoC in one of my client, below devices are used;
ISE 2.3v
Catalyst 3750-G (IOS 12.2(55)SE10) and IOS 12.2(55)SE5 --- tried both version but still having the same issue as mentioned below.
I was having an issue in the LAB setup of my ISE (PoC), i can see that my switch is able to get the authorization policy based on the attached debug output but it's not able to enforce the policy or redirection to the interface level. It's showing that "Critical Authorization is in effect for domain(s) DATA" and having full access to network - it is happening on a MAB for PC only (guest PC),
Please note that it was able to get a proper profile for phone, printer & APs. I don't even have an issue with dot1x as it was also working fine.
I just have an issue with a guest PC connecting to wired port.
Please refer to the switch config and debug output for reference.
Anyone can help me please or anyone had the same issue and got fixed.
Thanks,
05-01-2018 01:40 PM
05-01-2018 02:50 PM
05-01-2018 03:01 PM
05-01-2018 03:38 PM
Ok, I've re-read your original email, you state all other devices are working ok - pc, phones, printers and AP. Correct?
The interface configure for Gi1/0/11 does not have "no authentication open" configured therefore it must be in closed mode. The output from Gi1/0/11 shows dot1x and mab failed, therefore all authentications failed, so therefore no access on that port (because it's in closed mode). So I'd say what you are seeing is the expected result.
If you want some kind of guest access, you'll have to configure an Authorisation rule on the radius server (I assume ISE?) and permit access using mab, perhaps using CWA or return a DACL limiting access
05-01-2018 03:39 PM - edited 05-02-2018 01:12 AM
EDIT: duplicate post
05-01-2018 10:12 PM
05-02-2018 01:30 AM
Actually I'd expect "Access-Reject" sent from radius when you fail dot1x and mab, I can't see that in the output you attached, I would not have expected to see the Critical Auth VLAN.
To answer your question "authentication event server dead action" is used when the aaa server is "dead" and not responding, to authorise existing/new sessions into the vlan configured.
Have a look at this page (although it is for 3750 v15.x) it has instructions on for Guest VLAN, although it might just be simplier to authorise the guest on the radius server.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide