08-01-2020 05:34 PM
Hi all,
My 802.1x environment consist of 2x Cisco ISE (primary and secondary) units with windows AD.
My AD is configured with GPO which is applied to my users machine to dictate how they would authenticate against my cisco ISE as shown below.
1) using user certificate for authentication for users who are assigned individual PCs.
PC would be authorized to access the network once user cert authentication/authorization succeeds.
2) using machine certificate for authentication for machines which are shared among multiple users.
PC would be authorized to access the network once machine cert authentication/authorization succeeds.
I have upgraded my cisco ISE (cluster of 2x nodes) from v2.4 patch 8 to v2.4 patch 12 (25th july) and then to v2.6 patch 6 on 1st August.
With reference to attached i notice the following peculiar log events in cisco ise that was not there before i embark on my upgrade prior to 25th July.
1) My secondary ISE unit ISE02 was never involved in the authentication or authorization as long as my primary unit ISE01 is working. Ever since the upgrade conducted on 25th July, I started to see "dynamic authorization" by my secondary unit ISE02 in my ISE logs even though ISE01 is working as the active unit. Is this behavior normal?
2) The attached logs shows "Dynamic authorization" succeeded for machine authentication but not user authentication. Is this a concern?
At this moment my users do not feel any impact (lag or disconnectivity) when they authenticate (be it user or machine cert authentication) to my network through 802.1x against my cisco ISE. Please advise what i should do with regards to the dynamic authorization which starts to appear in my logs ever since upgrading my cisco ISE. TIA!
Solved! Go to Solution.
08-11-2020 03:31 PM
"Dynamic Authorization" is referring to the RADIUS CoA process.
I did a quick Excel Pivot Table with your CSV and found that all of the failures are happening on ISE02 with your NAD @ 192.168.210.51.
|
Fail |
Pass |
192.168.164.95 |
1 |
21 |
Authentication failed |
1 |
0 |
ISE01 |
1 |
0 |
Authentication succeeded |
0 |
21 |
ISE01 |
0 |
21 |
192.168.210.51 |
70 |
0 |
Dynamic Authorization failed |
70 |
0 |
ISE02 |
70 |
0 |
I would suggest verifying your NAD configs match with respect to RADIUS CoA:
aaa server radius dynamic-author client {ISE01_IP} server-key {key}
client {ISE02_IP} server-key {key
08-02-2020 12:40 AM
08-03-2020 05:01 AM
In an ISE deployment all nodes with the PSN role are active and able to handle authentications. That's independent of which node is in the primary or secondary PAN or MnT role.
Some NADs (e.g. ASAs) will fall back to using the second configured aaa server (= ISE PSN) when it sees a failure of the first one and not fail back unless you manually change it (or it sees a subsequent failure of the second node).
08-03-2020 08:02 PM
Hi Marvin,
With reference to my attached logs, there were no failure of any kind for my primary node. But "dynamic authorization failed" is still seen on my secondary node which is puzzling.
08-11-2020 03:31 PM
"Dynamic Authorization" is referring to the RADIUS CoA process.
I did a quick Excel Pivot Table with your CSV and found that all of the failures are happening on ISE02 with your NAD @ 192.168.210.51.
|
Fail |
Pass |
192.168.164.95 |
1 |
21 |
Authentication failed |
1 |
0 |
ISE01 |
1 |
0 |
Authentication succeeded |
0 |
21 |
ISE01 |
0 |
21 |
192.168.210.51 |
70 |
0 |
Dynamic Authorization failed |
70 |
0 |
ISE02 |
70 |
0 |
I would suggest verifying your NAD configs match with respect to RADIUS CoA:
aaa server radius dynamic-author client {ISE01_IP} server-key {key}
client {ISE02_IP} server-key {key
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide