10-18-2018 05:21 AM - edited 05-28-2019 06:36 AM
[***TO-DELETE***]
Solved! Go to Solution.
10-29-2018 03:32 PM
I have reproduced your issue in my lab.
There is an anonymous identity component in the EAP request that cannot be blank when talking to ISE. You can make it whatever you like, and it won't have any bearing on your results, other than to make ISE happy to continue. So put a static value in there like "PolycomVVX" - you will not see this anonymous username in the logs - you will see the Subject CN in the logs.
10-18-2018 06:19 AM
This is very common 802.1X authentication scenario and if you're starting out as a beginner, then I would recommend watching the www.labminutes.com - search that site for 802.1X - the guy shows you how to do exactly what you're after.
Doing cert auth is very simple once you see that video.
And AD lookups using EAP-PEAP (MSchapv2) is also relatively straightforward - you can easily join the AD domain or use LDAP for your lookups. Again, for total beginners there is too much to explain here - watch the labminutes. It's brilliant.
10-18-2018 10:41 AM
Hi,
As rightly mentioned, you can also refer this document for complete wired deployment guide where in they have mentioned 802.1x for IP phones.
Thanks,
Aravind
10-25-2018 07:16 AM
@Aravind this is actually great deployment guide however is designed only for Cisco infrastructure.
It is really great but it is for Cisco Phones.
Btw I was able to configure Polycom VVX phone to use 802.1X & EAP-TLS and I was able to establish communication with ISE (using device certificate to authenticate). However I'm getting following error:
22007 Username attribute is not present in the authentication request
I was pretty sure that EAP-TLS can use CA/Device certificate to authenticate but based on error I getting it looks like I need username which is unclear to me....
[Steps performed from my side]
- configured authorized policy with one condition: Certificate:Issuer-Organization STARTS_WITH value from certificate
- configured dACL_Voice which permit all trafic and permit voice vlan as well
- configured authentication policy to allow EAP-TLS
Any queries/comments?
Thank you very much.
10-25-2018 03:28 PM
@kamil.swedrak - If you're 100% sure that the phone did perform EAP-TLS (and not EAP-PEAP), then it might be because by default ISE will look into the supplicant's certificate and try to extract the Subject Common Name (CN) from that cert. This is default behaviour. If the cert doesn't contain any value in that part of the cert then ISE will complain.
Some customers might want to extract username from the Subject CN and then perform an LDAP/AD lookup to see if that user account is active. Whether or not you do it is another story - but the fact is that ISE will expect some data in that field.
Have a look at the Polycom's cert and if the SUbject is null (empty) then tell ISE to look at another attribute
10-26-2018 01:40 AM
@Arne Bier - yes I'm pretty sure that my phone is using EAP-TLS:
Certificate I'm using is artificial and common name started with polycom.test please take a look:
Regarding certificate policy - I don't have position Certificate - Subject Common name, I have only Certificate - Issuer Common name but I think it can be used parallel (correct me if I'm wrong).
Below showing you the certificate which was imported to ISE and device:
The second thing is that I haven't entry under Certificate Authentication Profile which pointing to my Polycom certificate (I have only Polycom certificate under Trusted Certificate section).
Although I created new certificate with the template you shown it doesn't changed anything for me.
10-26-2018 03:10 AM
There are two things at play here
1) The ISE server is acting as Authenticating Server (in the EAP game) and it needs to present a certificate to the Polycom during TLS establishment. This certificate has to be trusted by the Polycom, or else the TLS breaks down. Question to you: is this trust feature enabled or disabled on the Polycom? If enabled, then have you installed that cert on the Polycom (or, if not the exact cert, then the CA chain that generated the ISE EAP cert?)
2) If point 1 is out of the way then let's look at the Polycom cert. ISE needs to have the CA chain that signed that Polycom cert that you showed. It doesn't make sense to install all the Polycom self-signed certs into ISE (although you could do that, it would be impractical). Normally those phones would have a cert created for them by some PKI. Now if that is the case, then you must install that PKI cert chain into the ISE trusted cert store.
that's it.
10-26-2018 04:11 AM - edited 10-26-2018 04:22 AM
1) Not sure if Polycom phones have trust feature (walked through phone menu/Web GUI and I didn't found).
The only information I have is that certificate is installed (so I'm assuming that is trusted).
2) Since polycom.test cert is installed on ISE how to check if ISE have CA chained signed by Polycom?
Should I refer to this?:
Cisco ISE Custom Certificate Installation
10-27-2018 08:48 PM
From my read of VVX 410 and 802.1x - Polycom Community, it seems you would need to fill-in the Identity field to serve as the user name.
EAP-TLS
Device certificate
Trusted pool of root/CA certificates
Identity (user name)
10-29-2018 12:34 AM
@hslai - thank you for your post.
I already configured phone with username but it is unclear to me what kind of username that should be (I'm assumed that it can be artificial user but somewhere this artificial username should be authenticated is this correct?).
10-29-2018 05:42 AM
Once the identity configured, you should not be getting
22007 Username attribute is not present in the authentication request
If you are still getting the same error, best to consult Polycom support team to validate the configuration for the Polycom device.
For cert-based auth only, ISE validates the client certificates and, I believe, it cares not the username as long as it present.
10-29-2018 07:24 AM
You can get the copy of the endpoint certificate and the chain that ISE is receiving using ISE debug tool:
Note: I am showing Cisco IP Phone example, but you get the idea.
10-29-2018 03:32 PM
I have reproduced your issue in my lab.
There is an anonymous identity component in the EAP request that cannot be blank when talking to ISE. You can make it whatever you like, and it won't have any bearing on your results, other than to make ISE happy to continue. So put a static value in there like "PolycomVVX" - you will not see this anonymous username in the logs - you will see the Subject CN in the logs.
11-06-2018 07:26 AM
@Arne Bier - thanks for that valued information.
I have also one question regarding Authorization Policy - where this should be specify since I'm looking on my dashboard and have only policy sets, authorization profiles under policy tab, please take a look:
At this moment I can only specify authorization profile/allowed protocols to use under policy sets but don't have any place where I can specify authorization policy for IP phone to use certificate.
Do you have Arne any thoughts on this?
11-08-2018 03:52 AM
Not sure what you're asking.
When I reproduced this in the lab, I did not need to make any changes in ISE. I was testing with a Linux supplicant called wpa_supplicant. And it allows me to play around with EAP parameters.
In ISE there is no special tricks that you need to be aware of. Any standard 802.1X EAP-TLS authentication example that you find with google searches (or via www.labminutes.com) will work.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide