04-11-2018 11:55 AM
We are moving our customer environment to low impact mode slowly and have been solving the different endpoint groups to authenticate those correctly before we take the action from open to low-impact mode.
However we have noticed that even though a Windows machines do authenticate correctly from the beginning, they fail to authenticate later on. We have been trying to search for best practise / working configuration from all around but no one seems to have posted such (or have not been able to find one.) Yes I know ISE is not responsible of the supplicants but for sure people has been struggling with these.
as far as we see there are some scenarios which might be the cause of the problem
Has anyone collected some working / best practises around the Windows native supplicant and ISE secure access deployment. Would be great if such common practises would be collected here as well.
Thanks
Solved! Go to Solution.
04-12-2018 12:10 AM
It doesn't sound like you're using MAR, and the FlexAuth caveat I mentioned should only apply if you're using the following switch config:
authentication order mab dot1x
authentication priority dot1x mab
It's tough to say where the problem could lie without knowing more details about the specific symptom.
If you haven't done so already, you might just check the "Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions" chapter in the Reference section of the Admin Guide for your ISE version to see if there's anything you've missed.
Example from ISE 2.2 - Cisco Identity Services Engine Administrator Guide, Release 2.2 - Switch and Wireless LAN Controller Configuration Requ…
If you can duplicate the problem, you might need to start looking at packet captures, endpoint tracking, debugs (you might need TAC help with this), etc.
10-23-2019 01:25 PM
There are various reasons you could be seeing the symptom you're describing and there is not enough context or information in the show commands that you've provided to determine the cause.
If your Authorisation Policy is using a dACL, be aware that legacy switches require an IP ACL applied to the switchport to be able to apply a dACL sent by the RADIUS server to override it.
Have a look at the output from 'show authentication sessions interfaces fa0/3 details' to see if that indicates the dACL is applied.
Check your configuration against the document at the following link as a guideline. It's quite old, but still relevant for Wired 802.1x deployments using the legacy IBNS framework.
If all else fails, I suggest you open a TAC case to investigate further.
Cheers,
Greg
01-05-2020 07:34 PM
Hi Olivier,
From the screenshot attached, the switch is reporting a 'timeout' which would mean that the supplicant stopped responding. There are multiple variables that could cause that scenario.
If you are able to replicate this issue easily, I would suggest opening a TAC case to investigate. TAC will likely need to get packet captures from the client and ISE as well as a number of debugs from the switch to investigate in more depth.
Cheers,
Greg
04-11-2018 02:58 PM
It's hard to say for sure if this is a supplicant issue or switch/ISE configuration issue without more detail on the behaviour you're seeing, but there are two possible scenarios you should check.
-Regards
Greg
04-11-2018 10:54 PM
Thanks Gregory, I might actual face some of the issues in the first bullet, but while reading your response, I realised that I did not give much to work with when posting my question. So let me fill in some more information in case some more ideas would come out.
and then the interface configuration is like this
description CLIENT_PORT
switchport access vlan xxx
switchport mode access
switchport voice vlan yyy
no logging event link-status
authentication event fail action next-method
authentication event server dead action authorize vlan xxx
authentication event server dead action authorize voice
authentication event no-response action authorize vlan xxx
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication open
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer restart 0
mab
no snmp trap link-status
dot1x pae authenticator
dot1x timeout tx-period 5
spanning-tree portfast
service-policy input MARK_TRAFFIC
service-policy output QUEUE
ip dhcp snooping limit rate 30
So based on that we would be hitting on the issue with the flex auth and next-method if I have understood correctly
04-12-2018 12:10 AM
It doesn't sound like you're using MAR, and the FlexAuth caveat I mentioned should only apply if you're using the following switch config:
authentication order mab dot1x
authentication priority dot1x mab
It's tough to say where the problem could lie without knowing more details about the specific symptom.
If you haven't done so already, you might just check the "Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions" chapter in the Reference section of the Admin Guide for your ISE version to see if there's anything you've missed.
Example from ISE 2.2 - Cisco Identity Services Engine Administrator Guide, Release 2.2 - Switch and Wireless LAN Controller Configuration Requ…
If you can duplicate the problem, you might need to start looking at packet captures, endpoint tracking, debugs (you might need TAC help with this), etc.
10-23-2019 07:37 AM
10-23-2019 07:40 AM
10-23-2019 01:25 PM
There are various reasons you could be seeing the symptom you're describing and there is not enough context or information in the show commands that you've provided to determine the cause.
If your Authorisation Policy is using a dACL, be aware that legacy switches require an IP ACL applied to the switchport to be able to apply a dACL sent by the RADIUS server to override it.
Have a look at the output from 'show authentication sessions interfaces fa0/3 details' to see if that indicates the dACL is applied.
Check your configuration against the document at the following link as a guideline. It's quite old, but still relevant for Wired 802.1x deployments using the legacy IBNS framework.
If all else fails, I suggest you open a TAC case to investigate further.
Cheers,
Greg
10-23-2019 01:31 PM
Yes, i found out this was the reason. Thanks for your help anyway!
12-21-2019 11:31 AM
Hello,
In using 802.1x -Windows AD - Cisco 2960 switch , everything works fine when using PEAP-MSCHAP.
When using PEAP-TLS , first authentication succeeds. After two minutes, the switch starts reauthenticating, with failure.
Do you have any idea what can cause this problem?
Thanks!
Olivier
01-05-2020 07:34 PM
Hi Olivier,
From the screenshot attached, the switch is reporting a 'timeout' which would mean that the supplicant stopped responding. There are multiple variables that could cause that scenario.
If you are able to replicate this issue easily, I would suggest opening a TAC case to investigate. TAC will likely need to get packet captures from the client and ISE as well as a number of debugs from the switch to investigate in more depth.
Cheers,
Greg
05-06-2020 02:07 PM
Community,
I have the same issue. Windows native supplicant runs via "Wired AutoConfig" and for me restarting the service in Windows forces a reauth in ISE and thereby fixes the issue but only for a while. The issue returns sometime later and restarting the service fixes it. I'm trying to find a common denominator here. We too are trying to move towards Low-Impact mode.
Thanks,
Pete
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide