cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3743
Views
25
Helpful
10
Replies

Wired Non Domain Users/Computers automatic VLAN Assignment from ISE

laurathaqi
Level 3
Level 3

Hi all, 

 

I have a Usecase were Customer want to place non domain users/machines into a isolated VLAN when connected to the switch port. I have created the VLAN in the Switch with the name of ex: VLAN 5, and also created a Profile in ISE and pointed to the VLAN 5. On the AuthC and AuthZ rules I have done following: 

AuthC: Not Defined yet.

AuthZ: if user is not part of the Domain Users and Domain Computers and Machine is Wired, then use VLAN 5 Profile to be assigned to the port session.

Switch interface config: switchport access, initial VLAN assigned VLAN X, which after machine connecting to the port, it should automatically change it to VLAN 5.

 

Do you guys have any idea what logic should I add to the AuthC in order to achieve my goal of automatically adding the machine to VLAN 5 after user connected to the port switch as a non Domain User? Or if there is any other better suggestions for the all logic of the Wired non Domain User UseCase would be highly appreciated. 

The VLAN assignment examples I have seen configured online so far, are all related to AD groups. However this UseCase does not have communication to AD, since these are going to be Non Domain Users.

 

Any suggestion or thoughts would be highly appreciated.

 

Thank you,

Laura

2 Accepted Solutions

Accepted Solutions

@laurathaqi 

...but does the output of show authentication session int gi10/1 indicate whether the Vlan Policy = vlan 15, if not that would indicate that the switch did not receive the settings from ISE, therefore the client remains in vlan specified under the interface.

 

The client would be denied access to the network before authentication, that includes DHCP, only EAPoL is allowed.

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html

 

 

 

View solution in original post

Hi @Rob Ingram 

 

Found the solution. Seems that COA is not supported on Cisco Switches versions lower than 12.2(53). Mine was 12.2(50). Tested it in a switch version 15.2 which I had it available and the VLAN Policy works like charm. 

Found the info on the following link: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_troubleshooting.html#wp1043599

 

Thank you once again for the feedback and support. You make this community awesome. 

 

Best regards,

Laura 

View solution in original post

10 Replies 10

balaji.bandi
Hall of Fame
Hall of Fame

Your use case most like BYOD, if the user not logged in how do you identify the device? 

 

 you need to get a user portal or MAB authentication for the user to get into non-authenticated access to assign VLAN.

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Hi @balaji.bandi 

 

Yes, I have though of this, but the issues is that the Switch does not support URL Redirection in regards CWA thus making it impossible to implement wired BYOD. Thus the idea was to go only with VLAN assignment isolation. 

 

Thank you for your feedback. 

 

Best regards,

Laura

Hi @laurathaqi 

You can use the common task "VLAN" in the authorisation profile and apply to any users that aren't a member of the domain. Refer to this guide for more information on dynamic VLAN authorisation.

 

Another option is to just apply a DACL to these users restricting their access, this means you don't need to create additional vlans and DHCP scopes.

Hi @Rob Ingram 

 

Will do the test of the information guide you provided and inform you about the income during tomorrow. 

 

Thank you for the feedback. 

 

Best wishes,

Laura  

Hi @Rob Ingram ,

 

I tried the configurations you suggested but for some reason, non domain machine VLAN interface does not get updated from the AuthZ Profile VLAN pushed.   The configurations existing are as following: 

Interface g1: switchport access VLAN 10, interface gets IP, however I want the logic to as following: when gone through Policy Set: Flow will fail from MAB to DOT1X, and it will go through the AuthC Mab Rule, and AuthZ Mab Rule, thus to change to VLAN15, since this VLAN is isolated and used for non domain computers and users.

 

However, the interface for some reason is stuck into the same ip address which is assigned in the switch port manually via the switchport access VLAN 10, and the IP address does not change to the new VLAN Broadcast. This, even thought, the flow goes into the AuthC and AuthZ rules I configured and the profile with VLAN ID is pushed. 

Do you have any idea why the VLAN does not change, even thought the profile with dynamic VLA is pushed?

 

Please have in mind that the VLAN in AuthZ Profile is configured with the same name in Switch. And DHCP for this VLAN is also configured and working correctly when manually assigned to a port with "Switchport access 35". 

 

Looking forward to hearing from you. 

 

Thank you,

Laura

@laurathaqi 

The computer should not receive an IP address until ISE has processed the authc/authz request.

At what point does the computer receive an IP address in VLAN10?

Is the user on the non-domain pc actually authorised using mab initially?

 

Can you turn on debugs "debug radius" and provide the output. Also provide the output of "show authentication session int gi10/1"

 

 

Hi Rob, 

 

Please find answers in Italic below: 

 

The computer should not receive an IP address until ISE has processed the authc/authz request. 

Answer: The reason why the computer gets the ip is cause of the manual switch interface vlan that we have it configured, and which we think would change dynamically after it realizes its a wired MAB non domain User/Computer. What I mean with the manual switch interface vlan configuration is as following: 

!

interface gi10/1

  switchport mode access 

  switchport access vlan 10

  ....dot1x and mab configs....

end

!

At what point does the computer receive an IP address in VLAN10?

Answer: The computer seems to recieve the IP address at the moment it connects to the network, thus getting an ip in the Broadcast of VLAN 10. And only after that, it reads other dot1x configs in order. And since this is the case, switchport access vlan 10 is the first command on the configurations of the switch, it gets read first, thus gets an IP in the VLAN. And only after that, it proceeds to reading other configurations of the port.  

 

Is the user on the non-domain pc actually authorised using mab initially?

Answer: Not sure I understand your question, but the following behaviour is present: 

User connects to switchport, gets an IP, proceeds to other switch commands configuration read, which sends it to ISE, in ISE(based on live logs) it goes through MAB rule, which has Continue option configured, -> proceeds to AuthZ rule that checks as following: If its a MAB rule, go to profile ex:XYZ and profile XYZ has configured a AuthZ profile with a VLAN on it. This VLAN should be dynamically assigned to the port, if the flow goes into the mentioned rules. 

However, for some reason, the interface is stuck to the primary VLAN that was assigned to the port via the "switchport access vlan 10" command and the new profile even though its read based on live logs, VLAN does not change to the new one that we want to assign.  

 

The "show authentication session int gi10/1" shows the interface MAB success, whilst failed from 802.1x first. And it gets the IP of the VLAN what is assigned in the switchport configuration manually as following: 

  interface gi10/1

  switchport mode access 

  switchport access vlan 10

 

Note: COA is enabled in both Switch and ISE. However, I am not sure how to confirm if the COA is happening during the process of when the switchport needs to change its VLAN to the new one. 

 

I will further proceed with the radius debug information and provide it to you. 

 

Looking forward to hearing back from you. 

 

Thank you,

Laura 

@laurathaqi 

...but does the output of show authentication session int gi10/1 indicate whether the Vlan Policy = vlan 15, if not that would indicate that the switch did not receive the settings from ISE, therefore the client remains in vlan specified under the interface.

 

The client would be denied access to the network before authentication, that includes DHCP, only EAPoL is allowed.

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html

 

 

 

Hi @Rob Ingram 

 

With Further analyses, the show authentication session int gi10/1 VLAN Policy shows empty. Meanwhile, in the Active sessions of the port in ISE, when I do the reauthenticate session from the CoA Column, I am getting error of  Dynamic Authorization Failed; Check the connectivity between ISE and Network Access Device. Ensure that ISE is defined as Dynamic Authorization Client on Network Access Device and that CoA is supported on device.

 

CoA is enabled in Switch with the "aaa server radius dynamic-author", as following: 

 

aaa server radius dynamic-author

 example: client 10.0.0.3 server-key testExampleKey
 example: client 10.0.0.4 server-key testExampleKey

 

Meanwhile in ISE I have CoA enabled with Reauth action. 

The flow am testing with is:

   AuthC: if Wired_MAB, check on internal Endopoints DB, if user not found -> Continue.   

   AuthZ: if Wired_MAB, assign AuthZ profile of VLAN ID 15

 

Please have in mind that the 802.1x EAP-TLS and PEAP flows are working successfully, and this is only the MAB one. 

I did not configure Pre-AUTH ACL in the port. 

 

Full interface config is as following:

switchport access vlan 10
switchport mode access

authentication event fail action next-method
authentication event server dead action authorize vlan 10
authentication event server alive action reinitializes
authentication host-mode multi-auth
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
authentication violation restrict
mab
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast
spanning-tree bpduguard enable

!

Note: Other devices in the network are authentication with success with ISE as per 802.1x. 

Any thoughts how to check and validate communication of COA between NAD and ISE. 

Actions done so far: 

- validated via Wireshark, that 1700 port is being used from ISE side for COA. 

- Supplicant windows firewall is turned off. 

- there is no other firewall that is in between these two networks and devices, and between the vlans neither.

- ping is wokring and also 802.1x EAP-TLS and PEAP are successful AuthC and AuthZ. 

- switch model is 2960, and the COA commands were accepted on the CLI. 

 

Any thoughts on how to further troubleshoot? 

Also if you have a better suggestion on the implementation logic of wired non domain user authentication and authorization, please let me know. As long as its not BYOD, as per the URL redirection limitations. 

 

Thank you for your feedback. Looking forward to hearing from you. 

 

Best,

Laura 

Hi @Rob Ingram 

 

Found the solution. Seems that COA is not supported on Cisco Switches versions lower than 12.2(53). Mine was 12.2(50). Tested it in a switch version 15.2 which I had it available and the VLAN Policy works like charm. 

Found the info on the following link: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_troubleshooting.html#wp1043599

 

Thank you once again for the feedback and support. You make this community awesome. 

 

Best regards,

Laura