cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6659
Views
0
Helpful
29
Replies

Cisco NAC - Mapping Rules with VLAN ID

Daniel Stefani
Level 1
Level 1

Hello,

I have a NAC L3 - OOB - Real IP Gateway environment.

The NAC is the version 4.8.1.

Each floor of the company has one Access Vlan, one Auth Vlan and one User Role.

I configured an LDAP Auth Server where the default role is Unauthenticated Role

and created Mapping Rules based on the Vlan ID of Auth Vlan on each floor.

Ex: The Access Vlan of the 8th floor is  380, the Auth Vlan is 908 and User Role is

FuncionariosB8.

When I run an Auth Test, the result is as expected and User is mapped to the desired Role.

But when put into production, the user enters the Default Unauthenticated Role.

The figures attached show my settings in the NAC.

The log file below is taken nac_manager.log

2011-02-25 17:42:23.091 +0100 [TP-Processor23] INFO  com.perfigo.wlan.web.admin.UserInfoManager         - UIM - removeUsersByMacList: 1 MACs 0 users

2011-02-25 17:42:44.709 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=1 condId=1 type=2 lOp=VLAN ID op=equals rOp=907

2011-02-25 17:42:44.709 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.709 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=0 condId=1 type=2 lOp=VLAN ID op=equals rOp=908

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=2 condId=1 type=2 lOp=VLAN ID op=equals rOp=909

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=3 condId=1 type=2 lOp=VLAN ID op=equals rOp=929

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=8 condId=1 type=2 lOp=VLAN ID op=equals rOp=928

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=11 condId=1 type=2 lOp=VLAN ID op=equals rOp=910

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=13 condId=1 type=2 lOp=VLAN ID op=equals rOp=931

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.710 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=15 condId=1 type=2 lOp=VLAN ID op=equals rOp=911

2011-02-25 17:42:44.711 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:44.711 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=17 condId=1 type=2 lOp=VLAN ID op=equals rOp=912

2011-02-25 17:42:44.711 +0100 [TP-Processor23] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

2011-02-25 17:42:49.103 +0100 [Thread-72] ERROR com.perfigo.wlan.web.sms.SnmpUtil                  - Failed to find Access VLAN for switch [10.5.0.121] port [88]. Use default Access VLAN 380 instead.

2011-02-25 17:42:49.354 +0100 [Thread-73] ERROR com.perfigo.wlan.web.sms.SnmpUtil                  - Failed to find Access VLAN for switch [10.5.0.121] port [88]. Use default Access VLAN 380 instead.

Can you help me with this problem? that will need to open a TAC?

Kind Regards,

Daniel Stefani

1 Accepted Solution

Accepted Solutions

The connection between switches are L3?

Do you have in your network active L3 routing protocol?

What is your NAC deployment model, it's a L2 OOB VG or L3 OOB RG?

Kamil

View solution in original post

29 Replies 29

wkamil123
Level 1
Level 1

Hi Daniel,

You don't correctly configure a LDAP mapping rules.

LDAP use queries by looking in AD structure to find a user belongs to OU or groups and the basis of received responses put user to the proper role.

In your  NAC configuration  it always put user in Unauthenticated role because you indicate Auth VLAN 908.

For example in your AD is created a group called 'FunctionariosB8'  and it has a member called 'test'

Create a role that in the expression form be a formula 'memeberof contains FunctionariosB8'.

And you can now verify in Auth Test what is a response for user 'test'

Kamil

Hi Kamil,

In Mapping Rule setup, the condition VLAN ID is available for all Auth Servers.

I intend to use the condition type VLAN ID and not Attribute.

In my environment, this condition is more appropriate.

In the example you gave, you use Attribute.

See my illustrated attached file.

Thanks for the reply, but i believe it does not solve my problem.

Kind Regards,

Daniel Stefani

Hi Daniel,

Show me how are you configure rules for users? Why are try tu use LDAP, it has any information about VLAN ID that you want to use?

I think better for you is to create port profile for a dedicated role and assign user to this role.

By the way, I verify to what you want to do and as I mention above the mapping rule is not your solution.

You must create port profile and assign port on a switch to this profile.

Kamil

Hi Kamil,

The settings are attached.

I'm using LDAP to use AD as a base of users and an authentication option for users who are not on the Domain but have accounts in AD.

The method of authentication via SSO is the default, but the same problem happens in Mapping Rule.

I chose to use User Role VLAN because i'm configuring the Guest access too.

Thus, a switch port may be in the Employees Network or Guest Network .

My network does not propagate VLANs on a switch to the other, the entire L3.

The focus on solving the problem should be in the nac_manager.log messages I sent in the first post.

Finding the solution to the error will solve my problem.

For some reason, NAC Manager can not read the Auth VLAN ID of the user for mapping it correctly.

It can be a SNMP problem, but not sure yet.

I am sending my SNMP settings for you see.

Kind regards,

Daniel Stefani

The SNMP settings on a CAT switch are in mode read-only, so verify when you changed this SNMP settings for CAM's only to read-write.

Kamil

I imagine that the SNMP settings are correct.

If I make a snmpwalk of CAM for the switch, got the following output

[root@srvtatcam001 ~]# snmpwalk -v 1 -c nac-ro 10.5.0.121 | more

SNMPv2-MIB::sysDescr.0 = STRING: Cisco IOS Software, s3223_rp Software (s3223_rp-ADVENTERPRISEK9_WAN-M), Version 12.2(33)SXH5, RELEA

SE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2009 by Cisco Systems, Inc.

Compiled Thu 16-Apr-09 01:34 by prod

SNMPv2-MIB::sysObjectID.0 = OID: SNMPv2-SMI::enterprises.9.1.400

DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (320415575) 37 days, 2:02:35.75

SNMPv2-MIB::sysContact.0 = STRING:

SNMPv2-MIB::sysName.0 = STRING: SWITATIDF002

SNMPv2-MIB::sysLocation.0 = STRING:

SNMPv2-MIB::sysServices.0 = INTEGER: 78

SNMPv2-MIB::sysORLastChange.0 = Timeticks: (0) 0:00:00.00

IF-MIB::ifNumber.0 = INTEGER: 357

IF-MIB::ifIndex.1 = INTEGER: 1

IF-MIB::ifIndex.2 = INTEGER: 2

IF-MIB::ifIndex.3 = INTEGER: 3

IF-MIB::ifIndex.4 = INTEGER: 4

IF-MIB::ifIndex.5 = INTEGER: 5

IF-MIB::ifIndex.6 = INTEGER: 6

IF-MIB::ifIndex.7 = INTEGER: 7

IF-MIB::ifIndex.8 = INTEGER: 8

IF-MIB::ifIndex.9 = INTEGER: 9

.

.

.

Kind Regards,

Daniel Stefani

Could you test when you changed CAT 6500 and CAM switch profile to SNMP version 2?

Kamil

Hi,

remains the same behavior, users are still being mapped out for Unauthenticated Role.

-


Mensagem original

In AD create a user and test through Auth test and show a CAM's response.

Kamil

See attached files...

So, you have an answer why users are put in Unautheticated Role.

In mapping role change the value 908 to 380 and test it with a acsadmin user.

Kamil

Hi,

The users are put in Unautheticated Role because the NAC Manager is unable to obtain the VLAN ID of the switch port where User is connected.

This can be seen in the file nac_manager.log

2011-02-28 16:37:55.601 +0100 [TP-Processor22] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - Cond#1:AuthServerMapCondition: mapid=4 condId=1 type=2 lOp=VLAN ID op=equals rOp=908

2011-02-28 16:37:55.601 +0100 [TP-Processor22] INFO  c.perfigo.wlan.web.auth.expr.RoleMappingEvaluator  - conditions - {1=false}

the result of the condition should be conditions - {1=true}.

In consequence of the condition is false, the NAC Manager puts the switch port  in the Default Vlan Access configured in Port Profile and the user in the Unauthenticated Role, which is the default LDAP Auth Server

But the big question to be answered is why it(NAC Manager) can not read this VLAN ID?.

In the user guide says:

"The Mapping Rules forms can be used to map users into user role(s) based on the following parameters:

•The VLAN ID of user traffic originating from the UNTRUSTED SIDE of the CAS (all auth server types). ------> IN MY CASE IS THE VLAN 908

•Authentication attributes passed from LDAP and RADIUS auth servers (and RADIUS attributes passed from Cisco VPN Concentrators)"

Kind Regards,

Daniel Stefani

Hi,

Read this document about Cisco NAC Appliance Switch and Wireless LAN Controller Support.

http://www.cisco.com/en/US/docs/security/nac/appliance/support_guide/switch_spt.html#wp89679

There is a command try it on the CAM.

snmpget -v 1 -c 1.3.6.1.2.1.1.2.0

If CAM response with the same OID as above, your SNMP settings are correct but test more SNMP settings on CAM and on a switch.

As far sa i know you have supported IOS on CAT6500 by CAM or maybe are some bugs in your IOS version?

The simple way to check SNMP go to port profile on CAM chose the proper port on a switch an bounce port to which is connected a PC.

In that way you verify of CAM communication thtough SNMP.

Kamil

Hi,

I did a test with snmpget using the OID of VLAN ID.

# snmpget -v 1 -c nac-ro 10.5.0.121 1.3.6.1.4.1.9.9.68.1.2.2.1.2.88

SNMPv2-SMI::enterprises.9.9.68.1.2.2.1.2.88 = INTEGER: 908

Also collected packets between the switch and NAC Manager during

Authentication.

See attached file.

Kind Regards,

Daniel Stefani

Review Cisco Networking for a $25 gift card