You want to demonstrate not only wireless 802.1X but also wired 802.1X with a single router that has a built-in AP and switchport(s). This guide will show you how to update the configuration to do 802.1X on one or more of the router switchports.
This guide assumes you have Identity Services Engine (ISE) running in your lab or dCloud.
This guide was created using a Cisco 819HWD @ IOS 15.4(3)M1 and ISE 2.2.
Note that the 819HWD and 8xx series routers in general are only capable of VLAN-based enforcement on the FastEthernet switchports - it cannot handle downloadable ACLs from ISE.
Step 1: Find the IP address used for ISE.
If using ISE in dCloud, this should be in the topology diagram or in the demo documentation:
Step 2: Record the ISE IP address for use in the router's RADIUS configuration.
Step 1: From the router's console, find and verify the router interface and IP address that can reach ISE :
router# ping 198.18.133.27 source vlan10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 198.18.133.27, timeout is 2 seconds:
Packet sent with a source address of 10.64.10.1
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 20/21/24 ms
router#
Step 2: Record the router's source IP address (10.64.10.1 in the example above) for use in the RADIUS client configuration for ISE.
Step 1: Get into your router's configuration mode:
router# configure terminal
Step 2: Copy and paste the global RADIUS client configuration below into your dCloud router after replacing
aaa authentication dot1x default group ise-group
aaa authorization network default group ise-group
aaa accounting update newinfo
aaa accounting dot1x default start-stop group ise-group
!
!
radius server ISE-1
address ipv4 {ISE-IP} auth-port 1812 acct-port 1813
key {dCloud-PreSharedKey}
!
aaa group server radius ise-group
server name ISE-1
!
!
aaa server radius dynamic-author
client {ISE-IP}
server-key {dCloud-PreSharedKey}
auth-type any
!
device-sensor accounting
!
dot1x system-auth-control
!
ip radius source-interface {Router-Interface-Name}
!
ip device tracking
ip dhcp snooping
!
radius-server vsa send authentication
radius-server vsa send accounting
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server attribute 31 mac format ietf upper-case
radius-server attribute 31 send nas-port-detail
radius-server dead-criteria time 10 tries 3
!
! --- Required for discovery by ISE Visibility Setup Wizard
snmp-server community {dCloud-PreSharedKey} ro
!
Note: For discussion about each of these configurations, please see the How To: Universal IOS Switch Config for ISE
Step 3: Copy and paste the following 802.1X+MAB configuration below into below into your dCloud router's switchport(s) that you want to enable edge authentication on :
interface FastEthernet0
description Secure Access Edge with 802.1X & MAB
switchport mode access
switchport access vlan 10
switchport trunk native vlan 10
switchport voice vlan 100
no ip address
authentication control-direction in
authentication event fail action next-method
authentication event server dead action reinitialize vlan 10
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication open
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
mab
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast
Note: The 819HWD is only capable of VLAN-based enforcement on the FastEthernet switchports - it cannot handle downloadable ACLs from ISE.
Step 1: In ISE, navigate to Administration > Network Resources > Network Devices
Step 2: Add the dCloud router with the following settings:
Attribute | Value |
---|---|
Network Device | |
Name | dCloud-Router |
IP Address | 10.64.10.1/32 |
Device Profile | Cisco |
✓ RADIUS Authentication Settings | |
Shared Secret | C1sco12345 |
✓ SNMP Settings | |
SNMP Version | 2c |
SNMP RO Community | C1sco12345 |
Step 3: Submit the changes.
Create a user identity in ISE if you haven't already. This will be used for the test authentication.
Step 1: In ISE, navigate to Administration > Identity Management > Users
Step 2: Click on +Add to add a new network user
Step 3: Fill in the form with the following settings:
Attribute | Value |
---|---|
Network Access User |
|
Name | test |
Status | Enabled |
Passwords | |
Password Type | Internal Users |
Login Password | C1sco12345 |
User Groups | |
User Groups | Employee |
Step 4: Click on Submit
You can use the router CLI to perform a RADIUS test authorization from the router to ensure you have RADIUS connectivity to ISE.
Step 1: Open the dCloud Router console
Step 2: Run the test aaa command to ISE which has the format
test aaa group {group-name | radius} {username} {password} new-code
Example output using the user identity above:
router# test aaa group ise-group test C1sco12345 new-code
User successfully authenticated
USER ATTRIBUTES
username 0 "test"
Step 1: Connect an endpoint (Windows, MacOS, Linux) to the dCloud router's switchport interface configured for 802.1X.
Step 2: On the router console You should immediately events for
Link-Up:
000376: *Sep 14 03:09:10.383: %LINK-3-UPDOWN: Interface FastEthernet0, changed state to up
Starting 802.1X:
000377: *Sep 14 03:09:10.763: %AUTHMGR-5-START: Starting 'dot1x' for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000300845614
Step 3: On your endpoint, if 802.1X is enabled for the wired interface you should be prompted to enter your user identity credentials (test:C1sco12345). Enter the credentials and submit them
Step 4: Your identity should immediately be authenticated and your endpoint authorized onto the network.
Step 5: On the router console, view the authentication and authorization events:
Authentication:
000379: *Sep 14 03:09:11.443: %DOT1X-5-SUCCESS: Authentication successful for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000300845614
Authentication Result:
000380: *Sep 14 03:09:11.443: %AUTHMGR-7-RESULT: Authentication result 'success' from 'dot1x' for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000300845614
Authorization Success:
000381: *Sep 14 03:09:11.447: %AUTHMGR-5-SUCCESS: Authorization succeeded for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000300845614
Step 6: View the authentication session information for the router interface
router# show authentication sessions interface FastEthernet 0
Interface: FastEthernet0
MAC Address: 20c9.d029.a3fb
IP Address: Unknown
User-Name: test
Status: Authz Success
Domain: DATA
Oper host mode: multi-auth
Oper control dir: both
Authorized By: Authentication Server
Vlan Group: N/A
AAA Policies:
Session timeout: N/A
Idle timeout: N/A
Common Session ID: 0A66930B0000000300845614
Acct Session ID: 0x00000006
Handle: 0x21000004
Runnable methods list:
Method State
dot1x Authc Success
mab Not run
router#
Step 7: In ISE, navigate to Operations > RADIUS > Livelogs to view the authentication for user test in ISE
indicates that there was a successful authentication for the user test@20:C9:D0:29:A3:FB
indicates that there is an active RADIUS session for this device
If for some reason you miss the 802.1X authentication challenges and it times out, your endpoint should still be successfully authenticated with MAC Authentication Bypass (MAB).
Starting 802.1X:
000392: *Sep 14 03:39:43.831: %AUTHMGR-5-START: Starting 'dot1x' for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
000393: *Sep 14 03:39:44.967: %LINK-3-UPDOWN: Interface FastEthernet0, changed state to up
After approximately 30 seconds (3 x 10 second timeouts) you will see 802.1X fail due to a lack of response from the endpoint:
000395: *Sep 14 03:40:14.739: %DOT1X-5-FAIL: Authentication failed for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
000396: *Sep 14 03:40:14.739: %AUTHMGR-7-RESULT: Authentication result 'no-response' from 'dot1x' for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
The switchport will then begin to failover from 802.1X authentication into MAB authentication:
000397: *Sep 14 03:40:14.739: %AUTHMGR-7-FAILOVER: Failing over from 'dot1x' for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
000398: *Sep 14 03:40:14.739: %AUTHMGR-5-START: Starting 'mab' for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
And this should be successful:
000399: *Sep 14 03:40:14.811: %MAB-5-SUCCESS: Authentication successful for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
000400: *Sep 14 03:40:14.811: %AUTHMGR-7-RESULT: Authentication result 'success' from 'mab' for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
000401: *Sep 14 03:40:14.815: %AUTHMGR-5-SUCCESS: Authorization succeeded for client (20c9.d029.a3fb) on Interface Fa0 AuditSessionID 0A66930B0000000500A05470
You can see how the authentication session information shows a successful MAB authentication for the MAC address (not the username) into the DATA VLAN:
router# show authentication sessions interface FastEthernet 0
Interface: FastEthernet0
MAC Address: 20c9.d029.a3fb
IP Address: Unknown
User-Name: 20-C9-D0-29-A3-FB
Status: Authz Success
Domain: DATA
Oper host mode: multi-auth
Oper control dir: both
Authorized By: Authentication Server
Vlan Group: N/A
AAA Policies:
Session timeout: N/A
Idle timeout: N/A
Common Session ID: 0A66930B0000000500A05470
Acct Session ID: 0x00000008
Handle: 0xB8000006
Runnable methods list:
Method State
dot1x Failed over
mab Authc Success
router#
Step 7: In ISE, navigate to Operations > RADIUS > Livelogs to view the MAB authentication for the endpoint MAC address: