04-25-2019 05:25 AM
Hello,
I am deploying software-defined access for a customer and i have trouble with the trustsec configuration.
The issue is that the DNA center did not push cts configuration to fabric switches. As a result there are a ton of "CTSREQUEST failed" radius logs in ISE, and we won't be able to push segmentation policies.
Maybe someone can clarify whether the cts configuration is supposed to be pushed by the DNA center or if we are supposed to do it manually ?
If the DNA center is supposed to do it, at which stage does it do so (discovery, provisioning, add to fabric )?
Thank you in advance,
Best regards.
04-25-2019 05:44 AM
04-25-2019 09:42 AM
There are two steps:
1. When you assign devices to Site in DNAC, the network devices are populated into ISE
2. When you provision devices in DNAC, switches will receive all the respective AAA / radius config
Example config for step2:
!exec: enableip tacacs source-interface Loopback0ip radius source-interface Loopback0aaa new-modelip http serverip http authentication localip http max-connections 16ip http secure-serverip access-list extended ACL_WEBAUTH_REDIRECT 30 permit tcp any any eq www 40 permit tcp any any eq 443 50 permit tcp any any eq 8443 20 deny ip any host 10.168.124.5 60 deny udp any any eq domain 70 deny udp any eq bootpc any eq bootpsexitaaa session-id commonaaa group server radius dnac-client-radius-group server name dnac-radius_10.168.124.5 ip radius source-interface Loopback 0exitaaa group server radius dnac-network-radius-group server name dnac-radius_10.168.124.5 ip radius source-interface Loopback 0exitaaa accounting identity default start-stop group dnac-client-radius-groupaaa accounting update newinfo periodic 2880aaa accounting exec default start-stop group dnac-network-radius-groupaaa authorization network dnac-cts-list group dnac-client-radius-groupaaa authorization network default group dnac-client-radius-groupaaa authorization exec default localaaa authorization exec VTY_author group dnac-network-radius-group local if-authenticatedaaa authentication login default localaaa authentication dot1x default group dnac-client-radius-groupaaa authentication login VTY_authen group dnac-network-radius-group localdot1x system-auth-controlradius server dnac-radius_10.168.124.5 address ipv4 10.168.124.5 auth-port 1812 acct-port 1813 pac key XXX retransmit 1 timeout 2exitradius-server vsa send authenticationradius-server vsa send accountingradius-server dead-criteria time 5 tries 3radius-server deadtime 3radius-server attribute 31 mac format ietf upper-caseradius-server attribute 31 send nas-port-detail mac-onlyradius-server attribute 25 access-request includeradius-server attribute 8 include-in-access-reqradius-server attribute 6 on-for-login-authradius-server attribute 6 support-multiplects authorization list dnac-cts-listline vty 0 15 login authentication VTY_authen authorization exec VTY_author transport input allaaa server radius dynamic-author client 10.168.124.5 server-key XXX client 10.195.181.35 server-key XXXexitip domain-lookupip name-server 10.168.124.2ip domain name tmelab.localservice password-encryptionbanner motd #Welcome to SDA TME Lab#!exec: enable
Can you please post the output of "sh cts pacs", "sh run aaa" from Fabric Edge switch?
When you add devices to the fabric, and host onboarding, we push more config like cts role-based enforcement, cts role-based enforcement vlan-list 1021
05-10-2019 11:53 AM
Hello Tom,
Can you clarify what you meant by trustsec configs? Is it the CTS environment data or SGACL? If its related to CTS Environment data, then may be you hitting this bug.. https://cdetsng.cisco.com/webui/#view=CSCvp02082..
I am not aware of a fix for this and i know its WIP AFAIK..
Regards
Mahesh N
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide