cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1969
Views
0
Helpful
12
Replies

SDA and embedded wlc cannot assign vlan id from ISE

trondaker
Level 1
Level 1

Hi,

 

Struggeling with getting fabric in a box in a branch office up and running. Everything looks good in ISE, getting the correct policy hit - but the embedded wlc says it cannot assign vlan-id to the client from the name its getting from ISE:

 

[auth-mgr-feat_wireless] [31006]: (info): [0000.0000.0000:unknown] retrieving vlanid from name failed

 

This comes from ISE:

 

2021/09/25 07:53:49.949463 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: Tunnel-Private-Group-Id[81] 21 "10_208_23_0-VRF1"
2021/09/25 07:53:49.949468 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: EAP-Key-Name [102] 67 *
2021/09/25 07:53:49.949484 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: Cisco AVpair [1] 32 "cts:security-group-tag=0022-00"
2021/09/25 07:53:49.949495 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: Cisco AVpair [1] 32 "cts:security-group-tag=0022-00"
2021/09/25 07:53:49.949505 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: Cisco AVpair [1] 30 "cts:sgt-name=VRF1-SG"
2021/09/25 07:53:49.949516 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: Cisco AVpair [1] 15 "cts:vn=VRF1"
2021/09/25 07:53:49.949525 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: MS-MPPE-Send-Key [16] 52 *
2021/09/25 07:53:49.949539 {wncd_x_R0-0}{1}: [radius] [31006]: (info): RADIUS: MS-MPPE-Recv-Key [17] 52 *

 

This "10_208_23_0-VRF1" exists as Vlan1033 on the switch, and the correct VNID is assigned from the control-plane under Fabric. Has anyone seen this before? The clients arent getting an IP without the correct vlan-id mapping from that name.

12 Replies 12

jalejand
Cisco Employee
Cisco Employee

Try to use the AireSpace interface name attribute instead of the VLAN:

 

 
 

imagen.png

 

Hi,

 

Didnt have time this weekend to test this, we had to roll this branch back. It was our pilot location - this problem didnt happen in the lab. Will keep you updated. 

 

I suspect the error in the initial post is cosmetic - as the MAC-address of the clients showed up in the correct VLAN, but somehow they didnt get an IP. The topology was ISR 4331 - Fabric in a box (control, border, wlc and edge in a 9300), and then 5 other 9300s behind that FIAB acting as edges. As far as i can see, this is supported - but maybe i was wrong? Version 17.3.4.

@trondaker ,

What are you using for your DHCP server ? Whatever you use must preserve Option 82 as that is what we use to determine the correct Fabric Edge to send the DHCP reply.

We do support connecting Fabric Edge Nodes to a Fabric-in-a-Box (FiaB ... B/CP/E/eWLC).

Cheers,
Scott Hodgdon

Senior Technical Marketing Engineer

Enterprise Networking and Cloud Group

rasmus.elmholt
Level 7
Level 7

Hi,

 

Does a VLAN with the following name exist on the FIAB?  10_208_23_0-VRF1

Could you do a show VLAN brief?

 

When configuring SDA it is important to use the built in AV-Pairs to get the full use of our SDA. This is how ours look:

Access Type = ACCESS_ACCEPT
cisco-av-pair = cts:security-group-tag=0002-0
cisco-av-pair = cts:sgt-name=ClientSGT
cisco-av-pair = cts:vn=CORPORATE
Tunnel-Private-Group-ID = 1:CORPORATE
Tunnel-Medium-Type = 1:13
Tunnel-Type = 1:6

Hallo,

 

I did some comparisons between our onprem fabric with external wlc-9800 that works, and our branch fabric with fabric-in-a-box on a 9300. There were some commands relating to CTS that seems to have made som problems:

 

cts role-based enforcement

cts role-based enforcement vlan-list x,y,z

 

When i removed these, the clients started getting IP-adresses in the correct pool. This doesnt make much sense to me, bug?

Has those commands been added as part of the fabric provisioning, or have you typed them in manually?

 

They were added as part of the provisioning, and so i cant quite understand why they were there in the branch, and not onprem.

I cannot rememeber if I have ever seen those commands on a FIAB, let me just verify in the lab and see if this is normal behavior.

I have create FIAB with wireless many times with the default provisioning, with out any issues.

Did you see the same commands @rasmus.elmholt ?

Sorry about the late reply.

I see the same lines as well:

cts role-based enforcement
cts role-based enforcement vlan-list 1021-1025

Hm ok, but that config works with those lines in? could you share the ISE authentication result where you assign pools for this config?

Access Type = ACCESS_ACCEPT
cisco-av-pair = cts:security-group-tag=0002-0
cisco-av-pair = cts:sgt-name=ClientSGT
cisco-av-pair = cts:vn=CORPORATE
Tunnel-Private-Group-ID = 1:CORPORATE
Tunnel-Medium-Type = 1:13
Tunnel-Type = 1:6