cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
373
Views
0
Helpful
5
Replies

AAA Authentication doesn't failover to second AAA Server

mishadib
Level 1
Level 1

HI all, 

I hope somebody can help me with the following situation:

I have AAA enabled on our switches with 3 NPS servers. All users ports have 802.1x enabled. If the first NPS server goes down the users can't authenticate anymore. Even though I can still authenticate via SSH (also using NPS) on the switch ( so failover for ssh still works) users can't. Bellow i posted the config : 

macro name 802.1X
no cdp enable
switchport mode access
switchport port-security
switchport port-security aging time 2
switchport port-security violation shutdown
switchport port-security aging type inactivity
dot1x pae authenticator
dot1x host-mode single-host
dot1x port-control auto
dot1x timeout tx-period 15
dot1x timeout tx-period 3
dot1x guest-vlan ###-guest vlan
dot1x auth-fail vlan ###-guest vlan
dot1x auth-fail max-attempts 1
spanning-tree portfast
spanning-tree bpduguard enable
no macro description

 

interface GigabitEthernet1/0/15
switchport access vlan ###- user vlan
switchport mode access
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
no cdp enable
authentication event fail retry 3 action authorize vlan ###-guest vlan
authentication event no-response action authorize vlan ###-guest vlan
authentication port-control auto
dot1x pae authenticator
dot1x timeout tx-period 3
spanning-tree portfast
spanning-tree bpduguard enable

radius server A
address ipv4 AAAA auth-port 1645 acct-port 1646
key 7 .......
!
radius server B
address ipv4 BBBB auth-port 1645 acct-port 1646
key 7 ......
!
radius server C
address ipv4 CCCC auth-port 1645 acct-port 1646
key 7 .....

aaa new-model
!
!
aaa group server radius AAA_RADIUS
server name A
server name B
server name C

!

aaa authentication login default local
aaa authentication login AAA_RADIUS group radius local
aaa authentication dot1x default group radius
aaa authorization exec default group radius local if-authenticated
!
!
!
!
!
!
aaa session-id common

PS: Switches are 9300s and 3600s 

5 Replies 5

These are all config 

MHM

mishadib
Level 1
Level 1

I am not sure what you mean by that. 

You edit your post now I see aaa config 

Can you try config 

Aaa authentication dot1x defualt group AAA_RADIUS

MHM

mishadib
Level 1
Level 1

I tried adding the command radius-server retry method reorder and I also added the radius-server dead-criteria time 5 tries 3  and dead server deadtime 5 
In my test environment, it seems to be working. I enabled this in one of our offices to see if it has any side-effects, and if not I will role it company-wide. After I added these commands I noticed under show aaa servers the server that I deliberately changed the IP to simulate it as dead, was showing  dead, and the test client was authenticating to the next server. Before that somehow the switch was not identifying the NPS server as dead. 

balaji.bandi
Hall of Fame
Hall of Fame

as you already in the track of testing, that is settings missed - 

 

balajibandi_0-1706059602381.png

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Review Cisco Networking for a $25 gift card