cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
656
Views
0
Helpful
6
Replies

Problems NPS server and windows 11 / cisco switch not using timeout

piet-krobot
Level 1
Level 1

hello

I am having problems with my NPS system. I set this up and it works perfectly with a windows 10 laptop so a nice authentication and aceptation for my laptop resulting in it getting into the right vlan. Then I asked a colleague if he wanted to test it as well. This was with a windwos 11 laptop and this did not work. After long googling I found that is a known problem and can be solved in different ways. The way we used is to select via a GPO that at dot1x authentication should look for the domain controller and use these certificates . After pushing this this setup works with both windows 10 and 11. A 2nd solution is to disable credential guard on the windows 11 laptop then authentication also works well.

Now here is my question. The problem was also without this adjustment on the windows 11 laptop it never had internet it keeps getting stuck in the authentication process so it gets both no accept and no reject. See photo. This caused it to have no internet. How come the switch did not use the command timeout and then put it in a guestvlan/failover vlan 88? Is there a solution for this

interface GigabitEthernet2/0/48
description Access-LAN-Dot1x
switchport mode access
authentication event fail action authorize vlan 88
authentication event no-response action authorize vlan 88
authentication port-control auto
authentication periodic
dot1x pae authenticator
dot1x timeout quiet-period 2
dot1x timeout tx-period 2
spanning-tree portfast
spanning-tree bpduguard enable

The reason I want to get this working is because if people from our company need to authetnicate to the internet it is not a problem now because they are using the pushed gpo that makes sure authentication works on Windows 11 and 10. But I would also like someone external to be able to connect to the internet. Then authentication rejected and placed in the guest vlan. But right now on windows 11 a person would not get internet. It doesn't seem like an option to me to have to disable the credential guard every time someone external wants to connect via cable. All solutions I have found for this problem are client side solutions. Are there any server side solutions for this?

 

This is a picture of the wireshark capture of the client. The first two captures (Blue) are authentication attempts where in windows the service wired autoconfig is disabled. The last capture (Red) is this one when I try to authenticate with  wired autoconfig service enabled. But as you can see with the last capture there is never a result so never internet access.

client pc 2.png

This picture shows what a wireshark capture on the NPS sees with an authentication where no reject or access comes from.

NPS server capture.png
Hopefully my question is somewhat clear.

Edit/add:
quick summary 
Windows 10 device, NO service wired autoconfig, NOT in domain, NO GPO = Guest VLAN

Windows 10 device,  service wired autoconfig, NOT in domain, NO GPO = Guest VLAN

Windows 10 device,  service wired autoconfig, NOT in domain, GPO = Guest VLAN 

Windows 10 device, service wired autoconfig, in domain, NO GPO= Assigned VLAN

Windows 10 device service wired autoconfig, in domain, GPO = Assigned VLAN

===================================================================================

Windows 11 device, NO service wired autoconfig, NOT in domain, NO GPO = Guest VLAN

Windows 11 device,  service wired autoconfig, NOT in domain, NO GPO = No internet (this is the situation external people have)

Windows 11 device,  service wired autoconfig, NOT in domain, GPO = Guest VLAN 

Windows 11 device, service wired autoconfig, in domain, NO GPO= No internet (situation never present)

Windows 11 device service wired autoconfig, in domain, GPO = Assigned VLAN

The no internet is caused by the credential guard that is standard enabled on windows 11 pc's but on external people's i can't change that. Is there an other solution?

6 Replies 6

So win11 is failed to auth ?

If yes 

Then 

authentication event fail action authorize vlan 88 <<- this line should work IF aaa retrun access-reject

If the win11 not response to dot1x (you disable it) 

Then 

authentication event no-response action authorize vlan 88 <<- this will work 

Now some case the event authz vlan is different than dynamic vlan assign by aaa this make endpoint mac add to event authz vlan but the endpoint have IP of dynamic vlan assign' the solution is make reauthc timer less dhcp lease timer

MHM

In the situation where the windows 11 device is not in the domain and has the wired autoconfig service enabled It can't authenticate. That is the situation in blue. The no response line, doesn't work in that situation. It never says no response and place the client not in vlan 88. 

I see the win11 send start so the SW un-authz the guest port 
I think this what you see here 
you need to be sure that the win11 not send any EAPoL 

MHM

client pc 2.png

 

 

Screenshot (169).png

piet-krobot
Level 1
Level 1

At that point in time when the start (EAPOL packet) is send there is no link. And if it would receive eapol packets while in link. The authentication should restart like it says in the note below it? 

this is with the exact same device but with the GPO pushed with the changes. And here you can see that it works perfect. But if external people come and want to connect i cant put them in our domain to push gpo. Or i can't go messing arround in there settings so i was wondering if there is a server side solution to this problem? 

pietkrobot_0-1725343918008.png

https://old.reddit.com/r/sysadmin/comments/xju508/windows_11_22h2_credential_guard_default/
this post also describes this problem. But no where in this post it is cleared how you can solve it without changing client side settings. Because you can't change settings of external peoples pc. And i hoped the timeout in the switch config would still work but in cisco documentation it says that line doesn't do anything when you passed the EAP request/identitie.
afbeelding.png

friend run 

debug dot1x event <<- share it here 

MHM

Please enable the aaa authentication and radius authentication debugs on the switch and share the output for review.