Hello All!
This is follow-on to me earlier dot1x question. Here is the
situation:
I have a Windows XP client connected to Cat 3650 and a configured ACS
server. With the Cat configured as RAIDUS IETF client in the ACS, I can
authenticate the XP PC and get the VLAN pushed back to the Cat. All
works fine. So now I want to try setting the Cat to be a RADIUS (Cisco
IOS/PIX 6.x) client in the ACS. I would expect to have to use the
configuration Yusuf shows in his book on pages 339-341. Now here is
where the problem starts. First, if you look at his debug output you see
that Tunnel-Type, Tunnel-Medium-Type and Tunnel-Private-Group are pushed
back from ACS as BOTH Cisco AV-PAIRs and as IETF RADIUS attributes. Why
are both methods used?? I tried used using just the IETF values and it
works just fine. So why use the Cisco AV-PAIRS? Now If try to add the
AV-PAIRS to the ACS, entered exactly as figure 11-8, the Switch does not
recognize them:
*Mar 17 23:21:18.222: RADIUS: Message-Authenticato[80] 18
*Mar 17 23:21:18.222: RADIUS: 16 DF 78 4A FF DD 02 62 E2 45 CA 35 74
E7 53 F5 [ xJbE5tS]
*Mar 17 23:21:18.222: RADIUS: Vendor, Cisco [26] 49
*Mar 17 23:21:18.222: RADIUS: Cisco AVpair [1] 43
"audit-session-id=0A1414040000003F5767FE11"
*Mar 17 23:21:18.222: RADIUS: NAS-Port
SEC-CAT4(config-if)#-Type [61] 6 Ethernet [15]
*Mar 17 23:21:18.222: RADIUS: NAS-Port [5] 6 50018
*Mar 17 23:21:18.222: RADIUS: NAS-Port-Id [87] 21
"GigabitEthernet0/18"
*Mar 17 23:21:18.222: RADIUS: State [24] 27
*Mar 17 23:21:18.222: RADIUS: 45 41 50 3D 30 2E 32 30 31 2E 34 39 37
2E 31 3B [EAP=0.201.497.1;]
*Mar 17 23:21:18.222: RADIUS: 53 56 43 3D 30 2E 31 64 3B [
SVC=0.1d;]
*Mar 17 23:21:18.222: RADIUS: NAS-IP-A
SEC-CAT4(config-if)#ddress [4] 6 10.20.20.4
*Mar 17 23:21:18.247: RADIUS: Received from id 1645/84
10.20.20.101:1812, Access-Accept, len 243
*Mar 17 23:21:18.247: RADIUS: authenticator 34 14 2D BA 5D 79 93 70 -
88 91 01 F4 39 14 79 24
Note that the AV-PAIRS below appear exactly as they do on page 341
*Mar 17 23:21:18.247: RADIUS: Vendor, Cisco [26] 49
*Mar 17 23:21:18.247: RADIUS: Cisco AVpair [1] 43
"cisco-avpair= "tunnel-type(#64)=VLAN(13)""
*Mar 17 23:21:18.247: RADIUS: Vendor, Cisco [26] 60
*Mar 17 23:21:18.247: RADIUS: Cis
SEC-CAT4(config-if)#co AVpair [1] 54 "cisco-avpair=
"tunnel-medium-type(#65)=802 media(6)""
*Mar 17 23:21:18.247: RADIUS: Vendor, Cisco [26] 56
*Mar 17 23:21:18.247: RADIUS: Cisco AVpair [1] 50
"cisco-avpair= "tunnel-private-group-ID(#81)=200""
*Mar 17 23:21:18.247: RADIUS: Framed-IP-Address [8] 6
255.255.255.255
*Mar 17 23:21:18.247: RADIUS: EAP-Message [79] 6
*Mar 17 23:21:18.247: RADIUS: 03 21 00 04 [ !]
*Mar 17 23:21:18.247: RADIUS: Clas
SEC-CAT4(config-if)#s [25] 28
*Mar 17 23:21:18.247: RADIUS: 43 41 43 53 3A 30 2F 33 35 34 32 64 2F
61 31 34 [CACS:0/3542d/a14]
*Mar 17 23:21:18.247: RADIUS: 31 34 30 34 2F 35 30 30 31 38 [
1404/50018]
*Mar 17 23:21:18.247: RADIUS: Message-Authenticato[80] 18
*Mar 17 23:21:18.247: RADIUS: 31 CE 78 F1 01 A9 A8 DB EA 36 73 A2 A8
C6 74 5D [ 1x6st]]
*Mar 17 23:21:18.247: RADIUS(00000042): Received from id 1645/84
But, the switch does not know what do with them...
*Mar 17 23:21:18.247: RADIUS/DECODE: parse unknown cisco vsa "cisco
<======================
SEC-CAT4(config-if)#-avpair" - IGNORE
*Mar 17 23:21:18.247: RADIUS/DECODE: parse unknown cisco vsa
"cisco-avpair" - IGNORE <======================
*Mar 17 23:21:18.247: RADIUS/DECODE: parse unknown cisco vsa
"cisco-avpair" - IGNORE <======================
*Mar 17 23:21:18.247: RADIUS/DECODE: EAP-Message fragments, 4, total 4
bytes
*Mar 17 23:21:18.256: dot1x-packet(Gi0/18): Received an EAP Success
*Mar 17 23:21:18.256: %DOT1X-5-SUCCESS: Authentication successful for
client (0008.7492.2c0e) on Interface Gi0/18
*Mar 17 23:21:18.256: dot1x-ev(Gi0/18): Sending event (2)
SEC-CAT4(config-if)#to Auth Mgr for 0008.7492.2c0e
*Mar 17 23:21:18.256: %AUTHMGR-7-RESULT: Authentication result 'success'
from 'dot1x' for client (0008.7492.2c0e) on Interface Gi0/1
Has anyone got this to work?? What is the "Secret Sauce"?
Thanks!
Dave
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com