David,

I am not sure what you mean by pushback?  When I checked it did assign
the VLAN to the port.

Cat3#show dot1x int f0/15 det | begin Cl
Dot1x Authenticator Client List
-------------------------------
Domain                    = DATA
Supplicant                = 000c.2996.0fac
    Auth SM State         = AUTHENTICATED
    Auth BEND SM State    = IDLE
Port Status               = AUTHORIZED
ReAuthPeriod              = 3600
ReAuthAction              = Reauthenticate
TimeToNextReauth          = 944
Authentication Method     = Dot1x
Authorized By             = Authentication Server
Vlan Policy               = 10

Cat3#


On Fri, Jan 29, 2010 at 11:16 PM, Mack, David A (Dave)
<[email protected]> wrote:
> Tyson,
>        Thanks for looking into this! I tried the slight variation below and 
> it also works.
>
> tunnel-type=VLAN(13)
> tunnel-medium-type=ALL_802 (6)
> tunnel-private-group-id=200
>
>
> *Mar 18 06:41:21.155: RADIUS:  Message-Authenticato[80]  18
> *Mar 18 06:41:21.155: RADIUS:   8F 54 5E 39 55 CF A8 40 BD A0 5B A6 46 83 8E 
> A8           [ t...@[f]
> *Mar 18 06:41:21.155: RADIUS:  Vendor, Cisco       [26]  49
> *Mar 18 06:41:21.155: RADIUS:   Cisco AVpair       [1]   43  
> "audit-session-id=0A1414040000004358FB2B3C"
> *Mar 18 06:41:21.155: RADIUS:  NAS-Port
> SEC-CAT4(config-if)#-Type       [61]  6   Ethernet                  [15]
> *Mar 18 06:41:21.155: RADIUS:  NAS-Port            [5]   6   50018
> *Mar 18 06:41:21.155: RADIUS:  NAS-Port-Id         [87]  21  
> "GigabitEthernet0/18"
> *Mar 18 06:41:21.155: RADIUS:  State               [24]  27
> *Mar 18 06:41:21.164: RADIUS:   45 41 50 3D 30 2E 32 30 31 2E 37 38 35 2E 31 
> 3B  [EAP=0.201.785.1;]
> *Mar 18 06:41:21.164: RADIUS:   53 56 43 3D 30 2E 32 31 3B         [ 
> SVC=0.21;]
> *Mar 18 06:41:21.164: RADIUS:  NAS-IP-A
> SEC-CAT4(config-if)#ddress      [4]   6   10.20.20.4
> *Mar 18 06:41:21.180: RADIUS: Received from id 1645/92 10.20.20.101:1812, 
> Access-Accept, len 179
> *Mar 18 06:41:21.180: RADIUS:  authenticator 28 9F 53 42 F0 63 EC EF - 80 CF 
> B6 B7 E2 E2 8D 88
> *Mar 18 06:41:21.180: RADIUS:  Vendor, Cisco       [26]  28
> *Mar 18 06:41:21.180: RADIUS:   Cisco AVpair       [1]   22  
> "tunnel-type=VLAN(13)"
> *Mar 18 06:41:21.180: RADIUS:  Vendor, Cisco       [26]  38
> *Mar 18 06:41:21.180: RADIUS:   Cisco AVpair       [1]
> SEC-CAT4(config-if)# 32  "tunnel-medium-type=ALL_802 (6)"
> *Mar 18 06:41:21.180: RADIUS:  Vendor, Cisco       [26]  35
> *Mar 18 06:41:21.180: RADIUS:   Cisco AVpair       [1]   29  
> "tunnel-private-group-id=200"
> *Mar 18 06:41:21.180: RADIUS:  Framed-IP-Address   [8]   6   255.255.255.255
> *Mar 18 06:41:21.180: RADIUS:  EAP-Message         [79]  6
> *Mar 18 06:41:21.180: RADIUS:   03 25 00 04                 [ ?]
> *Mar 18 06:41:21.180: RADIUS:  Class               [25]  28
> *Mar 18 06:41:21.180: RADIUS:   43 4
> SEC-CAT4(config-if)#1 43 53 3A 30 2F 33 35 35 61 36 2F 61 31 34  
> [CACS:0/355a6/a14]
> *Mar 18 06:41:21.180: RADIUS:   31 34 30 34 2F 35 30 30 31 38        [ 
> 1404/50018]
> *Mar 18 06:41:21.180: RADIUS:  Message-Authenticato[80]  18
> *Mar 18 06:41:21.180: RADIUS:   F6 8F 07 1C CB B6 73 6E 6E 62 08 52 A7 23 75 
> 2E          [ snnbR#u.]
> *Mar 18 06:41:21.180: RADIUS(00000046): Received from id 1645/92
> *Mar 18 06:41:21.180: RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes
> *Mar 18 06:41:21.180: dot1x-packet(Gi0/18): Received
> SEC-CAT4(config-if)#an EAP Success
> *Mar 18 06:41:21.180: %DOT1X-5-SUCCESS: Authentication successful for client 
> (0008.7492.2c0e) on Interface Gi0/18
> *Mar 18 06:41:21.180: dot1x-ev(Gi0/18): Sending event (2) to Auth Mgr for 
> 0008.7492.2c0e
>
> However, the pushback of the vlan assignment for the client is not working. 
> Can you check it out in your environment?
>
> Thanks!
> Dave
> -----Original Message-----
> From: Tyson Scott [mailto:[email protected]]
> Sent: Friday, January 29, 2010 8:47 PM
> To: Mack, David A (Dave)
> Cc: Stuart Hare; [email protected]
> Subject: Re: [OSL | CCIE_Security] Dot1X Radius Config
>
> Dave,
>
> After further testing the following is what you need.
>
> tunnel-type=VLAN (13)
> tunnel-medium-type=ALL_802 (6)
> tunnel-private-group-id=10
>
>
> On Fri, Jan 29, 2010 at 2:50 PM, Tyson Scott <[email protected]> wrote:
>> Dave,
>>
>> You can see that from the Debug output it says
>>
>> parse unknown cisco vsa "cisco-avpair".  The box that is created in
>> the user account already has that attribute set.  So it is kindof like
>> you are saying
>>
>> cisco-avpair=cisco-avpair=tunnel-type(#64)=VLAN(13)
>>
>> That is why it doesn't understand it.
>>
>> On Fri, Jan 29, 2010 at 2:46 PM, Tyson Scott <[email protected]> wrote:
>>> Dave,
>>>
>>> You need to remove
>>> cisco-avpair=
>>>
>>> In ACS put
>>> tunnel-type(#64)=VLAN(13)
>>> tunnel-medium-type(#65)=802 media(6)
>>> tunnel-private-group-ID(#81)=200
>>>
>>> Not
>>> cisco-avpair=tunnel-type(#64)=VLAN(13)
>>> cisco-avpair=tunnel-medium-type(#65)=802 media(6)
>>> cisco-avpair=tunnel-private-group-ID(#81)=200
>>>
>>> You only put cisco-avpair= when you are working with Unix based ACS.
>>>
>>> On Fri, Jan 29, 2010 at 2:22 PM, Mack, David A (Dave) <[email protected]> 
>>> wrote:
>>>> Stu,
>>>>
>>>>                 If by changing my client, you mean going to the Network
>>>> Configuration section of the ACS and then setting the "Authenticate Using"
>>>> drop down to "RADIUS (Cisco IOS/PIX 6.0)", then yes I did that. As for the
>>>> switch itself, I have the basics:
>>>>
>>>>
>>>>
>>>> aaa new-model
>>>>
>>>> aaa authentication dot1x default group radius
>>>>
>>>> aaa authorization network default group radius
>>>>
>>>> aaa session-id common
>>>>
>>>> radius-server host 10.20.20.101 auth-port 1812 acct-port 1813
>>>>
>>>> radius-server key cisco123!
>>>>
>>>>
>>>>
>>>> In addition I have this:
>>>>
>>>> radius-server vsa send authentication
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> What else is there to set?
>>>>
>>>>
>>>>
>>>> Thanks!
>>>> Dave
>>>>
>>>> From: Stuart Hare [mailto:[email protected]]
>>>> Sent: Friday, January 29, 2010 2:11 PM
>>>> To: Mack, David A (Dave)
>>>> Cc: [email protected]
>>>> Subject: Re: [OSL | CCIE_Security] Dot1X Radius Config
>>>>
>>>>
>>>>
>>>> Dave,
>>>>
>>>>
>>>>
>>>> Im not familiar with Yusuf's lab book, but you say it worked with IETF
>>>> attributes but not with Cisco AV Pairs.
>>>>
>>>> When you changed to AV Pairs, did you also change the AAA Client
>>>> Authentication method?
>>>>
>>>> For instance I take it for the IETF to work you had your AAA client cfg'd
>>>> for RADIUS (IETF), did you try changing the client to RADIUS(Cisco 
>>>> IOS/PIX)?
>>>>
>>>>
>>>>
>>>> Stu
>>>>
>>>> On Fri, Jan 29, 2010 at 6:54 PM, Mack, David A (Dave) <[email protected]>
>>>> wrote:
>>>>
>>>> Hello All!
>>>>    This is follow-on to me earlier dot1x question. Here is the
>>>> situation:
>>>>
>>>> I have a Windows XP client connected to Cat 3650 and a configured ACS
>>>> server. With the Cat configured as RAIDUS IETF client in the ACS, I can
>>>> authenticate the XP PC and get the VLAN pushed back to the Cat. All
>>>> works fine. So now I want to try setting the Cat to be a RADIUS (Cisco
>>>> IOS/PIX 6.x) client in the ACS. I would expect to have to use the
>>>> configuration Yusuf shows in his book on pages 339-341. Now here is
>>>> where the problem starts. First, if you look at his debug output you see
>>>> that Tunnel-Type, Tunnel-Medium-Type and Tunnel-Private-Group are pushed
>>>> back from ACS as BOTH Cisco AV-PAIRs and as IETF RADIUS attributes. Why
>>>> are both methods used?? I tried used using just the IETF values and it
>>>> works just fine. So why use the Cisco AV-PAIRS? Now If try to add the
>>>> AV-PAIRS to the ACS, entered exactly as figure 11-8, the Switch does not
>>>> recognize them:
>>>>
>>>>
>>>> *Mar 17 23:21:18.222: RADIUS:  Message-Authenticato[80]  18
>>>> *Mar 17 23:21:18.222: RADIUS:   16 DF 78 4A FF DD 02 62 E2 45 CA 35 74
>>>> E7 53 F5           [ xJbE5tS]
>>>> *Mar 17 23:21:18.222: RADIUS:  Vendor, Cisco       [26]  49
>>>> *Mar 17 23:21:18.222: RADIUS:   Cisco AVpair       [1]   43
>>>> "audit-session-id=0A1414040000003F5767FE11"
>>>> *Mar 17 23:21:18.222: RADIUS:  NAS-Port
>>>> SEC-CAT4(config-if)#-Type       [61]  6   Ethernet                  [15]
>>>> *Mar 17 23:21:18.222: RADIUS:  NAS-Port            [5]   6   50018
>>>>
>>>> *Mar 17 23:21:18.222: RADIUS:  NAS-Port-Id         [87]  21
>>>> "GigabitEthernet0/18"
>>>> *Mar 17 23:21:18.222: RADIUS:  State               [24]  27
>>>> *Mar 17 23:21:18.222: RADIUS:   45 41 50 3D 30 2E 32 30 31 2E 34 39 37
>>>> 2E 31 3B  [EAP=0.201.497.1;]
>>>> *Mar 17 23:21:18.222: RADIUS:   53 56 43 3D 30 2E 31 64 3B         [
>>>> SVC=0.1d;]
>>>> *Mar 17 23:21:18.222: RADIUS:  NAS-IP-A
>>>> SEC-CAT4(config-if)#ddress      [4]   6   10.20.20.4
>>>> *Mar 17 23:21:18.247: RADIUS: Received from id 1645/84
>>>> 10.20.20.101:1812, Access-Accept, len 243
>>>> *Mar 17 23:21:18.247: RADIUS:  authenticator 34 14 2D BA 5D 79 93 70 -
>>>> 88 91 01 F4 39 14 79 24
>>>>
>>>> Note that the AV-PAIRS below appear exactly as they do on page 341
>>>>
>>>> *Mar 17 23:21:18.247: RADIUS:  Vendor, Cisco       [26]  49
>>>> *Mar 17 23:21:18.247: RADIUS:   Cisco AVpair       [1]   43
>>>> "cisco-avpair= "tunnel-type(#64)=VLAN(13)""
>>>> *Mar 17 23:21:18.247: RADIUS:  Vendor, Cisco       [26]  60
>>>> *Mar 17 23:21:18.247: RADIUS:   Cis
>>>> SEC-CAT4(config-if)#co AVpair       [1]   54  "cisco-avpair=
>>>> "tunnel-medium-type(#65)=802 media(6)""
>>>> *Mar 17 23:21:18.247: RADIUS:  Vendor, Cisco       [26]  56
>>>> *Mar 17 23:21:18.247: RADIUS:   Cisco AVpair       [1]   50
>>>> "cisco-avpair= "tunnel-private-group-ID(#81)=200""
>>>> *Mar 17 23:21:18.247: RADIUS:  Framed-IP-Address   [8]   6
>>>> 255.255.255.255
>>>> *Mar 17 23:21:18.247: RADIUS:  EAP-Message         [79]  6
>>>> *Mar 17 23:21:18.247: RADIUS:   03 21 00 04                 [ !]
>>>> *Mar 17 23:21:18.247: RADIUS:  Clas
>>>> SEC-CAT4(config-if)#s               [25]  28
>>>> *Mar 17 23:21:18.247: RADIUS:   43 41 43 53 3A 30 2F 33 35 34 32 64 2F
>>>> 61 31 34  [CACS:0/3542d/a14]
>>>> *Mar 17 23:21:18.247: RADIUS:   31 34 30 34 2F 35 30 30 31 38        [
>>>> 1404/50018]
>>>> *Mar 17 23:21:18.247: RADIUS:  Message-Authenticato[80]  18
>>>> *Mar 17 23:21:18.247: RADIUS:   31 CE 78 F1 01 A9 A8 DB EA 36 73 A2 A8
>>>> C6 74 5D            [ 1x6st]]
>>>> *Mar 17 23:21:18.247: RADIUS(00000042): Received from id 1645/84
>>>>
>>>> But, the switch does not know what do with them...
>>>>
>>>> *Mar 17 23:21:18.247: RADIUS/DECODE: parse unknown cisco vsa "cisco
>>>> <======================
>>>> SEC-CAT4(config-if)#-avpair" - IGNORE
>>>> *Mar 17 23:21:18.247: RADIUS/DECODE: parse unknown cisco vsa
>>>> "cisco-avpair" - IGNORE        <======================
>>>> *Mar 17 23:21:18.247: RADIUS/DECODE: parse unknown cisco vsa
>>>> "cisco-avpair" - IGNORE        <======================
>>>> *Mar 17 23:21:18.247: RADIUS/DECODE: EAP-Message fragments, 4, total 4
>>>> bytes
>>>> *Mar 17 23:21:18.256: dot1x-packet(Gi0/18): Received an EAP Success
>>>> *Mar 17 23:21:18.256: %DOT1X-5-SUCCESS: Authentication successful for
>>>> client (0008.7492.2c0e) on Interface Gi0/18
>>>> *Mar 17 23:21:18.256: dot1x-ev(Gi0/18): Sending event (2)
>>>> SEC-CAT4(config-if)#to Auth Mgr for 0008.7492.2c0e
>>>> *Mar 17 23:21:18.256: %AUTHMGR-7-RESULT: Authentication result 'success'
>>>> from 'dot1x' for client (0008.7492.2c0e) on Interface Gi0/1
>>>>
>>>> Has anyone got this to work?? What is the "Secret Sauce"?
>>>>
>>>> Thanks!
>>>> Dave
>>>> _______________________________________________
>>>> For more information regarding industry leading CCIE Lab training, please
>>>> visit www.ipexpert.com
>>>>
>>>>
>>>> --
>>>> Regards,
>>>>
>>>> Stuart Hare
>>>> CCIE #25616 (Security), CCSP, Microsoft MCP
>>>> Sr. Support Engineer - IPexpert, Inc.
>>>> URL: http://www.IPexpert.com
>>>>
>>>> _______________________________________________
>>>> For more information regarding industry leading CCIE Lab training, please
>>>> visit www.ipexpert.com
>>>>
>>>>
>>>
>>>
>>>
>>> --
>>> Tyson Scott - CCIE #13513 R&S and Security
>>> Technical Instructor - IPexpert, Inc.
>>>
>>> Telephone: +1.810.326.1444
>>> Fax: +1.810.454.0130
>>> Mailto:  [email protected]
>>>
>>> Join our free online support and peer group communities:
>>> http://www.IPexpert.com/communities
>>>
>>> IPexpert - The Global Leader in Self-Study, Classroom-Based, Video On
>>> Demand and Audio Certification Training Tools for the Cisco CCIE R&S
>>> Lab, CCIE Security Lab, CCIE Service Provider Lab , CCIE Voice Lab and
>>> CCIE Storage Lab Certifications.
>>>
>>
>>
>>
>> --
>> Tyson Scott - CCIE #13513 R&S and Security
>> Technical Instructor - IPexpert, Inc.
>>
>> Telephone: +1.810.326.1444
>> Fax: +1.810.454.0130
>> Mailto:  [email protected]
>>
>> Join our free online support and peer group communities:
>> http://www.IPexpert.com/communities
>>
>> IPexpert - The Global Leader in Self-Study, Classroom-Based, Video On
>> Demand and Audio Certification Training Tools for the Cisco CCIE R&S
>> Lab, CCIE Security Lab, CCIE Service Provider Lab , CCIE Voice Lab and
>> CCIE Storage Lab Certifications.
>>
>
>
>
> --
> Tyson Scott - CCIE #13513 R&S and Security
> Technical Instructor - IPexpert, Inc.
>
> Telephone: +1.810.326.1444
> Fax: +1.810.454.0130
> Mailto:  [email protected]
>
> Join our free online support and peer group communities:
> http://www.IPexpert.com/communities
>
> IPexpert - The Global Leader in Self-Study, Classroom-Based, Video On
> Demand and Audio Certification Training Tools for the Cisco CCIE R&S
> Lab, CCIE Security Lab, CCIE Service Provider Lab , CCIE Voice Lab and
> CCIE Storage Lab Certifications.
>



-- 
Tyson Scott - CCIE #13513 R&S and Security
Technical Instructor - IPexpert, Inc.

Telephone: +1.810.326.1444
Fax: +1.810.454.0130
Mailto:  [email protected]

Join our free online support and peer group communities:
http://www.IPexpert.com/communities

IPexpert - The Global Leader in Self-Study, Classroom-Based, Video On
Demand and Audio Certification Training Tools for the Cisco CCIE R&S
Lab, CCIE Security Lab, CCIE Service Provider Lab , CCIE Voice Lab and
CCIE Storage Lab Certifications.
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to