Hi Tyson

If you can apply eou admission (NAC L2 IP) on the L2 interface then
certainly you can also apply http admission on the L2 interfaces.

Please find the config below:

Switch(config)# aaa new-model

Switch(config)# aaa authentication login default group radius

Switch(config)# aaa authorization auth-proxy default group radius

Switch(config)# radius-server host 1.1.1.2 key key1

Switch(config)# radius-server attribute 8 include-in-access-req

Switch(config)# radius-server vsa send authentication

Switch(config)# ip device tracking

Switch(config) end

Switch# configure terminal

Switch(config)# ip admission name rule1 proxy http

Switch(config)# interface gigabit0/1

Switch(config-if)# switchport mode access

Switch(config-if)# ip access-group policy1 in

Switch(config-if)# ip admission rule1

Switch(config-if)# end



http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_46_se/configuration/guide/sw8021x.html



With regards

Kings



On Fri, Apr 9, 2010 at 7:47 PM, Tyson Scott <[email protected]> wrote:

>  Sorry, let me say... I forgot about even doing that task.  It has been
> too long I guess ;).
>
>
>
> As stated in my first email the admission is not applied to the L2
> interface though.  It uses the fallback profile.
>
>
>
>
>
>
>
> Regards,
>
>
>
> Tyson Scott - CCIE #13513 R&S, Security, and SP
>
> Technical Instructor - IPexpert, Inc.
>
> Mailto: [email protected]
>
> Telephone: +1.810.326.1444, ext. 208
>
> Live Assistance, Please visit: www.ipexpert.com/chat
>
> eFax: +1.810.454.0130
>
>
>
> IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
> Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
> CCIE (R&S, Voice, Security & Service Provider) certification(s) with
> training locations throughout the United States, Europe, South Asia and
> Australia. Be sure to visit our online communities at
> www.ipexpert.com/communities and our public website at www.ipexpert.com
>
>
>
> *From:* Kingsley Charles [mailto:[email protected]]
> *Sent:* Friday, April 09, 2010 4:33 AM
> *To:* Tyson Scott
> *Cc:* [email protected]
> *Subject:* Re: [OSL | CCIE_Security] ip admission on switch
>
>
>
> Hi Tyson
>
>
>
> The auth-proxy is given in vol 3 Lab 3 (section 5.3) but with dot1x
> fallback.
>
>
>
>
>
> With regards
>
> Kings
>
> On Fri, Apr 9, 2010 at 1:57 PM, Tyson Scott <[email protected]> wrote:
>
> Kingsley,
>
>
>
> Attribute 6 is the service-type.  "
> http://www.iana.org/assignments/radius-types";
>
>
>
> You could try moving it to the L3 VLAN interface on the switch and see if
> it is supported there but to be honest I have never tried it before.  I
> believe the feature to be limited to L3 support and you are applying it to a
> L2 interface.  IP admission is also used for L2 IP NAC and you may find it
> to be the case that the auth-proxy commands are remnant commands that don't
> really work.  But please let us know your results.  I think we will all be
> interested.
>
>
>
> Regards,
>
>
>
> Tyson Scott - CCIE #13513 R&S, Security, and SP
>
> Technical Instructor - IPexpert, Inc.
>
> Mailto: [email protected]
>
> Telephone: +1.810.326.1444, ext. 208
>
> Live Assistance, Please visit: www.ipexpert.com/chat
>
> eFax: +1.810.454.0130
>
>
>
> IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
> Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
> CCIE (R&S, Voice, Security & Service Provider) certification(s) with
> training locations throughout the United States, Europe, South Asia and
> Australia. Be sure to visit our online communities at
> www.ipexpert.com/communities and our public website at www.ipexpert.com
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Kingsley Charles
> *Sent:* Friday, April 09, 2010 4:19 AM
> *To:* [email protected]
> *Subject:* [OSL | CCIE_Security] ip admission on switch
>
>
>
> Hi all
>
>
>
> I am trying for http auth-proxy on a switch. I don't get prompted for
> username/password on the browser as we get on router auth-proxy. The switch
> is sending mac address for authentication.
>
>
>
> f1/0/6 is connected to a XP PC.
>
>
>
> Any thoughts?
>
>
>
> Also, please let me know what does "radius-server attribute 6
> on-for-login-auth" do?
>
>
>
>
>
>
>
> *Config*
>
>
>
> ip device tracking
> ip admission name king proxy http list 123
>
>
>
> interface FastEthernet1/0/6
>  switchport access vlan 4
>  switchport mode access
>  ip admission king
>
>
>
> *Debugs*
>
>
>
>
>
> 1w3d: RADIUS:  authenticator FB D8 DE 61 A8 E2 F9 11 - 4B 3F F0 7F E5 CC C5
> 08
> 1w3d: RADIUS:  Calling-Station-Id  [31]  16  "0008.a145.f40c"
> 1w3d: RADIUS:  Service-Type        [6]   6   Call Check                [10]
> 1w3d: RADIUS:  NAS-Port-Type       [61]  6   Ethernet                  [15]
> 1w3d: RADIUS:  Message-Authenticato[80]  18
> 1w3d: RADIUS:   30 54 6D 6E 1E A8 24 2C 01 7C 68 C5 D4 5D 41 19        [
> 0Tmn$,|
> h]A]
> 1w3d: RADIUS:  NAS-Port-Type       [61]  6   Async                     [0]
> 1w3d: RADIUS:  NAS-Port            [5]   6   0
> 1w3d: RADIUS:  NAS-Port-Id         [87]  19  "FastEthernet1/0/6"
> 1w3d: RADIUS:  NAS-IP-Address      [4]   6   10.20.30.43
> 1w3d: RADIUS: Received from id 1645/82 10.20.30.45:1645, Access-Reject,
> len 50
> 1w3d: RADIUS:  authenticator 50 91 59 89 0D 19 25 CA - 68 0D C3 56 C6 21 FF
> BB
> 1w3d: RADIUS:  Reply-Message       [18]  12
> 1w3d: RADIUS:   52 65 6A 65 63 74 65 64 0A 0D          [ Rejected]
> 1w3d: RADIUS:  Message-Authenticato[80]  18
> 1w3d: RADIUS:   C7 2E 1B 58 EF A7 A7 56 1C 61 47 21 F8 81 AC 1D
> [ .XV
> aG!]
> 1w3d: RADIUS(000002C6): Received from id 1645/82
> 1w3d: RADIUS/DECODE: Reply-Message fragments, 10, total 10 bytes
> 1w3d:  NRH reply fail for 10.20.30.44
> 1w3d:  Apply HTTP_INTERCEPT for host 10.20.30.44
>
>
>
> With regards
>
> Kings
>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to