Kingsley,
As stated in my previous emails as well. I have never configured it. So I am not sure. NAC L2 and Auth proxy function at two different layers. NAC L2 is layer 2. Auth Proxy functions at layer 3. I read thru the document quickly and what enables it to function at layer 3 is the device tracking feature which maps the L3 back to the L2 port. So the question would be are you using static or dynamic addressing. If you are using dynamic addressing then you must also enable DHCP snooping. I can look at this Monday and test it out but I have not configured it before so I am unsure of the answer to give you for this without doing it myself. I have only tested every other variant on the webpage. Please respond with whether or not you are using DHCP in conjunction with this? Regards, Tyson Scott - CCIE #13513 R&S, Security, and SP Technical Instructor - IPexpert, Inc. Mailto: <mailto:[email protected]> [email protected] Telephone: +1.810.326.1444, ext. 208 Live Assistance, Please visit: <http://www.ipexpert.com/chat> www.ipexpert.com/chat eFax: +1.810.454.0130 IPexpert is a premier provider of Self-Study Workbooks, Video on Demand, Audio Tools, Online Hardware Rental and Classroom Training for the Cisco CCIE (R&S, Voice, Security & Service Provider) certification(s) with training locations throughout the United States, Europe, South Asia and Australia. Be sure to visit our online communities at <http://www.ipexpert.com/communities> www.ipexpert.com/communities and our public website at <http://www.ipexpert.com/> www.ipexpert.com From: Kingsley Charles [mailto:[email protected]] Sent: Friday, April 09, 2010 11:03 AM To: Tyson Scott Cc: [email protected] Subject: Re: [OSL | CCIE_Security] ip admission on switch Hi Tyson If you can apply eou admission (NAC L2 IP) on the L2 interface then certainly you can also apply http admission on the L2 interfaces. Please find the config below: Switch(config)# aaa new-model Switch(config)# aaa authentication login default group radius Switch(config)# aaa authorization auth-proxy default group radius Switch(config)# radius-server host 1.1.1.2 key key1 Switch(config)# radius-server attribute 8 include-in-access-req Switch(config)# radius-server vsa send authentication Switch(config)# ip device tracking Switch(config) end Switch# configure terminal Switch(config)# ip admission name rule1 proxy http Switch(config)# interface gigabit0/1 Switch(config-if)# switchport mode access Switch(config-if)# ip access-group policy1 in Switch(config-if)# ip admission rule1 Switch(config-if)# end http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/1 2.2_46_se/configuration/guide/sw8021x.html With regards Kings On Fri, Apr 9, 2010 at 7:47 PM, Tyson Scott <[email protected]> wrote: Sorry, let me say... I forgot about even doing that task. It has been too long I guess ;). As stated in my first email the admission is not applied to the L2 interface though. It uses the fallback profile. Regards, Tyson Scott - CCIE #13513 R&S, Security, and SP Technical Instructor - IPexpert, Inc. Mailto: [email protected] Telephone: +1.810.326.1444, ext. 208 Live Assistance, Please visit: www.ipexpert.com/chat eFax: +1.810.454.0130 IPexpert is a premier provider of Self-Study Workbooks, Video on Demand, Audio Tools, Online Hardware Rental and Classroom Training for the Cisco CCIE (R&S, Voice, Security & Service Provider) certification(s) with training locations throughout the United States, Europe, South Asia and Australia. Be sure to visit our online communities at www.ipexpert.com/communities and our public website at www.ipexpert.com <http://www.ipexpert.com/> From: Kingsley Charles [mailto:[email protected]] Sent: Friday, April 09, 2010 4:33 AM To: Tyson Scott Cc: [email protected] Subject: Re: [OSL | CCIE_Security] ip admission on switch Hi Tyson The auth-proxy is given in vol 3 Lab 3 (section 5.3) but with dot1x fallback. With regards Kings On Fri, Apr 9, 2010 at 1:57 PM, Tyson Scott <[email protected]> wrote: Kingsley, Attribute 6 is the service-type. "http://www.iana.org/assignments/radius-types" You could try moving it to the L3 VLAN interface on the switch and see if it is supported there but to be honest I have never tried it before. I believe the feature to be limited to L3 support and you are applying it to a L2 interface. IP admission is also used for L2 IP NAC and you may find it to be the case that the auth-proxy commands are remnant commands that don't really work. But please let us know your results. I think we will all be interested. Regards, Tyson Scott - CCIE #13513 R&S, Security, and SP Technical Instructor - IPexpert, Inc. Mailto: [email protected] Telephone: +1.810.326.1444, ext. 208 Live Assistance, Please visit: www.ipexpert.com/chat eFax: +1.810.454.0130 IPexpert is a premier provider of Self-Study Workbooks, Video on Demand, Audio Tools, Online Hardware Rental and Classroom Training for the Cisco CCIE (R&S, Voice, Security & Service Provider) certification(s) with training locations throughout the United States, Europe, South Asia and Australia. Be sure to visit our online communities at www.ipexpert.com/communities and our public website at www.ipexpert.com <http://www.ipexpert.com/> From: [email protected] [mailto:[email protected]] On Behalf Of Kingsley Charles Sent: Friday, April 09, 2010 4:19 AM To: [email protected] Subject: [OSL | CCIE_Security] ip admission on switch Hi all I am trying for http auth-proxy on a switch. I don't get prompted for username/password on the browser as we get on router auth-proxy. The switch is sending mac address for authentication. f1/0/6 is connected to a XP PC. Any thoughts? Also, please let me know what does "radius-server attribute 6 on-for-login-auth" do? Config ip device tracking ip admission name king proxy http list 123 interface FastEthernet1/0/6 switchport access vlan 4 switchport mode access ip admission king Debugs 1w3d: RADIUS: authenticator FB D8 DE 61 A8 E2 F9 11 - 4B 3F F0 7F E5 CC C5 08 1w3d: RADIUS: Calling-Station-Id [31] 16 "0008.a145.f40c" 1w3d: RADIUS: Service-Type [6] 6 Call Check [10] 1w3d: RADIUS: NAS-Port-Type [61] 6 Ethernet [15] 1w3d: RADIUS: Message-Authenticato[80] 18 1w3d: RADIUS: 30 54 6D 6E 1E A8 24 2C 01 7C 68 C5 D4 5D 41 19 [ 0Tmn$,| h]A] 1w3d: RADIUS: NAS-Port-Type [61] 6 Async [0] 1w3d: RADIUS: NAS-Port [5] 6 0 1w3d: RADIUS: NAS-Port-Id [87] 19 "FastEthernet1/0/6" 1w3d: RADIUS: NAS-IP-Address [4] 6 10.20.30.43 1w3d: RADIUS: Received from id 1645/82 10.20.30.45:1645 <http://10.20.30.45:1645/> , Access-Reject, len 50 1w3d: RADIUS: authenticator 50 91 59 89 0D 19 25 CA - 68 0D C3 56 C6 21 FF BB 1w3d: RADIUS: Reply-Message [18] 12 1w3d: RADIUS: 52 65 6A 65 63 74 65 64 0A 0D [ Rejected] 1w3d: RADIUS: Message-Authenticato[80] 18 1w3d: RADIUS: C7 2E 1B 58 EF A7 A7 56 1C 61 47 21 F8 81 AC 1D [ .XV aG!] 1w3d: RADIUS(000002C6): Received from id 1645/82 1w3d: RADIUS/DECODE: Reply-Message fragments, 10, total 10 bytes 1w3d: NRH reply fail for 10.20.30.44 1w3d: Apply HTTP_INTERCEPT for host 10.20.30.44 With regards Kings
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
