Hi Tyson I have not used DHCP and snooping.
With regards Kings On Fri, Apr 9, 2010 at 8:50 PM, Tyson Scott <[email protected]> wrote: > Kingsley, > > > > As stated in my previous emails as well. I have never configured it. So I > am not sure. NAC L2 and Auth proxy function at two different layers. NAC > L2 is layer 2. Auth Proxy functions at layer 3. I read thru the document > quickly and what enables it to function at layer 3 is the device tracking > feature which maps the L3 back to the L2 port. So the question would be are > you using static or dynamic addressing. If you are using dynamic addressing > then you must also enable DHCP snooping. I can look at this Monday and test > it out but I have not configured it before so I am unsure of the answer to > give you for this without doing it myself. I have only tested every other > variant on the webpage. > > > > Please respond with whether or not you are using DHCP in conjunction with > this? > > > > Regards, > > > > Tyson Scott - CCIE #13513 R&S, Security, and SP > > Technical Instructor - IPexpert, Inc. > > Mailto: [email protected] > > Telephone: +1.810.326.1444, ext. 208 > > Live Assistance, Please visit: www.ipexpert.com/chat > > eFax: +1.810.454.0130 > > > > IPexpert is a premier provider of Self-Study Workbooks, Video on Demand, > Audio Tools, Online Hardware Rental and Classroom Training for the Cisco > CCIE (R&S, Voice, Security & Service Provider) certification(s) with > training locations throughout the United States, Europe, South Asia and > Australia. Be sure to visit our online communities at > www.ipexpert.com/communities and our public website at www.ipexpert.com > > > > *From:* Kingsley Charles [mailto:[email protected]] > *Sent:* Friday, April 09, 2010 11:03 AM > > *To:* Tyson Scott > *Cc:* [email protected] > *Subject:* Re: [OSL | CCIE_Security] ip admission on switch > > > > Hi Tyson > > > > If you can apply eou admission (NAC L2 IP) on the L2 interface then > certainly you can also apply http admission on the L2 interfaces. > > > > Please find the config below: > > Switch(config)# *aaa new-model* > > Switch(config)# *aaa authentication login default group radius * > > Switch(config)# *aaa authorization auth-proxy default group radius* > > Switch(config)# *radius-server host 1.1.1.2 key key1* > > Switch(config)# *radius-server attribute 8 include-in-access-req* > > Switch(config)# *radius-server vsa send authentication* > > Switch(config)# *ip device tracking* > > Switch(config) *end* > > *Switch# configure terminal* > > *Switch(config)# ip admission name rule1 proxy http* > > *Switch(config)# interface gigabit0/1* > > *Switch(config-if)# switchport mode access * > > *Switch(config-if)# ip access-group policy1 in * > > *Switch(config-if)# ip admission rule1 * > > *Switch(config-if)# end* > > * * > > *http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_46_se/configuration/guide/sw8021x.html* > > * * > > * * > > *With regards* > > *Kings* > > * * > > > > > On Fri, Apr 9, 2010 at 7:47 PM, Tyson Scott <[email protected]> wrote: > > Sorry, let me say... I forgot about even doing that task. It has been too > long I guess ;). > > > > As stated in my first email the admission is not applied to the L2 > interface though. It uses the fallback profile. > > > > > > > > Regards, > > > > Tyson Scott - CCIE #13513 R&S, Security, and SP > > Technical Instructor - IPexpert, Inc. > > Mailto: [email protected] > > Telephone: +1.810.326.1444, ext. 208 > > Live Assistance, Please visit: www.ipexpert.com/chat > > eFax: +1.810.454.0130 > > > > IPexpert is a premier provider of Self-Study Workbooks, Video on Demand, > Audio Tools, Online Hardware Rental and Classroom Training for the Cisco > CCIE (R&S, Voice, Security & Service Provider) certification(s) with > training locations throughout the United States, Europe, South Asia and > Australia. Be sure to visit our online communities at > www.ipexpert.com/communities and our public website at www.ipexpert.com > > > > *From:* Kingsley Charles [mailto:[email protected]] > > *Sent:* Friday, April 09, 2010 4:33 AM > *To:* Tyson Scott > > *Cc:* [email protected] > *Subject:* Re: [OSL | CCIE_Security] ip admission on switch > > > > Hi Tyson > > > > The auth-proxy is given in vol 3 Lab 3 (section 5.3) but with dot1x > fallback. > > > > > > With regards > > Kings > > On Fri, Apr 9, 2010 at 1:57 PM, Tyson Scott <[email protected]> wrote: > > Kingsley, > > > > Attribute 6 is the service-type. " > http://www.iana.org/assignments/radius-types" > > > > You could try moving it to the L3 VLAN interface on the switch and see if > it is supported there but to be honest I have never tried it before. I > believe the feature to be limited to L3 support and you are applying it to a > L2 interface. IP admission is also used for L2 IP NAC and you may find it > to be the case that the auth-proxy commands are remnant commands that don't > really work. But please let us know your results. I think we will all be > interested. > > > > Regards, > > > > Tyson Scott - CCIE #13513 R&S, Security, and SP > > Technical Instructor - IPexpert, Inc. > > Mailto: [email protected] > > Telephone: +1.810.326.1444, ext. 208 > > Live Assistance, Please visit: www.ipexpert.com/chat > > eFax: +1.810.454.0130 > > > > IPexpert is a premier provider of Self-Study Workbooks, Video on Demand, > Audio Tools, Online Hardware Rental and Classroom Training for the Cisco > CCIE (R&S, Voice, Security & Service Provider) certification(s) with > training locations throughout the United States, Europe, South Asia and > Australia. Be sure to visit our online communities at > www.ipexpert.com/communities and our public website at www.ipexpert.com > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Kingsley Charles > *Sent:* Friday, April 09, 2010 4:19 AM > *To:* [email protected] > *Subject:* [OSL | CCIE_Security] ip admission on switch > > > > Hi all > > > > I am trying for http auth-proxy on a switch. I don't get prompted for > username/password on the browser as we get on router auth-proxy. The switch > is sending mac address for authentication. > > > > f1/0/6 is connected to a XP PC. > > > > Any thoughts? > > > > Also, please let me know what does "radius-server attribute 6 > on-for-login-auth" do? > > > > > > > > *Config* > > > > ip device tracking > ip admission name king proxy http list 123 > > > > interface FastEthernet1/0/6 > switchport access vlan 4 > switchport mode access > ip admission king > > > > *Debugs* > > > > > > 1w3d: RADIUS: authenticator FB D8 DE 61 A8 E2 F9 11 - 4B 3F F0 7F E5 CC C5 > 08 > 1w3d: RADIUS: Calling-Station-Id [31] 16 "0008.a145.f40c" > 1w3d: RADIUS: Service-Type [6] 6 Call Check [10] > 1w3d: RADIUS: NAS-Port-Type [61] 6 Ethernet [15] > 1w3d: RADIUS: Message-Authenticato[80] 18 > 1w3d: RADIUS: 30 54 6D 6E 1E A8 24 2C 01 7C 68 C5 D4 5D 41 19 [ > 0Tmn$,| > h]A] > 1w3d: RADIUS: NAS-Port-Type [61] 6 Async [0] > 1w3d: RADIUS: NAS-Port [5] 6 0 > 1w3d: RADIUS: NAS-Port-Id [87] 19 "FastEthernet1/0/6" > 1w3d: RADIUS: NAS-IP-Address [4] 6 10.20.30.43 > 1w3d: RADIUS: Received from id 1645/82 10.20.30.45:1645, Access-Reject, > len 50 > 1w3d: RADIUS: authenticator 50 91 59 89 0D 19 25 CA - 68 0D C3 56 C6 21 FF > BB > 1w3d: RADIUS: Reply-Message [18] 12 > 1w3d: RADIUS: 52 65 6A 65 63 74 65 64 0A 0D [ Rejected] > 1w3d: RADIUS: Message-Authenticato[80] 18 > 1w3d: RADIUS: C7 2E 1B 58 EF A7 A7 56 1C 61 47 21 F8 81 AC 1D > [ .XV > aG!] > 1w3d: RADIUS(000002C6): Received from id 1645/82 > 1w3d: RADIUS/DECODE: Reply-Message fragments, 10, total 10 bytes > 1w3d: NRH reply fail for 10.20.30.44 > 1w3d: Apply HTTP_INTERCEPT for host 10.20.30.44 > > > > With regards > > Kings > > > > >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
