Sorry for the extremely delayed response on this. 

 

I'm still not sure what the issue was but after no progress with debugs and
the like I'd decided to MAB the AP's until I could resolve the 802.1x issue.
Once the MAC addresses were added to the endpoint DB, 802.1x started
functioning properly on all AP's. MAB is second in both order and priority
and these endpoints never even attempt MAB (been sending debugs to server
for one week now) so I'm still not sure why this behavior exists. I have
some other bug-related testing to do on new switch code (2960S) so I'll
circle back to this when that is complete but I just wanted to update the
group with this strange behavior.

 

Kind Regards,

 

Kevin Sheahan

CCIE # 41349 (Security)

 

From: Bastien Migette [mailto:bastien.mige...@gmail.com] 
Sent: Monday, December 16, 2013 9:43 AM
To: Bruno Silva
Cc: Kevin Sheahan; ccie_security@onlinestudylist.com
Subject: Re: [OSL | CCIE_Security] 802.1x AP Authentication

 

There is another thing to mention, ISE will always sends an access-reject
after successful PAC Provisioning (so the NAD will not grant network access
right after PAC Provisionning), so the switch will therefore enter auth fail
state. It might take a while for reauth to happen.

 

Example after setting an AP to FlexConnect in my lab:

 

Dec 16 15:39:16.164: %AUTHMGR-5-START: Starting 'dot1x' for client
(7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID 0A96331D000007D916424C9C

bast_3560#

bast_3560#

Dec 16 15:39:30.878: %DOT1X-5-FAIL: Authentication failed for client
(7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID 0A96331D000007D916424C9C

Dec 16 15:39:30.878: %AUTHMGR-7-RESULT: Authentication result 'fail' from
'dot1x' for client (7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID
0A96331D000007D916424C9C

bast_3560#

Dec 16 15:39:30.878: %AUTHMGR-5-FAIL: Authorization failed or unapplied for
client (7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID
0A96331D000007D916424C9C

 

 

==60Sec default reauth timer

 

Dec 16 15:40:31.083: %AUTHMGR-5-START: Starting 'dot1x' for client
(7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID 0A96331D000007DA1644D6EC

Dec 16 15:40:31.385: %DOT1X-5-SUCCESS: Authentication successful for client
(7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID 0A96331D000007DA1644D6EC

Dec 16 15:40:31.385: %AUTHMGR-7-RESULT: Authentication result 'success' from
'dot1x' for client (7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID
0A96331D000007DA1644D6EC

Dec 16 15:40:31.385: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 7c69.f6bc.5e05|
AuditSessionID 0A96331D000007DA1644D6EC| AUTHTYPE DOT1X| EVENT APPLY

Dec 16 15:40:31.511: %AUTHMGR-5-SUCCESS: Authorization succeeded for client
(7c69.f6bc.5e05) on Interface Fa0/3 AuditSessionID 0A96331D000007DA1644D6EC

 

 

 

2013/12/16 Bruno Silva <auranpr...@gmail.com <mailto:auranpr...@gmail.com> >

Had the same problem with a Lab environment at home. What`s the model of the
AP and the WLC?

In my case it meant that the AP could not run 802.1x because of the model of
network board installed on it. For some reason it was not ready and the
firmware version 12.x could not upgrade its firmware so after debugging and
trying to fix it I just gave up because cisco told me was impossible. So I
changed the model of the AP.

 

BR,

Bruno Silva.

 

2013/12/15 Bastien Migette <bastien.mige...@gmail.com
<mailto:bastien.mige...@gmail.com> >

Hi Kevin, No matter of flex or local, dot1x is always performed by the AP.

The only thing you need to do for flex is normally to send
device-traffic-class=switch to put the port in trunk mode if you have vlan
mappings, but AFAIK nothing particular for the authentication...

 

I would check debug eap xxx on the AP and see why it sends an alert.

 

2013/12/13 Kevin Sheahan <sheaha...@gmail.com <mailto:sheaha...@gmail.com> >

Gents,

 

The scenario: Cisco AP in Flex Connect Local-Switching and authenticating
802.1x against ISE without incident. No special considerations necessary,
EAP-FAST(EAP-TLS), anonymous PAC provisioning. When the wireless deployment
changes to local-mode, 802.1x authentication for the AP breaks. Same
EAP-FAST(EAP-TLS) with anonymous PAC provisioning. ISE reports: 12154
EAP-FAST failed SSL/TLS handshake after a client alert. Open SSL Errors
include: SSL alert: code=0x20A=522 ; source=remote ; type=fatal ;
message="unexpected_message" and 47010861041984:error:140943F2:SSL
routines:SSL3_READ_BYTES:sslv3 alert unexpected message:s3_pkt.c:1102:SSL
alert number 10.

 

My question: I'm unable to find any Cisco documentation that dictates any
special considerations that must be made between wireless deployment modes.
Why does this work in Flex Connect Local-Switching but not in Local Mode? 

 

My current train of thought (feel free to derail if I'm off base): As you
know, in Local Mode all traffic is tunneled back to the controller (CAPWAP).
All of what ISE reports is showing the switch as the NAD, and that is what I
expect to see. However, after the EAP-FAST tunnel is built, the
communications seem to fail and therefore EAP-TLS inner method fails. I'm
wondering if the AP is sending the EAP-TLS session through the CAPWAP tunnel
rather than the EAP-FAST tunnel as it should. Is this possible, or I am just
chasing my tail?

 

Kind Regards,

 

Kevin Sheahan

CCIE # 41349 (Security)

 

 

_______________________________________________
Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::

iPexpert on YouTube: www.youtube.com/ipexpertinc
<http://www.youtube.com/ipexpertinc> 

 


_______________________________________________
Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::

iPexpert on YouTube: www.youtube.com/ipexpertinc
<http://www.youtube.com/ipexpertinc> 




-- 
Bruno Silva
Network Consultant
Cisco CCNA/CCDA/CCNP/CCDP/CCSP Certified
Arcsight Professional Certified - ACIA/ACSA

 

_______________________________________________
Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::

iPexpert on YouTube: www.youtube.com/ipexpertinc

Reply via email to