Ok, try that:

conf t
default int GigabitEthernet1/0/28
int GigabitEthernet1/0/28

switchport mode access
switchport voice vlan 999
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication timer restart 10800
authentication timer reauthenticate 10800
authentication violation replace
mab
no snmp trap link-status
dot1x pae authenticator
dot1x timeout quiet-period 2
dot1x timeout tx-period 3

shut
no shut

end

Check if PF receives the radius request:

test aaa group radius bob bob legacy

Check in your radius logs or the Auditing tab in PF if you see the user bob 
beeing rejected / fails

Thanks,

Ludovic Zammit
lzam...@inverse.ca <mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca <https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org <http://packetfence.org/>)







> On Mar 8, 2021, at 11:26 PM, Pavit Maddy <pavitgulat...@gmail.com> wrote:
> 
> Thanxx for your reply Ludovic
> 
> Here is my configuration
> 
> Version Details
> 
> Switch Ports Model               SW Version    SW Image                    
> Mode
> ------ ----- -----             ----------         ----------                  
>    ----
> *    1 29    C9300L-24P-4X      16.12.4           CAT9K_IOSXE           
> INSTALL
> 
> 
> 
> Global Commands
> 
> aaa group server radius packetfence
>  server name pfnac
> aaa authentication dot1x default group packetfence
> aaa authorization network default group packetfence
> aaa accounting dot1x default start-stop group packetfence
> aaa accounting update periodic 1
> dot1x system-auth-control
> radius-server vsa send authentication
> aaa server radius dynamic-author
>  client X.X.X.X server-key 7 **************
>  port 3799
> radius server pfnac
>  address ipv4 X.X.X.X auth-port 1812 acct-port 1813
>  key 7 ***************
> snmp-server community abcd RW
> snmp-server community abc RO
> 
> 
> Interface Commands
> 
> switchport mode access
>  switchport voice vlan 999
>  ip flow monitor SMC-flow-monitor input
>  authentication host-mode multi-auth
>  authentication order dot1x mab
>  authentication priority dot1x mab
>  authentication port-control auto
>  authentication periodic
>  authentication timer reauthenticate server
>  authentication timer restart 10800
>  authentication violation replace
>  mab
>  no snmp trap link-status
>  dot1x pae authenticator
>  dot1x timeout quiet-period 2
>  dot1x timeout tx-period 3
>  spanning-tree portfast
>  spanning-tree bpduguard enable
> 
> Thanks
> 
> On Tue, Mar 9, 2021 at 1:31 AM Ludovic Zammit <lzam...@inverse.ca 
> <mailto:lzam...@inverse.ca>> wrote:
> Hello Pavit,
> 
> Which IOS are you running on the Cisco Catalyst 9300?
> 
> Show me the config and I will check it out.
> 
> Thanks,
> 
> Ludovic Zammit
> lzam...@inverse.ca <mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
> www.inverse.ca <https://www.inverse.ca/>
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu 
> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org 
> <http://packetfence.org/>)
> 
> 
> 
> 
> 
> 
> 
>> On Mar 8, 2021, at 9:36 AM, Pavit Maddy <pavitgulat...@gmail.com 
>> <mailto:pavitgulat...@gmail.com>> wrote:
>> 
>> Greetings to all
>> 
>> We have added new cisco9300 catalyst switches in our environment for dot1x 
>> authentication using Packetfence. These new switches have been configured in 
>> the same way as we configured cisco2960-x Switch.
>> But when debugging dot1x events, we came across a message 
>> 
>> %SESSION_MGR-5-FAIL: Switch 1 R0/0: sessmgrd: Authorization failed or 
>> unapplied for client (XXXX.XXXX.XXXX) on Interface GigabitEthernet1/0/28 
>> AuditSessionID 1180FC0A00000047DE238CC2. Failure reason: Authc fail.
>> 
>> What does this event indicate ?
>> 
>> Regards
> 

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to