Advanced IEEE 802.1x PDF
Advanced IEEE 802.1x PDF
1X
Design and Troubleshooting
BRKSEC-3005
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Legos and IEEE 802.1X
Same pieces, different castles
Basic Realistic
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Agenda
Deployment Considerations
Authentication
Authorization
Deployment Scenarios
Monitor Mode
Low Impact Mode
Closed Mode For Your Reference
Troubleshooting
Methodology Real World Example
Flows
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Deployment Considerations
Authentication
Thinking About Authentication
Authorization
Authentication Credentials,
DBs, EAP,
Supplicants,
Agentless, Policy
Order/Priority
Network,
IT,
Desktop
Windows GPO,
Desktops machine auth,
PXE, WoL, VM Multiple
Endpoints
Teamwork &
Organization Confidentiality
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
IEEE 802.1X Provides Port-Based Access
Control Using Authentication
Layer 2 Point-to-Point Layer 3 Link
Supplicant Authenticator Authentication Server
(Client) (Switch) (AAA /RADIUS Server)
EAP over LAN RADIUS
(EAPoL)
EAPoL Start
Beginning EAPoL Request Identity
RADIUS Access-Accept
End EAP Success
[AVP: EAP Success]
[AVP: VLAN 10, dACL-n]
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Choosing Credentials for 802.1X
alice
c1sC0L1v Certificate
Authority
Token
Server
Username/Pwd
Directory
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Credentials May Have Systemic Limitations
2) RADIUS proxy
alice alice.mycorp.com
c1sC0L1v
3) mycorp root CA
PEAP-MSCHAPv2 EAP-TLS
Server Cert Authentication:
Server Cert Authentication:
Signed by trusted CA
Signed by trusted CA
Belongs to allowed server
Belongs to allowed server
server server
CA CA
client CA
host/alice-xp.mycorp.com
MachinePwd
Client Authentication:
Known Username Client Cert Authentication:
Valid password Signed by trusted CA
Additional checks
Encrypted Tunnel
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Users and Machines Can Have Credentials
User Authentication Machine Authentication
alice
host\XP2
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Why You Must Enable Machine Auth In A
Managed Environment
Certificate Auto Enrollment
Kernel Loading Time Synchronization
Windows HAL Loading Dynamic DNS Update
Device Driver Loading
GINA
Power On Machine Authentication Kerberos Auth
(User Account)
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Business Case & Security Policy Determines
Whether You Need User Auth
Bonus Question:
Could this customer enable password-based
user authentication if they wanted to?
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Understanding Your Supplicant is Essential
Unauthenticated
SSC
SSC
Employee Guest
Employee (bad credential)
Rogue
802.1X
Managed Assets
802.1X Passed
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
MAC Authentication Bypass (MAB)
Authentication for Clientless Devices
Any Packet
RADIUS Access-Request
2 MAB [AVP: 00.0a.95.7f.de.06 ]
RADIUS Access-Accept
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
MAB is PAPor you can optimize
RADIUS Access-Request
MAB as PAP
works with any RADIUS server
password = username
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
IEEE 802.1X with MAB
Printer VLAN
802.1X MAB
interface GigabitEthernet1/4
dot1x max-reauth-req 2 Timeout
dot1x timeout tx-period 30
FlexAuth
MAB
interface GigabitEthernet1/4
authentication order mab dot1x
authentication priority* dot1x mab
MAB
Fails 802.1X
First packet from device will trigger MAB
Prepare For Additional Control Plane Traffic
Find It
Leverage Existing Asset Database
e.g. Purchasing Department, CUCM
Build It
Bootstrap methods to gather data
e.g. SNMP, Syslog, Accounting
Buy It
Automated Device Discovery
e.g. ISE
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Building Your MAB Database
Export Phone MACs From CUCM
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Building Your MAB Database
Wildcard Rules Based on MAC Prefixes
00-04-0D-9D-BE-59
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Building Your MAB Database
Profiling Tools Are Evolving
ISE
Profiler
SNMP, DHCP, MAC OUI
LDAP
RADIUS Access-Request
RADIUS Accounting
IOS Sensor
15.0(1)SE1
ISE 1.1
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
To Fail or Not to Fail MAB?
Two options for unknown MAC addresses
AAA server determines policy for unknown endpoints (e.g. network access levels, re-auth policy)
Good for centralized control & visibility of guest policy (VLAN, ACL)
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Deployment Considerations
Authorization
Thinking About Authorization
Pre-Auth,
Authorization
Authentication VLAN, ACL,
Failed Auth,
AAA down
Policy
Desktops Phones,
Link State,
VMs, Multiple
Desktop Switches Endpoints
Teamwork &
Organization Confidentiality
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Authorization Options: Pre-Authentication
Default: Closed
Selectively Open
Open
switch(config-if)#authentication open
switch(config-if)#ip access-group PRE-AUTH in
switch(config-if)#authentication open
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Authorization Options: Passed Authentication
Default: Open
Alice
Dynamic ACL
Dynamic VLAN
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Authorization Options: Failed 802.1X
Default: Closed
Next-method*
Auth-Fail VLAN
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Authorization Options: No Client
Default: Closed
Next-method*
Guest VLAN
switch(config-if)#mab
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Authorization Options: AAA Server Dead
Default: Closed
Critical VLAN
VM
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Modifying Single-MAC Filtering For IP Phones
Multi-Domain Authentication (MDA) Host Mode
IEEE 802.1X MDA
Single device per port Single device per domain per port
Voice Domain
Data Domain
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Modifying Single-MAC Filtering For Virtualized
Endpoints
Multi-Authentication Host Mode
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Authorization Summary
Authentication Default Alternative 1 Alternative 2
Status Authorization
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Deployment Scenarios
Implementing Phased Deployments
Thinking About Deployment Scenarios
Pre-Auth,
Authorization
Authentication Credentials, VLAN, ACL,
DBs, EAP, Failed Auth,
Supplicants, AAA down
Agentless, Definition, Policy
Order/Priority Enforcement,
Network,
Rollout
IT,
Desktop
Windows GPO,
Desktops machine auth,
Phones,
Link State,
PXE, WoL, VM VMs, Multiple
Desktop Switches Endpoints
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Three Deployment Scenarios
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Scenario 1: Monitor Mode Overview
Monitor Mode Goals Monitor Mode: How To
No Impact to Existing Network Enable 802.1X & MAB
Access
Enable Open Access
See All traffic in addition to EAP is
what is on the network allowed
who has a supplicant
Like not having 802.1X enabled
who has good credentials
except authentications still occur
who has bad credentials
Enable Multi-Auth Host-Mode
Deterrence through accountability
No Authorization
SSC
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Monitor Mode: Switch
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Monitor Mode: AAA Server and Endpoints
AAA Server Endpoints
Should be fully configured Should be fully configured:
except for authorization policy: PKI (CA certs, client cert) or
Communication with AAA clients other credentials
(i.e. switches) Supplicants configured &
Communication with credential installed everywhere supported
repository (e.g. AD, MAC Enable machine auth
Database)
Enable user auth if needed
PKI (CA certs, server cert)
EAP Configuration
MAB Configuration
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Monitor Mode: Next Steps
Monitor Mode Next Steps
Improve Accuracy
Evaluate Remaining Risk
Leverage Information
Prepare for Access Control
SSC
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Information Pays For Itself
ROI Without Access Control
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Preparing for Access Control: Fix 802.1X
Observed Failures:
Helpful supplicant:
SSC/AC3.0/Win7
Not as helpful:
XP SP2
Fix:
Import server cert signed
by enterprise CA
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Preparing for Access Control: Learn MACs
Observed Failure
Fix
MAC.CSV
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Monitor Mode In a Nutshell
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Low Impact Mode: Switch
Pre-Authentication
Port Authorization State
SSC
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Example: Using Low Impact Mode to
bootstrap a new phone 10.100.10.238
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Dynamic ACL Types for Authentication
ACL Configuration Notes 802.1X/MAB Web-Auth
Downloadable On ACS Centralized 3K: 12.2(50)SE 3K: 12.2(50)SE
ACL No size limitation* 4K: 12.2(50)SG 4K: 12.2(50)SG
Requires ACS 6K: 12.2(33)SXI 6K: 12.2(33)SXI
PerUser On AAA server Centralized 3K: 12.2(50)SE Not Supported
Length limited to 4K: 12.2(52)SG
RADIUS packet size* 6K: 12.2(33)SXI3
Supports 3rd party AAA
servers
Filter-id ACL name on Distributed 3K: 12.2(50)SE 3K: 12.2(50)SE
AAA server No size limitation* 4K: 12.2(52)SG 4K: Not Supported
ACL contents on Supports 3rd party AAA 6K: 12.2(33)SXI3 6K: Not Supported
switch servers
Proxy On AAA server Centralized Not Supported 3K: 12.2(35)SE
Web-Auth only 4K: 12.2(50)SG
Length limited to 6K: Not supported
RADIUS packet size*
Supports 3rd party AAA
servers
*Size refers to defined length of ACL. TCAM limits on switch still apply.
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
ACL Rules of Thumb
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Handling dACLs without PACLs
Before12.2(54)SG and12.2(55)SE
A switch that receives a dACL for a port %AUTHMGR-5-FAIL
without a PACL will fail authorization.
SSC
%EPM-6-AUTH_ACL: POLICY Auth-Default-ACL
dACL-n
Tip: Use For Graceful Transition
After 12.2(54)SG and12.2(55)SE from Monitor Mode
The switch will automatically attach a
default PACL called Auth-Default-ACL
and then apply dACL.
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Reduce dynamic ACL configuration
Default behavior:
If no dynamic ACL is downloaded, Pre-Auth Port ACL controls the port.
Every endpoint must be assigned a dynamic ACL.
permit ip any any
permit udp any any eq bootps
port permit udp any host 10.100.10.116 eq domain
ACL permit udp any host 10.100.10.117 eq tftp
SSC
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Low Impact: Failed Authentication
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Low Impact: Tune the Host Mode
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Low Impact In a Nutshell
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Scenario 3: Closed Mode
Closed Mode Goals Closed: How To
No access before authentication Return to default closed access
Rapid access for non-802.1X- Timers or authentication order change
capable corporate assets
Implement identity-based VLAN
Logical isolation of traffic at the assignment
access edge
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Closed Mode: Switch
Switch Global Config (add to Monitor Mode)
aaa authorization network default group radius
vlan 60
name data
vlan 61
name voice
vlan 62
name video
vlan 63
name fail-guest-critical
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Dynamic VLANs Impact Your Network
Network Interface
10.10.10.x/24 G0/1
10.10.20.x/24 G0/2
10.10.30.x/24 G0/3
10.10.40.x/24 G0/4
10.10.50.x/24 G0/5
VLAN 10: DATA 10.10.10.x/24
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Dynamic VLANs Can Impact Endpoints
Non-802.1X Endpoints
Unaware of VLAN changes, no mechanism to change IP address
Best Practice: Dynamic VLAN in Closed Mode only
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
802.1X, Dynamic VLANs, and WoL
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Avoid VLAN Name Changes with User
Distribution
Traditional VLAN Assignment Is vlan 30
by VLAN Name name corporate
30 Access-Accept:
switch1 VLAN: corporate
vlan 31
name corporate-2
Access-Accept:
VLAN: BLUE
Access-Accept:
VLAN: BLUE
Access-Accept
VM
12.2(55)SE
15.0(2)SG
12.2(33)SXJ
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Critical VLAN Now Supported With Multi-Auth
12.2(52)SE
Critical VLAN switch(config-if)#authentication event server dead action authorize vlan 52
15.0(2)SG
12.2(33)SXJ1
RADIUS-Access
Request: 00.18.ba.c7.bc.ee
Voice VLAN Enabled Only the VSA can
RADIUS-Access Accept
device-traffic-class=voice
save the phone!
00.18.ba.c7.bc.ee
15.0(1)SE
15.0(2)SG
12.2(33)SXJ1
#show authentication session int f3/48
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Extending the Network Edge
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Network Edge Authentication Topology (NEAT)
Supplicant
Switch (SSw)
2) RADIUS Access-Accept
[device-traffic-class=switch]
3) EAP-Response: Alice
RADIUS Access Request
[AVP: EAP-Response: Alice
RADIUS Access-Accept
[VLAN Yellow]
4) CISP: Allow Alices MAC
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Closed In a Nutshell
Default closed
Summary Differentiated access control using dynamic
VLANs
Logical Isolation at L2
Benefits & No Access for Unauthorized Endpoints
Limitations Impact to Network
Impact to Endpoints
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Troubleshooting
Failed Authorizations
Failed Authentications
Timeout-related Issues
Server-dead Issues
IP Telephony Issues
Troubleshooting In Perspective
Enterprise Customer
70,000 Endpoints
Windows Native Supplicant
PEAP-MSCHAPv2
Additional Support Staff:
< 5 Hours / Week
The typical user is unaware of
the 802.1X implementation.
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Troubleshooting Methodology
1 2 3
4 5 6
Develop & Document a Methodology
7 8 9
Microsoft
C:\Documents And Settings\All Users\Application netsh ras set tracing eapol enable
Native
SSC
Data\Cisco\Cisco Secure Services Client netsh ras set tracing rastls enable
C:\ProgramData\Cisco\Cisco Secure Services Client %systemroot%\tracing\EAPoL.log
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
802.1X Passed Authentication: Expected
Start 802.1X
Closed Mode
N Y Y
Final Port
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
802.1X Passed Authentication Problems
Dynamic Authorization Not Enabled
Start 802.1X
Authentication Process
802.1X
Pass
Switch
AAA-based Y configd
Authz?
for authz?
N
Final Port
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Authorization Problem 1: Configuration
End User
Access: default port config
I dont have enough access or I have too much access
AAA Server
Authentication Passed
Access Switch
Port is authorized but without dynamic VLAN or dACL
No syslog -- this is not an error
Detection: Difficult to detect (no indication that 802.1X is to blame)
Root Cause: Incomplete Switch Config
Resolution: (config)# aaa authorization network default group radius
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
802.1X Passed Authentication Problems
ACL Not Configured
Start 802.1X
Authentication Process
802.1X
Rcvd
Pass dACL?
Y
Y
Switch
AAA-based Y configd Port ACL
Authz? ACL
for authz? defined on N Enhancement?
switch?
N
N Authz Fail:
Quiet Period
Final Port
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Authorization Problem 2:
Authentication Passed but ACL Authorization Failed
End User
Pre-Authentication Access only
AAA Server
Authentication Passed
Access Switch
%AUTHMGR-7-RESULT: Authentication result 'success' from 'dot1x' for client
(0014.5e95.d6cc) on Interface Gi1/13
%AUTHMGR-5-FAIL: Authorization failed for client (0014.5e95.d6cc) on Interface Gi1/13
With epm logging configured:
%EPM-4-POLICY_APP_FAILURE: IP=0.0.0.0| MAC=0014.5e95.d6cc
|POLICY_TYPE=Named ACL| POLICY_NAME=xACSACLx-IP-PERMIT-ANY-4999ced8 |
RESULT=FAILURE| REASON=Interface ACL not configured
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
802.1X Passed Authentication Problems
Bad VLAN Assignment
Start 802.1X
Authentication Process
802.1X Rcvd
Rcvd N
Pass dynamic
dACL?
VLAN?
Y Y Or VLAN
Y Group!
Switch
AAA-based Y configd Port ACL VLAN
Authz?
for authz? defined on N N defined on
switch? switch?
Authz Fail:
N Quiet Period
Final Port
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Authorization Problem 3:
Authentication Passed but VLAN Authorization Failed
End User
Pre-Authentication Access only
AAA Server
Authentication Passed
Access Switch
%AUTHMGR-7-RESULT: Authentication result 'success' from 'dot1x' for
client (0014.5e95.d6cc) on Interface Gi1/13
%DOT1X_SWITCH-5-ERR_VLAN_NOT_FOUND: Attempt to assign non-
existent or shutdown VLAN Employee to 802.1x port GigabitEthernet1/13
%AUTHMGR-5-FAIL: Authorization failed for client (0014.5e95.d6cc) on
Interface Gi1/13
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
When Syslogs Are Too Much of A Good Thing
Filter by severity
#logging trap 5
Filters all syslogs (not just authentication syslogs)
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
802.1X Failed Authentication Flow
Restart
Start 802.1X Timer
Expires
802.1X Web-Auth
N
Authentication Process
Fail configd?
Restart Y
Y Timer
Event fail configd?
> Max
action Y Attempt? N Valid
configd? username N
Closed Mode / pwd? N
Y MAB N
N pass?
Low Impact Mode
Y
Quiet Auth Fail
Period VLAN
Expires N Y Valid dACL &
N
confd? priv-lvl=15?
Y Y
Final Port
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
802.1X Failed Authentication Overview
End User
Pre-Authentication Access only
AAA Server
Best source of info for 802.1X failures
Start Troubleshooting here!
Access Switch
*Mar 5 11:31:41: %AUTHMGR-7-RESULT: Authentication result 'fail'
from 'dot1x' for client (0014.5e95.d6cc) on Interface Gi1/13
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
802.1X Failures: Incompatible EAP Methods
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
802.1X Credential Failures: Server Certs
Applies to:
EAP methods that use server-side TLS server
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
802.1X Failure vs. 802.1X Timeout
An 802.1X failure occurs when the AAA server rejects the request:
SSC
EAPoL Start
EAPoL Request Identity
EAPoL Response Identity
RADIUS Access Request
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
802.1X Timeout Authentication Flow
Start 802.1X
Low Impact Mode
802.1X Web-Auth Y Valid N
Authentication Process
Time out username
configd?
/ pwd?
N Y
MAB N
configd?
Event no-
responsec N Valid dACL &
N
onfigd? priv-lvl=15?
Y
Y Restart Y Restart
MAB Timer Timer Y
pass? N configd? Expires
Closed Mode
Y N
Final Port
AAA
Status
fallback ACL
*See 802.1X Passed Flowchart for details
Subject to change on receipt of EAPoL-Start if 802.1X has priority
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Common Timeout-Related Problems
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
802.1X Server Dead Flow
Start 802.1X Re-auth 802.1X
Authentication Process
Event server Event server
dead N dead N
configd? configd?
Y Y
Final Port
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Misconfigurations Can Lead to Appearance of
Dead Server
Symptoms ACS5 Log / Root Cause / Resolution
All authentications fail from a switch
or groups of switches.
Root Cause: Shared secret is not the same on switch and AAA server
Resolution: Configure same shared secret on switch and AAA server
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
802.1X Passed Auth for IP Phones:
Expected Behavior with Multi-Domain Authentication (MDA)
Rcvd device-
Start 802.1X traffic-
class=voice?
Authentication Process
Y Y
802.1X
Pass Rcvd
Rcvd
dACL? N dynamic N
Closed Mode VLAN?
Y Y
Final Port
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
802.1X Passed Authentication for IP Phones
Authorization Problems with MDA
Y
Start 802.1X
Rcvd device-
traffic- Rcvd
Authentication Process
class=voice? Rcvd
802.1X N dynamic
N dACL?
VLAN?
Pass
Y Y Y
Y Switch
AAA-based
configd
Authz? Port ACL VLAN
for authz? N
N
defined on defined on
switch? switch?
N N
PC PC
N behind Y Y behind N
phone? phone? Authz Fail:
Quiet Period
Final Port
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
802.1X Failure Flow for IP Phones with MDA
Start 802.1X
802.1X
Authentication Process
Fail?
Event fail
action
next- N
method?
Y Event fail N
action
VLAN?
Web- PC Restart Restart
MAB Y
pass? N Auth N Behind N Y Timer Timer
configd? Phone? configd? Expires
Y
Y Y N
Final Port
AAA Security
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
802.1X Timeout Flow for IP Phones
Start 802.1X
802.1X
Authentication Process
Time Out
MAB
configd? N
Y Event no-
response N
VLAN?
Web- N
MAB PC Restart Restart
pass? N Auth
Y Behind N Timer Y Timer
configd?
Phone? configd? Expires
Y
Y Y N
Final Port
AAA
Status
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Most Important: Think at the System-Level
Pre-Auth,
Authorization
Authentication Credentials, VLAN, ACL,
DBs, EAP, Failed Auth,
Supplicants, AAA down
Agentless, Definition, Policy
Order/Priority Enforcement,
Network,
Rollout
IT,
Desktop
Windows GPO,
Desktops machine auth,
Phones,
Link State,
PXE, WoL, VM VMs, Multiple
Desktop Switches Endpoints
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
www.cisco.com/go/ibns
Where To Find Out More www.cisco.com/go/trustsec
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
Deployment Scenario Design /whitepaper_C11-530469.html
Guide
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
Deployment Scenario Config /Whitepaper_c11-532065.html
Guide
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
IEEE 802.1X Deep Dive /guide_c07-627531.html
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
MAB Deep Dive /config_guide_c17-663759.html
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
Web Auth Deep Dive /app_note_c27-577494.html
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
/app_note_c27-577490.html
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
Flex Auth App Note /application_note_c27- 573287_ps6638_Products_White_Paper.html
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
IP Telephony Deep Dive /config_guide_c17-605524.html
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638
MACSec Deep Dive /deploy_guide_c17-663760.html
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Complete Your Online
Session Evaluation
Give us your feedback and you
could win fabulous prizes.
Winners announced daily.
Receive 20 Passport points for each
session evaluation you complete.
Complete your session evaluation
online now (open a browser through
our wireless network to access our Dont forget to activate your
portal) or visit one of the Internet Cisco Live Virtual account for access to
stations throughout the Convention all session material, communities, and
on-demand and live activities throughout
Center. the year. Activate your account at the
Cisco booth in the World of Solutions or visit
www.ciscolive.com.
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Final Thoughts
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
BRKSEC-3005 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public