Dot1x on cisco 3560

Scott Armitage S.P.Armitage at lboro.ac.uk
Fri Apr 25 10:50:51 CEST 2008


I'd have something like:

radius-server host 192.168.1.50 auth-port 1812 acct-port 1813 key <shared-secret>
radius-server timeout 2
radius-server deadtime 1
radius-server vsa send authentication
!
aaa new-model
!
!
aaa group server radius RADIUS-SERVERS
 server 192.168.1.50 auth-port 1812 acct-port 1813
!
aaa authentication dot1x default group RADIUS-SERVERS
aaa accounting dot1x default start-stop group RADIUS-SERVERS
!
dot1x system-auth-control
dot1x guest-vlan supplicant
!
int fa0/1
 dot1x pae authenticator
 dot1x port-control auto
 dot1x host-mode multi-host
 dot1x timeout quiet-period 5
 dot1x timeout server-timeout 5
 dot1x timeout reauth-period server
 dot1x timeout tx-period 5
 dot1x timeout supp-timeout 5
 dot1x max-req 1
 dot1x max-reauth-req 1
 dot1x reauthentication
 dot1x guest-vlan 100
 dot1x auth-fail vlan 100



> -----Original Message-----
> From: freeradius-users-
> bounces+s.p.armitage=lboro.ac.uk at lists.freeradius.org
> [mailto:freeradius-users-
> bounces+s.p.armitage=lboro.ac.uk at lists.freeradius.org] On Behalf Of
> Omar Lopez Limonta
> Sent: 25 April 2008 09:36
> To: FreeRadius users mailing list
> Subject: Re: Dot1x on cisco 3560
> 
> On Fri, Apr 25, 2008 at 9:51 AM,  <A.L.M.Buxey at lboro.ac.uk> wrote:
> > Hi,
> >
> >
> >  > xxxx   Cleartext-Password := "PPPPPl"
> >  >            Service-Type = NAS-Prompt-User,
> >  >            cisco-avpair = "shell:priv-lvl=15"
> >              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> >
> >  this sort of stuff it for admin access to the switch
> >
> >
> >  > Sending Access-Challenge of id 60 to 172.29.11.1:21645
> >  >         Framed-IP-Address = 255.255.255.254
> >  >         Framed-MTU = 576
> >  >         Service-Type = Framed-User
> >  >         EAP-Message =
> 0x010300160410245db5b7205b11398ead15f567f6ed77
> >  >         Message-Authenticator = 0x00000000000000000000000000000000
> >  >         State = 0xb307e1b51eedc6cc895b65e64bcd34a3
> >  > Finished request 0
> >  > Going to the next request
> >  > --- Walking the entire request list ---
> >  > Waking up in 6 seconds...
> >  > rad_recv: Access-Request packet from host 172.29.11.1:21645,
> id=60, length=123
> >  > Sending duplicate reply to client authenticator-short-name:21645 -
> ID: 60
> >  > Re-sending Access-Challenge of id 60 to 172.29.11.1:21645
> >
> >  lots of these. looks like FR is sending challenges but the switch is
> not
> >  responding.  whats your IOS config look like? if you 'debug aaa' on
> the switch
> >  can you see stuff happening at all?
> 
> Mmmm is curious:
> 04-25-2008         10:27:16               Local7.Warning 172.29.11.1
>       67648: 070624: *Apr 14 13:06:59: %RADIUS-4-RADIUS_ALIVE: RADIUS
> server 172.29.11.7:1812,1813 has returned.
> 04-25-2008         10:27:16               Local7.Warning 172.29.11.1
>       67647: 070623: *Apr 14 13:06:59: %RADIUS-4-RADIUS_DEAD: RADIUS
> server 172.29.11.7:1812,1813 is not responding.
> Using debug in AAA on my switch.
> 
> I have this radius settings on my cisco switch:
> 
> #sh run | include radius
> aaa authentication dot1x default group radius
> aaa authorization network default group radius
> radius-server host 172.29.11.7 auth-port 1812 acct-port 1813 timeout 3
> radius-server key mecago
> #
> 
> Any other line could be necessary ?
> 
> I´m using MD5 challenge because i´m testing and i don´t want deploy
> certificates or certificate server.
> Are you using MS certificate Server with FR?
> 
> --
> Xgalaga se disfruta más sobre NetBSD sparc64
> 
> Content Rules:
> 
>     /////
>    \\\///
>    ///\\\  The Duke of Url.
>  { O--O }
>    / /\ \
>    \ -- /
>     [||]
> 
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html







More information about the Freeradius-Users mailing list