Cisco ISE : How to configure 802.1x on your switch and windows 10 Client

Overview 802.1x

  • L2 authentication standard for wired and wireless network
    • Used for identity-based networking.
    • Implemented through EAP (EAP over LAN “EAPOL”)
      • Framework for exchanging arbitary authentication data
  • 802.1x Components
    • Supplicant
      • client software
    • Authenticator
      • Policy enforcement (Switch/WLC/AP)
    • Authentication Server (Radius)

802.1x Authentication

  • Authenticator drop non-EAP packet frame during/before AuthC
    • Cisco add exceptions for protocol (CDP,STP,LLDP)
  • The Process
    1. Authentication process start on receptions of EAP request identity frame
      1. sent link up/down connection or upon reception EAP start
    2. Authenticator acts as a proxy between supplicant & RADIUS Server
      1. EAP data is extracted & encapsulated using two RADIUS EAP-specific attributes
    3. Authentication method is negotiated followed by authentications
  • Authentication results determine network access rights
    • Success (Access accept – EAP success)
      • allow access + return optional data (dACL/VLAN)
    • Failure (Access reject – EAP failure)
      • wireless (no-access)
      • wired (no-access) re-authenticate timeout quite-period

MAB (Mac Authentication Bypass)

  • Alternative authentication method for 802.1x Environments
    • Needed for non-supplicant devices (IP Cameras, printers, etc)
  • MAB Details
    1. if enabled (mab), trigger after 802.1x times out (dot1x timeout tx-period) default 90s
      • in wireless for WLAN configured with MAC Filtering.
    2. process as “Host lookup”
      • no password verification, AuthC on presence of MAC Address.
      • identified via radius service type 10 (Call Check) & NAS-Port-Type
        • 15 Ethernet
        • 19 Wireless

Flexible Authentication

  • Cisco 802.1x enhancement for wired deployments
    • single configuration that fits all 802.1x authentication scenarios.
      • authentication method list order:
        • authentication order [dot1x] [mab] [webauth]
      • failed authentication fallback
        • authentication event fail action next method
      • authentication method preference
        • authentication priority [dot1x|mab] webauth

Deployment Modes

  1. Monitoring
  2. Low Level
  3. Close

Topology

Testing Scnearios

  1. Configure Cisco ISE as radius server and Switch as authenticator with password cisco123
  2. Use testing user emp1 as username for windows 10 login via 802.1x auth.
  3. Configure authorization for user emp1 group employee in vlan 500.
  4. Configure 802.1x using native software windows 10.

Configurations

ISE

  1. add NAS switch enable radius and configure password cisco123: work centers -> administartor -> network resources> add

2. Create user emp1 and attach to group employee: work centers -> administartor -> identities -> add

    3. Create profile for vlan 500 employee: policy -> policy element -> profile -> add

      4. Create policy set for 802.1x: policy -> policy set -> add

        authentication policy

        authorization policy

        Switch

        Enable AAA and configure interface facing the windows 10 to enable 802.1x

          ## enable AAA
          aaa new-model
          aaa authentication dot1x default group radius
          aaa authorization network default group radius
          aaa accounting dot1x default start-stop group radius
          
          ## coa configuration
          aaa server radius dynamic-author
           client 167.205.196.79 server-key cisco123
          aaa session-id common
          
          ## radius attribute
          radius-server attribute 6 on-for-login-auth
          radius-server attribute 8 include-in-access-req
          radius-server attribute 25 access-request include
          radius-server host 167.205.196.79 key cisco123
          
          ## enable dot1x globally
          dot1x system-auth-control
          
          # enable dot1x on interface facing windows 10
          interface Ethernet0/2
           switchport mode access
           authentication event fail action next-method
           authentication order dot1x mab
           authentication priority dot1x mab
           authentication port-control auto
           mab
           dot1x pae authenticator
           dot1x timeout tx-period 10
           spanning-tree portfast edge
          !
          

          Windows 10

          1. download the intermediate cert cisco ise and upload save to windows client, import the CA to trusted CA

          2. import CA to windows 10 systems.

          3. Enable service 802.1x on windows 10: go to run: services.msc.

          4. go to adapater setting and configure 802.1x on the interface

          5. enter the username pass for emp1 and we can get ip address vlan 500.

          Verifications

          1. we can check both of ISE and Switch, from switch we can use this command
          show authent int eth 0/2 details

          2. From Cisco ISE we can the log lives radius server