You are here
SEC0216 - ISE 2.0 TrustSec - Network Device Authentication (Part 2)
Difficulty Level:
Lab Document:
<Please login to see the content>
Category:
Security
This is the first video of a TrustSec mini series on Cisco ISE 2.0. We will look at the first building block of creating a TrustSec domain which is Network Device Admission Control (NDAC). This will also be our first look at the new TrustSec WorkCenter. We will be configuring a seed device and a non-seed device in this lab, and test SGT propagation.
Part 2 of this video covers configuration of a seed switch
Topic:
- TrustSec Dashboard
- TrustSec WorkCenter
- Network Device Admission Control (NDAC)
- Seed and Non-Seed Device
- SGA Server List
- TrustSec Environment Data
- Switch-to-Switch Authorization
- Flexible Netflow
14 comments
5417 Dynamic Authorization failed
I am doing same exactly shown in video but still i am getting 5417 Dynamic Authorization failed
I am passed with PAC provisioned but after that i am getting 5417 Dynamic Authorization failed.
What configuration that i am missing please reply.
Logs
2018-07-31 09:15:45.389
Received Timestamp 2018-07-31 09:15:45.39
Policy Server ise-demo
Event 5417 Dynamic Authorization failed
Failure Reason 11213 No response received from Network Access Device after sending a Dynamic Authorization request
Resolution Check the connectivity between ISE and Network Access Device. Ensure that ISE is defined as Dynamic Authorization Client on Network Access Device and that CoA is supported on device.
Root cause No response received from Network Access Device after sending a Dynamic Authorization request
Network Device LM-SW
Device Type All Device Types
Location All Locations
NAS IPv4 Address 192.168.10.1
Response Time 10005 milliseconds
5417 Dynamic Authorization failed
Can i expect the above ans ?
5417 Dynamic Authorization failed
You probably want to check your switch is configured with dynamic authorization allowing ISE PSN IP with matching key.
5417 Dynamic Authorization failed
Thanks for Reply .
There was some miss configuration in switch side.
cts dot1x configuration on interface
I have only one Switch in trustsec environment . so i am confuse where should be or which interface that i can use cts dotx , and sap mode list , and propagate sgt command to use in switch interface .
Please reply fast its a very urgent need.
cts dot1x configuration on interface
If you only have one switch then you perform both classification and enforcement on that same switch. There is no need for any command that requires to connect between two switches like we do, like the sap or propagate as those are for inline tagging packet between switches.
cts dot1x configuration on interface
I am still waiting for your response . please reply i am stuck.
cts dot1x configuration on interface
Why dont you replying ?
NDAC configuration
I've got a Two-Tier simplified distribution layer design with VSL at core and DC, and port-channels. I've got 3850's all through out running Denila IOS 16.3.x. I've got a pilot lab and found I don't have the option for "cts dotx" on my interface links between DC(seed-sw)>Core /Core>Access.
How critical is it to configure NDAC in the trustsec architecture?
Do I just use "cts manual" on switch>switch interfaces to propagate SGTs?
NDAC configuration
NDAC is just anohter layer of security preventing unauthorized device from joining your TrustSec domain. If you are ok without, you can just make the port to manual trust and it will work just fine.
Thanks for the feedback but
Thanks for the feedback but what's not clear where to configure trustsec in the Campus, most docs show 1 switch in examples. Since I'm unable to do NDAC, where seed switch authenticates with ISE to build trust domain with non seed...do I generate pac keys for all my devices (DC/Core/Access) and cts manual on links between the switches to do inline tagging and enforcement?
If you go with the manual
If you go with the manual trust, there is no need to do NDAC to build trust domain. You just configure cts manual with propagation on ports between trustsec device.
Pac Key
Hello and thank you very much for your videos. The only thing I did not understand is the PAC key command under the radius server configuration. My concerns is about don`t PAC key is automatically provisioned during phase0 of FAST from server? what is purpose of this command. And previously for authentication to work we just need key command under radius configuration but this time you did not use it why? Does PAC KEY command replace it. I did not really understand the PAC KEY command. If it is for server and NAD authentication, didn`t we used cts credentials command?
Pac Key
The pac key command under RADIUS config is for device to authenticate with ISE and download the actual PAC key so they can further exchange CTS info. It has nothing to do with the regular key command that is used for device-server communication for client authentication.