How To's - Authenticate users without 802.1X

How To's - Authenticate users without 802.1X

Hi there, in this post we’re going to see how to provide access for users who don’t have a supplicant (fancy name to say “software/feature” that supports 802.1X). This post is a sequence from the previous one: How To's - Manage Network Access with ISE 2.7, and I highly recommend you to read it before following this one, as some commands have already been covered there.

In this one, we’re going to use MAB and EasyConnect to authenticate the users. Let’s get ready to rumble.

For this lab, I added one PC just to make things a bit more interesting. The port where the Guest PC is connected, has the same configuration as the others ports (for simplicity).

No alt text provided for this image

On the SW we have to correct the following config to support EasyConnect:

aaa server radius dynamic-author

client 192.168.234.23 ! it has to be ISE IP address

server-key admin1234

Now let’s start playing with ISE portal.

We have to add the GuestPC mac address to ISE Identity Store by going to Work Centers > Network Access > Identities and click on add (plus symbol) and type the mac address.

No alt text provided for this image

Next let’s add a new authentication and authorization rule above the others rules by going to Policy > Policy Sets > Wired

No alt text provided for this image

Mab configuration is done.

Now let’s start configuring EasyConnect by enabling the service in Administration > System > Deployment > ISE: Enable Passive Identity Service

No alt text provided for this image

Next we’ll Configure Identity Mapping by navigating to Work Centers > PassiveID > Providers 

No alt text provided for this image

Click on the server name

No alt text provided for this image

In PassiveID tab, click on Add DCs

No alt text provided for this image

In the Credentials section, enter the Username and Password of the DC, and select WMI as protocol. Click Configure and then Save. An updated table is displayed with the newly-defined DC included in the list of DCs. 

No alt text provided for this image
No alt text provided for this image
No alt text provided for this image

Next we’ll create a new Authentication Profile for Allowed Protocols in Policy Elements > Authentication > Allowed Protocols 

No alt text provided for this image

We’ll enable only Authentication Bypass.

No alt text provided for this image

Now let’s enable the Passive Identity feature for Marketing and Finance Authorization profiles in Authorization page.

No alt text provided for this image

We’ll create a Downloadable ACLs to be assigned for users being authenticated by EasyConnect. The destination host has to be AD IP.

No alt text provided for this image

Now we'll create another authorization profile for AD query and link it to this DACL.

No alt text provided for this image

Now let’s create the policy to allow these changes. In Policy > Policy Sets, add a new policy above the others. Set the condition to be the SW and the port where the CRP-PC2 is connected. For Allowed protocols, select the one created earlier.

No alt text provided for this image

Now let's create the authentication and authorization policy

No alt text provided for this image

It's time to test, so let's run shut/no shut on the switch port for GuestPC and CRP-PC2. For CRP-PC2, I disabled the 802.1X service.

No alt text provided for this image

We can see a more detailed output by adding the interface details

No alt text provided for this image
No alt text provided for this image

We can also verify this events in ISE

No alt text provided for this image

NOTE: Cisco does not recommend using vlan change when not using dot1x. There are some options but for this lab I just disabled the interface and re-enabled it on the PC side.

Cisco: When you change a VLAN assigned to an endpoint, that endpoint must know (somehow) to renew the DHCP request. The best solution is to not use VLAN changes on open networks because there is nothing on the client to detect the VLAN change and trigger the DHCP renewal.


And we have provided user authentication on a network, without using 802.1X.

I hope you enjoyed this post, leave your comments below and I'll see you on the next one.


Reference:

https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_sw_cnfg.html#wp1042275

Daniel Lavi

Co-Founder and CEO at ReviveSec

4 年

Interesting, thanks

回复

要查看或添加评论,请登录

Silésio Carvalho的更多文章

  • The Power of Visualization

    The Power of Visualization

    I am Silésio Carvalho, CCIE #65745 and I passed the CCIE lab exam on November 30 2021. If you paid attention to the…

    8 条评论
  • ForticlientEMS fails connection with Fortihate

    ForticlientEMS fails connection with Fortihate

    For those trying to play with Fortigate ZTNA, if you're using Fortigate on evaluation mode, one of the restrictions…

  • Why you won't become a CCIE

    Why you won't become a CCIE

    I'm not the author for the text below but I wanted to share this with you, in case you're thinking about taking the…

    10 条评论
  • Trobleshoot SD-WAN – Part 2

    Trobleshoot SD-WAN – Part 2

    Hi there, in the last article we saw how to troubleshoot control connection failure on Cisco SD-WAN, caused by…

  • Trobleshoot SD-WAN – Part 1

    Trobleshoot SD-WAN – Part 1

    Hi there, While deploying Cisco SD-WAN you might face control connection errors related to certificate. Here are some…

  • Como eu come?aria de novo, em Networking (Redes)?

    Como eu come?aria de novo, em Networking (Redes)?

    Estou nesta jornada a mais de uma década e até a data, tem sido uma caminhada nada fácil (por op??o minha) mas muito…

    6 条评论
  • CCIE - The Plan

    CCIE - The Plan

    Hi there, first of all, I’d like thank everyone for the congratulations messages. As a thank you back, I’ll share with…

    20 条评论
  • How To's - Deploy Checkpoint Remote Access VPN

    How To's - Deploy Checkpoint Remote Access VPN

    Hi there, in this post we'll see how to deploy remote access using Checkpoint Remote Access VPN client. Some…

    3 条评论
  • How To’s – Deploy DMVPN Front Door VRF (automating with ansible)

    How To’s – Deploy DMVPN Front Door VRF (automating with ansible)

    Hi there, in this post we're going to deploy DMVPN Front Door VRF and using ansible. Basically, we'll be using DMVPN…

    1 条评论
  • How To’s – Deploy DMVPN Dual Hub Dual Cloud

    How To’s – Deploy DMVPN Dual Hub Dual Cloud

    Hi there, in this post we’ll see how to deploy DMVPN Dual Hub Dual Cloud. Basically it means we’ll have two or more…

社区洞察

其他会员也浏览了