Global Configuration AAA Commands
aaa new-model #enable AAA
aaa authentication dot1x default group
radius #Create an authentication method for
802.1X
aaa authorization network default group
radius #Create an authorization method for
802.1X
aaa accounting dot1x default start-stop
group radius #Create an accounting method for
802.1X
aaa accounting update newinfo periodic
2880
Global Configuration RADIUS Commands
- IOS 12.2.x
username radius-test password password #add
a username and password for the RADIUS
keepalive
radius-server host ise_ip_address auth-port
1812 acct-port 1813 test username radius-
test key shared_secret #Add the Cisco ISE
servers to the RADIUS group
- IOS 15.x and IOS XE
username radius-test secret password #, add a
username and password for the RADIUS
keepalive
radius server [name] #Add the Cisco ISE server
address ipv4 [ip-address] auth-port 1812 acct-
port 1813 #Configure the IP address,
authentication port, and accounting port
key [shared-secret] #Configure the shared
secret
automate-tester username [username-from-
step-1]
- IOS 12.2.x, 15.x, and IOS XE
radius-server dead-criteria time 5 tries 3
#Set the dead criteria
aaa server radius dynamic-author #Enable
Change of Authorization (CoA)
client ise_ip_address server-key shared_secret
radius-server vsa send authentication
#Configure the switch to use the Cisco VSAs
radius-server vsa send accounting
radius-server attribute 6 on-for login-auth
#Enable the vendor-specific attributes (VSAs)
radius-server attribute 8 include-inaccess-
req
radius-server attribute 25 access-request
include
ip radius source-interface interface_name
#Ensure that the switch always sends traffic
from the correct interface.Therefore, it is a best
practice to always force any management
communications to occur via a specific interface
snmp-server trap-source interface_name
snmp-server source-interface informs
interface_name
Global 802.1X Commands
dot1x system-auth-control #Enable 802.1X
globally on the switch.
- IOS 12.2.x, 15.x
ip device tracking #Enable dACLs to function
for IOS Version 12.2 and Version 15.x
- IOS 15.2(2) or IOS XE 03.06.00 and later versions
ip device tracking probe auto-source
ip device tracking probe delay 10
Creating Local Access Control Lists
- ACL TO BE USED ON SWITCH PORTS IN MONITOR
MODE
ip access-list extended ACL-ALLOW
permit ip any any
ip access-list ext ACL-DEFAULT
remark DHCP
permit udp any eq bootpc any eq bootps
remark DNS
permit udp any any eq domain
remark Ping
permit icmp any any
remark PXE / TFTP
permit udp any any eq tftp
remark Drop all the rest
deny ip any any log
- ACL TO BE USED FOR URL REDIRECTION WITH WEB
AUTHENTICATION
ip access-list ext ACL-WEBAUTH-REDIRECT
remark explicitly deny DNS from being
redirected to address a bug
deny udp any any eq 53
remark redirect all applicable traffic to the
ISE Server
permit tcp any any eq 80
permit tcp any any eq 443
remark all other traffic will be implicitly
denied from the redirection
- ACL to be used for URL redirection with the posture
agent
ip access-list ext ACL-AGENT-REDIRECT
remark explicitly deny DNS and DHCP from
being redirected
deny udp any any eq 53 bootps
remark redirect HTTP traffic only
permit tcp any any eq 80
remark all other traffic will be implicitly
denied from the redirection
Configure Flexible Authentication and High
Availability
NB: show running-config all | inc radius-server
show running-config all | inc ip device tracking
show ip device tracking all