RADIUS Testing should be enabled for RADIUS Monitoring to work.
This feature must be enabled to track RADIUS server reachability. If not enabled, clients will continue to be put on the Guest or
Critical Auth
VLANs even after connectivity between the MS and RADIUS server has been restored.
It may be necessary to perform dynamic VLAN assignment on a per-computer or per-user basis. MS switches can accomplish this through the use of RADIUS authentication, allowing the local port VLAN to be overridden with one that's defined by a RADIUS server.
Support for Dynamic VLAN Assignment for the Voice VLAN / domain was introduced in firmware version MS 15.
An additional attribute,
device-traffic-class=voice
, must also be received within the Access-Accept message for Voice VLAN assignment to occur.
When using 802.1X authentication or MAC Authentication Bypass (MAB) , it is a best practice to configure the port VLAN (PVID) and the voice VLAN with different VLAN IDs. This helps ensure proper traffic isolation, prevents conflicts, and maintains QoS for voice traffic
Failed Authentication VLAN
A client device connecting to a switch port controlled by an access policy can be placed in the failed authentication VLAN if the RADIUS server denies its access request.
Client devices may fail RADIUS authentication because they do not comply with the network's security requirements. The failed authentication VLAN provides such clients with limited access to the network for remediation purposes.
Failed Authentication VLAN is only supported in the Single Host, Multi Host and Multi Domain modes. Access policies using
Multi Auth mode are not supported on MS Classic Switches, only Cloud Managed Catalyst
.
Re-authentication Interval
When the Re-authentication Interval (time in seconds) is specified, the switch will periodically attempt authentication for clients connected to switch ports with access policies. Apart from providing for a better security policy by periodically validating client authentication in a network, the re-authentication timer also enables the recovery of clients placed in the Failed Authentication VLAN because of incomplete provisioning of credentials.
Re-authentication will not occur if no re-authentication interval has been configured, or if a reauthentication-interval has been configured but the switch has lost connectivity to all of the RADIUS servers listed under the access policy.
Suspend Re-authentication when RADIUS servers are unreachable
Periodic re-authentication of clients can be an issue when RADIUS servers are unreachable. The
Suspend Re-authentication when RADIUS servers are unreachable
allows users to choose whether the re-authentication should occur or not when none of the RADIUS servers are reachable. By default, re-authetication gets suspended when RADIUS servers are not reachable.
'Suspend re-authentication when RADIUS servers are unreachable,' is not a configurable option on the MS390 and C9300-M series switches
. An MS390 and C9300-M switch will automatically ignore this configuration, and will always suspend client re-authentication, if it loses connectivity with the RADIUS server.
Critical Auth
entication VLAN
The critical authentication VLAN can be used to provide network connectivity to client devices connecting on switch ports controlled by an access policy when all of the RADIUS servers for that policy are unreachable or fail to respond to the authentication request on time. The critical data and critical voice VLANs should not be the same.
When the RADIUS servers are not reachable from the switch, authentication requests for clients attempting to connect to the network will fail, resulting in clients being denied access. Critical authentication VLAN ensures that these clients are still able to access the business-critical resources by placing them in a separate VLAN. This also allows network administrators to better control the network access available to clients when their identities cannot be established using RADIUS.
RADIUS Monitoring must be enabled to track RADIUS server reachability. If not enabled, clients will continue to be put on the Guest or Critical Auth VLANs even after connectivity between the MS and RADIUS server has been restored.
Configuring Critical Authentication VLAN or Failed Authentication VLAN under an access policy may affect its existing Guest VLAN behavior. Consult the
Interoperability and backward compatibility
section of this document for details.
An "802.1X Canned EAP Success" event will be triggered if the authentication process places a client's VLAN on the critical, guest, or failed authentication VLAN. This alert is different from the "802.1X EAP Success" event where authentication is successful and planned connectivity is provided.
Critical Authentication VLAN is only supported in the Single Host, Multi Host, Multi Domain, and Multi Auth modes for Cloud Manager Catalyst switches running CS17 and higher.
Critical Authentication VLAN is only supported in Single Host, Mult Host and Multi Domain on MS Classic Switches.
Critical Authentication VLAN is not currently supported in Multi Auth modes on MS Classic Switches.
Suspend port bounce
When connectivity between the switch and any of the RADIUS servers is restored, the switch will attempt to authenticate the clients which it had placed in the Critical Authentication VLAN. The switch does this by bouncing (turning off and on) the switch ports on which these clients are connected. If required, this port-bounce action can be disabled by enabling the
Suspend port bounce
option. When port-bounce is suspended, the clients will be retained in the Critical Authentication VLAN until a re-authentication for these clients is manually triggered.
If Critical and/or Failed Authentication VLANs are specified in an Access Policy, the Guest VLAN functionality gets modified to ensure backward-compatibility and inter-op between the configured VLANs. Refer to the
Interoperability and backward-compatibility
table below for more details on this.
The following matrix shows the remediation VLAN, if any, that client devices would be placed in for the different combinations of the remediation VLAN configuration options and the RADIUS authentication result.
1
When using hybrid authentication without concurrent authentication enabled, a client failing both 802.1X and MAB authentication will also be placed in the Guest VLAN. Refer to the
Access Policy Types
section of the MS Switch Access Policies documentation for details.
MS 14 is the minimum firmware version required for the following configuration options.