Cisco Dot1x Monitor Mode

Hello All,

Our 802.1X testbed setup is connected to our Active Directory DC and appears to be set up
correctly and working fine.  We are using machine authentication using PEAP .  Supplicants are successfully authenticating when trying to connect to the network.

My question is,  what commands in addition to "Authentication Open" do I need to place on
Cisco 3750X and 3750G switches running IOS version 1502 into "monitor mode"?

Also,  once the port\interface is configured for monitor mode,  will the ACS 5X server generate radius logs if the SUPPLICANT SUCCESSFULLY AUTHENTICATES or does it only
generate a radius log if there are authentication issues?

And finally.  When I issue the "Show dot1x interface xxx",  commnad,  I am not seeing anything in the output when I try to use monitor mode.

Thanks in advance.

ray
RayneedssomehelpAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Craig BeckCommented:
This should be all you need on a switchport to enable monitor mode (assuming you've already configured global 802.1x settings...

 interface range GigabitEthernet1/0/1 - 10
  authentication open
  authentication port-control auto
  dot1x pae authenticator
  mab
  authentication host-mode multi-auth

Open in new window


The RADIUS logs will show successes and failures.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Craig BeckCommented:
I 'think' that you don't see anything when you use the 'Show dot1x interface xxx' command because you're only able to see accounting messages, not authentications at the switch.  To see authentications you need to check the RADIUS Authentication logs in the ACS.
0
RayneedssomehelpAuthor Commented:
The only commands I had on the interface was Authentication Open and Authentication host-mode multi-auth.

Does not the "Show dot1x interface xxx" command tell you if the port is enabled for the
Dot1X protocol?  Which of the commands  aformentioned will actually enable 802.1x  on
a switch interface assuming that global configs are already correct?

Ray
0
Craig BeckCommented:
show authentication session interface gi1/0/1 will show you if authentication is working on the port.

If it is you'll see something like this...

sh authent sess int g1/0/1
            Interface:  GigabitEthernet1/0/1
          MAC Address:  0040.9668.9896
           IP Address:  Unknown
               Status:  Authz Success
               Domain:  DATA
       Oper host mode:  multi-domain
     Oper control dir:  both
        Authorized By:  Authentication Server
          Vlan Policy:  10
      Session timeout:  N/A
         Idle timeout:  N/A
    Common Session ID:  0000000000000AAAAAAAAAAA
      Acct Session ID:  0x00000CCB
               Handle:  0x2E000FF0
0
RayneedssomehelpAuthor Commented:
CRAIGBECK,

Thanks for clearing this up!  I think I was confused by the fact that apparently there are 2 different syntaxes for configuring Cisco switch interfaces for 802.1x...It depends on the IOS.
.
One starts with "Authentication" and the other starts off with "dot1x" in the syntax

I got confused because I did not know which ones to use.  I just configured as many commands as I could on the port until I got it to work and allow authentication.

Thanks again!

Ray
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Network Security

From novice to tech pro — start learning today.