Wired Intelligent Edge

 View Only
Expand all | Collapse all

Aruba CX 802.1x Port-Access status "Failed"

This thread has been viewed 48 times
  • 1.  Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 07, 2025 07:49 AM

    We are using ClearPass to send down a user-role to our Aruba CX switch. We are using local user roles in this environment. I am successfully applying the local user roles on our Aruba AOS switches but am having difficulty with our CX switches. this is on one of our lab switches as we are still in the beginning stages of trying to get wired security to work. 

    Our CX switch is failing to apply the local user role to the port in question once ClearPass has performed the necessary authentication checks and sent down the proper user role

    6300# show port-access clients                                 

    Port Access Clients

    Status Codes: d device-mode, c client-mode, m multi-domain 

    -----------------------------------------------------------------------------------------------------------------
      Port     MAC-Address       Onboarding     Status               Role                                Device Type 
                                 Method                                                                              
    -----------------------------------------------------------------------------------------------------------------
    c 1/1/1    f4:39:09:12:e8:d3 mac-auth       Success              LUR-UBT-User                        
    c 1/1/2    10:e7:c6:b8:1c:0b dot1x          Fail                 COD-MACHINE                         

    We are successfully tunneling one port over to our hardware controller, but failing to apply the role to port 2. I'm getting some kind of VLAN application error

    6300# show aaa authentication port-access interface 1/1/2 client-status 

    Port Access Client Status Details

    Client 10:e7:c6:b8:1c:0b, anonymous
    ===================================
      Session Details
      ---------------
        Port         : 1/1/2
        Session Time : 422s
        IPv4 Address : 
        IPv6 Address : 
        Device Type  : 

      Authentication Details
      ----------------------
        Status          : dot1x Authenticated
        Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
        Auth History    : dot1x - Authenticated, 422s ago

      Authorization Details
      ----------------------
        Role   : COD-MACHINE
        Status : Failed, Failed to assign VLAN

    I've checked the spelling of the port-access role, and even changed the name of the associated policy, as it had the same name but different case

    Name  : COD-MACHINE                                            
    Type  : local                                                  
    ----------------------------------------------                 
        Reauthentication Period             : 86400 secs           
        Cached Reauthentication Period      :                      
        Authentication Mode                 :                      
        Session Timeout                     :                      
        Client Inactivity Timeout           :                      
        Description                         :                      
        Gateway Zone                        :                      
        UBT Gateway Role                    :                      
        UBT Gateway Clearpass Role          :                      
        Access VLAN                         :                      
        Native VLAN                         :                      
        Allowed Trunk VLANs                 :                      
        Access VLAN Name                    :                      
        Native VLAN Name                    : data                 
        Allowed Trunk VLAN Names            : data,voice           
        VLAN Group Name                     :                      
        MTU                                 :                      
        QOS Trust Mode                      :                      
        STP Administrative Edge Port        :                      
        PoE Priority                        :                      
        PVLAN Port Type                     :                      
        Captive Portal Profile              :                      
        Policy                              : COD-Machines         
        GBP                                 :                      
        Device Type                         :                      
        MACsec-Policy                  :

    Here is the actual config of the port-access role:

    port-access role COD-MACHINE                                   
        associate policy COD-Machines                              
        reauth-period 86400                                        
        vlan trunk native name data                                
        vlan trunk allowed name data,voice    

    vlans:

    6300(config)# show vlan

    ------------------------------------------------------------------------------------------------------------------
    VLAN  Name                              Status  Reason                  Type        Interfaces                    
    ------------------------------------------------------------------------------------------------------------------
    1     DEFAULT_VLAN_1                    down    no_member_forwarding    default     1/1/49-1/1/50,lag1
    1188  data                              up      ok                      static      1/1/1-1/1/48,lag1
    1190  voice                             up      ok                      static      1/1/1-1/1/48,lag1
    1196  finhr                             down    no_member_forwarding    static      lag1
    1800  Management                        up      ok                      static      1/1/48,lag1
    4091  tunnel                            up      ok                      static      1/1/1,lag1

    The following is the interface configuration itself. We have the VLANs defined on the interfaces as that is our standard production configuration, and we are just beginning to try to deploy wired network security, as stated previously

    interface 1/1/2
        no shutdown
        no routing
        vlan trunk native 1188
        vlan trunk allowed 1188,1190
        spanning-tree port-type admin-edge
        aaa authentication port-access client-limit 12
        aaa authentication port-access dot1x authenticator
            eapol-timeout 10
            max-eapol-requests 1
            max-retries 1
            enable
        aaa authentication port-access mac-auth
            enable

    6300(config)# show logging -r                                  
    ---------------------------------------------------
    Event logs from current boot 
    ---------------------------------------------------
    2025-01-07T06:44:28.182387-06:00 6300 port-accessd[4403]: Event|10502|LOG_INFO|CDTR|1|Port 1/1/2 is blocked by port-access
    2025-01-07T06:44:28.145444-06:00 6300 intfd[751]: Event|403|LOG_INFO|UKWN|1|Link status for interface 1/1/2 is up

    I've been stuck on this for weeks, looking for some help here. Probably something obvious I'm missing



  • 2.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 07, 2025 08:46 AM

    What are the attributes returned from ClearPass? Failed to assign VLAN typically is a conflict or wrong attributes, or a missing VLAN. Also, I'm not 100% sure if vlan names can be used in a role; have you tried with the vlan ids to see if it works with that?



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 3.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 07, 2025 09:13 AM

    I assume you mean these attributes?

    regarding use of vlan names, we have an engagement with an Aruba engineer who has deployed this at other companies using vlan names. I can try to use the actual vlan ID, but that would force us to use different vlan ID's for every switch we use across campus (80+ switches) instead of using a uniform config using names.




  • 4.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 07, 2025 10:11 AM

    Aruba User Role is for AOS-CX, where HPE-User-Role is for older ArubaOS switches. Some switches don't like additional attributes that they don't understand. Can you see in Access Tracker what actually has been sent? Or (if you only have AOS-CX switches) remove the HPE-User-Role for now?



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 5.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 07, 2025 10:22 AM

    I removed the HPE-User-Role temporarily and still receive the same error.

    Here is the output from access tracker, AFTER i removed the HPE-User-Role

    I am still receiving a fail on the interface.

    6300(config-if)# show port-access clients 

    Port Access Clients

    Status Codes: d device-mode, c client-mode, m multi-domain 

    -----------------------------------------------------------------------------------------------------------------
      Port     MAC-Address       Onboarding     Status               Role                                Device Type 
                                 Method                                                                              
    -----------------------------------------------------------------------------------------------------------------
    c 1/1/1    f4:39:09:12:e8:d3 mac-auth       Success              LUR-UBT-User                        
    c 1/1/2    10:e7:c6:b8:1c:0b dot1x          Fail                 COD-MACHINE                         

    The strange thing is, this was working at one point. I may try to see if i can return a different role.




  • 6.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 07, 2025 10:23 AM

    Also, about 90% of our switches on campus are still the AOS style switches (5412R's). We only have migrated a small number of switches to CX style switches thus far, hence why we need both attributes on the clearpass profile




  • 7.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 02:28 AM

    I would first recommend to create 2 different profiles for CX switches and for Aos switches . This is how i achieved it in my environment . In the profile you can choose you CX switch to apply proper aruba attributes (Aruba-user-role)  and same for AOS switches . You create 2 groups for switches .




  • 8.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 08:57 AM

    It looks like the CX platform does have limitations with vlan NAMES where AOS did not. I changed the port-access role rules to use the actual vlan tags instead of the names, and it seems to work fine.

    I think this can work, since we are not using downloadable user roles. I'm not sure how downloadable roles would work in an environment where every switch uses different VLANs and VLAN's don't span across the environment

    port-access role COD-MACHINE                                   
        associate policy COD-Machines                              
        reauth-period 86400                                        
        vlan trunk native 1188                                     
        vlan trunk allowed 1188,1190,1196 

    6300(config)# show port-access clients 

    Port Access Clients

    Status Codes: d device-mode, c client-mode, m multi-domain 

    -----------------------------------------------------------------------------------------------------------------
      Port     MAC-Address       Onboarding     Status               Role                                Device Type 
                                 Method                                                                              
    -----------------------------------------------------------------------------------------------------------------
    c 1/1/1    f4:39:09:12:e8:d3 mac-auth       Success              LUR-UBT-User                        
    c 1/1/2    10:e7:c6:b8:1c:0b dot1x          Success              COD-MACHINE                         




  • 9.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 09:20 AM

    Regarding: I'm not sure how downloadable roles would work in an environment where every switch uses different VLANs and VLAN's don't span across the environment

    You probably don't want to renumber all your VLANs but, for anyone else wondering this same thing, here's how I do it in my network.  All of my buildings have the same set of VLANs and they all use the same VLAN ID's.  In my environment data is 44, voice is 45, security cameras are 253, etc.  Each building has a unique subnet for each of its VLANs and they're routed at the building level.  From the Clearpass perspective, when a security camera connects I don't need to care which building it's in, I just return the DUR for security cameras which assigns VLAN 253.   Does that make sense?  It took me a while to get used to having dozens of distinct VLANs that had the same ID but once you wrap your head around it it actually works really well.  I especially like doing it with DUR's because changes are super easy to push out.




  • 10.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 09:29 AM

    how large is your environment? Our routing actually happens at the core level (Layer 3 at the core, Layer 2 at the IDF's) so we aren't able to use the same VLAN ID's across every switch. I do understand what you are doing with your subnets though.

    We run 3 of the 8400's, in a bit of a triangle, in 3 separate datacenters. We run 5412 and 6405/10 chassis at the various BDF's and IDF's across campus that home run back to their respective cores (the 8400s). 




  • 11.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 10:47 AM

    We have 22 buildings and all of our building-to-building links are layer 3 only (there are always exceptions...).  If you're doing layer 2 back to the core and routing there then, I agree, my setup wouldn't work but I'm curious what the advantage of that is.  If you have 54xx and 64xx switches in the BDF's then you should have plenty of routing power there (unless you're pushing a TON of traffic through really complicated ACLs).  Most of my BDF's have 6300's and even those are fine (for my loads).

    For me, the biggest advantage to layer 3 between buildings is that I can build redundant links and use OSPF to sort out the loops instead of needing to do some flavor of STP.




  • 12.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 09:31 AM

    I also let our Aruba project manager and engineer know that the CX platform seems to struggle with VLAN names. We're paying for professional services for this project, but we are between sessions where we are trying to get this deployed to a test group of users before Aruba comes back on site to continue to help us push this out. It was their suggestion to use names, which seems to work perfectly in the AOS/5412 switches. CX seems to be a the problem child. He also steered us away from downloadable roles because of some issue he was aware of on the CX's




  • 13.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 10:49 AM

    Did they say what the issues were with DURs?  My network is 90% CX and every client gets a DUR.  I've had plenty of issues with DURs but they're all related to an admin messing things up, not an issue with CX itself.




  • 14.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 11:09 AM

    It had something to do with the a version of clearpass (11 maybe?) or something that had to do with Aruba central managed switches and how they don't work well there.




  • 15.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 08, 2025 11:12 AM

    That makes sense.  We're on CP 6.12 and our switches aren't managed by Central so we wouldn't be affected by any of that.  I have plans to move management to Central in the next few years, though, so I'll add DURs to my list of things to research!




  • 16.  RE: Aruba CX 802.1x Port-Access status "Failed"

    Posted Jan 10, 2025 12:44 PM

    I have a similar environment to yours, with a mix of AOS and CX.  We use DURs and don't define the roles locally.  So what we had to do in ClearPass:

    1. Define our switches with IPs or IP ranges.  Since we have both AOS and CX at some buildings, I use a range for the type of switch we have the most of at that building, and then break out individual IPs for the rest.
    2. Create device groups.  One for CX and one for AOS. 
    3. Then we created individual DUR profiles for each device type for AOS and for CX. 
    4. Then in the service, on the Roles tab we make rules that are based off the MAC Vendor AND the device groups for CX or AOS.
    5. Then on the Enforcement Policy tab, if it has an AOS role it sends the AOS DUR profile.  If it has the CX role it sends the CX DUR profile.
    6. In both profile types we define the VLAN by name so that we can have different VLAN IDs at every building.