*Mar 1 00:48:03.340: %AUTHMGR-5-FAIL: Authorization failed or unapplied for client (0014.e223.ad54) on Interface Fa0/12 AuditSessionID 0DF3D9B40111000D00F12AD4 *Mar 1 00:48:03.349: %DOT1X-5-RESULT_OVERRIDE: Authentication result overridden for client (0014.e223.ad54) on Interface Fa0/12 AuditSessionID 0DF3D9B40111000D00F12AD4 *Mar 1 00:48:04.582: %AUTHMGR-5-SUCCESS: Authorization succeeded for client (0014.e223.ad54) on Interface Fa0/12 AuditSessionID 0DF3D9B40111000D00F12AD4On others:
Jan 01 18:17:06.928: %AUTHMGR-5-FAIL: Authorization failed for client (0014.e223.ad54) on Interface Fa0/12 AuditSessionID 0DF3D9B40111000D00F12AD4 Jan 01 18:17:06.936: %DOT1X-5-RESULT_OVERRIDE: Authentication result overridden for client (0014.e223.ad54) on Interface Fa0/12 AuditSessionID 0DF3D9B40111000D00F12AD4 Jan 01 18:17:07.716: %AUTHMGR-5-SUCCESS: Authorization succeeded for client (0014.e223.ad54) on Interface Fa0/12 AuditSessionID 0DF3D9B40111000D00F12AD4
Switch#show authentication sessions interface f0/12 Interface: FastEthernet0/12 MAC Address: 0014.e223.ad54 IP Address: 10.10.10.10 User-Name: DOMAIN\user01 Status: Authz Failed Domain: DATA Security Policy: Should Secure Security Status: Unsecure Oper host mode: multi-auth Oper control dir: both Authorized By: Authentication Server Vlan Policy: N/A Session timeout: N/A Idle timeout: N/A Common Session ID: 0DF3D9B40111000D00F12AD4 Acct Session ID: 0x0000002D Handle: 0x8C000035 Runnable methods list: Method State dot1x Authc SuccessSo you actually have Authc Success, but Status: Authz Failed And also ACL is not applied, and show ip access-lists interface returns nothing:
Switch#show ip access-lists interface F0/12 Switch#Probable reason is issue with DACL (downloadable access list), web authentication or some other part of authorization profile. You should first check DACL, especially if it is in any way more complicated. Here are examples of DACLs that are fine and how they will be transformed when pushed to the switch:
DACL entry on ISE:
permit tcp any anyon switch will be translated to:
permit tcp host 10.10.10.10 any (15 matches)
DACL entry on ISE:
permit tcp any any eq 22 establishedon switch will be translated to:
permit tcp host 10.10.10.10 any eq 22 established
DACL entry on ISE:
permit tcp any eq 22 any establishedon switch will be translated to:
permit tcp host 10.10.10.10 eq 22 any established
Hi!
ReplyDeletethanks for your post.
I do not have DACL on my ACS and some computers are authorize and others not.
Jun 13 07:48:34: %AUTHMGR-5-FAIL: Authorization failed or unapplied for client ...
Can you help me ?
Regards.
Use
ReplyDeleteswitch(config)#Authorization failed or unapplied for client
If a downloadable ACL is configured for a client on the authentication server, a default port ACL on the connected client switch port must also be configured...
ReplyDeleteHowever, if the switch receives an host access policy from the Cisco Secure ACS but the default ACL is not configured, the authorization failure is declared.