Got it

802.1x Authentication Fails

Latest reply: Mar 2, 2021 19:04:51 536 6 4 0 0

Hi all,

This case mainly talks about 802.1x Authentication failure.

Problem Description

Device version: S5710-28X-LI  V200R008C00SPC500.

Key configurations:

#

radius-server template radius_huawei

radius-server shared-key cipher %^%#6-tBY5@m)-"u](H4(aJA;XT@2Qyr10vpUR%^%#

radius-server authentication 10.197.233.98 1812 weight 80

radius-server accounting 10.197.233.98 1813 source weight 80

radius-server authorization 10.197.233.98 shared-key cipher %^%#n[Y8KJgb4P1a=zL5iCRY%R,M!G!k~ '%^%#

#

aaa

authentication-scheme auth_scheme

authentication-mode radius

accounting-scheme acco_scheme

accounting-mode radius

accounting realtime 15

domain default

authentication-scheme auth_scheme

accounting-scheme acco_scheme

radius-server radius_huawei

#

interface Vlanif233

ip address 10.197.233.252 255.255.254.0

#

interface GigabitEthernet0/0/1

port link-type access

port default vlan 233

authentication dot1x

#

Handing Process

1. Check the user access information. The user access status is pre-authenticated.

<huawei> display access-user mac-address 286E-D488-C63C

Basic:

User ID: 26

Domain-name: -

User MAC                       : 286e-d488-c63c

User IP address: 10.197.233.2

User vpn-instance: -

User access Interface: GigabitEthernet0/0/8

User vlan event: Pre-authen

QinQVlan/UserVlan: 0/233

User access time               : 2020/12/02 11:38:20

Option82 information: -

User access type: None

Terminal Device Type: Data Terminal


AAA:

User authentication type: No authentication

Current authentication method: -

Current authorization method: Local

Current accounting method: None


2. Check the trace information. It is found that the device receives the EAP Challenge Response packet from the terminal.

[huawei] trace enable

[huawei] trace object mac-address 286e-d488-c63c

[BTRACE][2020/12/03 13:15:11][EAPoL][286e-d488-c63c]:Receive a ARP packet from user.

[BTRACE][2020/12/03 13:15:11][EAPoL][286e-d488-c63c]:User(MAC:) existed in temp user table.

[BTRACE][2020/12/03 13:15:11][EAPoL][286e-d488-c63c]:User(MAC:)  has been online.

[BTRACE][2020/12/03 13:15:21][EAPoL][286e-d488-c63c]:No response of request identity from user.

[BTRACE][2020/12/03 13:15:21][EAPoL][286e-d488-c63c]:Resend a EAPoL request identity packet to user.

[BTRACE][2020/12/03 13:15:21][EAPoL][286e-d488-c63c]:Receive a EAPoL response identity packet from user.

[BTRACE][2020/12/03 13:15:21][EAPoL][286e-d488-c63c]:Send a EAPoL request challenge packet to user.

[BTRACE][2020/12/03 13:15:21][EAPoL][286e-d488-c63c]:Receive a EAPoL response challenge packet from user.

[BTRACE][2020/12/03 13:15:26][EAPoL][286e-d488-c63c]:No response of request challenge from user.

[BTRACE][2020/12/03 13:15:26][EAPoL][286e-d488-c63c]:Resend a EAPoL request challenge packet to user.

[BTRACE][2020/12/03 13:15:26][EAPoL][286e-d488-c63c]:Receive a EAPoL response challenge packet from user.

[BTRACE][2020/12/03 13:15:31][EAPoL][286e-d488-c63c]:No response of request challenge from user.

[BTRACE][2020/12/03 13:15:31][EAPoL][286e-d488-c63c]:Resend a EAPoL request challenge packet to user.

[BTRACE][2020/12/03 13:15:31][EAPoL][286e-d488-c63c]:Receive a EAPoL response challenge packet from user.

[BTRACE][2020/12/03 13:15:32][EAPoL][286e-d488-c63c]:Receive a ARP packet from user.

[BTRACE][2020/12/03 13:15:32][EAPoL][286e-d488-c63c]:User(MAC:) existed in temp user table.

[BTRACE][2020/12/03 13:15:32][EAPoL][286e-d488-c63c]:User(MAC:)  has been online.

[BTRACE][2020/12/03 13:15:36][EAPoL][286e-d488-c63c]:No response of request challenge from user.

[BTRACE][2020/12/03 13:15:36][EAPoL][286e-d488-c63c]:Send EAP-Failure packet to user.


3. It is suspected that the processing of EAP packets is abnormal. In 802.1X authentication, the device exchanges authentication information with the RADIUS server in either of the following modes:

EAP termination: 

The device terminates EAP packets. The device encapsulates client authentication information into standard RADIUS packets, which are then authenticated by the RADIUS server using the Password Authentication Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP). This authentication mode is applicable since the majority of RADIUS servers support PAP and CHAP authentication and server update is unnecessary. However, device processing is complex, and the device supports only the MD5-Challenge EAP authentication method.

EAP relay: 

The device relays EAP packets. The device encapsulates EAP packets in EAP over RADIUS (EAPoR) format and sends the packets to the RADIUS server for authentication. This authentication mode simplifies device processing and supports various EAP authentication methods, such as MD5-Challenge, EAP-TLS, and PEAP. However, the RADIUS server must support the corresponding authentication methods.

Refer to: https://support.huawei.com/hedex/hdx.do?docid=EDOC1100126530&id=EN-US_CONCEPT_0176369118&lang=en


4. When RADIUS authentication is used, the 802.1X packet processing mode must be set to EAP relay. In V200R008, however, the device uses EAP termination CHAP authentication by default. Therefore, the 802.1X packet processing mode must be set to EAP relay globally.

[huawei] dot1x authentication-method eap


After the configuration, the authentication succeeds.

Root Cause

802.1X packets are processed incorrectly.

Solution

When RADIUS authentication is used, set the 802.1X packet processing mode to EAP relay.

[huawei] dot1x authentication-method eap


cool
View more
  • x
  • convention:

Luisjre
Luisjre Created Dec 10, 2020 17:06:59 (0) (0)
yeah  
802.1x Authentication Fails-3622007-1
View more
  • x
  • convention:

Very helpful. Thanks for sharing
View more
  • x
  • convention:

thanks
View more
  • x
  • convention:

802.1x Authentication Fails-3818267-1
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.