Silent devices keepalive with 802.1X authentication

Post Reply
Deepmind
Member
Posts: 8
Joined: 13 Jan 2015 10:17

Silent devices keepalive with 802.1X authentication

Post by Deepmind »

Hi all,

We are trying to implement a standard configuration on all interfaces of our switches with 802.1X authentication falling back to MAC authentication. All of our ports are configured with an unused vlan in access, needing authentication to assign the correct vlan via UNP profiles. However, we are facing issues with 802.1X/MAC authentication expiration with silent devices (printers and industrial devices) that do not emit traffic and expire from the authentication / MAC address table.

The situation is the following, taking the example of a printer:
1. The printer boots up, generates traffic requesting an IP via DHCP.
2. The switch authenticates the printer via MAC after falling back from 802.1X.
3. The printer is associated to the correct vlan and can then communicate and be reached from the network.
4. If no further request is made to the printer, the authentication expires and the mac ages out from the table.
5. If a device is trying to reach the printer, as the vlan is no longer assigned to the port, the ARP never reaches the device and the device is not reachable anymore from the network.

To work around that, we are aware of the "unp vlan" command, that we can use either in our UNP template or directly on the port:
unp port-template ###UNP_TEMPLATE_NAME### vlan ###SILENT_VLAN_ID###
unp port ###PORT_ID### vlan ###SILENT_VLAN_ID###

However, this is:
1. Less secure: as traffic is passed in egress to the port, meaning unauthenticated devices can gather information about internal network communications
2. Not scalable: that might work with one or a few vlans, but if silent devices are scattered across numerous vlans, this sends egress traffic of all these vlans on all ports configured with the unp template.

At the moment we have implemented this solution and have developed additional configuration with QoS filtering on the broadcast and multicast traffic to restrict what is being sent on all ports, but we would like to find a more secure and scalable solution.

In Cisco we use the SISF device tracking functionality, which allows the switch to trigger an ARP request to devices that are close to expire from the table, maintaining those devices alive as there is active communication. More information about that functionality can be found here : https://www.cisco.com/c/en/us/td/docs/s ... cking.html

Is anyone here aware of any mechanism that would be close to what we use in Cisco on AOS 8 ? Or other configuration in AOS8 that could be more secure and scalable ?

Thank you for your attention!
silvio
Alcatel Unleashed Certified Guru
Alcatel Unleashed Certified Guru
Posts: 1894
Joined: 01 Jul 2008 10:51
Location: Germany

Re: Silent devices keepalive with 802.1X authentication

Post by silvio »

Hi, this is a very interesting question. I have only one idea - not to open this vlan(s) at the template but only at the ports with printers. But than you don't have the benefit of the mobilty of all your devices. So the best idea is to open a ticket at ALE with your which. Maybe there is a solution for you.
BR Silvio
Deepmind
Member
Posts: 8
Joined: 13 Jan 2015 10:17

Re: Silent devices keepalive with 802.1X authentication

Post by Deepmind »

Hello silvio,

Thank you for your reply ! We have already opened a ticket with Alcatel, without much luck for now, and we are in discussion with our technical contact as well :)

But I wanted to know if anyone out here might have a suggestion or had encountered the same situation and found a workaround for it that would be cleaner :)

If anyone has an idea, we are interested!
Post Reply

Return to “OmniSwitch 6560”