802.1x Authentication with Radius Filter-ID
Posted: 19 May 2025 09:57
Hey Guys,
i'm new here and desperate. maybe someone is able to help me out.
I am trying to configure 802.1x authentication with NPS as Radius Server. I'm using the filter-id attribute but its not working well. All clients end up in the alternate vlan. on the long run i want all devices to be authenticated by 802.1x. for now i'm just focusing on one client which should end up in vlan 58.
Hardware: Alcatel-Lucent Enterprise OS6560-P48X4 8.10.102.R01 GA
configuration:
AAA:
aaa radius-server "NPS1" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa radius-server "NPS2" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa radius-server "NPS3" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa radius-server "NPS4" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa profile "AAA_1"
aaa profile "AAA_1" device-authentication 802.1x "NPS1"
aaa profile "AAA_2"
aaa profile "AAA_2" device-authentication 802.1x "NPS2"
aaa profile "AAA_3"
aaa profile "AAA_3" device-authentication 802.1x "NPS3"
aaa profile "AAA_4"
aaa profile "AAA_4" device-authentication 802.1x "NPS4"
aaa device-authentication mac "NPS1" "NPS2" "NPS3" "NPS4"
aaa device-authentication 802.1x "NPS1" "NPS2" "NPS3" "NPS4"
aaa accounting 802.1x "NPS1" "NPS2" "NPS3" "NPS4"
aaa radius nas-ip-address local-ip 'IP-Adresse Switch'
unp profile "Client"
unp profile "Client" map vlan 58
unp profile "Voice"
unp profile "Voice" map vlan 68
unp profile "IoT"
unp profile "IoT" map vlan 62
unp profile "WLAN-AP"
unp profile "WLAN-AP" map vlan 70
unp profile "salto"
unp profile "salto" map vlan 1
unp profile "alternate"
unp profile "alternate" map vlan 71
unp port-template "TEMPL-1" aaa-profile "AAA_1" default-profile "alternate" 802.1x-authentication pass-alternate "alternate"
Port Konfig:
unp port 1/1/25 port-type bridge
unp port 1/1/25 port-template "TEMPL-1"
unp redirect port-bounce enable
This won't work. if i look it up it always says Server unreachable. I double checked the firewall and the shared secret.
show unp user details port 1/1/25
Port: 1/1/25
MAC-Address: 6c:02:e0:06:7a:fb
SAP = -,
Service ID = -,
VNID = -,
VPNID = -,
ISID = -,
VPLSID = -,
Access Timestamp = 05/19/2025 14:23:16,
User Name = host/LLA222.bruecknertt.local,
IP-Address = 192.168.71.13,
Vlan = 71,
Authentication Type = 802.1x,
Authentication Status = Failed,
Authentication Failure Reason = Reason - Server - Unreachable,
Authentication Retry Count = 0,
Authentication Server IP Used = -,
Authentication Server Used = -,
Server Reply-Message = -,
Profile = alternate,
Profile Source = Auth Fail - Default UNP,
Profile From Auth Server = -,
Session Timeout = -,
Classification Profile Rule = -,
Role = -,
Role Source = -,
User Role Rule = -,
Restricted Access = No,
Location Policy Status = -,
Time Policy Status = -,
QMR Status = Passed,
Redirect Url = -,
SIP Call Type = Not in a call,
SIP Media Type = None,
Applications = None,
Encap Value = -,
Rule ID = 1,
Total users : 1
This is what the nps is saying:
Der Netzwerkrichtlinienserver hat einem Benutzer den Zugriff verweigert.
Wenden Sie sich an den Administrator des Netzwerkrichtlinienservers, um weitere Informationen zu erhalten.
Benutzer:
Sicherheits-ID: NULL SID
Kontoname: alcatel
Kontodomäne: -
Vollqualifizierter Kontoname: -
Clientcomputer:
Sicherheits-ID: NULL SID
Kontoname: -
Vollqualifizierter Kontoname: -
ID der Empfangsstation: -
ID der Anrufstation: -
NAS:
NAS-IPv4-Adresse: -
NAS-IPv6-Adresse: -
NAS-ID: -
NAS-Porttyp: -
NAS-Port: -
RADIUS-Client:
Clientanzeigename: Switch1
Client-IP-Adresse: 192.168.x.x
Authentifizierungsdetails:
Name der Verbindungsanforderungsrichtlinie: -
Netzwerkrichtlinienname: -
Authentifizierungsanbieter: -
Authentifizierungsserver: lradius.bruecknertt.local
Authentifizierungstyp: -
EAP-Typ: -
Kontositzungs-ID: -
Protokollierungsergebnisse: Die Kontoinformationen wurden in die lokale Protokolldatei geschrieben.
Ursachencode: 49
Ursache: Die RADIUS-Anforderung stimmte mit keiner konfigurierten Verbindungsanforderungsrichtlinie (Connection Request Policy, CRP) überein.
Sorry for the german language. basically the switch is trying to authenticate itself instead of the client.
anyone who has an idea?
i'm new here and desperate. maybe someone is able to help me out.
I am trying to configure 802.1x authentication with NPS as Radius Server. I'm using the filter-id attribute but its not working well. All clients end up in the alternate vlan. on the long run i want all devices to be authenticated by 802.1x. for now i'm just focusing on one client which should end up in vlan 58.
Hardware: Alcatel-Lucent Enterprise OS6560-P48X4 8.10.102.R01 GA
configuration:
AAA:
aaa radius-server "NPS1" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa radius-server "NPS2" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa radius-server "NPS3" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa radius-server "NPS4" host x.x.x.x hash-key "XXXXXX" retransmit 3 timeout 2 auth-port 1812 acct-port 1813 vrf-name default
aaa profile "AAA_1"
aaa profile "AAA_1" device-authentication 802.1x "NPS1"
aaa profile "AAA_2"
aaa profile "AAA_2" device-authentication 802.1x "NPS2"
aaa profile "AAA_3"
aaa profile "AAA_3" device-authentication 802.1x "NPS3"
aaa profile "AAA_4"
aaa profile "AAA_4" device-authentication 802.1x "NPS4"
aaa device-authentication mac "NPS1" "NPS2" "NPS3" "NPS4"
aaa device-authentication 802.1x "NPS1" "NPS2" "NPS3" "NPS4"
aaa accounting 802.1x "NPS1" "NPS2" "NPS3" "NPS4"
aaa radius nas-ip-address local-ip 'IP-Adresse Switch'
unp profile "Client"
unp profile "Client" map vlan 58
unp profile "Voice"
unp profile "Voice" map vlan 68
unp profile "IoT"
unp profile "IoT" map vlan 62
unp profile "WLAN-AP"
unp profile "WLAN-AP" map vlan 70
unp profile "salto"
unp profile "salto" map vlan 1
unp profile "alternate"
unp profile "alternate" map vlan 71
unp port-template "TEMPL-1" aaa-profile "AAA_1" default-profile "alternate" 802.1x-authentication pass-alternate "alternate"
Port Konfig:
unp port 1/1/25 port-type bridge
unp port 1/1/25 port-template "TEMPL-1"
unp redirect port-bounce enable
This won't work. if i look it up it always says Server unreachable. I double checked the firewall and the shared secret.
show unp user details port 1/1/25
Port: 1/1/25
MAC-Address: 6c:02:e0:06:7a:fb
SAP = -,
Service ID = -,
VNID = -,
VPNID = -,
ISID = -,
VPLSID = -,
Access Timestamp = 05/19/2025 14:23:16,
User Name = host/LLA222.bruecknertt.local,
IP-Address = 192.168.71.13,
Vlan = 71,
Authentication Type = 802.1x,
Authentication Status = Failed,
Authentication Failure Reason = Reason - Server - Unreachable,
Authentication Retry Count = 0,
Authentication Server IP Used = -,
Authentication Server Used = -,
Server Reply-Message = -,
Profile = alternate,
Profile Source = Auth Fail - Default UNP,
Profile From Auth Server = -,
Session Timeout = -,
Classification Profile Rule = -,
Role = -,
Role Source = -,
User Role Rule = -,
Restricted Access = No,
Location Policy Status = -,
Time Policy Status = -,
QMR Status = Passed,
Redirect Url = -,
SIP Call Type = Not in a call,
SIP Media Type = None,
Applications = None,
Encap Value = -,
Rule ID = 1,
Total users : 1
This is what the nps is saying:
Der Netzwerkrichtlinienserver hat einem Benutzer den Zugriff verweigert.
Wenden Sie sich an den Administrator des Netzwerkrichtlinienservers, um weitere Informationen zu erhalten.
Benutzer:
Sicherheits-ID: NULL SID
Kontoname: alcatel
Kontodomäne: -
Vollqualifizierter Kontoname: -
Clientcomputer:
Sicherheits-ID: NULL SID
Kontoname: -
Vollqualifizierter Kontoname: -
ID der Empfangsstation: -
ID der Anrufstation: -
NAS:
NAS-IPv4-Adresse: -
NAS-IPv6-Adresse: -
NAS-ID: -
NAS-Porttyp: -
NAS-Port: -
RADIUS-Client:
Clientanzeigename: Switch1
Client-IP-Adresse: 192.168.x.x
Authentifizierungsdetails:
Name der Verbindungsanforderungsrichtlinie: -
Netzwerkrichtlinienname: -
Authentifizierungsanbieter: -
Authentifizierungsserver: lradius.bruecknertt.local
Authentifizierungstyp: -
EAP-Typ: -
Kontositzungs-ID: -
Protokollierungsergebnisse: Die Kontoinformationen wurden in die lokale Protokolldatei geschrieben.
Ursachencode: 49
Ursache: Die RADIUS-Anforderung stimmte mit keiner konfigurierten Verbindungsanforderungsrichtlinie (Connection Request Policy, CRP) überein.
Sorry for the german language. basically the switch is trying to authenticate itself instead of the client.
anyone who has an idea?