cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3740
Views
0
Helpful
2
Replies

Catalyst 3850 & show run vs show run all - ISE Missing Configuration Found on Device...

bodonogh
Cisco Employee
Cisco Employee

Hi there,

A customer is asking whether the below findings will impact ISE operation.

Their findings are that ISE appears to issue a show run to validate switch requirements, rather than a show run all. The show run doesn't return radius-server vsa send accounting nor radius-server vsa send authentication, while the show run all does

Many thanks,

Brian

As you can see below the missing config is on the switch if I run the show run all command instead of show all command. The ISE use “ show run” command to check for mandatory command.

show run all | inc radius

aaa group server radius ISE-Group

aaa authentication dot1x default group radius

aaa authorization network default group radius

aaa authorization auth-proxy default group ISE-Group group radius

aaa accounting dot1x default start-stop group radius

aaa server radius dynamic-author

mab radius

ip radius source-interface Vlan99

radius-server attribute 77 include-in-acct-req

radius-server attribute 77 include-in-access-req

radius-server attribute 6 on-for-login-auth

radius-server attribute 6 support-multiple

radius-server attribute 8 include-in-access-req

radius-server attribute 25 access-request include

radius-server attribute 11 default direction out

radius-server attribute nas-port format a

radius-server dead-criteria time 30 tries 3

radius-server cache expiry 24 enforce hours

radius-server host 157.190.23.14 auth-port 1812 acct-port 1813 key 7 011205075E18155E711D0F48

radius-server host 157.190.23.19 auth-port 1812 acct-port 1813 key 7 130414110E1F177B7B756972

radius-server transaction max-tries 8

radius-server retransmit 3

radius-server timeout 5

radius-server ipc-limit in 10

radius-server ipc-limit done 10

radius-server vsa send accounting

radius-server vsa send authentication

show run  | inc radius 

aaa group server radius ISE-Group

aaa authentication dot1x default group radius

aaa authorization network default group radius

aaa authorization auth-proxy default group ISE-Group group radius

aaa accounting dot1x default start-stop group radius

aaa server radius dynamic-author

ip radius source-interface Vlan99

radius-server attribute 6 on-for-login-auth

radius-server attribute 6 support-multiple

radius-server attribute 8 include-in-access-req

radius-server attribute 25 access-request include

radius-server dead-criteria time 30 tries 3

radius-server host 157.190.23.14 auth-port 1812 acct-port 1813 key 7 011205075E18155E711D0F48

radius-server host 157.190.23.19 auth-port 1812 acct-port 1813 key 7 130414110E1F177B7B756972

show run all | inc ip device tracking

ip device tracking probe count 3

ip device tracking probe interval 30

ip device tracking probe delay 0

ip device tracking trace-buffer

show run  | inc ip device tracking 

CS-2-C160#

1 Accepted Solution

Accepted Solutions

Aaron Woland
Cisco Employee
Cisco Employee

Are you referring to the "Evaluate Configuration Validator" tool?

It's not actually been updated for the newer IOS/IOS-XE versions.

That tools ability to validate the configuration will actually have no bearing whatsoever on the device's ability to work correctly with ISE as an authentication server / BYOD tool, etc. etc. etc.


It is just an old tool built into ACS/ISE to try and validate configurations and help guide customers through finding mis-configured switches.

-Aaron

View solution in original post

2 Replies 2

Aaron Woland
Cisco Employee
Cisco Employee

Are you referring to the "Evaluate Configuration Validator" tool?

It's not actually been updated for the newer IOS/IOS-XE versions.

That tools ability to validate the configuration will actually have no bearing whatsoever on the device's ability to work correctly with ISE as an authentication server / BYOD tool, etc. etc. etc.


It is just an old tool built into ACS/ISE to try and validate configurations and help guide customers through finding mis-configured switches.

-Aaron

mbuttnerMSI
Level 1
Level 1

The switch config validator is not intelligent but just there to baseline you. Need to read through the lines. Like Aaron said, it does not appear to be updated for the new IOS-XE or C3PL etc..

I have a 1.4 install at the moment with a few hundred 3850s/3750s/4500s.

On IOS-XE the vsa commands do not show in the run and device sensor commands do not as well.

On the IOS generation they do show up.

The tool trips-up if you defined a radius server group ise for example and use those for your AAA commands instead of radius default.

Also noticed that if the switch is requiring ssh of 2048 keys or higher ISE will not be able to log into that switch.