Configuring Agentless Host Checking with Native Supplicant

The access control for this use case can be achieved through RADIUS CoA and a sample workflow is described below:

1.The native supplicant performs 802.1X authentication and PPS creates a session. The PPS assigns a limited access role since the host check is not performed.

2.The user configures the RADIUS URL-redirection attributes on the Cisco Switch. Using RADIUS URL-Redirection return attributes the Cisco switch redirects any initial HTTP/s traffic to PPS so that Layer 3 authentication is performed along with compliance check. Upon successful Host Check, a different set of radius attributes is pushed using Radius CoA to seamlessly access any resource.

You must configure the following return attributes (supported only on Cisco switches):

Cisco-AVPAIR=url-redirect-acl=REDIRECT_To_PPS

Cisco-AVPAIR=url-redirect=https://<PPS-SIGN-IN-URL>/

Figure shows a sample PPS configuration for URL-redirection on Cisco switch.

3.The user configures the RADIUS CoA attributes. The recommended radius return attribute to perform access control using RADIUS CoA is Filter-ID for wired devices and ACL-name for WLC.

You must configure the following return attributes on PPS:

Filter-Id=PERMIT-ALL.in

CiscoAVPAIR=subscriber:command=reauthenticate

Cisco-AVPAIR=subscriber:reauthenticate-type=last

Figure shows a sample PPS configuration for RADIUS CoA.

4.The agentless L3 authentication is done through web browser and host check is performed. If host check passes the user receives new role (for example, full-access), which provides full access to authorized resources.

- The L2 and L3 connections are merged and the merged session receives full-access role.
- The change of role triggers new RADIUS return attribute policy. The new policy triggers RADIUS CoA and applies new radius attribute, which provides full access to authorized resources.
- VLAN change using CoA is not supported with Cisco Switches. It is recommended to use RADIUS disconnect for VLAN change.
- The RADIUS CoA configuration for various Cisco switch platforms is described below.

Cisco Platform

IOS Version

RADIUS CoA Configuration

3850

16.3

Filter-Id=PERMIT-ALL.in

2960X

15.2

Filter-Id=PERMIT-ALL.in

2960

12.2

Filter-Id=PERMIT-ALL.in

Cisco-AVPAIR=subscriber:command=reauthenticate

Cisco-AVPAIR=subscriber:reauthenticate-type=last