[Day 14] Cisco ISE Mastery Training: Setting Up a Test Switch for Authentication

[Day 14] Cisco ISE Mastery Training: Setting Up a Test Switch for Authentication

Introduction

In Cisco ISE deployments, a Test Switch is your lab’s workhorse. Before rolling NAC (802.1X/MAB) into production, you need a safe environment to test authentication policies, VLAN assignments, and posture checks.
This session walks you through configuring a switch from scratch to talk to ISE, authenticate endpoints, and provide live validation using both CLI commands and ISE GUI logs.

A properly configured test switch is critical for:

  • Verifying policy behavior before production rollout
  • Avoiding downtime on live networks
  • Learning ISE workflows hands-on

Problem Statement

Deploying ISE without pre-testing device configurations can lead to:

  • Authentication loops or endpoint lockouts
  • VLAN misassignments and network outages
  • Misconfigured RADIUS settings that fail silently

Without a dedicated test switch, you risk learning the hard way — directly on production gear.


Solution Overview

Cisco ISE allows you to register a test switch as a network device, apply RADIUS policies, and monitor endpoint authentications in a controlled setup. By integrating a switch in lab mode, you can:

  • Validate 802.1X and MAB
  • Confirm dynamic VLAN assignments
  • Troubleshoot authentication issues before they impact users

Sample Lab Topology

Text Description:

  • VMware/EVE-NG running Cisco ISE (2.7+ recommended)
  • 1x Cisco Catalyst Switch (EVE-NG virtual or physical)
  • 1x Test Endpoint (Laptop/VM with supplicant enabled)
  • Optional: AD server for external authentication
  • Management PC with SSH/HTTPS access to switch and ISE GUI

Traffic Flow:
Test endpoint → Switch Access Port → RADIUS request to ISE → Policy check → VLAN assignment → Access granted/denied

Diagram Description:

  • ISE authenticates/authorizes the admin (optionally via AD), applies roles/command sets, and logs accounting for every admin action
  • Admin PCs SSH to the Test Switch (or WLC) to perform device administration.
  • The Switch/WLC forwards TACACS+ (TCP/49) and RADIUS (UDP/1812/1813) requests to Cisco ISE.

Step-by-Step GUI & CLI Configuration Guide


Step A – Add Switch to ISE (GUI)

  1. Log into ISE GUI.
  2. Navigate: Administration → Network Resources → Network Devices
  3. Click Add.
  4. Fill details:
    • Name: TestSwitch01
    • IP Address: 192.168.10.2
    • Device Type: Switch
  5. Enable RADIUS Authentication Settings.
  6. Enter Shared Secret (match CLI config).
  7. Click Submit.
    [Screenshot: ISE Network Device Add Screen]

Step B – Configure Switch for ISE Integration (CLI)

conf t
! Enable AAA
aaa new-model

! Define RADIUS server
radius server ISE1
 address ipv4 192.168.10.10 auth-port 1812 acct-port 1813
 key MySharedSecret

! AAA Authentication & Authorization
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa accounting update periodic 5
aaa accounting dot1x default start-stop group radius

! Enable 802.1X globally
dot1x system-auth-control

! Configure an access interface
interface FastEthernet0/1
 switchport mode access
 authentication port-control auto
 mab
 dot1x pae authenticator
 spanning-tree portfast

! Set RADIUS as source interface
ip radius source-interface vlan 10
end

! Save config
write memory

Step C – Enable Endpoint Supplicant (Windows example)

  1. Go to Control Panel → Network and Sharing Center.
  2. Click active Ethernet → Properties.
  3. Enable 802.1X under Authentication tab.
  4. Choose PEAP and validate certificate if using EAP-TLS.

Step D – Create ISE Policy Set for Test Switch

  1. Policy → Policy Sets → Add
  2. Name: Lab_Switch_Auth_Test
  3. Condition: Device Type = Switch AND IP = 192.168.10.2
  4. Authentication Policy:
    • 802.1X: Use Internal Users or AD
    • MAB: Internal Endpoints
  5. Authorization Policy:
    • 802.1X: VLAN 20
    • MAB: VLAN 30 (Guest)
      [Screenshot: ISE Policy Set Screen]

Step E – Validation

From Switch CLI:

show authentication sessions interface Fa0/1
show aaa servers
debug radius authentication

From ISE GUI:

  • Go to Operations → RADIUS → Live Logs.
  • Check for green checkmarks for success and VLAN assignment details.

FAQs

Q1: Do I need a physical switch or can I use EVE-NG for this lab?
A: You can use either. Physical Catalyst switches give you realistic port-level behavior, but EVE-NG with virtual IOS (IOU or vIOS) works fine for learning the AAA/RADIUS flow. Just ensure the virtual switch image supports 802.1X and MAB commands.


Q2: Which VLAN should I configure on the test switch?
A: Configure an access VLAN for authenticated devices (e.g., VLAN 20) and optionally a guest VLAN (e.g., VLAN 30) for unauthenticated/MAB endpoints. These VLANs should exist on the switch and be routable to ISE.


Q3: What’s the difference between MAB and 802.1X in testing?
A:

  • 802.1X: Requires a supplicant (like Windows, macOS, or AnyConnect NAM).
  • MAB: Uses MAC address as the credential when no supplicant is present.
    When testing, it’s best to configure both so you can simulate different endpoint scenarios.

Q4: My authentication keeps failing — what’s the first thing I should check?
A:

  1. Verify the shared secret matches between ISE and the switch.
  2. Check RADIUS reachability using show aaa servers.
  3. Look at ISE Live Logs for the failure reason — usually, it’s wrong credentials or missing policy match.

Q5: How do I clear a stuck authentication session on the switch?
A: Use:

clear authentication sessions interface Fa0/1

This forces the port to restart the authentication process.


Q6: Can I run 802.1X without enabling it globally?
A: No — dot1x system-auth-control must be enabled globally before any interface can participate in 802.1X authentication.


Q7: What’s the difference between RADIUS Authentication and Authorization?
A:

  • Authentication: Verifies the user/device identity (e.g., username/password or MAC).
  • Authorization: Decides what access to grant (e.g., VLAN, ACLs, downloadable ACLs) after authentication.

Q8: Can I test downloadable ACLs (dACL) in a lab switch?
A: Yes, as long as the switch IOS supports dACLs. You’ll configure them in the ISE Authorization Profile and see them pushed to the switch during authentication.


Q9: How can I monitor real-time authentication attempts from the switch side?
A: Use:

debug radius authentication
show authentication sessions

And watch ISE’s Operations → RADIUS → Live Logs at the same time to correlate results.


Q10: What’s the minimum configuration I need on the switch for a quick test?
A:

aaa new-model
radius server ISE
 address ipv4 <ISE-IP> auth-port 1812 acct-port 1813
 key <secret>
aaa authentication dot1x default group radius
dot1x system-auth-control
interface Fa0/1
 switchport mode access
 authentication port-control auto
 mab
 dot1x pae authenticator

That’s enough to get basic MAB and 802.1X working for lab validation.


YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Closing Notes

A test switch is your ISE proving ground. Mastering switch-side 802.1X/MAB configuration and ISE policy mapping here ensures a smooth, outage-free deployment later. Validate every change via CLI and ISE Live Logs for confidence before production rollout.


Fast-Track to Cisco ISE Mastery Pro

Take your Cisco ISE skills from lab to expert-level!
I’ve helped thousands of engineers master ISE through my 4-month Instructor-Led CCIE Security Training. This program combines hands-on labs, real-world deployments, and live troubleshooting so you’re ready for enterprise-grade NAC rollouts.

Enroll Now & Future‑Proof Your Career
Emailinfo@networkjourney.com
WhatsApp / Call: +91 97395 21088


Trainer Sagar Dhawan

Hi all,
Good to see you here.
I'm your Trainer for CCIE, CCNP, CCNA, Firewall batches and many more courses coming up!
Stay tuned for latest updates!
Keep me posted over Whatsapp/Email about your experience learning from us.
Thanks for being part of - "Network Journey - A journey towards packet-life!!!"