<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE error disable interface in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221722#M111558</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Eng.malak, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The port config provided by you the interface GigabitEthernet1/0/2 is configured for MDA that means an IP phone and a single host behind the IP phone are authenticated independently, even though both the IP phone and host machine are connected to a single switch port on the switch. If more than once device is detected in either domain, a security violation will be triggered. This can be a problem when a phone fails to authenticate properly. If a phone fails authentication, then the switch does not receive the "device-traffic-class=voice" VSA from the radius server and the switch will assume that the failed device was in the data domain. However if there is already a data device behind the phone, there will be now 2 devices in the data domain, and a security violation is triggered.&amp;nbsp; On this port only 2 MAC addresses are allowed. The switch place the client machine in a data vlan and the IP phone in a voice vlan.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure the violation mode. The keywords have these meanings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;authentication violation shutdown | restrict | protect | replace} &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•shutdown-Error disable the port.&lt;/P&gt;&lt;P&gt;•restrict-Generate a syslog error.&lt;/P&gt;&lt;P&gt;•protect-Drop packets from any new device that sends traffic to the port.&lt;/P&gt;&lt;P&gt;•replace-Removes the current session and authenticates with the new host.&lt;/P&gt;&lt;H5&gt;&lt;SPAN style="color: #333333;"&gt;Configuring 802.1x Violation Modes &lt;/SPAN&gt;&lt;/H5&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/sw8021x.html#wp1324086" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/sw8021x.html#wp1324086&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Jul 2013 13:15:17 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2013-07-16T13:15:17Z</dc:date>
    <item>
      <title>ISE error disable interface</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221719#M111412</link>
      <description>&lt;P&gt;&lt;BR /&gt;Dears&lt;BR /&gt;After configuring DOT1x on access ports , some ports show error disabled without enabling the port-security , is their any way to increase the number of MAC addresses allowed on the port ? , is it possible to disable this feature&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221719#M111412</guid>
      <dc:creator>eng.malak</dc:creator>
      <dc:date>2019-03-11T03:39:14Z</dc:date>
    </item>
    <item>
      <title>ISE error disable interface</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221720#M111433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent us the show run commands of interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Pankaj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 07:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221720#M111433</guid>
      <dc:creator>pankaj29in</dc:creator>
      <dc:date>2013-07-16T07:57:55Z</dc:date>
    </item>
    <item>
      <title>ISE error disable interface</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221721#M111495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here you are &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/2&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport voice vlan 91&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server dead action reinitialize vlan 184&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt; authentication host-mode multi-domain&lt;/P&gt;&lt;P&gt; authentication order mab dot1x&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 08:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221721#M111495</guid>
      <dc:creator>eng.malak</dc:creator>
      <dc:date>2013-07-16T08:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE error disable interface</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221722#M111558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Eng.malak, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The port config provided by you the interface GigabitEthernet1/0/2 is configured for MDA that means an IP phone and a single host behind the IP phone are authenticated independently, even though both the IP phone and host machine are connected to a single switch port on the switch. If more than once device is detected in either domain, a security violation will be triggered. This can be a problem when a phone fails to authenticate properly. If a phone fails authentication, then the switch does not receive the "device-traffic-class=voice" VSA from the radius server and the switch will assume that the failed device was in the data domain. However if there is already a data device behind the phone, there will be now 2 devices in the data domain, and a security violation is triggered.&amp;nbsp; On this port only 2 MAC addresses are allowed. The switch place the client machine in a data vlan and the IP phone in a voice vlan.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure the violation mode. The keywords have these meanings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;authentication violation shutdown | restrict | protect | replace} &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•shutdown-Error disable the port.&lt;/P&gt;&lt;P&gt;•restrict-Generate a syslog error.&lt;/P&gt;&lt;P&gt;•protect-Drop packets from any new device that sends traffic to the port.&lt;/P&gt;&lt;P&gt;•replace-Removes the current session and authenticates with the new host.&lt;/P&gt;&lt;H5&gt;&lt;SPAN style="color: #333333;"&gt;Configuring 802.1x Violation Modes &lt;/SPAN&gt;&lt;/H5&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/sw8021x.html#wp1324086" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/sw8021x.html#wp1324086&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 13:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-error-disable-interface/m-p/2221722#M111558</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-16T13:15:17Z</dc:date>
    </item>
  </channel>
</rss>

