<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE support on third party switch doing 802.1x authc on interfac in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-support-on-third-party-switch-doing-802-1x-authc-on/m-p/2237703#M136036</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Cool Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First and foremost, thanks for the replies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The third party LAN switch model mention is 3Com® Baseline Switch 2948-SFP Plus. After reviewing the user manual, it seems like a L2 LAN switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Acutally, my business requirement can be either:&lt;/P&gt;&lt;P&gt;a. optimum, the switch support FlexAuth (open mode, then evolve to low impact mode)&lt;/P&gt;&lt;P&gt;b. due to switch limitation capabilities, as long as it can do 802.1X authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after&amp;nbsp; review the documentation, i still found out some of the configuration&amp;nbsp; that look like unable to configure on the 3COM switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example&lt;/P&gt;&lt;P&gt;a. configure RADIUS setting&lt;/P&gt;&lt;P&gt;ip radius source-interface&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server attribute 25 access-request include&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b. identity setting on switch port, to support FlexAuth&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt;authentication order&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c. policy enforcement&lt;/P&gt;&lt;P&gt;radius-server-vsa send authenticaiton&lt;/P&gt;&lt;P&gt;radius-server-vsa send accounting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d. Change of Authorization (COA), the most crucial&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e. dACL apply to the port after authentication, based on authorization profile. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, to hit the baseline, i guess it can do 802.1X authentication but not with FlexAuth feature. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the C4507, thanks for the info. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;million thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 08 Jun 2013 09:54:51 GMT</pubDate>
    <dc:creator>yong khang NG</dc:creator>
    <dc:date>2013-06-08T09:54:51Z</dc:date>
    <item>
      <title>ISE support on third party switch doing 802.1x authc on interface</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-support-on-third-party-switch-doing-802-1x-authc-on/m-p/2237701#M136019</link>
      <description>&lt;DIV&gt;&lt;P&gt;Hi all, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have few question on how ISE support on third party LAN switch, if the requirement is doing 802.1X based flexauth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer to the diagram i attached; 01 topology.png&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Concern&amp;nbsp; 1: if the 3com switch with 802.1X feature, but still without the full&amp;nbsp; feature to support FlexAuth, policy encforcement, DACL etc. In this kind&amp;nbsp; of situation, will user still able to authenticate (using method&amp;nbsp; PEAP-MSCHAP v2), but authorization just grant with permit any any?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Concern&amp;nbsp; 2: In this case, can i assume i authenticated the 3com switch using&amp;nbsp; MAB? But this will cause endpoint with no 802.1X, am i right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Concern&amp;nbsp; 3: cisco switch C4507-E, loaded with IOS version&amp;nbsp; Cat4500e-UNIVERSALK9-M, version 03.04 and Supervisor Engine&amp;nbsp; :WS-X45-SUP7-E, is this platform is supported in Cisco TrusctSEC? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advice, million thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:31:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-support-on-third-party-switch-doing-802-1x-authc-on/m-p/2237701#M136019</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2019-03-11T03:31:27Z</dc:date>
    </item>
    <item>
      <title>ISE support on third party switch doing 802.1x authc on interfac</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-support-on-third-party-switch-doing-802-1x-authc-on/m-p/2237702#M136022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes users will be able to authenticate. With MAB you can not use peap because it uses PAP as a authentication type and it is used for devices who doesn't understand 802.1x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;looks like it is supported but with few limitation&lt;/P&gt;&lt;P&gt;The following guidelines and limitations apply to&amp;nbsp; configuring Cisco TrustSec SGT and SGACL on Catalyst&amp;nbsp; WS-X45-SUP7-E/SUP7L-E and WS-C4500X-32 switches: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/trustsec/configuration/guide/appb_cat4k.html"&gt;http://www.cisco.com/en/US/docs/switches/lan/trustsec/configuration/guide/appb_cat4k.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 09:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-support-on-third-party-switch-doing-802-1x-authc-on/m-p/2237702#M136022</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-08T09:49:25Z</dc:date>
    </item>
    <item>
      <title>ISE support on third party switch doing 802.1x authc on interfac</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-support-on-third-party-switch-doing-802-1x-authc-on/m-p/2237703#M136036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Cool Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First and foremost, thanks for the replies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The third party LAN switch model mention is 3Com® Baseline Switch 2948-SFP Plus. After reviewing the user manual, it seems like a L2 LAN switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Acutally, my business requirement can be either:&lt;/P&gt;&lt;P&gt;a. optimum, the switch support FlexAuth (open mode, then evolve to low impact mode)&lt;/P&gt;&lt;P&gt;b. due to switch limitation capabilities, as long as it can do 802.1X authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after&amp;nbsp; review the documentation, i still found out some of the configuration&amp;nbsp; that look like unable to configure on the 3COM switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example&lt;/P&gt;&lt;P&gt;a. configure RADIUS setting&lt;/P&gt;&lt;P&gt;ip radius source-interface&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server attribute 25 access-request include&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b. identity setting on switch port, to support FlexAuth&lt;/P&gt;&lt;P&gt;mab&lt;/P&gt;&lt;P&gt;authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt;authentication order&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c. policy enforcement&lt;/P&gt;&lt;P&gt;radius-server-vsa send authenticaiton&lt;/P&gt;&lt;P&gt;radius-server-vsa send accounting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d. Change of Authorization (COA), the most crucial&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e. dACL apply to the port after authentication, based on authorization profile. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, to hit the baseline, i guess it can do 802.1X authentication but not with FlexAuth feature. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the C4507, thanks for the info. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;million thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 09:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-support-on-third-party-switch-doing-802-1x-authc-on/m-p/2237703#M136036</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2013-06-08T09:54:51Z</dc:date>
    </item>
  </channel>
</rss>

