<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Are you pushing any DACL for in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990806#M24445</link>
    <description>&lt;P&gt;Are you pushing any DACL for the Avaya phones after authorization or is it just Access-Accept and Voice Domain? Can you check the "show authentication session interface &amp;lt;&amp;gt; details" to see if this has been applied correctly? I would also run a "show ip access-list interface &amp;lt;&amp;gt;" post-authorization to confirm that this has taken effect.&lt;/P&gt;
&lt;P&gt;Also, what is your default ACL on the interface? Is it a permit ip any any or does it have specific rules?&lt;/P&gt;
&lt;P&gt;From the PC side, do you see it run through dot1x before falling into MAB? You can run a "debug dot1x all" to confirm this.&lt;/P&gt;
&lt;P&gt;I have deployed a similar setup with Avaya Phones and Windows with Anyconnect NAM (EAP-chaining) and posture. I have not run into this issue before.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Jan 2017 03:16:58 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-01-16T03:16:58Z</dc:date>
    <item>
      <title>Avaya IP Phones block PC from getting authenticated and experienced one-way issue (ISE 2.1)</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990805#M24443</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are currently migrating users from NAC to ISE and experienced an issue with Avaya IP Phones.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The Avaya IP phones is configured to be automatically profiled and allowed in VOICE domain using MAB while the PC gets authenticated by the ISE using 802.1x. On the PC, we use AnyConnect ISE Posture Module to do the posturing and AnyConnect Network Access Manager (NAM) to provide the 802.1x authentication.&lt;/P&gt;
&lt;P&gt;We are authenticating the users against AD and in normal condition when the PC connects to the ISE for the first time, the NAM module would pop a small window for user to input their AD credential information and after that the ISE Posture modue would do the posturing properly.&lt;/P&gt;
&lt;P&gt;We have no problem with the PC behind Cisco IP Phones. However when the PC is behind an Avaya IP Phone, the small pop-up window from NAM wouldn't show up and the PC couldn't get authenticated using 802.1x. The live logs on the ISE showed that the PC is authenticated using MAB and authorized with the default authorization policy (which we configured with explicit deny).&lt;/P&gt;
&lt;P&gt;The Avaya IP Phone itself was&amp;nbsp;authenticated, profiled, and authorized perfectly. However, when we tried to make a call with the phone, we experienced one-way problem. The Avaya phone could send voice and be heard by the user on the other end, but couldn't hear anything as a reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We tried to remove the Avaya phone and connect the PC directly to 802.1x enabled port and the PC was&amp;nbsp;authenticated perfectly. The NAM module popped-up the small window and users were able to input their credential information.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do we need to configure something on the phone? Any help would be very appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;Ozy&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;P.S. Here is our port configuration, we are using C4507R+E as the authenticator&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip access-group &lt;I&gt;acl_default&lt;/I&gt;&amp;nbsp;in&lt;BR /&gt; authentication event fail action next-method&lt;BR /&gt; authentication event server dead action reinitialize vlan&amp;nbsp;&lt;EM&gt;X&lt;/EM&gt;&lt;BR /&gt; authentication event server dead action authorize voice&lt;BR /&gt; authentication host-mode multi-auth&lt;BR /&gt; authentication open&lt;BR /&gt; authentication order dot1x mab&lt;BR /&gt; authentication priority dot1x mab&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; mab&lt;BR /&gt; dot1x pae authenticator&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990805#M24443</guid>
      <dc:creator>ozy.djohan21</dc:creator>
      <dc:date>2019-03-11T07:21:34Z</dc:date>
    </item>
    <item>
      <title>Are you pushing any DACL for</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990806#M24445</link>
      <description>&lt;P&gt;Are you pushing any DACL for the Avaya phones after authorization or is it just Access-Accept and Voice Domain? Can you check the "show authentication session interface &amp;lt;&amp;gt; details" to see if this has been applied correctly? I would also run a "show ip access-list interface &amp;lt;&amp;gt;" post-authorization to confirm that this has taken effect.&lt;/P&gt;
&lt;P&gt;Also, what is your default ACL on the interface? Is it a permit ip any any or does it have specific rules?&lt;/P&gt;
&lt;P&gt;From the PC side, do you see it run through dot1x before falling into MAB? You can run a "debug dot1x all" to confirm this.&lt;/P&gt;
&lt;P&gt;I have deployed a similar setup with Avaya Phones and Windows with Anyconnect NAM (EAP-chaining) and posture. I have not run into this issue before.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jan 2017 03:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990806#M24445</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-16T03:16:58Z</dc:date>
    </item>
    <item>
      <title>Hi Rahul,</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990807#M24447</link>
      <description>&lt;P&gt;Hi Rahul,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes, we are pushing a DACL to the phones to allow traffic for the voice segment. The "show auth session int detail" displayed that the voice got the correct DACL as shown below:&lt;/P&gt;
&lt;P&gt;---------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;sh auth ses int gi7/3 d&lt;BR /&gt; Interface: GigabitEthernet7/3&lt;BR /&gt; MAC Address: XXXX.XXXX.XXX&lt;BR /&gt; IPv6 Address: Unknown&lt;BR /&gt; IPv4 Address: 10.x.x.x //&amp;nbsp;&lt;EM&gt;correct IP address&lt;/EM&gt;&lt;BR /&gt; User-Name: XX-XX-XX-XX-XX-XX // &lt;EM&gt;same as&amp;nbsp;&lt;/EM&gt;&lt;I&gt;MAC address, should be AD cred&lt;/I&gt;&lt;BR /&gt; Status: Authorized&lt;BR /&gt; Domain: DATA&lt;BR /&gt; Oper host mode: multi-auth&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Restart timeout: N/A&lt;BR /&gt; Common Session ID: 0A15180400001C452FD1A200&lt;BR /&gt; Acct Session ID: 0x00017499&lt;BR /&gt; Handle: 0x5F000830&lt;BR /&gt; Current Policy: POLICY_Gi7/3&lt;/P&gt;
&lt;P&gt;Local Policies:&lt;BR /&gt; Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt; Security Policy: Should Secure&lt;BR /&gt; Security Status: Link Unsecure&lt;/P&gt;
&lt;P&gt;Server Policies:&lt;BR /&gt; ACS ACL: xACSACLx-IP-Deny_Default_ACL-584a630d&lt;/P&gt;
&lt;P&gt;Method status list: &lt;BR /&gt; Method State&lt;/P&gt;
&lt;P&gt;dot1x Stopped&lt;BR /&gt;&lt;SPAN&gt;mab Authc Success&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;----------------------------------------&lt;BR /&gt; Interface: GigabitEthernet7/3&lt;BR /&gt; MAC Address: &lt;SPAN&gt;XXXX.XXXX.XXX&lt;/SPAN&gt;&lt;BR /&gt; IPv6 Address: Unknown&lt;BR /&gt; IPv4 Address: 172.x.x.x&lt;BR /&gt; User-Name: &lt;SPAN&gt;XX-XX-XX-XX-XX-XX&lt;/SPAN&gt;&lt;BR /&gt; Status: Unauthorized&lt;BR /&gt; Domain: DATA&lt;BR /&gt; Oper host mode: multi-auth&lt;BR /&gt; Oper control dir: both&lt;BR /&gt; Session timeout: N/A&lt;BR /&gt; Restart timeout: N/A&lt;BR /&gt; Common Session ID: 0A15180400001C462FD1F728&lt;BR /&gt; Acct Session ID: &lt;SPAN&gt;0x0001749A&lt;/SPAN&gt;&lt;BR /&gt; Handle: 0x1C000831&lt;BR /&gt; Current Policy: POLICY_Gi7/3&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Local Policies:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Security Policy: Should Secure&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Security Status: Link Unsecure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Server Policies:&lt;BR /&gt; ACS ACL: xACSACLx-IP-acl_voice_traffic_avaya-583c0100&lt;/P&gt;
&lt;P&gt;Method status list: &lt;BR /&gt; Method State&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;dot1x Stopped&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mab Authc Success&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As you can see above, the dot1x authentication had stopped for the PC and failing to MAB. I can't understand why the dot1x wouldn't run with Avaya connected while it worked like a charm when we connect the PC directly to the dot1x enabled port without Avaya in between.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As for the debug dot1x which you suggest, I couldn't do it because this is a customer's network and permission is difficult to get. I'll give it a try as soon as the permission to debug is granted.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your suggestions,&lt;/P&gt;
&lt;P&gt;Ozy&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2017 03:36:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990807#M24447</guid>
      <dc:creator>ozy.djohan21</dc:creator>
      <dc:date>2017-01-17T03:36:14Z</dc:date>
    </item>
    <item>
      <title>*** UPDATE ***</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990808#M24448</link>
      <description>&lt;P&gt;*** UPDATE ***&lt;/P&gt;
&lt;P&gt;The Avaya phone type which caused the issue is Avaya&amp;nbsp;4622SW IP Telephone. We tried to replace the phone with another type, in this case we use the Avaya 16161-I, and the dot1x authentication for the PC worked.&lt;/P&gt;
&lt;P&gt;Is it possible that particular type of phone (4622SW) is blocking the dot1x? Is there any possible workaround to get the PC authenticated with dot1x while using the 4622SW phone?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2017 03:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990808#M24448</guid>
      <dc:creator>ozy.djohan21</dc:creator>
      <dc:date>2017-01-17T03:41:32Z</dc:date>
    </item>
    <item>
      <title>Avaya IP telephones support</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990809#M24449</link>
      <description>&lt;P&gt;Avaya IP telephones support three 802.1X operational modes. The operational mode can be changed by pressing “mute80219#” (“mute8021x”).&lt;/P&gt;
&lt;P&gt;Pass-thru Mode – Unicast supplicant operation for the IP telephone itself, with PAE multicast pass-through for the attached PC, but without proxy Logoff (default).&lt;/P&gt;
&lt;P&gt;Pass-thru with logoff Mode (p –t w/Logoff) – Unicast supplicant operation for the IP telephone itself, with PAE multicast pass-through and proxy Logoff for the attached PC. When the attached PC is physically disconnected from the IP telephone, the phone will send an EAPOL-Logoff for the attached PC.&lt;/P&gt;
&lt;P&gt;Supplicant Mode – Unicast or multicast supplicant operation for the IP telephone itself, without PAE multicast pass-through or proxy Logoff for the attached PC.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Since most 802.1X clients use the Multicast MAC address for the EAPOL messages, the IP telephone must be configured to the pass-thru or p-t w/Logoff mode to pass-through these Multicast messages. It is recommended to use the p-t w/Logoff mode. When the phone is in the p-t w/Logoff mode, the phone will do proxy logoff for the attached PC when the PC is physically disconnected.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://downloads.avaya.com/css/P8/documents/003896223"&gt;https://downloads.avaya.com/css/P8/documents/003896223&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2017 21:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/2990809#M24449</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2017-01-17T21:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya IP telephones support</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3181909#M24450</link>
      <description>&lt;P&gt;Thanks Peter,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We encountered the same issue, after enabling the "pass-through with proxy logoff" enabled hte EAPOL packets to reach the switch. When machines connected to the Phones were disconnected/logged-off/powered-off, the avaya was able to pass on the messages to Switch and the "show authentication session interface Gx/0/x details" was not showing an active sessions anymore. We enabled value (DOT1X=1) and it worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://downloads.avaya.com/elmodocs2/one-X_Deskphone_Edition/R1.5/output/16_300698_4/admn079.html" target="_blank"&gt;https://downloads.avaya.com/elmodocs2/one-X_Deskphone_Edition/R1.5/output/16_300698_4/admn079.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;*************************&lt;/P&gt;&lt;P&gt;## SET DOT1X 0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*************************&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for your write-up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2017 21:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3181909#M24450</guid>
      <dc:creator>jai_chandra2001</dc:creator>
      <dc:date>2017-09-08T21:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya IP Phones block PC from getting authenticated and experienced one-way issue (ISE 2.1)</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3349716#M24451</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/133334"&gt;@ozy.djohan21&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How did you specify the voice VLAN id on ISE for Avaya phones as in my case i have different VLANs for data and voice. I enabled Voice Domain Permission but my Avaya phone is not getting an IP due to not having the correct voice VLAN pushed to the port. If i configure the voice vlan under the port it works, but&amp;nbsp;I want the VLAN to be pushed from ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have any insights regarding this issue?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 09:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3349716#M24451</guid>
      <dc:creator>Sylvia</dc:creator>
      <dc:date>2018-03-16T09:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya IP Phones block PC from getting authenticated and experienced one-way issue (ISE 2.1)</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3373947#M24452</link>
      <description>&lt;P&gt;That's an easy fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Under the&amp;nbsp;authorization profile that you set, you have to have the Voice Domain Permission checked, and then check the VLAN option. Once you do that you're presented with the option to put in the vlan id or vlan name. you put in the vlan data there. ISE will then push the VLAN id/Name from itself, rather then you having the add it to the port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Auth Profile.jpg" style="width: 722px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/11128i35438EADCA9F4330/image-size/large?v=v2&amp;amp;px=999" role="button" title="Auth Profile.jpg" alt="Auth Profile.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 17:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3373947#M24452</guid>
      <dc:creator>lenwood.spotts</dc:creator>
      <dc:date>2018-04-26T17:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya IP Phones block PC from getting authenticated and experienced one-way issue (ISE 2.1)</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3745523#M24453</link>
      <description>&lt;P&gt;Hi Sylvia,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm sorry I really forgot about this thread to give it an update. No we didn't configure the VLAN from the ISE and use the voice vlan configuration on the interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The root cause of the issue is caused by out of date firmware of the Avaya phones. After we upgrade it the authentication worked successfully for both the phones and the PC.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 06:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3745523#M24453</guid>
      <dc:creator>ozy.djohan21</dc:creator>
      <dc:date>2018-11-13T06:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya IP Phones block PC from getting authenticated and experienced one-way issue (ISE 2.1)</title>
      <link>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3901775#M24454</link>
      <description>&lt;P&gt;What model of phone are you using?&amp;nbsp; I am having the same issue using Avaya 1120e?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 01:35:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/avaya-ip-phones-block-pc-from-getting-authenticated-and/m-p/3901775#M24454</guid>
      <dc:creator>Harvey.Reed</dc:creator>
      <dc:date>2019-08-02T01:35:02Z</dc:date>
    </item>
  </channel>
</rss>

