<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wired DOT1X Authentication using List Name /NOT default in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/3712329#M25162</link>
    <description>&lt;P&gt;Community,&lt;/P&gt;
&lt;P&gt;I have a requirement for DOT1X authentication using multiple vrf-aware RADIUS server groups on my Catalyst 3850. 16.3.6 Denali. I have followed the "vfr aware aaa" documentation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x &lt;STRONG&gt;black_list&lt;/STRONG&gt; group black-radius (for VRF black)&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x &lt;STRONG&gt;blue_list&lt;/STRONG&gt; group blue-radius (for VRF blue)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Although the&amp;nbsp;command structure&amp;nbsp;supports placing these commands, it does nothing in authenticating to my two radius environments. I'd like to be able to process black to black and blue to blue but when I enter these, authentication doesn't work at all until I fallback using "default":&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa authentication dot1x&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;default&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;group black-radius.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If anyone is wondering what I am doing - I have a single switch environment&amp;nbsp;hosting two clients, and I have certificates in my endpoints that work with my radius to authenticate the endpoint to an environment. Its just that it can be one or the other but not both.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does anyone know if this is supported? Using these named lists with dot1x?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Any documentation available?&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Mon, 24 Sep 2018 18:15:59 GMT</pubDate>
    <dc:creator>chris-lawrence</dc:creator>
    <dc:date>2018-09-24T18:15:59Z</dc:date>
    <item>
      <title>Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/3712329#M25162</link>
      <description>&lt;P&gt;Community,&lt;/P&gt;
&lt;P&gt;I have a requirement for DOT1X authentication using multiple vrf-aware RADIUS server groups on my Catalyst 3850. 16.3.6 Denali. I have followed the "vfr aware aaa" documentation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x &lt;STRONG&gt;black_list&lt;/STRONG&gt; group black-radius (for VRF black)&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x &lt;STRONG&gt;blue_list&lt;/STRONG&gt; group blue-radius (for VRF blue)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Although the&amp;nbsp;command structure&amp;nbsp;supports placing these commands, it does nothing in authenticating to my two radius environments. I'd like to be able to process black to black and blue to blue but when I enter these, authentication doesn't work at all until I fallback using "default":&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa authentication dot1x&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;default&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;group black-radius.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If anyone is wondering what I am doing - I have a single switch environment&amp;nbsp;hosting two clients, and I have certificates in my endpoints that work with my radius to authenticate the endpoint to an environment. Its just that it can be one or the other but not both.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does anyone know if this is supported? Using these named lists with dot1x?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Any documentation available?&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Sep 2018 18:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/3712329#M25162</guid>
      <dc:creator>chris-lawrence</dc:creator>
      <dc:date>2018-09-24T18:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/3714414#M25170</link>
      <description>Hi Chris,&lt;BR /&gt;&lt;BR /&gt;This sounds more like an possible switch configuration issue that something that would be ISE specific.  I suggest reaching out to the TAC to further troubleshoot and figure out if that switch configuration is possible.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Tim</description>
      <pubDate>Thu, 27 Sep 2018 15:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/3714414#M25170</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-09-27T15:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4714183#M578010</link>
      <description>&lt;P&gt;Hi Chris, did you manage to find a solution for this. I have an exact same requirment as yours and trying to find a solution.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 10:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4714183#M578010</guid>
      <dc:creator>vivekshukla</dc:creator>
      <dc:date>2022-11-01T10:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715148#M578042</link>
      <description>&lt;P&gt;Hi Vivekshukla,&lt;/P&gt;&lt;P&gt;unfortunately this was ACS and not ISE - I do know that ISE is not VRF-aware. I’ve actually not had to complete that design - it fell through. ISE is a whole different beast. Sorry can’t help you.&lt;/P&gt;&lt;P&gt;chris&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 20:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715148#M578042</guid>
      <dc:creator>chris-lawrence</dc:creator>
      <dc:date>2022-11-02T20:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715150#M578043</link>
      <description>&lt;P&gt;Perhaps I can think about this tomorrow and report back to you if I think about something…&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 20:52:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715150#M578043</guid>
      <dc:creator>chris-lawrence</dc:creator>
      <dc:date>2022-11-02T20:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715157#M578045</link>
      <description>&lt;P&gt;Thanks Chris, I did some more digging after posting this and the config I am after is possible via IBNS 2.0 . I will test it during next week and if everything is working will post back on this thread for anyone else with same problem.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 21:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715157#M578045</guid>
      <dc:creator>vivekshukla</dc:creator>
      <dc:date>2022-11-02T21:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715615#M578052</link>
      <description>&lt;P&gt;Are you sure you're using it correctly?&amp;nbsp; I was under the impression the point of two different radius servers was to allow you to use one for dot1x and one for ssh logins, assuming you didn't have a dedicated TACACS+ capable server for login controls.&amp;nbsp; Out of curiosity, I tried this on my lab 9200 series and while it took the command, the logs showed another thing entirely:&lt;BR /&gt;&lt;BR /&gt;Nov 2 17:53:39.628 EDT: %PARSER-5-HIDDEN: Warning!!! ' aaa authentication dot1x blue radius group ISE' is a hidden command. Use of this command is not recommended/supported and will be removed in future.&lt;/P&gt;&lt;P&gt;Do you have any similar warnings in your Denali IOS after you type in your aaa VRF style commands?&lt;/P&gt;&lt;P&gt;This matches up with me being unable to find anything for this EXCEPT in cases where you might want to split authz to a different server than authc.&amp;nbsp; As for why I found the VRF option in the dynamic author and radius servers, that would be for their basic communication routing setups. So that leads me to think the option is not for VRF based authentication.&amp;nbsp; If that were the case, how would you even tie a port to the VRF? It would have to be a way to tie in authorization (after authentication is done), for which I don't see anything.&amp;nbsp; Food for thought.&amp;nbsp; I'll definitely be following this topic. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2022 12:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4715615#M578052</guid>
      <dc:creator>davidgfriedman</dc:creator>
      <dc:date>2022-11-03T12:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4721798#M578275</link>
      <description>&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;My use case was that I was using a common NAD that provides potential access to two different customers. Customer 1 (BLACK) would come in on a VRF'ed zone and the AuthC would be directed to the BLACK-ACS (at this time, we were not using ISE). Likewise on the BLUE VRF'ed zone, that customer would hit the BLUE-ACS. The project fell apart so I didn't have to find a solution but it was an interesting problem that Vivekshuka was looking into. I'm always interested in integrations like this and what solutions I can define.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 13:35:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4721798#M578275</guid>
      <dc:creator>chris-lawrence</dc:creator>
      <dc:date>2022-11-15T13:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: Wired DOT1X Authentication using List Name /NOT default</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4723981#M578354</link>
      <description>&lt;P&gt;I have completed my testing and it is working using IBNS 2.0. With IBNS 2.0 we have option to define seperate radius server for each interface using service policy. Combine it with vrf aware aaa and we have our solution. More information on below link under section&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Differentiated Authentication with IBNS 2.0&lt;/H2&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 16:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-authentication-using-list-name-not-default/m-p/4723981#M578354</guid>
      <dc:creator>vivekshukla</dc:creator>
      <dc:date>2022-11-18T16:30:07Z</dc:date>
    </item>
  </channel>
</rss>

