<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Marvin, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-and-restricting-vlan-assignment/m-p/3083439#M25971</link>
    <description>&lt;P&gt;Thanks Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That's what it looks like to me too, so I'm just going to have to remove CoA and say "basic auth only&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your feedback&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;john&lt;/P&gt;</description>
    <pubDate>Thu, 22 Jun 2017 20:49:28 GMT</pubDate>
    <dc:creator>johncaston_2</dc:creator>
    <dc:date>2017-06-22T20:49:28Z</dc:date>
    <item>
      <title>Wired 802.1X and restricting VLAN assignment</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-and-restricting-vlan-assignment/m-p/3083437#M25961</link>
      <description>&lt;P&gt;We have an unusual situation whereby we are supplying LAN as a managed service but will allow clients to control port security via 802.1X&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Although I can get this working fine, we're concerned that there's nothing stopping the client changing the port to our management VLAN - unless we disable CoA completely.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ideally what I'd like to do is just have something to prevent them from selecting VLAN 100.&lt;/P&gt;
&lt;P&gt;I've done some research but haven't been able to find a simple method to do this other than applying an L3 ACL somewhere else on the network&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Switch type that we're using is the 2960X&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any thoughts?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-and-restricting-vlan-assignment/m-p/3083437#M25961</guid>
      <dc:creator>johncaston_2</dc:creator>
      <dc:date>2019-03-11T07:48:09Z</dc:date>
    </item>
    <item>
      <title>AFAIK you cannot restrict CoA</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-and-restricting-vlan-assignment/m-p/3083438#M25962</link>
      <description>&lt;P&gt;AFAIK you cannot restrict CoA that way.&lt;/P&gt;
&lt;P&gt;Once you allow the RADIUS server to initiate changes it has complete control (within the scope of what A-V pairs are supported of course).&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 02:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-and-restricting-vlan-assignment/m-p/3083438#M25962</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-21T02:59:48Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin,</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-and-restricting-vlan-assignment/m-p/3083439#M25971</link>
      <description>&lt;P&gt;Thanks Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That's what it looks like to me too, so I'm just going to have to remove CoA and say "basic auth only&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your feedback&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;john&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 20:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-and-restricting-vlan-assignment/m-p/3083439#M25971</guid>
      <dc:creator>johncaston_2</dc:creator>
      <dc:date>2017-06-22T20:49:28Z</dc:date>
    </item>
  </channel>
</rss>

