<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dot1x authentication using ACS 4.2 and Active Directory in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-using-acs-4-2-and-active-directory/m-p/1495209#M289468</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I found good information on dot1x and the switch configuration but I'&lt;/P&gt;&lt;P&gt;m still not clear on the ACS config or what the options are.&amp;nbsp; I'm trying to test for a mac-address match and then assign vlan membership based on a match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently I have the client failing dot1x auth and being assigned to the guest vlan.&amp;nbsp; Problem is, I dont know how to make them pass authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can anyone describe the user experience when I configure integration with AD... or how that works?&amp;nbsp; Does the user get prompted with credentials or do I need to configure credentials within the clients dot1x settings?&amp;nbsp; Ultimately I want to prevent non-domain(AD) pc's from getting an ip address or otherwise quarrantine them to a guest vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help aon any aspect of this will be appreciated.&amp;nbsp; thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Aug 2010 14:35:58 GMT</pubDate>
    <dc:creator>cchughes</dc:creator>
    <dc:date>2010-08-05T14:35:58Z</dc:date>
    <item>
      <title>Dot1x authentication using ACS 4.2 and Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-using-acs-4-2-and-active-directory/m-p/1495208#M289384</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure Dot1x authentication using ACS 4.2 and Active Directory but am coming up short on how to configure the ACS for this.&amp;nbsp; Can anyone point me to a howto or otherwise assist?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I understand, when using AD I need to turn on MD5, a certificate is not required on the ACS(?) or the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help or pointers would be greatly appreciated.&amp;nbsp; Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-using-acs-4-2-and-active-directory/m-p/1495208#M289384</guid>
      <dc:creator>cchughes</dc:creator>
      <dc:date>2019-03-11T00:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x authentication using ACS 4.2 and Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-using-acs-4-2-and-active-directory/m-p/1495209#M289468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I found good information on dot1x and the switch configuration but I'&lt;/P&gt;&lt;P&gt;m still not clear on the ACS config or what the options are.&amp;nbsp; I'm trying to test for a mac-address match and then assign vlan membership based on a match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently I have the client failing dot1x auth and being assigned to the guest vlan.&amp;nbsp; Problem is, I dont know how to make them pass authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can anyone describe the user experience when I configure integration with AD... or how that works?&amp;nbsp; Does the user get prompted with credentials or do I need to configure credentials within the clients dot1x settings?&amp;nbsp; Ultimately I want to prevent non-domain(AD) pc's from getting an ip address or otherwise quarrantine them to a guest vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help aon any aspect of this will be appreciated.&amp;nbsp; thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 14:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-using-acs-4-2-and-active-directory/m-p/1495209#M289468</guid>
      <dc:creator>cchughes</dc:creator>
      <dc:date>2010-08-05T14:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x authentication using ACS 4.2 and Active Directory</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-using-acs-4-2-and-active-directory/m-p/1495210#M289528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Found the answer.&amp;nbsp; The ACS was configured co&lt;/P&gt;&lt;P&gt;rrect.&amp;nbsp; the solution for the ACS involves&lt;/P&gt;&lt;P&gt;enabling 3 attributes on the ACS:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IETF 64 (Tunnel Type)—Set this to VLAN.&lt;BR /&gt;IETF 65 (Tunnel Medium Type)—Set this to 802&lt;BR /&gt;IETF 81 (Tunnel Private Group ID)—Set this to VLAN ID&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also the requirement to create a user with the username and password set to the mac address of the device(s) to be authenticated.&amp;nbsp; In ACS4.2 you need to set up a group whose authentication method is RADIUS and the attributes mentioned above enabled.&amp;nbsp; Then assign the user you just created to that group.&amp;nbsp; You can use other RADIUS servers that support all of this, mainly Steel Belted RADIUS and Microsoft RADIUS (under IAS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The switch config I used is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius radserv&lt;BR /&gt;server 10.x.x.5 auth-port 1645 acct-port 1646&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group radius none&lt;BR /&gt;aaa authorization network default group radius &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan44&lt;BR /&gt;ip address 10.x.x.7 255.255.255.0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface Vlan666&lt;BR /&gt;ip address 10.x.x.1 255.255.255.0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;radius-server host 10.x.x.5 auth-port 1645 acct-port 1646&lt;BR /&gt;radius-server key xxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This all is correct but there were a few hurdles to make it work.&amp;nbsp; First was to get a supported IOS that wasnt buggy for the 2960 switch.&amp;nbsp; The version I found, surprisingly was not the most current.&amp;nbsp; I ended up using 12.2(44)SE2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The next hurdle was DHCP timeouts.&amp;nbsp; I found that DHCP times out while waiting for dot1x to run.&amp;nbsp; Without tweaking settings dhcp would succeed but only after the timer cycles converged.&amp;nbsp; I corrected this behaviour by setting the dot1x timeout tx-period to 5 seconds.&amp;nbsp; This resulted in the dot1x kicking in before dhcp timed out (15 seconds) which for me is acceptable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once this worked and the machine authenticated its mac address, I was able to also configure a vlan attribute and have the port dynamically assigned to a vlan.&amp;nbsp; Cool stuff but not many folks use dot1x for this so good uick finding too much info on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did find a good doc that pg 13-14 talks about the timeout issue:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/univercd/cc/td/doc/solution/macauthb.pdf"&gt;http://www.cisco.com/univercd/cc/td/doc/solution/macauthb.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps someone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 12:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-using-acs-4-2-and-active-directory/m-p/1495210#M289528</guid>
      <dc:creator>cchughes</dc:creator>
      <dc:date>2010-08-09T12:41:56Z</dc:date>
    </item>
  </channel>
</rss>

