<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dot1x authentication with IP Phone and Hub connected behind in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117213#M324861</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the same, it is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since I need to check if the user belongs to some AD group, and I need to check at the same time that the user IP is from specific subnet, then I need to authorize the access to specific VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the idea of Attribute 8 can work on this scenario, then I need to create an authorization profile for each user on the AD group, and this also is not scalable solution for the ISE, and I think this will not work in DHCP environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About the "&lt;SPAN style="font-size: 10pt;"&gt;tunnel-private-group-id&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;", according to the RFC2868, it will be sent on the Access-Request, can I sent the original VLAN of the port before the dot1x authentication with this attribute?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Ahmad.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 13 Jan 2013 18:25:16 GMT</pubDate>
    <dc:creator>Ahmad Murad</dc:creator>
    <dc:date>2013-01-13T18:25:16Z</dc:date>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117205#M324536</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question regarding the following scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I have ISE deployment with x endpoint license, I have the following setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE ------- SW ------- IP Phone ------- Hub ------ 4 Devices connected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to authenticate and profile all 4 devices connected to the Hub, but in the same time, I don't need to authenticate the IP Phone using the ISE since this will consume extra endpoint from the license count, and I need to overcome this scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the configuration point of view, using "authentication host-mode multi-auth" will solve the issue for the devices connected to the Hub, but how I can exclude the IP Phone from the endpoint count from the ISE point of view?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Ahmad.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117205#M324536</guid>
      <dc:creator>Ahmad Murad</dc:creator>
      <dc:date>2019-03-11T02:57:16Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117206#M324538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you talking about the advanced or the base license count ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jan 2013 20:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117206#M324538</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2013-01-12T20:42:42Z</dc:date>
    </item>
    <item>
      <title>Re:Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117207#M324541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will not be able to bypass this scenario since authentication host mode single mode will allow cdp bypass.&lt;BR /&gt;&lt;BR /&gt;With multiauth all devices must authenticate much like you mentioned. You will have to purchase or account for your base license being consumed by your ip phone, you can manually import all the phones mac address and you can use mab to authenticate t&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jan 2013 22:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117207#M324541</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-12T22:11:48Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117208#M324553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm talking about base and advnaced at the same time. I'm talking about endpoint, not what is the function? the end points connected behind a hub may have posture policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Ahmad.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 15:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117208#M324553</guid>
      <dc:creator>Ahmad Murad</dc:creator>
      <dc:date>2013-01-13T15:39:48Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117209#M324579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tarik, with this setup and the command "&lt;SPAN style="font-size: 10pt;"&gt;authentication host-mode multi-auth&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;", all the devices behind the IP Phone will be authenticated, and also the IP phone also must be counted on the license number, even we authenticate it using dot1x or we use MAB for it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Also I can use the MAB for the devices connected to the same hub if I have printer, scanners or any device that does not support dot1x, right ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Ahmad.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 15:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117209#M324579</guid>
      <dc:creator>Ahmad Murad</dc:creator>
      <dc:date>2013-01-13T15:54:26Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117210#M324611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct, but the only issue you run into is being able to place the "data" devices on different vlans. So if a computer plugs in and needs to have guest access, they will be placed on the same vlan as the first device that connects to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some reference material on that scenario. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_2_se/configuration/guide/sw8021x.html#wp1347331"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_2_se/configuration/guide/sw8021x.html#wp1347331&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 16:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117210#M324611</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-13T16:30:39Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117211#M324712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again Tarek, yes it is logical that all the devices behind will be authenticated and authorized to the same VLAN since we are dealing with access-port here from the switch point of view.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question out of the context, can I have a rule to check the subnet of the user and the AD group at the same time, I mean if the user subnet is 10.0.0.0/24 and belongs to AD group "IT" then the authorization will be VLAN25, if he belongs to different subnet (10.0.1.0/24) but the same AD group then the authorization will be VLAN50.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read but not sure if I can use Radius IP framed and Framed subnet will help or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Ahmad.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 17:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117211#M324712</guid>
      <dc:creator>Ahmad Murad</dc:creator>
      <dc:date>2013-01-13T17:49:05Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117212#M324777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This may not be possible due to the fact that dot1x authentication sends the client's mac address in the calling station id attribute. When using web authentication, or vpn authentication would expect this value to be the client's ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The framed ip address is an accounting attribute (based on my knowledge) and usually takes place after authentication. However I know that the tunnel-private-group-id (user or port vlan) is sent in the access-request. Would that help in your scenario?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/12_2t/12_2t11/feature/guide/radattr8.html#wp1023050"&gt;http://www.cisco.com/en/US/docs/ios/12_2t/12_2t11/feature/guide/radattr8.html#wp1023050&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 17:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117212#M324777</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-13T17:53:53Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117213#M324861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the same, it is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since I need to check if the user belongs to some AD group, and I need to check at the same time that the user IP is from specific subnet, then I need to authorize the access to specific VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the idea of Attribute 8 can work on this scenario, then I need to create an authorization profile for each user on the AD group, and this also is not scalable solution for the ISE, and I think this will not work in DHCP environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About the "&lt;SPAN style="font-size: 10pt;"&gt;tunnel-private-group-id&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;", according to the RFC2868, it will be sent on the Access-Request, can I sent the original VLAN of the port before the dot1x authentication with this attribute?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Ahmad.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 18:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117213#M324861</guid>
      <dc:creator>Ahmad Murad</dc:creator>
      <dc:date>2013-01-13T18:25:16Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117214#M324992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the switch sends this in the initial access-request to see which vlan the client is trying to connect to. Keep in mind with ISE you can assign user vlans so in your scenario you can set the default vlan to a dummy vlan (or even guest). From there you can assign the vlan using the radius attributes and also use other scenarios: ie. Network device location (for example Dallas), and AD group (for example IT). Then hand back the result of VLAN 100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The dot1x authentication is tunneled through the radius packet as an AV Pair, you have dot1x which is the L2 transport between switch and client, then you have that encapsulated within a radius packet which uses L3 between switch and radius server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When dot1x is configured this in turn triggers a radius transaction between the switch and radius server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that helps.&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 19:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117214#M324992</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-13T19:44:40Z</dc:date>
    </item>
    <item>
      <title>Dot1x authentication with IP Phone and Hub connected behind</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117215#M325057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tarik for this valuable discussions, appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Ahmad.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 07:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-authentication-with-ip-phone-and-hub-connected-behind/m-p/2117215#M325057</guid>
      <dc:creator>Ahmad Murad</dc:creator>
      <dc:date>2013-01-14T07:15:57Z</dc:date>
    </item>
  </channel>
</rss>

