<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic dot1x with authentication open in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-with-authentication-open/m-p/1363136#M332560</link>
    <description>&lt;P&gt;I am building a test setup with open authentication and i am trying to get the theory right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First the scenario for which we are going to use dot1x with open authentication:&lt;/P&gt;&lt;P&gt;We want to deploy dot1x throughout our network, which includes a number of users which logon to a domain.&lt;/P&gt;&lt;P&gt;With open authentication I want to allow AD/DNS/DHCP before dot1x authentication and then use dot1x (PEAP ms-chapv2) to authenticate the user before allowing normal traffic to proceed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct me if i'm wrong but from what i gathered from several documents it should work like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) The switchport to which the user connects is setup for "authentication open" and has a PRE-AUTH ACL inbound configured on it which contains all the holes it needs for AD/DNS/DHCP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) The User then authenticates through his logon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) The user identity is used to authenticate the switchport as well and a ACL is downloaded from our MS-IAS which allows for normall traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the above theory correct or am i missing a crucial bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem i currently have is that the ACL is never downloaded from our MS-IAS, we are running 4506's with 12.2(50)SG2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The policy i tested returns the folowing attributes:&lt;/P&gt;&lt;P&gt;Cisco-AV-Pair: ip:inacl#1=permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;port config used is:&lt;/P&gt;&lt;P&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication open&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;ip access-group &amp;lt;acl-name&amp;gt; in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global config contains:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and of course i have defined my radius servers in my config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any ideas or pointers where to look?&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 23:56:34 GMT</pubDate>
    <dc:creator>drienties</dc:creator>
    <dc:date>2019-03-10T23:56:34Z</dc:date>
    <item>
      <title>dot1x with authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-with-authentication-open/m-p/1363136#M332560</link>
      <description>&lt;P&gt;I am building a test setup with open authentication and i am trying to get the theory right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First the scenario for which we are going to use dot1x with open authentication:&lt;/P&gt;&lt;P&gt;We want to deploy dot1x throughout our network, which includes a number of users which logon to a domain.&lt;/P&gt;&lt;P&gt;With open authentication I want to allow AD/DNS/DHCP before dot1x authentication and then use dot1x (PEAP ms-chapv2) to authenticate the user before allowing normal traffic to proceed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct me if i'm wrong but from what i gathered from several documents it should work like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) The switchport to which the user connects is setup for "authentication open" and has a PRE-AUTH ACL inbound configured on it which contains all the holes it needs for AD/DNS/DHCP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) The User then authenticates through his logon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) The user identity is used to authenticate the switchport as well and a ACL is downloaded from our MS-IAS which allows for normall traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the above theory correct or am i missing a crucial bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem i currently have is that the ACL is never downloaded from our MS-IAS, we are running 4506's with 12.2(50)SG2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The policy i tested returns the folowing attributes:&lt;/P&gt;&lt;P&gt;Cisco-AV-Pair: ip:inacl#1=permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;port config used is:&lt;/P&gt;&lt;P&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication open&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;ip access-group &amp;lt;acl-name&amp;gt; in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global config contains:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and of course i have defined my radius servers in my config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any ideas or pointers where to look?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-with-authentication-open/m-p/1363136#M332560</guid>
      <dc:creator>drienties</dc:creator>
      <dc:date>2019-03-10T23:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x with authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-with-authentication-open/m-p/1363137#M332635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Found a problem in my setup, Downloadable ACL's are only supported by Cisco ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as of IOS 12.2(52)SG filter-id and per-user acl's are available, which basicly do the exact same thing but support 3rd party aaa servers like MS-IAS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2010 11:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-with-authentication-open/m-p/1363137#M332635</guid>
      <dc:creator>drienties</dc:creator>
      <dc:date>2010-02-22T11:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x with authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-with-authentication-open/m-p/1363138#M332679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know if you always need an ACL, even if you don't want to filter anything with the open authentication?&lt;/P&gt;&lt;P&gt;I've configured it on a port, and after the failed authentication, the computer still access everything although it's marked as 'auth failed' :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Normale Tabelle";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US"&gt;C3560-NAC-043#sh authentication sessions&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US"&gt;Interface&amp;nbsp; MAC Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; Domain&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US"&gt;Fa0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 001a.e80c.1e70&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VOICE&amp;nbsp;&amp;nbsp;&amp;nbsp; Authz Success&amp;nbsp; AC10FA2B0000005010BD2E9C&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US"&gt;Fa0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 001e.ec16.0ea0&amp;nbsp; N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DATA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authz Failed&amp;nbsp;&amp;nbsp; AC10FA2B0000005110BD35D2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Global config :&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius HBM_NAC_Radius&lt;BR /&gt; server 172.16.250.123 auth-port 1812 acct-port 1813&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius HBM_Login_Radius&lt;BR /&gt; server 172.16.249.239 auth-port 1812 acct-port 1813&lt;BR /&gt; server 172.18.20.215 auth-port 1812 acct-port 1813&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group HBM_Login_Radius local&lt;BR /&gt;aaa authentication dot1x default group HBM_NAC_Radius&lt;BR /&gt;aaa authorization exec default group HBM_Login_Radius local &lt;BR /&gt;aaa authorization network default group HBM_NAC_Radius &lt;BR /&gt;aaa accounting dot1x default start-stop group HBM_NAC_Radius&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;port config :&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface FastEthernet0/1&lt;BR /&gt; switchport access vlan 190&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan 290&lt;BR /&gt; priority-queue out &lt;BR /&gt; authentication event server dead action reinitialize vlan 190&lt;BR /&gt; authentication event server alive action reinitialize &lt;BR /&gt; authentication host-mode multi-auth&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication open&lt;BR /&gt; authentication timer reauthenticate 10&lt;BR /&gt; mab&lt;BR /&gt; snmp trap mac-notification change added&lt;BR /&gt; snmp trap mac-notification change removed&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; service-policy input QoS-Marker&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Thanks and regards&lt;/P&gt;&lt;P class="MsoNormal"&gt;Rishi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 12:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-with-authentication-open/m-p/1363138#M332679</guid>
      <dc:creator>rishi.sumbal</dc:creator>
      <dc:date>2010-06-15T12:26:15Z</dc:date>
    </item>
  </channel>
</rss>

