<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 802.1x: MAC Authentication Bypass in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-authentication-bypass/m-p/1418117#M347942</link>
    <description>&lt;P&gt;Hey sorry for keeping bugging you guys...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I am configuring this Bypass thing on my 3750 switch. It works fine. It seems the switch will send a access request to the radius server (I use FreeRadius) with the username/password both as the MAC address of the deivce.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However my dilema is that I have 200+ these devices. I can easily create a user group with MAC starting with 00a008 (&lt;SPAN style="color: #0000ff;"&gt;which are the first 3 octets of the MAC addresses&lt;/SPAN&gt;), however it's impossible to include each of the MAC address as the password!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is that whether there is a way to configure the switch use a static string as the password for all the devices using MAC Authentication Bypass?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Difan&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 23:51:16 GMT</pubDate>
    <dc:creator>Difan Zhao</dc:creator>
    <dc:date>2019-03-10T23:51:16Z</dc:date>
    <item>
      <title>802.1x: MAC Authentication Bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-authentication-bypass/m-p/1418117#M347942</link>
      <description>&lt;P&gt;Hey sorry for keeping bugging you guys...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I am configuring this Bypass thing on my 3750 switch. It works fine. It seems the switch will send a access request to the radius server (I use FreeRadius) with the username/password both as the MAC address of the deivce.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However my dilema is that I have 200+ these devices. I can easily create a user group with MAC starting with 00a008 (&lt;SPAN style="color: #0000ff;"&gt;which are the first 3 octets of the MAC addresses&lt;/SPAN&gt;), however it's impossible to include each of the MAC address as the password!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is that whether there is a way to configure the switch use a static string as the password for all the devices using MAC Authentication Bypass?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Difan&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-mac-authentication-bypass/m-p/1418117#M347942</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2019-03-10T23:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x: MAC Authentication Bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-authentication-bypass/m-p/1418118#M348076</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Difan:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I went through your post&amp;nbsp; and understand that you are in a process of configuring 802.1x with MAB in such way so that you use custom password (except Mac address) for all users OR shared password string that should be sent by the switch but this is not possible.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Reason: Switch only send the device Mac address as the username and password. The user name should be the mac address of the client and the password should be same as username and this can't be change on cisco switches.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;I have also attached a document regarding MAB for your better understanding.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This forum is only for you guys...keep bugging us &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;JK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Pls rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Feb 2025 16:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-mac-authentication-bypass/m-p/1418118#M348076</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2025-02-08T16:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x: MAC Authentication Bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-mac-authentication-bypass/m-p/1418119#M348164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hey JK, thank you very much for breaking my hope so straight forward lol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I guess I need to find a way to do it on my radius server then...\&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Dec 2009 20:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-mac-authentication-bypass/m-p/1418119#M348164</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2009-12-19T20:00:23Z</dc:date>
    </item>
  </channel>
</rss>

