<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE MAB issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936670#M37942</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am working on site now and I faced aproblem with mac authentication bypass,,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I work on ISE&amp;nbsp;SNS-3415-K9, with version&amp;nbsp;2.0.0.306, in deployment mode Active/standby,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ISE make the profiling through snmp messages and DHCP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;in the most of switches the MAB work properly,&lt;/P&gt;
&lt;P&gt;but unfortunately I faced an issue in some switches.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt; the ISE can't discover the mac of some endpoint, then the MAB fail, even I enter the MAC address of the endpoint manually, the MAB failed.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;kindly check the following configuration on switch&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;/P&gt;
&lt;P&gt;ip device tracking&lt;/P&gt;
&lt;P&gt;epm logging&lt;BR /&gt;logging origin-id ip&lt;/P&gt;
&lt;P&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa authorization auth-proxy default group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;!&lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;aaa accounting system default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author &lt;BR /&gt;client 10.255.255.13 server-key P@ssw0rd&lt;BR /&gt;client 10.255.255.14 server-key P@ssw0rd&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;no radius-server attribute 8 include-in-access-req&lt;BR /&gt;no radius-server attribute 25 access-request include&lt;BR /&gt;no radius-server dead-criteria time 120 tries 10&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;no radius-server key 0&amp;nbsp;P@ssw0rd&lt;BR /&gt;no radius-server host 10.255.255.13 auth-port 1812 acct-port 1813&lt;BR /&gt;no radius-server host 10.255.255.14 auth-port 1812 acct-port 1813&lt;BR /&gt;no radius-server host 10.255.255.13 test username ise_probe idle-time 30&lt;BR /&gt;no radius-server host 10.255.255.14 test username ise_probe idle-time 30&lt;/P&gt;
&lt;P&gt;no radius-server vsa send accounting&lt;BR /&gt;no radius-server vsa send authentication&lt;/P&gt;
&lt;P&gt;no ip radius source-interface vlan300&lt;/P&gt;
&lt;P&gt;no dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;no logging host 10.255.255.13 transport udp port 20514&lt;BR /&gt;logging host 10.255.255.14 transport udp port 20514&lt;/P&gt;
&lt;P&gt;snmp-server host 10.255.255.14 version 2c&amp;nbsp;P@ssw0rd&lt;BR /&gt;snmp-server host 10.255.255.13 version 2c&amp;nbsp;P@ssw0rd&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;switchport&lt;BR /&gt; switchport mode access&lt;BR /&gt; authentication host-mode multi-host&lt;BR /&gt; authentication order mab&lt;BR /&gt; authentication priority mab&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; mab&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Also, when I open the radius log file, a failed authentication message appear even I insert the MAC manually.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Please note the ise probe in the username field&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/STRONG&gt;Kindly check the attached screenshots&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 07:09:01 GMT</pubDate>
    <dc:creator>amrelquasaby</dc:creator>
    <dc:date>2019-03-11T07:09:01Z</dc:date>
    <item>
      <title>ISE MAB issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936670#M37942</link>
      <description>ISE MAB failure cause of missing of MAC</description>
      <pubDate>Mon, 11 Mar 2019 07:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936670#M37942</guid>
      <dc:creator>amrelquasaby</dc:creator>
      <dc:date>2019-03-11T07:09:01Z</dc:date>
    </item>
    <item>
      <title>where does all those "no"</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936671#M37945</link>
      <description>&lt;P&gt;where does all those "no" statements come from?????&lt;/P&gt;
&lt;P&gt;no radius-server attribute 8 include-in-access-req&lt;BR /&gt;no radius-server attribute 25 access-request include&lt;BR /&gt;no radius-server dead-criteria time 120 tries 10&lt;/P&gt;
&lt;P&gt;no radius-server key 0&amp;nbsp;P@ssw0rd&lt;BR /&gt;no radius-server host 10.255.255.13 auth-port 1812 acct-port 1813&lt;BR /&gt;no radius-server host 10.255.255.14 auth-port 1812 acct-port 1813&lt;BR /&gt;no radius-server host 10.255.255.13 test username ise_probe idle-time 30&lt;BR /&gt;no radius-server host 10.255.255.14 test username ise_probe idle-time 30&lt;/P&gt;
&lt;P&gt;no radius-server vsa send accounting&lt;BR /&gt;no radius-server vsa send authentication&lt;/P&gt;
&lt;P&gt;no ip radius source-interface vlan300&lt;/P&gt;
&lt;P&gt;no dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 07:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936671#M37945</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2016-10-14T07:39:11Z</dc:date>
    </item>
    <item>
      <title>@pieterh</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936672#M37951</link>
      <description>&lt;P&gt;@pieterh&lt;/P&gt;
&lt;P&gt;The No before commands is putted by accident.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 16:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936672#M37951</guid>
      <dc:creator>Ahmed</dc:creator>
      <dc:date>2016-10-14T16:25:33Z</dc:date>
    </item>
    <item>
      <title>Hello Amr,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936673#M37957</link>
      <description>&lt;P&gt;Hello Amr,&lt;/P&gt;
&lt;P&gt;it seems the identity source sequence which ISE match on it NOT include Internal Endpoints, please double check the &lt;SPAN&gt;identity source sequence which you used for Authenticating users including Internal&amp;nbsp;Endpoints.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 16:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936673#M37957</guid>
      <dc:creator>Ahmed</dc:creator>
      <dc:date>2016-10-14T16:27:48Z</dc:date>
    </item>
    <item>
      <title>Ahmed,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936674#M37959</link>
      <description>&lt;P&gt;Ahmed,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Kindly be informed that the authentication policy check for Internal Endpoints only, although the logs file check for&amp;nbsp;&lt;SPAN&gt;All_User_ID_Stores, that is not found in the policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Oct 2016 12:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936674#M37959</guid>
      <dc:creator>amrelquasaby</dc:creator>
      <dc:date>2016-10-16T12:34:28Z</dc:date>
    </item>
    <item>
      <title>Ok, that's clear</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936675#M37969</link>
      <description>&lt;P&gt;Ok, that's clear&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;back to the real issue.&lt;/P&gt;
&lt;P&gt;your MAC-address is not recognized as MAC address&lt;/P&gt;
&lt;P&gt;that's why the MAB rule is not activated, but the default rule&lt;/P&gt;
&lt;P&gt;and the default rule checks all users identity stores, not the internal endpoints.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm missing some lines in&amp;nbsp;the switch config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; radius-server attribute 31 mac format ietf&lt;/P&gt;
&lt;P&gt;transforms the xxxx.xxxx.xxxx mac adrress to xx-xx-xx-xx-xx-xx format in the radius packet sent from switch to ISE&lt;/P&gt;
&lt;P&gt;maybe this helps&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;H2 class="topictitle2"&gt;radius-server attribute 31 mac format&lt;/H2&gt;
&lt;SECTION&gt;
&lt;SECTION class="section"&gt;&lt;A name="wp3633954949__GUID-0D673E25-F5B5-4100-B9AF-375EDCD693D1"&gt;&lt;/A&gt;&lt;!-- --&gt;
&lt;P&gt;To configure a nondefault MAC address format in the calling line ID (CLID) of a DHCP accounting packet, use the &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;radius-server&lt;/SPAN&gt; &lt;SPAN class="kwd"&gt;attribute&lt;/SPAN&gt; &lt;SPAN class="kwd"&gt;31&lt;/SPAN&gt; &lt;SPAN class="kwd"&gt;mac&lt;/SPAN&gt; &lt;SPAN class="kwd"&gt;format&lt;/SPAN&gt;&lt;/SPAN&gt; command in global configuration mode. To revert to the default MAC address format, use the &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;no&lt;/SPAN&gt;&lt;/SPAN&gt; form of this command.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;SECTION class="section"&gt;&lt;A name="wp3633954949__GUID-E036BD65-B00F-432D-9C60-30AC2C7C1FE8"&gt;&lt;/A&gt;&lt;!-- --&gt;
&lt;SECTION&gt;
&lt;P&gt;&lt;B&gt;radius-server&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;attribute&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;31&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;mac&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;format&lt;/B&gt;&lt;!--null--&gt; { &lt;B&gt;default &lt;/B&gt; | &lt;B&gt;ietf&lt;/B&gt;&lt;!--null--&gt; [ &lt;B&gt;lower-case &lt;/B&gt;&lt;B&gt; | upper-case&lt;/B&gt; ] &lt;!--null--&gt; &lt;B&gt; | unformatted&lt;/B&gt; }&lt;/P&gt;
&lt;P&gt;&lt;B&gt;no&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;radius-server&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;attribute&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;31&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;mac&lt;/B&gt;&lt;!--null--&gt; &lt;B&gt;format&lt;/B&gt;&lt;!--null--&gt; { &lt;B&gt;default &lt;/B&gt; | &lt;B&gt;ietf&lt;/B&gt;&lt;!--null--&gt; [ &lt;B&gt;lower-case &lt;/B&gt;&lt;B&gt; | upper-case&lt;/B&gt; ] &lt;!--null--&gt; &lt;B&gt; | unformatted&lt;/B&gt; }&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;SECTION class="section"&gt;&lt;A name="wp3633954949__GUID-ACC3F63F-8E60-494B-A7F8-1C5D5D7B3F20"&gt;&lt;/A&gt;&lt;!-- --&gt;
&lt;H2 class="sectiontitle"&gt;Syntax Description&lt;/H2&gt;
&lt;SECTION class="tablenoborder"&gt;&lt;A name="wp3633954949__GUID-478FDC1E-A189-4215-AFA9-F20E3E9367B5"&gt;&lt;/A&gt;&lt;!-- --&gt;
&lt;TABLE width="90%" bordercolor="#808080" border="1" rules="all" frame="border" cellspacing="0" cellpadding="3" summary=""&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" valign="top"&gt;
&lt;P&gt;&lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;default&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" valign="top"&gt;
&lt;P&gt;Sets the MAC address format to the default format (for example, aaaa.bbbb.cccc).&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" valign="top"&gt;
&lt;P&gt;&lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;ietf&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="cellrowborder" valign="top"&gt;
&lt;P&gt;Sets the IETF format for MAC addresses (for example, aa-aa-bb-bb-cc-cc).&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Mon, 17 Oct 2016 14:53:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-mab-issue/m-p/2936675#M37969</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2016-10-17T14:53:18Z</dc:date>
    </item>
  </channel>
</rss>

