<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Neno, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851667#M39690</link>
    <description>&lt;P&gt;Hi Neno,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Turns out we needed to do a code upgrade to address some bug issues. Once we did it started to work. I appreciate the help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Jim&lt;/P&gt;</description>
    <pubDate>Thu, 02 Jun 2016 18:28:04 GMT</pubDate>
    <dc:creator>JHaynes4B</dc:creator>
    <dc:date>2016-06-02T18:28:04Z</dc:date>
    <item>
      <title>8021X Security Violation after Radius Access-Accept</title>
      <link>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851665#M39687</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am running a POC to enable DOT1X on our switches. We are using certificates on the laptops&amp;nbsp; and a Cisco ACS server running 5.8.1.&lt;/P&gt;
&lt;P&gt;We get to the point where the ACS server sends an Access-Accept to the switch for the DOT1X request but then the port&amp;nbsp; goes into error disable with an error it found a new mac-address on the port and yet it is the mac-address of the device it just authenticated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here are the relevant portions of the debugs:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;*****************************************************************************************************&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;May 31 09:53:04.619: RADIUS: Received from id 1645/133 10.5.20.230:1645, Access-Accept, len 205&lt;/P&gt;
&lt;P&gt;*****************************************************************************************************&lt;/P&gt;
&lt;P&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp; authenticator 1A C2 2A F6 62 34 59 20 - 3D EA 68 E1 B8 67 53 FB&lt;BR /&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp; User-Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1]&amp;nbsp;&amp;nbsp; 11&amp;nbsp; "UB-HY-002"&lt;BR /&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp; Class&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [25]&amp;nbsp; 34&amp;nbsp; &lt;BR /&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp;&amp;nbsp; 43 41 43 53 3A 53 57 2D 41 43 53 2D 31 31 32 31&amp;nbsp; [CACS:SW-ACS-1121]&lt;BR /&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp;&amp;nbsp; 2F 32 35 33 38 39 37 39 34 32 2F 35 39 32 35 37&amp;nbsp; [/253897942/59257]&lt;BR /&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp; EAP-Message&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [79]&amp;nbsp; 6&amp;nbsp;&amp;nbsp; &lt;BR /&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp;&amp;nbsp; 03 F2 00 04&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [????]&lt;BR /&gt;May 31 09:53:04.619: RADIUS:&amp;nbsp; Message-Authenticato[80]&amp;nbsp; 18&amp;nbsp; &lt;BR /&gt;May 31 09:53:04.628: RADIUS:&amp;nbsp;&amp;nbsp; E9 1B CB 87 77 1A A2 CE E0 30 61 C1 0D 2A E1 F0&amp;nbsp; [????w????0a??*??]&lt;BR /&gt;May 31 09:53:04.628: RADIUS:&amp;nbsp; Vendor, Microsoft&amp;nbsp;&amp;nbsp; [26]&amp;nbsp; 58&amp;nbsp; &lt;BR /&gt;May 31 09:53:04.628: RADIUS:&amp;nbsp;&amp;nbsp; MS-MPPE-Send-Key&amp;nbsp;&amp;nbsp; [16]&amp;nbsp; 52&amp;nbsp; *&lt;BR /&gt;May 31 09:53:04.628: RADIUS:&amp;nbsp; Vendor, Microsoft&amp;nbsp;&amp;nbsp; [26]&amp;nbsp; 58&amp;nbsp; &lt;BR /&gt;May 31 09:53:04.628: RADIUS:&amp;nbsp;&amp;nbsp; MS-MPPE-Recv-Key&amp;nbsp;&amp;nbsp; [17]&amp;nbsp; 52&amp;nbsp; *&lt;BR /&gt;May 31 09:53:04.628: RADIUS(00000002): Received from id 1645/133&lt;BR /&gt;May 31 09:53:04.628: RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes&lt;/P&gt;
&lt;P&gt;*************************************************************************************************************************&lt;/P&gt;
&lt;P&gt;May 31 09:53:04.628: dot1x-packet:Received an EAP Success on the FastEthernet0/24 for mac 5882.a895.510b&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Posting EAP_SUCCESS on Client=1A3DFE8&lt;BR /&gt;May 31 09:53:04.628:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x_auth_bend Fa0: during state auth_bend_response, got event 11(eapSuccess)&lt;BR /&gt;May 31 09:53:04.628: @@@ dot1x_auth_bend Fa0: auth_bend_response -&amp;gt; auth_bend_success&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Fa0/24:5882.a895.510b:auth_bend_response_exit called&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Fa0/24:5882.a895.510b:auth_bend_success_enter called&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Fa0/24:5882.a895.510b:auth_bend_response_success_action called&lt;BR /&gt;May 31 09:53:04.628:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x_auth_bend Fa0: idle during state auth_bend_success&lt;BR /&gt;May 31 09:53:04.628: @@@ dot1x_auth_bend Fa0: auth_bend_success -&amp;gt; auth_bend_idle&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Fa0/24:5882.a895.510b:auth_bend_idle_enter called&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Posting AUTH_SUCCESS on Client=1A3DFE8&lt;BR /&gt;May 31 09:53:04.628:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x_auth Fa0: during state auth_authenticating, got event 12(authSuccess_portValid)&lt;BR /&gt;May 31 09:53:04.628: @@@ dot1x_auth Fa0: auth_authenticating -&amp;gt; auth_authc_result&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Fa0/24:5882.a895.510b:auth_authenticating_exit called&lt;BR /&gt;May 31 09:53:04.628: dot1x-sm:Fa0/24:5882.a895.510b:auth_authc_result_enter called&lt;/P&gt;
&lt;P&gt;**************************************************************************************************************************&lt;/P&gt;
&lt;P&gt;May 31 09:53:04.628: %DOT1X-5-SECURITY_VIOLATION: Security violation on the interface FastEthernet0/24, new MAC address 5882.a895.510b is seen.&lt;BR /&gt;May 31 09:53:04.628: %PM-4-ERR_DISABLE: security-violation error detected on Fa0/24, putting Fa0/24 in err-disable state&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is the dot1x configuration from the switch and the port we are testing are as follows:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;
&lt;P&gt;aaa authorization network default group radius&lt;/P&gt;
&lt;P&gt;aaa accounting dot1x default start-stop group radius&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/24&lt;BR /&gt;&amp;nbsp;switchport access vlan 420&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 321&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification added&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification removed&lt;BR /&gt;&amp;nbsp;snmp trap link-status permit duplicates&lt;BR /&gt;&amp;nbsp;dot1x mac-auth-bypass&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x port-control auto&lt;BR /&gt;&amp;nbsp;dot1x host-mode multi-domain&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 3&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any help would be appreciated. Thanks in advance.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Jim&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851665#M39687</guid>
      <dc:creator>JHaynes4B</dc:creator>
      <dc:date>2019-03-11T06:49:28Z</dc:date>
    </item>
    <item>
      <title>Hi Jim, how many devices are</title>
      <link>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851666#M39689</link>
      <description>&lt;P&gt;Hi Jim, how many devices are being connected on that switch port? Also, are you perhaps using a docking station with the laptop?&lt;/P&gt;
&lt;P&gt;You can try running multi-auth instead of multi-domain and see if that fixes the problem&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;authentication host-mode multi-auth&lt;/PRE&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 18:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851666#M39689</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-06-02T18:08:17Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,</title>
      <link>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851667#M39690</link>
      <description>&lt;P&gt;Hi Neno,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Turns out we needed to do a code upgrade to address some bug issues. Once we did it started to work. I appreciate the help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Jim&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 18:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851667#M39690</guid>
      <dc:creator>JHaynes4B</dc:creator>
      <dc:date>2016-06-02T18:28:04Z</dc:date>
    </item>
    <item>
      <title>Ah good to hear! Any chance</title>
      <link>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851668#M39691</link>
      <description>&lt;P&gt;Ah good to hear! Any chance you can post:&lt;/P&gt;
&lt;P&gt;1. Bug that you were facing (if known)&lt;/P&gt;
&lt;P&gt;2. Version of code that was affected&lt;/P&gt;
&lt;P&gt;3. Version of code that you upgraded to&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 18:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851668#M39691</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-06-02T18:35:10Z</dc:date>
    </item>
    <item>
      <title>Sure,</title>
      <link>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851669#M39692</link>
      <description>&lt;P&gt;Sure,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the bug was unknown and we went from code:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;c2960-lanbasek9-mz.122-35.SE to 12.2(55)SE10&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 18:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851669#M39692</guid>
      <dc:creator>JHaynes4B</dc:creator>
      <dc:date>2016-06-02T18:45:55Z</dc:date>
    </item>
    <item>
      <title>Oh yeah, the (55) train is</title>
      <link>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851670#M39693</link>
      <description>&lt;P&gt;Oh yeah, the (55) train is the way to go if you are not on 15.x. Thank you for taking the time to provide the solution to the problem! (+5 from me)&lt;/P&gt;
&lt;P&gt;Now, since your issue is resolved, you should mark the thread as "answered" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 19:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/8021x-security-violation-after-radius-access-accept/m-p/2851670#M39693</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-06-02T19:16:19Z</dc:date>
    </item>
  </channel>
</rss>

