<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inaccesible Authentication Bypass Feature Wrong Behaviour -  in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/inaccesible-authentication-bypass-feature-wrong-behaviour/m-p/544950#M427561</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing I see that's missing is part of the radius-server definition:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should look soemthing like:&lt;/P&gt;&lt;P&gt;radius-server host 10.0.1.20 auth-port 1812 acct-port 1813 [username blah key blah]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;B/c you only have one RADIUS server defined, you need this test option test if the radius-server deadtime is not configured or not operational, b/c the dead-time is zero with only one server defined. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;But the test option above should send a probe request to RADIUS before blindly considering it alive again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;End result, you SHOULD see something like this based on the rest of your config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch#sho dot1x int f0/5 details&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;Dot1x Authenticator Client List&lt;/P&gt;&lt;P&gt;-------------------------------&lt;/P&gt;&lt;P&gt;Supplicant                = blah.blah.blah&lt;/P&gt;&lt;P&gt;        Auth SM State     = AUTHENTICATED&lt;/P&gt;&lt;P&gt;        Auth BEND SM Stat = IDLE&lt;/P&gt;&lt;P&gt;Port Status               = AUTHORIZED&lt;/P&gt;&lt;P&gt;Authentication Method     = Dot1x&lt;/P&gt;&lt;P&gt;Authorized By             = Critical-Auth&lt;/P&gt;&lt;P&gt;          &lt;/P&gt;&lt;P&gt;Operational HostMode      = MULTI_HOST&lt;/P&gt;&lt;P&gt;Vlan Policy               = 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Mar 2006 17:49:53 GMT</pubDate>
    <dc:creator>jafrazie</dc:creator>
    <dc:date>2006-03-28T17:49:53Z</dc:date>
    <item>
      <title>Inaccesible Authentication Bypass Feature Wrong Behaviour - CAT2960</title>
      <link>https://community.cisco.com/t5/network-access-control/inaccesible-authentication-bypass-feature-wrong-behaviour/m-p/544948#M427557</link>
      <description>&lt;P&gt;I´m doing some tests with the new 802.1x authentication feaures in the CAT2960 switch and IOS firmware file 'c2960-lanbase-mz.122-25.SEE.bin'. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In particular, I´ve configured the 'Inaccesible Authentication Bypass' feature. What is wrong with it is that when the RADIUS server is not available I´m not redirected to the configured critical VLAN but to the default access VLAN configured in the port. I´ve checked out whether there´s some bug related but unsuccessfully. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuraction that I have is (summarized): &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius none&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius none &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;dot1x critical recovery delay 2000&lt;/P&gt;&lt;P&gt;dot1x critical eapol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/5&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; dot1x critical&lt;/P&gt;&lt;P&gt; dot1x critical recovery action reinitialize&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x port-control auto&lt;/P&gt;&lt;P&gt; dot1x timeout reauth-period 60&lt;/P&gt;&lt;P&gt; dot1x reauthentication&lt;/P&gt;&lt;P&gt; dot1x guest-vlan 5&lt;/P&gt;&lt;P&gt; dot1x auth-fail vlan 3&lt;/P&gt;&lt;P&gt; dot1x auth-fail max-attempts 2&lt;/P&gt;&lt;P&gt; dot1x critical vlan 6&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server dead-criteria time 30 tries 20&lt;/P&gt;&lt;P&gt;radius-server host 10.0.1.20 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;radius-server source-ports 1645-1646&lt;/P&gt;&lt;P&gt;radius-server key xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/inaccesible-authentication-bypass-feature-wrong-behaviour/m-p/544948#M427557</guid>
      <dc:creator>ramiro_ortiz</dc:creator>
      <dc:date>2019-03-10T21:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Inaccesible Authentication Bypass Feature Wrong Behaviour -</title>
      <link>https://community.cisco.com/t5/network-access-control/inaccesible-authentication-bypass-feature-wrong-behaviour/m-p/544949#M427559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think based on the command "aaa authentication dot1x default group radius none " in your configuration,  if the radius server is unavailable, you are not undergone into any authentication check. So, all are permitted without any authentication or authorization check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you recheck this command to suit your requirement?.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2006 15:14:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/inaccesible-authentication-bypass-feature-wrong-behaviour/m-p/544949#M427559</guid>
      <dc:creator>thomas.chen</dc:creator>
      <dc:date>2006-03-27T15:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inaccesible Authentication Bypass Feature Wrong Behaviour -</title>
      <link>https://community.cisco.com/t5/network-access-control/inaccesible-authentication-bypass-feature-wrong-behaviour/m-p/544950#M427561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing I see that's missing is part of the radius-server definition:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should look soemthing like:&lt;/P&gt;&lt;P&gt;radius-server host 10.0.1.20 auth-port 1812 acct-port 1813 [username blah key blah]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;B/c you only have one RADIUS server defined, you need this test option test if the radius-server deadtime is not configured or not operational, b/c the dead-time is zero with only one server defined. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;But the test option above should send a probe request to RADIUS before blindly considering it alive again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;End result, you SHOULD see something like this based on the rest of your config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch#sho dot1x int f0/5 details&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;Dot1x Authenticator Client List&lt;/P&gt;&lt;P&gt;-------------------------------&lt;/P&gt;&lt;P&gt;Supplicant                = blah.blah.blah&lt;/P&gt;&lt;P&gt;        Auth SM State     = AUTHENTICATED&lt;/P&gt;&lt;P&gt;        Auth BEND SM Stat = IDLE&lt;/P&gt;&lt;P&gt;Port Status               = AUTHORIZED&lt;/P&gt;&lt;P&gt;Authentication Method     = Dot1x&lt;/P&gt;&lt;P&gt;Authorized By             = Critical-Auth&lt;/P&gt;&lt;P&gt;          &lt;/P&gt;&lt;P&gt;Operational HostMode      = MULTI_HOST&lt;/P&gt;&lt;P&gt;Vlan Policy               = 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2006 17:49:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/inaccesible-authentication-bypass-feature-wrong-behaviour/m-p/544950#M427561</guid>
      <dc:creator>jafrazie</dc:creator>
      <dc:date>2006-03-28T17:49:53Z</dc:date>
    </item>
  </channel>
</rss>

