<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 802.1x Authentication and Phones in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811189#M45600</link>
    <description>&lt;P&gt;I have just begun&amp;nbsp;to roll out 802.1x authentication and am finding that while I got authentication for PC's on the data VLAN to work, phones on the VOICE VLAN are not unless I set "authentication host-mode" to "multi-host". &amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have been running un-authenticated for 7 years with phones and PC's both working.&lt;/P&gt;
&lt;P&gt;What I want to do (i.e. what Management has told me to make happen) is have phones connect unauthenticated (accepting CDP to handle correct VLAN assignment) but require PC's to authenticate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suppose the easy question is; is that even possible? If it is, any advice is greatly appreciated. &amp;nbsp;(switch config is below).&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Arch&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;version 12.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname switch&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging monitor emergencies&lt;BR /&gt;enable secret 5 *****&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone cst -6&lt;BR /&gt;clock summer-time cdt recurring&lt;BR /&gt;switch 1 provision ws-c3750g-24ps&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;no ip domain-lookup&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip igmp snooping vlan 41 mrouter interface Gi1/0/27&lt;BR /&gt;ip igmp snooping vlan 41 mrouter interface Gi1/0/28&lt;BR /&gt;!&lt;BR /&gt;mls qos omitted&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;vlan 13&lt;BR /&gt; name data-VLAN&lt;BR /&gt;!&lt;BR /&gt;vlan 857&lt;BR /&gt; name voice-VLAN&lt;BR /&gt;!&lt;BR /&gt;vlan 1611&lt;BR /&gt; name guest-VLAN&lt;BR /&gt;lldp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map match-all AutoQoS-VoIP-RTP-Trust&lt;BR /&gt;match ip dscp ef&lt;BR /&gt;class-map match-all AutoQoS-VoIP-Control-Trust&lt;BR /&gt; match ip dscp cs3 af31&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map AutoQoS-Police-CiscoPhone&lt;BR /&gt; class AutoQoS-VoIP-RTP-Trust&lt;BR /&gt; set dscp ef&lt;BR /&gt; police 320000 8000 exceed-action policed-dscp-transmit&lt;BR /&gt; class AutoQoS-VoIP-Control-Trust&lt;BR /&gt; set dscp cs3&lt;BR /&gt; police 32000 8000 exceed-action policed-dscp-transmit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt; switchport access vlan 13&lt;BR /&gt; switchport mode access&lt;BR /&gt; switchport voice vlan 857&lt;BR /&gt; switchport port-security violation protect&lt;BR /&gt; srr-queue bandwidth share 10 10 60 20&lt;BR /&gt; srr-queue bandwidth shape 10 0 0 0&lt;BR /&gt; queue-set 2&lt;BR /&gt; priority-queue out&lt;BR /&gt; authentication control-direction in&lt;BR /&gt; authentication event no-response action authorize vlan 1611&lt;BR /&gt; authentication host-mode multi-host&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication violation protect&lt;BR /&gt; mls qos trust device cisco-phone&lt;BR /&gt; mls qos trust cos&lt;BR /&gt; auto qos voip cisco-phone&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; service-policy input AutoQoS-Police-CiscoPhone&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/6&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/7&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/9&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/11&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/12&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/13&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/14&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/16&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/17&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/18&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/19&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/20&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/21&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/22&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/23&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/24&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/25&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/26&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/27&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/28&lt;BR /&gt; switchport trunk encapsulation dot1q&lt;BR /&gt; switchport trunk allowed vlan 13,857,1611&lt;BR /&gt; switchport mode trunk&lt;BR /&gt; srr-queue bandwidth share 10 10 60 20&lt;BR /&gt; srr-queue bandwidth shape 10 0 0 0&lt;BR /&gt; queue-set 2&lt;BR /&gt; mls qos trust cos&lt;BR /&gt; auto qos voip trust&lt;BR /&gt;!&lt;BR /&gt;radius-server host 10.1.2.10 auth-port 1645 acct-port 1646&lt;BR /&gt;radius-server key 7 ***&lt;BR /&gt;radius-server vsa send authentication&lt;BR /&gt;end&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 06:26:18 GMT</pubDate>
    <dc:creator>astockton</dc:creator>
    <dc:date>2019-03-11T06:26:18Z</dc:date>
    <item>
      <title>802.1x Authentication and Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811189#M45600</link>
      <description>Catalyst 3750G new configuration for 802.1x authentication does not allow Cisco Phone on Voice VLAN</description>
      <pubDate>Mon, 11 Mar 2019 06:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811189#M45600</guid>
      <dc:creator>astockton</dc:creator>
      <dc:date>2019-03-11T06:26:18Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811190#M45604</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;authentication with PC and Phone needs "&lt;STRONG&gt;authentication host-mode multi-domain&lt;/STRONG&gt;". You con use the MAC-Adress or 802.1X (username &amp;amp; password) for authentication of IP-Phone.&lt;/P&gt;
&lt;P&gt;The authenticatipo profile must send "&lt;STRONG&gt;&lt;SPAN style="font-size: 11.0pt; line-height: 115%; font-family: 'Arial','sans-serif';"&gt;device-traffic-class=voice&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 11.0pt; line-height: 115%; font-family: 'Arial','sans-serif';"&gt;." to the switch. Then PC is in DATA-DOMAIN and Phone in VOICE-Domain.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; line-height: 115%; font-family: 'Arial','sans-serif';"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; line-height: 115%; font-family: 'Arial','sans-serif';"&gt;see attachment:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 10:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811190#M45604</guid>
      <dc:creator>hdussa</dc:creator>
      <dc:date>2016-01-29T10:25:34Z</dc:date>
    </item>
    <item>
      <title>Yes you can do that. When a</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811191#M45608</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Yes you can do that. When a Cisco IP phone is plugged into a port that is configured with a voice VLAN and single-host mode, the phone is silently allowed onto the network by way of a feature known as CDP Bypass. The phone, or any device, that sends the appropriate type-length-value (TLV) messages in a CDP message is allowed access to the voice VLAN. CDP Bypass is a legacy feature that has been deprecated in favor of MDA for &lt;A href="http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/IP_Tele/IP_Telephony_DIG.html#12033"&gt;these reasons.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;~ Jatin&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Jan 2016 15:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811191#M45608</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-01-31T15:10:54Z</dc:date>
    </item>
    <item>
      <title>Jatin and hdussa, </title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811192#M45612</link>
      <description>&lt;P&gt;Jatin and hdussa,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you both for the answers. &amp;nbsp;They both pointed me in the right direction and I was able to make MAB work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Arch&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 19:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/2811192#M45612</guid>
      <dc:creator>astockton</dc:creator>
      <dc:date>2016-02-02T19:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Yes you can do that. When a</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/3191052#M45613</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The CDP Bypass feature is stoneage solution that is only supported on the old platforms like 2960/3750 but not 3750X. Do you know any other options that can be used to authenticate only the PC but not IP-Phone?&lt;/P&gt;&lt;P&gt;Exluding:&lt;/P&gt;&lt;P&gt;MIC&lt;/P&gt;&lt;P&gt;MAB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2017 13:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-and-phones/m-p/3191052#M45613</guid>
      <dc:creator>amin.amor</dc:creator>
      <dc:date>2017-09-28T13:38:33Z</dc:date>
    </item>
  </channel>
</rss>

