<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows PC's using MAB instead of dot1x spontaneously in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928859#M456941</link>
    <description>&lt;P&gt;Just a couple notes here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Changing the Dot1x timeout back to 30 seconds should only be a test.&amp;nbsp; We run ours at 7 seconds.&lt;/LI&gt;
&lt;LI&gt;Changing the Dot1x timeout honestly shouldn't matter because even if the switch times out Dot1x and goes to MAB the Windows Supplicant will kick the switch back into Dot1x mode when it comes up and sends out an EAPol Start.&amp;nbsp; The Windows Supplicant (unlike the Mac supplicant) is a initiator and a responder.&amp;nbsp; It will actively try to do 802.1x when the supplicant starts up.&amp;nbsp; If you want to prove that to yourself, stop the Wired AutoConfig servers, get the switch to MAB the device then start the Wired AutoConfig service.&amp;nbsp; The switch should go to Dot1x and authenticate the device.&amp;nbsp; The windows supplicant initiated the Dot1x when the service restarted.&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Mon, 23 Sep 2019 19:00:42 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2019-09-23T19:00:42Z</dc:date>
    <item>
      <title>Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928695#M456935</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having a weird spontaneous issue on some WIndows PC's that are setup for 802.1x.&amp;nbsp; After a complete bootup, ISE logs show that the PC is doing MAB authentication and are failing as expected.&amp;nbsp; If I unplug the network cable and reconnect, then the PC's connect using 802.1x and pass authentication.&amp;nbsp; It happens on occasions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not using group policy at this point so all the configs are applied to the PC directly.&amp;nbsp; We are using computer authentication with Microsoft PEAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I check the switch logs, it does show the attempts are made with dot1x then MAB.&amp;nbsp; However ISE is only seeing the MAB attemtps.&lt;/P&gt;&lt;P&gt;On the ISE side, the policy is set to allow computers that are part of the domain computers security group.&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;switchport access vlan 12&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 8&lt;BR /&gt;ip access-group PORT-ACL-DEFAULT in&lt;BR /&gt;authentication event server dead action authorize&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;Extended IP access list PORT-ACL-DEFAULT&lt;BR /&gt;10 permit udp any eq bootpc any eq bootps&lt;BR /&gt;20 permit udp any any eq domain&lt;BR /&gt;30 permit icmp any any&lt;BR /&gt;40 permit udp any any eq tftp&lt;BR /&gt;50 permit tcp any host 10.11.2.23 eq 8443&lt;BR /&gt;60 deny ip any any&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius local&lt;BR /&gt;aaa authentication enable default enable group radius&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization exec default local group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa authorization auth-proxy default group radius&lt;BR /&gt;aaa accounting auth-proxy default start-stop group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting system default start-stop group radius&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.11.2.23 server-key 7 xxx&lt;BR /&gt;server-key 7 xxx&lt;BR /&gt;aaa session-id common&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;dot1x critical eapol&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius server ISE01&lt;BR /&gt;address ipv4 10.11.2.23 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 xxx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 15:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928695#M456935</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-09-23T15:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928839#M456936</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I answered this in below post. Follow the recommendations and it should&lt;BR /&gt;work.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/intermittent-authentication-failures-on-wired-pc-using-native/td-p/3839705" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/intermittent-authentication-failures-on-wired-pc-using-native/td-p/3839705&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Remember to rate useful post&lt;BR /&gt;</description>
      <pubDate>Mon, 23 Sep 2019 18:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928839#M456936</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-09-23T18:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928841#M456939</link>
      <description>&lt;P&gt;You can try 2 things.&amp;nbsp; First, remove the dot1x timeout tx-period 10 command from the port.&amp;nbsp; That will reset the dot1x timeout back to 30 seconds with 2 retries for a total of 90 seconds.&amp;nbsp; With your command, dot1x fails over to MAB in 30 seconds.&amp;nbsp; It is possible that the PC has some software on it that takes a long time to boot before the network adapter and Wired AutoConfig service can fully start.&amp;nbsp; 99% of the time, a timeout of 10 seconds with 2 retries is perfect, but there are also rare times where that timer needs to be tweaked higher or lower.&lt;/P&gt;&lt;P&gt;The other thing to try is to remove the default port ACL.&amp;nbsp; If you remove both of those and it still isn't working, then I would recommend some dot1x and Radius debugs on the switch to dig a little deeper.&amp;nbsp; I know you said you saw some dot1x attempts, but that could just be the switch requesting the identity of the endpoint but the switch isn't getting a response so it never sends the information to ISE.&amp;nbsp; You could also SPAN the port and capture the packets.&amp;nbsp; See if the PC is responding to the switch's EAP Request-Identity.&lt;/P&gt;&lt;P&gt;Also check the Event Viewer on the PC for any System events related to the network adapter or 802.1x.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 18:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928841#M456939</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-09-23T18:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928859#M456941</link>
      <description>&lt;P&gt;Just a couple notes here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Changing the Dot1x timeout back to 30 seconds should only be a test.&amp;nbsp; We run ours at 7 seconds.&lt;/LI&gt;
&lt;LI&gt;Changing the Dot1x timeout honestly shouldn't matter because even if the switch times out Dot1x and goes to MAB the Windows Supplicant will kick the switch back into Dot1x mode when it comes up and sends out an EAPol Start.&amp;nbsp; The Windows Supplicant (unlike the Mac supplicant) is a initiator and a responder.&amp;nbsp; It will actively try to do 802.1x when the supplicant starts up.&amp;nbsp; If you want to prove that to yourself, stop the Wired AutoConfig servers, get the switch to MAB the device then start the Wired AutoConfig service.&amp;nbsp; The switch should go to Dot1x and authenticate the device.&amp;nbsp; The windows supplicant initiated the Dot1x when the service restarted.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 23 Sep 2019 19:00:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928859#M456941</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-09-23T19:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928860#M456943</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/624773"&gt;@Colby LeMaire&lt;/a&gt;&amp;nbsp;I will test the settings.&amp;nbsp; Just for reference, when you mentioned "&lt;SPAN&gt;a timeout of 10 seconds with &lt;STRONG&gt;2 retries&lt;/STRONG&gt; is perfect", for the retries, are you referring to the Max Authentication Failures in the GPO?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And yes it may be that the PC is not sending an EAP request.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 19:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928860#M456943</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-09-23T19:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928864#M456944</link>
      <description>&lt;P&gt;2 retries is the default on the switchport so if you don't have a command changing the number of retries, then it will be 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 19:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3928864#M456944</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-09-23T19:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3930901#M456945</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ended up changing the Authentication retries in the GPO from 1 to 3.&amp;nbsp; I think this was the fix for the issue.&amp;nbsp; All other settings on the switchport and ISE were left as per my original post.&amp;nbsp; Didn't have to change the timers on the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 15:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/3930901#M456945</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-09-26T15:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/4008182#M456946</link>
      <description>&lt;P&gt;We are having similar issues as well.&lt;/P&gt;&lt;P&gt;we use Windows 10, Dell laptops, Dell WD15 docking station and Avaya IP Phone.&lt;/P&gt;&lt;P&gt;From Wall jack cables goes to Avaya Phone, From Phone to Dock and PC is connected to Dock using USB-C.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue that we are seeing is randomly PC will stop authentication using dot1x (PEAP in our case) and will keep authentication using MAB and ISE will deny the MAB request as expected.&lt;/P&gt;&lt;P&gt;user have tried rebooting the laptops no luck,&lt;/P&gt;&lt;P&gt;we verified the Supplicant on the PC was running while issue was happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have seen lot of post about USB-C docking station my cause problem with dot1x if they are not configure for MAC bypass. will send Dock mac address instead of PC mac address. But this is not the case in our situation we have verified that MAC address that we are seeing on ISE is the actual mac address of the PC not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the workaround we are telling user to go wireless, which works.&lt;/P&gt;&lt;P&gt;If user reboots the Avayaphone it works temporarily, then issue comes back again.&lt;/P&gt;&lt;P&gt;In some cases we had user bypass the phone and they have not seen the issue happen again.&lt;/P&gt;&lt;P&gt;In some cases we had user connect network cable to the PC instead of the docking station and this also seemed to have fix the problem as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this point we are not sure whats causing the Problem Window 10, Avaya Phone or Docking Station.&lt;/P&gt;&lt;P&gt;As always network guy has to prove that nothing is wrong on the Cisco Switch side or Cisco ISE side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;below is the switchport configuration, we use default timers for dot1x, Cisco ISE configured to allow machine if its member of domain user group (PEAP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again this issue is not happening to all the users, its random.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;description USER-VLAN&lt;BR /&gt;switchport access vlan 100&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport nonegotiate&lt;BR /&gt;switchport voice vlan 10&lt;BR /&gt;ip access-group ACL-ALLOW in&lt;BR /&gt;srr-queue bandwidth share 1 30 35 5&lt;BR /&gt;priority-queue out&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action reinitialize vlan 100&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication timer inactivity server&lt;BR /&gt;mab&lt;BR /&gt;mls qos trust dscp&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;auto qos trust dscp&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;service-policy input SWITCHPORT-ACCESS-POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 14:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/4008182#M456946</guid>
      <dc:creator>Nayan.Patel85</dc:creator>
      <dc:date>2020-01-08T14:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/4008212#M456947</link>
      <description>&lt;P&gt;Try adding the "dot1x timeout tx-period 10" command to the port and also changed the order of authentication to do dot1x first (i.e. "authentication order dot1x mab").&amp;nbsp; If that doesn't help, then I would recommend grabbing some packet captures on the PC when the issue is happening to see if the PC is actually receiving the EAPOL frames from the switch.&amp;nbsp; It is possible that the phone or docking station is not passing the frames across.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 15:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/4008212#M456947</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-01-08T15:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/4032309#M456948</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Can you share the ACL for this: ACL-ALLOW in&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2020 14:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/4032309#M456948</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2020-02-19T14:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/5273362#M595553</link>
      <description>&lt;P&gt;Hi Brian,&lt;/P&gt;&lt;P&gt;I know it's an old thread; however, can you please share the GPO configuration?&lt;BR /&gt;&lt;BR /&gt;we are having the same issue, with sleeping machine,&lt;BR /&gt;after returning from sleep stack in MAB.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 07:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/5273362#M595553</guid>
      <dc:creator>oron.yaniv</dc:creator>
      <dc:date>2025-03-20T07:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Windows PC's using MAB instead of dot1x spontaneously</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/5289139#M596263</link>
      <description>&lt;P&gt;&lt;SPAN&gt;How was this achieved in Group Policy? "changing the Authentication retries in the GPO from 1 to 3"&lt;BR /&gt;&lt;BR /&gt;I can only see "Maximum Authenticatoin Failures"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 16:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/m-p/5289139#M596263</guid>
      <dc:creator>rmead</dc:creator>
      <dc:date>2025-05-08T16:53:28Z</dc:date>
    </item>
  </channel>
</rss>

