<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wired 802.1x in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wired-802-1x/m-p/3913034#M457502</link>
    <description>At some point you will want to replace authentication open with authentication closed. In doing so you will want to create some sort of Base ACL for your interface config that then later gets overridden by something like a dacl upon successful authc/authz. Something else to consider is to determine whether or not you want to configure dot1x max-reauth-req to statically configure how many times it re-sends request-identity frames. One quick last thing to consider is to maybe configure an auth fail vlan via the authentication event fail action authorize vlan ## and move hosts into a restricted area upon failure. This all depends on your requirements. Good luck &amp;amp; HTH!</description>
    <pubDate>Fri, 23 Aug 2019 12:52:28 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2019-08-23T12:52:28Z</dc:date>
    <item>
      <title>Wired 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x/m-p/3912934#M457501</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have recently done wired 802.1x implementation and its seem very thing is working fine, but still i would request you kindly suggest what more best can be done in below mentioned script.&lt;/P&gt;&lt;P&gt;ISE :-2.3 patch 2,3,5&lt;/P&gt;&lt;P&gt;L2 SW:- 2960 series&lt;/P&gt;&lt;P&gt;IOS Ver :- 15.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;===================================================================&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;L2 Switch Global level 802.1x commands:-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa group server radius ISE&lt;BR /&gt;server name ISE-ISE&lt;BR /&gt;ip radius source-interface vlan 5&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local enable&lt;BR /&gt;aaa authentication dot1x default group ISE&lt;BR /&gt;aaa authorization network default group ISE&lt;BR /&gt;aaa authorization auth-proxy default group ISE&lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;aaa accounting auth-proxy default start-stop group ISE&lt;BR /&gt;aaa accounting dot1x default start-stop group ISE&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.10.10.71 server-key 7 090D40031B&lt;BR /&gt;server-key 7 0152080E59&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 30 tries 3&lt;BR /&gt;radius-server deadtime 30&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface Vlan5&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-ISE&lt;BR /&gt;address ipv4 10.10.10.71 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 086042440B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;===============================================================================&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;L2 Switch USERS INTERFACE LEVEL 802.1x commands:-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;switchport mode access&lt;BR /&gt;authentication open&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer inactivity server dynamic&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 5&lt;BR /&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;================================================================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Amit&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 09:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x/m-p/3912934#M457501</guid>
      <dc:creator>Amit Kulshrestha</dc:creator>
      <dc:date>2019-08-23T09:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x/m-p/3913034#M457502</link>
      <description>At some point you will want to replace authentication open with authentication closed. In doing so you will want to create some sort of Base ACL for your interface config that then later gets overridden by something like a dacl upon successful authc/authz. Something else to consider is to determine whether or not you want to configure dot1x max-reauth-req to statically configure how many times it re-sends request-identity frames. One quick last thing to consider is to maybe configure an auth fail vlan via the authentication event fail action authorize vlan ## and move hosts into a restricted area upon failure. This all depends on your requirements. Good luck &amp;amp; HTH!</description>
      <pubDate>Fri, 23 Aug 2019 12:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x/m-p/3913034#M457502</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-08-23T12:52:28Z</dc:date>
    </item>
  </channel>
</rss>

