<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dot1x and MAB Order in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882465#M471832</link>
    <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I am authenticating via EAP-TLS in my wired LAN. What will happen if the machine does not have a user certificate in its certificate store, will it failover to MAB?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any dot1x to MAB failover in wireless as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 01 Jul 2019 11:31:54 GMT</pubDate>
    <dc:creator>fatalXerror</dc:creator>
    <dc:date>2019-07-01T11:31:54Z</dc:date>
    <item>
      <title>Dot1x and MAB Order</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882465#M471832</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I am authenticating via EAP-TLS in my wired LAN. What will happen if the machine does not have a user certificate in its certificate store, will it failover to MAB?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any dot1x to MAB failover in wireless as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 11:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882465#M471832</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-07-01T11:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x and MAB Order</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882529#M471834</link>
      <description>If you have flexauth configured via template or statically configured on your interfaces to support mab then if 8021x fails your host would failover to mab. The physical medium should not matter (wired or wireless). Check out: &lt;A href="http://www.labminutes.com/video/sec" target="_blank"&gt;http://www.labminutes.com/video/sec&lt;/A&gt; for some good video tutorials and &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/sec/b_166_sec_9300_cg/configuring_ieee_802_1x_port_based_authentication.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/sec/b_166_sec_9300_cg/configuring_ieee_802_1x_port_based_authentication.html&lt;/A&gt;&lt;BR /&gt;Good luck &amp;amp; HTH!</description>
      <pubDate>Mon, 01 Jul 2019 12:24:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882529#M471834</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-07-01T12:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x and MAB Order</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882555#M471836</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210"&gt;@Mike.Cifelli&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the feedback.&lt;/P&gt;&lt;P&gt;Yes I have configured FlexAuth in my wired LAN but in wireless I am not sure how to configure it in WLC.&lt;/P&gt;&lt;P&gt;Even if I don't have a certificate, the ISE will still try to authenticate it via 802.1x?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 13:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882555#M471836</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-07-01T13:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x and MAB Order</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882903#M471838</link>
      <description>&lt;P&gt;For Cisco WLC, see&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://community.cisco.com/t5/wireless-security-and-network/cisco-wireless-mab-and-802-1x/td-p/3699599" target="_blank"&gt;Cisco Wireless MAB and 802.1X - Cisco Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://community.cisco.com/t5/wireless-security-and-network/ise-2-1-802-1x-and-mac-filtering/td-p/3763618" target="_blank"&gt;Solved: ISE 2.1 802.1X and MAC filtering - Cisco Community&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Please note that this does not support Radius NAC (ISE NAC) so no ISE posture and CoA might not work properly, either.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 22:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3882903#M471838</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-01T22:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x and MAB Order</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3883125#M471841</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked link that you provided but&amp;nbsp; it seems to be 802.1x AND MAB. My client wants it to be like FlextAuth when 802.1x is not available, it will failover to MAB.&lt;/P&gt;&lt;P&gt;Is that possible in wireless?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 10:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3883125#M471841</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-07-02T10:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x and MAB Order</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3883194#M471842</link>
      <description>&lt;P&gt;You are correct it's not exactly like the wired flexauth. In my experience, we always create separate WLANs for different security settings, as most clients move from one Wi-Fi network to another fairly easily. On the client side, we either do not configure security at all or do it with the matching parameters.&lt;/P&gt;
&lt;P&gt;I've not tried myself but the others found it working in some use cases.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-9/config-guide/b_cg89/wlan_security.html#d174628e12906a1635" target="_blank"&gt;MAC Authentication Failover to 802.1X&lt;/A&gt;&amp;nbsp;says,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;H3 id="ariaid-title54" class="title topictitle3"&gt;Configuring MAC Authentication Failover to 802.1X Authentication&lt;/H3&gt;
&lt;SECTION class="body"&gt;
&lt;P class="p"&gt;You can configure the controller to start 802.1X authentication when MAC authentication with static WEP for the client fails. If the RADIUS server rejects an access request from a client instead of deauthenticating the client, the controller can force the client to undergo an 802.1X authentication. If the client fails the 802.1X authentication too, then the client is deauthenticated.&lt;/P&gt;
&lt;P class="p"&gt;If MAC authentication is successful and the client requests for an 802.1X authentication, the client has to pass the 802.1X authentication to be allowed to send data traffic. If the client does not choose an 802.1X authentication, the client is declared to be authenticated if the client passes the MAC authentication.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 12:46:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-mab-order/m-p/3883194#M471842</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-02T12:46:09Z</dc:date>
    </item>
  </channel>
</rss>

