<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE switch port dot1x policy map in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3953771#M473933</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/356770"&gt;@mnagired&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;1st, If you using ISE as your AAA server, Concurrent Authentication doesn’t work so having these two auth statement under event session-started doesn’t help.&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;event session-started match-all&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10 class always do-until-failure&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 20 authenticate using mab priority 20&lt;/P&gt;&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P class="p1"&gt;This is not correct. We are using ISE 2.4 with IBNS2 policy and have been using concurrent authentication for several years. Most desktop PC's will pass authentication for MAB immediately with dot1x taking a few seconds longer sometimes. Given dot1x has a higher priority it will override the MAB auth.&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Nov 2019 03:16:58 GMT</pubDate>
    <dc:creator>franklinb</dc:creator>
    <dc:date>2019-11-06T03:16:58Z</dc:date>
    <item>
      <title>ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3838656#M473849</link>
      <description>&lt;P&gt;Would appreciate it if someone could verify the switchport configuration I have for low impact mode. My switch is running denali release. Do you see any issues with the below policy-map and classes? Also what about&amp;nbsp;service-template AUTH_SUCCESS, its empty?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;service-template DEFAULT_CRITICAL_VOICE_TEMPLATE&lt;BR /&gt;voice vlan&lt;BR /&gt;!&lt;BR /&gt;service-template CRITICAL_AUTH_ACCESS&lt;BR /&gt;vlan 100&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-template AUTH_SUCCESS&lt;BR /&gt;description Successful authentication&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-all AAA_SVR_DOWN_AUTHD_HOST&lt;BR /&gt;match result-type aaa-timeout&lt;BR /&gt;match authorization-status authorized&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-all AAA_SVR_DOWN_UNAUTHD_HOST&lt;BR /&gt;match result-type aaa-timeout&lt;BR /&gt;match authorization-status unauthorized&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-all DOT1X_FAILED&lt;BR /&gt;match method dot1x&lt;BR /&gt;match result-type method dot1x authoritative&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-all DOT1X_NO_RESP&lt;BR /&gt;match method dot1x&lt;BR /&gt;match result-type method dot1x agent-not-found&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-any IN_CRITICAL_AUTH&lt;BR /&gt;match activated-service-template CRITICAL_AUTH_ACCESS&lt;BR /&gt;match activated-service-template DEFAULT_CRITICAL_VOICE_TEMPLATE&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-all MAB_FAILED&lt;BR /&gt;match method mab&lt;BR /&gt;match result-type method mab authoritative&lt;BR /&gt;!&lt;BR /&gt;class-map type control subscriber match-none NOT_IN_CRITICAL_AUTH&lt;BR /&gt;match activated-service-template CRITICAL_AUTH_ACCESS&lt;BR /&gt;match activated-service-template DEFAULT_CRITICAL_VOICE_TEMPLATE&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type control subscriber DOT1X&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;5 class DOT1X_FAILED do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure&lt;BR /&gt;10 activate service-template CRITICAL_AUTH_ACCESS&lt;BR /&gt;20 activate service-template DEFAULT_CRITICAL_VOICE_TEMPLATE&lt;BR /&gt;30 authorize&lt;BR /&gt;40 pause reauthentication&lt;BR /&gt;20 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;30 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;40 class MAB_FAILED do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authentication-restart 60&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event aaa-available match-all&lt;BR /&gt;10 class IN_CRITICAL_AUTH do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;20 class NOT_IN_CRITICAL_AUTH do-until-failure&lt;BR /&gt;10 resume reauthentication&lt;BR /&gt;event authentication-success match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 activate service-template AUTH_SUCCESS&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 restrict&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on the interface:&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 10&lt;BR /&gt;dot1x max-reauth-req 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to get as much as I could from the &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;Wired Access Prescriptive Deployment Guide&lt;/A&gt;&amp;nbsp;and the older one which I can't see to find online any longer. However there are some class config such as:&lt;/P&gt;&lt;P&gt;class-map type control subscriber match-all DOT1X&lt;/P&gt;&lt;P&gt;class-map type control subscriber match-all DOT1X_MEDIUM_PRIO&lt;/P&gt;&lt;P&gt;class-map type control subscriber match-all MAB&lt;/P&gt;&lt;P&gt;class-map type control subscriber match-all DOT1X_TIMEOUT&lt;/P&gt;&lt;P&gt;which are not used in the policy-map (refer to section&amp;nbsp;Configuring and Understanding the IBNS 2.0 Policy in the above link). Are these required?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 11:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3838656#M473849</guid>
      <dc:creator>Madura Malwatte</dc:creator>
      <dc:date>2019-04-15T11:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3838684#M473853</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to have the following global configurations:&lt;/P&gt;&lt;PRE&gt;dot1x system-auth-control
dot1x critical eapol&lt;/PRE&gt;&lt;PRE&gt;aaa group server radius ISE
 server name ISE01
 server name ISE02
 ip radius source-interface Vlan254
!
aaa authentication dot1x default group ISE
aaa authorization network default group ISE 
aaa accounting Identity default start-stop group ISE
aaa accounting update newinfo periodic 2880&lt;/PRE&gt;&lt;P&gt;Change the source-interface VLAN as necessary. You can also change the group name if you like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the interface configurations, you'll need these in addition to what you've shared:&lt;/P&gt;&lt;PRE&gt;authentication periodic
authentication timer reauthenticate server / authentication timer reauthenticate &amp;lt;seconds&amp;gt;&lt;BR /&gt;access-session port-control auto&lt;/PRE&gt;&lt;P&gt;Any class-maps not used by IBNS are unnecessary. Sometimes there are some class-maps that can't be deleted, if that's the case then they are harmless.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 12:08:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3838684#M473853</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2019-04-15T12:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3838793#M473857</link>
      <description>&lt;P&gt;Hi Nadav,&lt;/P&gt;&lt;P&gt;Thanks for the response. I have the rest of the config which should be fine. I was in particular interested in the class-maps and policy-map config.&lt;/P&gt;&lt;P&gt;What about&amp;nbsp;&lt;SPAN&gt;service-template AUTH_SUCCESS, does something need to be configured in it?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 14:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3838793#M473857</guid>
      <dc:creator>Madura Malwatte</dc:creator>
      <dc:date>2019-04-15T14:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840077#M473858</link>
      <description>&lt;P&gt;Well, if you only leave it as a description it won't do anything. Unless you plan on using it for easier readability in debugging.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 07:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840077#M473858</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2019-04-17T07:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840106#M473929</link>
      <description>Ok, what needs to go in there? Hence this thread as to what I am missing.&lt;BR /&gt;Is there a config example for auth success? I couldnt find anything.&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Apr 2019 08:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840106#M473929</guid>
      <dc:creator>Madura Malwatte</dc:creator>
      <dc:date>2019-04-17T08:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840324#M473930</link>
      <description>&lt;P&gt;I'm not sure why you put it in there to begin with, if you're interested in working according to the prescriptive deployment guide you linked then you should be consistent.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is an example of a policy-map there for port authentication, it didn't use any such service template.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The policy-map ended with:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;event inactivity-timeout match-all
   10 class always do-until-failure
     10 clear-session
 event authentication-success match-all
 event violation match-all
   10 class always do-until-failure
     10 activate service-template 
          DEFAULT_LINKSEC_POLICY_SHOULD_SECURE&lt;/PRE&gt;&lt;P&gt;You can change the policy-map to suit your needs. No need to add class-maps and service templates you have no intention on using.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 13:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840324#M473930</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2019-04-17T13:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840412#M473931</link>
      <description>&lt;P&gt;The prescriptive guide has that service template under&amp;nbsp;&lt;SPAN&gt;event authentication-success, its called "DEFAULT_LINKSEC_POLICY_SHOULD_SECURE", but there is no details on this service-template. And I could not find any reference on cisco or other documentation what is meant to be configured in this service-template. The comment next to it in the prescriptive just says "with successful authentication, activate service-template with full access". &lt;/SPAN&gt;&lt;SPAN&gt;I have a pre-auth acl on my dot1x interfaces and access depends on what type of device has authenticated, where a dACL is pushed down or vlan change is done. Hence why its confusing what the&amp;nbsp;authentication-success and its service-template (DEFAULT_LINKSEC_POLICY_SHOULD_SECURE) is meant to do??&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The service-template on my config is just called a different name (AUTH_SUCCESS) instead of&amp;nbsp;DEFAULT_LINKSEC_POLICY_SHOULD_SECURE.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 14:55:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3840412#M473931</guid>
      <dc:creator>Madura Malwatte</dc:creator>
      <dc:date>2019-04-17T14:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3841404#M473932</link>
      <description>&lt;P class="p1"&gt;&lt;STRONG&gt;1st, If you using ISE as your AAA server, Concurrent Authentication doesn’t work so having these two auth statement under event session-started doesn’t help.&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;event session-started match-all&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10 class always do-until-failure&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 20 authenticate using mab priority 20&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;2. 10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure.. &lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;For Low-Impact mode, you have a pre-auth ACL on interface, so just activating service template for Voice and Data Vlan doesn’t help, you need to have an service template to push “permit ip any any “ ..&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;3. Refer to the below configuration.. &lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;ip access-list extended IPV4_CRITICAL_AUTH_ACL&lt;/P&gt;
&lt;P class="p1"&gt;permit ip any any&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;service-template DefaultCriticalAccess_SRV_TEMPLATE&lt;/P&gt;
&lt;P class="p1"&gt;access-group IPV4_CRITICAL_AUTH_ACL&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;service-template DefaultCriticalAuthVlan_SRV_TEMPLATE&lt;/P&gt;
&lt;P class="p1"&gt;Vlan 100&lt;/P&gt;
&lt;P class="p3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; voice vlan&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all AAA_SVR_DOWN_AUTHD_HOST&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match authorization-status authorized&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type aaa-timeout&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all AAA_SVR_DOWN_UNAUTHD_HOST&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match authorization-status unauthorized&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type aaa-timeout&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all AUTHC_SUCCESS-AUTHZ_FAIL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match authorization-status unauthorized&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type success&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all DOT1X&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match method dot1x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all DOT1X_FAILED&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match method dot1x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type method dot1x authoritative&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all DOT1X_NO_RESP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match method dot1x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type method dot1x agent-not-found&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all DOT1X_TIMEOUT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match method dot1x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type method dot1x method-timeout&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type method-timeout&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-any IN_CRITICAL_AUTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match activated-service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-any IN_CRITICAL_AUTH_CLOSED_MODE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match activated-service-template DefaultCriticalAuthVlan_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match activated-service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all MAB&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match method mab&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-all MAB_FAILED&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match method mab&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match result-type method mab authoritative&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-none NOT_IN_CRITICAL_AUTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match activated-service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;class-map type control subscriber match-none NOT_IN_CRITICAL_AUTH_CLOSED_MODE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; match activated-service-template DefaultCriticalAuthVlan_SRV_TEMPL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;policy-map type control subscriber&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;LowImpact-dot1X_MAB&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event session-started match-all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10 class always do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event authentication-failure match-first&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;5 class DOT1X_FAILED do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 terminate dot1x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;20 authenticate using mab priority 20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 activate service-template DefaultCriticalAuthVlan_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;20 activate service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;25 activate service-template DefaultCriticalAccess_SRV_TEMPLATE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;30 authorize&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;40 pause reauthentication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;20 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 pause reauthentication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;20 authorize&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;30 class DOT1X_NO_RESP do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 terminate dot1x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;20 authenticate using mab priority 20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;40 class MAB_FAILED do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 terminate mab&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;20 authentication-restart 60&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;60 class always do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 terminate dot1x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;20 terminate mab&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;30 authentication-restart 60&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event aaa-available match-all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10 class IN_CRITICAL_AUTH do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 clear-session&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;20 class NOT_IN_CRITICAL_AUTH do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 resume reauthentication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event agent-found match-all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10 class always do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 terminate mab&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event inactivity-timeout match-all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10 class always do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 clear-session&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event authentication-success match-all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event violation match-all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10 class always do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 restrict&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt; event authorization-failure match-all&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10 class AUTHC_SUCCESS-AUTHZ_FAIL do-until-failure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10 authentication-restart 60&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p4"&gt;&lt;SPAN class="s1"&gt;I hope this helps..&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 23:04:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3841404#M473932</guid>
      <dc:creator>mnagired</dc:creator>
      <dc:date>2019-04-18T23:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE switch port dot1x policy map</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3953771#M473933</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/356770"&gt;@mnagired&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;1st, If you using ISE as your AAA server, Concurrent Authentication doesn’t work so having these two auth statement under event session-started doesn’t help.&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;event session-started match-all&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10 class always do-until-failure&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 20 authenticate using mab priority 20&lt;/P&gt;&lt;P class="p4"&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P class="p1"&gt;This is not correct. We are using ISE 2.4 with IBNS2 policy and have been using concurrent authentication for several years. Most desktop PC's will pass authentication for MAB immediately with dot1x taking a few seconds longer sometimes. Given dot1x has a higher priority it will override the MAB auth.&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2019 03:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-switch-port-dot1x-policy-map/m-p/3953771#M473933</guid>
      <dc:creator>franklinb</dc:creator>
      <dc:date>2019-11-06T03:16:58Z</dc:date>
    </item>
  </channel>
</rss>

