<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAB based Voice Vlan authorization in case of ISE failure in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771556#M486723</link>
    <description>&lt;P&gt;Please review our &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt; for many of your questions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do not use Port Security with 802.1X - these are 2 completely different processes for controlling the port. This is mentioned under &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--605853302" rel="nofollow noopener noreferrer" target="_blank"&gt;Switch Configuration for Closed Mode&lt;/A&gt; &amp;gt; MAC Limits.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Critical Voice VLAN is mentioned in &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--605853302" rel="nofollow noopener noreferrer" target="_blank"&gt;Switch Configuration for Closed Mode&lt;/A&gt; &amp;gt; Critical Authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jan 2019 17:39:15 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2019-01-02T17:39:15Z</dc:date>
    <item>
      <title>MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3769968#M486687</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am concerned in case of ISE failure so&amp;nbsp; i would like to make sure that IP phones (MAB based) will continue to operate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my config is as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4/23&lt;BR /&gt;description VoIP-Tests&lt;BR /&gt;switchport access vlan 100&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 90&lt;BR /&gt;switchport port-security maximum 5&lt;BR /&gt;switchport port-security&lt;BR /&gt;switchport port-security violation restrict&lt;BR /&gt;switchport port-security aging type inactivity&lt;BR /&gt;switchport port-security aging static&lt;BR /&gt;logging event link-status&lt;BR /&gt;authentication event server dead action authorize&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;mab&lt;BR /&gt;snmp trap mac-notification change added&lt;BR /&gt;snmp trap mac-notification change removed&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 5&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Although the Phone works OK while ISE is present when i remove ISE from the switch config , the phone does not get registered.&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am i missing any additional commands under interface config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also had the command "authentication server fail action next-method" under interface config but it did not make any difference so i removed it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What follow are some debugs:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): Reauthenticating client 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:01:48: mab-sm(Gi4/23): Received event 'MAB_REAUTHENTICATE' on handle 0x5600004D&lt;BR /&gt;Dec 28 16:01:48:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab : during state mab_terminate, got event 2(mabReauthenticate)&lt;BR /&gt;Dec 28 16:01:48: @@@ mab : mab_terminate -&amp;gt; mab_authorizing&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): Sending create new context event to EAP from MAB for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): Starting MAC-AUTH-BYPASS for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): MAB received an Access-Reject for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:01:48: %MAB-5-FAIL: Authentication failed for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): MAB received an Access-Reject for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:01:48: %MAB-5-FAIL: Authentication failed for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): Final EAP Fail pkt received by MAB&lt;BR /&gt;Dec 28 16:01:48: mab-sm(Gi4/23): Received event 'MAB_RESULT' on handle 0x5600004D&lt;BR /&gt;Dec 28 16:01:48:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab : during state mab_authorizing, got event 5(mabResult)&lt;BR /&gt;Dec 28 16:01:48: @@@ mab : mab_authorizing -&amp;gt; mab_terminate&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): Deleted credentials profile for 0x5600004D (dot1x_mac_auth_007278263a1f)&lt;BR /&gt;Dec 28 16:01:48: mab-ev(Gi4/23): Sending event (2) to AuthMGR for 0072.7826.3a1f&lt;BR /&gt;Dec 28 16:01:48: mab-sm(Gi4/23): Received event 'MAB_RESULT' on handle 0x5600004D&lt;BR /&gt;Dec 28 16:01:48:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab : during state mab_terminate, got event 5(mabResult) (ignored)&lt;BR /&gt;Dec 28 16:01:48: %AUTHMGR-7-RESULT: Authentication result 'server dead' from 'mab' for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:01:48: %AUTHMGR-5-FAIL: Authorization failed for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:02:00: AAA/BIND(00019775): Bind i/f&lt;BR /&gt;Dec 28 16:02:00: AAA/AUTHEN/LOGIN (00019775): Pick method list 'default'&lt;BR /&gt;Dec 28 16:02:06: AAA/AUTHOR (0x19775): Pick method list 'default'&lt;BR /&gt;Dec 28 16:02:06: AAA/AUTHOR/EXEC(00019775): processing AV cmd=&lt;BR /&gt;Dec 28 16:02:06: AAA/AUTHOR/EXEC(00019775): processing AV priv-lvl=15&lt;BR /&gt;Dec 28 16:02:06: AAA/AUTHOR/EXEC(00019775): Authorization successful&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): Reauthenticating client 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:02:49: mab-sm(Gi4/23): Received event 'MAB_REAUTHENTICATE' on handle 0x5600004D&lt;BR /&gt;Dec 28 16:02:49:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab : during state mab_terminate, got event 2(mabReauthenticate)&lt;BR /&gt;Dec 28 16:02:49: @@@ mab : mab_terminate -&amp;gt; mab_authorizing&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): Sending create new context event to EAP from MAB for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): Starting MAC-AUTH-BYPASS for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): MAB received an Access-Reject for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:02:49: %MAB-5-FAIL: Authentication failed for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): MAB received an Access-Reject for 0x5600004D (0072.7826.3a1f)&lt;BR /&gt;Dec 28 16:02:49: %MAB-5-FAIL: Authentication failed for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): Final EAP Fail pkt received by MAB&lt;BR /&gt;Dec 28 16:02:49: mab-sm(Gi4/23): Received event 'MAB_RESULT' on handle 0x5600004D&lt;BR /&gt;Dec 28 16:02:49:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab : during state mab_authorizing, got event 5(mabResult)&lt;BR /&gt;Dec 28 16:02:49: @@@ mab : mab_authorizing -&amp;gt; mab_terminate&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): Deleted credentials profile for 0x5600004D (dot1x_mac_auth_007278263a1f)&lt;BR /&gt;Dec 28 16:02:49: mab-ev(Gi4/23): Sending event (2) to AuthMGR for 0072.7826.3a1f&lt;BR /&gt;Dec 28 16:02:49: mab-sm(Gi4/23): Received event 'MAB_RESULT' on handle 0x5600004D&lt;BR /&gt;Dec 28 16:02:49:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab : during state mab_terminate, got event 5(mabResult) (ignored)&lt;BR /&gt;Dec 28 16:02:49: %AUTHMGR-7-RESULT: Authentication result 'server dead' from 'mab' for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:02:49: %AUTHMGR-5-FAIL: Authorization failed for client (0072.7826.3a1f) on Interface Gi4/23 AuditSessionID 00000000000003845C018D25&lt;BR /&gt;Dec 28 16:02:50: RADIUS/ENCODE(000193FB):Orig. component type = DOT1X&lt;BR /&gt;Dec 28 16:02:50: RADIUS(000193FB): Config NAS IP: 0.0.0.0&lt;BR /&gt;Dec 28 16:02:50: RADIUS(000193FB): sending&lt;BR /&gt;Dec 28 16:02:50: RADIUS/DECODE: parse response no app start; FAIL&lt;BR /&gt;Dec 28 16:02:50: RADIUS/DECODE: parse response; FAIL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 14:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3769968#M486687</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2018-12-28T14:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3769982#M486688</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I've no idea what the outcome would be by removing the dot1x configuration on an interface in order to simulate ISE failure, it's probably not a actual valid test.&lt;BR /&gt;&lt;BR /&gt;A better way to simulate ISE failure which I've used for NRFU testing previously, was to ensure that the switch reports that RADIUS servers are dead by adding a static null route to the RADIUS servers, meaning the switch won't route traffic to the ISE server. Wait for the output of "show aaa server" to report the RADIUS servers are dead and then plugin the phone. The phone should be authorized due to the command "authentication event server dead action authorize voice" you have configured.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 14:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3769982#M486688</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-12-28T14:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3769984#M486693</link>
      <description>Also it's not recommended (by Cisco) to use port-security on the same interface you've configured dot1x.</description>
      <pubDate>Fri, 28 Dec 2018 14:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3769984#M486693</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-12-28T14:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3770073#M486703</link>
      <description>&lt;P&gt;Hi Ditter,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.You have all the required configs for Critical authentication to work, i would recommend to add the below CLI as part of best practice configuration..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;authentication control-direction in&lt;/P&gt;
&lt;P&gt;authentication event server alive action reinitialize&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Yes, can you confirm the way you failing reachability to ISE?? Your debug do show "&lt;SPAN&gt;Authentication result 'server dead'" which is a good sign but i would like to understand the way its done..&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Yes, its not recommended to use port- security&amp;nbsp;with dot1x as its not compatible ..&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 17:26:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3770073#M486703</guid>
      <dc:creator>mnagired</dc:creator>
      <dc:date>2018-12-28T17:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771054#M486709</link>
      <description>&lt;P&gt;Thanks RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you please elaborate why in your opinion , what is a reason why port-security would interfear&amp;nbsp; with MAB?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition , if i remove port-security from the phone interface how can i limit the amount of MAC addresses to (for example) 5 or 10?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jan 2019 17:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771054#M486709</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2019-01-01T17:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771057#M486713</link>
      <description>&lt;P&gt;Hi Mnagired,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Yes i added the two commands you mentioned but nothing changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. The way i "simulated" the lack of connection to ISE was simply to do a&lt;/P&gt;&lt;P&gt;"no radius-server host &amp;lt;ip address&amp;gt; auth-port 1812 acct-port 1813 key abcdef&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What worries me is that when i do "sh authentication sessions interface gigabitEthernet 4/23"&lt;/P&gt;&lt;P&gt;it mentions that the domain is DATA but is should be voice....&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet4/23&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; 0072.7826.3a1f&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 10.10.224.27&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Failed&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&amp;nbsp; &amp;lt;------ Shouldn't this be voice ?&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; in&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; 00000000000003845C018D25&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x00019772&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0xB2000385&lt;BR /&gt;&lt;BR /&gt;Runnable methods list:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Failed&lt;BR /&gt;&lt;BR /&gt;Critical Authorization is in effect for domain(s) VOICE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Finally&lt;/STRONG&gt;&lt;/U&gt; when i re-enable the Radius server on the switch , immediatelly the phone comes on-line&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh authentication sessions interface gigabitEthernet 4/23&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet4/23&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; 0072.7826.3a1f&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 10.10.224.27&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; 00-72-78-26-3A-1F&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Success&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; VOICE&amp;nbsp;&amp;nbsp; &amp;lt;---&amp;nbsp;&amp;nbsp; And in the correct domain&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; in&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorized By:&amp;nbsp; Authentication Server&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; 000000000000038A71740833&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x0001990C&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0x8C00038B&lt;BR /&gt;&lt;BR /&gt;Runnable methods list:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas what could be wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jan 2019 17:30:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771057#M486713</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2019-01-01T17:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771063#M486718</link>
      <description>&lt;P&gt;Hi Ditter,&lt;/P&gt;&lt;P&gt;It's not my opinion, but rather a Cisco recommendation not to use 802.1x and Port Security. More information here:- &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;Deployment guide&lt;/A&gt; and &lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/802-1x-authentication-and-port-security-simultaneously-in-multi/td-p/3482843" target="_self"&gt;forum post&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you really envisage having more than 2 devices (1 data (pc/laptop) and 1 voice) per interface? multi-domain would cover that scenario.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jan 2019 18:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771063#M486718</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-01T18:15:50Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771081#M486721</link>
      <description>&lt;P&gt;Thanks RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes i need multi-auth instead of multi-domain as there are cases where the users install a small switch (or running hypervisors) in their PCs , so i need&amp;nbsp; multi-auth to be present to switch ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jan 2019 19:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771081#M486721</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2019-01-01T19:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771556#M486723</link>
      <description>&lt;P&gt;Please review our &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt; for many of your questions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do not use Port Security with 802.1X - these are 2 completely different processes for controlling the port. This is mentioned under &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--605853302" rel="nofollow noopener noreferrer" target="_blank"&gt;Switch Configuration for Closed Mode&lt;/A&gt; &amp;gt; MAC Limits.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Critical Voice VLAN is mentioned in &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--605853302" rel="nofollow noopener noreferrer" target="_blank"&gt;Switch Configuration for Closed Mode&lt;/A&gt; &amp;gt; Critical Authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 17:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3771556#M486723</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2019-01-02T17:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3772866#M486725</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;having looked in the document "ISE-secure-wired-access-prescriptive-deployment-guide" i did not find why MAB is not compatible with port security. If you recall in the config i sent you in relation to voice vlan problem after radius server was dead , i do not utilize 802.1x for the phones but MAB (not all my cisco phones support 802.1.x supplicants).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All of you, mentioned that 802.1x is not compatible&amp;nbsp; with port-security and this is also mentioned in the above mentioned document but is also MAB incompatible with port-security?&amp;nbsp; MAB is not 802.1x so i suppose that it can coexist in an interface config with port-security being present.&amp;nbsp; Correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 13:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3772866#M486725</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2019-01-04T13:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3773156#M486727</link>
      <description>&lt;P&gt;Hello Ditter,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dot1x pae authenticator -- this commend enables dot1x on the port and by default port tries dot1x first before it falls back to MAB.. Again its a general recommendations.. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;WRT to simulating server failure, &lt;STRONG&gt;no radius-server host&lt;/STRONG&gt; may not be the right way to do it. Can you simulate this on the layer above( may be disconnecting the uplink or disabling routing between your access switch and distribution).. This is how i had verified and it worked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh N&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 17:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3773156#M486727</guid>
      <dc:creator>mnagired</dc:creator>
      <dc:date>2019-01-04T17:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3775890#M486729</link>
      <description>&lt;P&gt;Hi Mnagired,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;finally i have some good results and i would like to share it with all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The steps i followed are :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Firstly i manipulated the routing (static entries to null0) in order to simulate radius-dead (instead of just negating the radius command in the switch itself).&amp;nbsp; Result : &lt;U&gt;&lt;STRONG&gt;Nothing Changed&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;2.I negated all port security commands in order to be consistent with Cisco Recommendations and the guide you shared. Result : &lt;U&gt;&lt;STRONG&gt;Nothing Changed&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally what made the difference was to remove the command : &lt;U&gt;&lt;STRONG&gt;authentication event server dead action authorize&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i removed the above mentioned command the phone came up online.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh authentication sessions interface gigabitEthernet 4/23&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet4/23&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; 0072.7826.3a1f&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; 10.10.224.27&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Failed&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; in&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; 00000000000003D29917AC99&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x00019C40&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0xE00003D3&lt;BR /&gt;&lt;BR /&gt;Runnable methods list:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Failed&lt;BR /&gt;&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Critical Authorization is in effect for domain(s) VOICE&amp;nbsp;&lt;/STRONG&gt;&lt;/U&gt; &amp;lt;-------&amp;nbsp;&amp;nbsp; Here shows that the phone is registered in the voice domain although the command&amp;nbsp; shows the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh authentication sessions&lt;BR /&gt;&lt;BR /&gt;Interface&amp;nbsp; MAC Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; Domain&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID&lt;BR /&gt;Gi4/23&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0072.7826.3a1f&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;U&gt;&lt;STRONG&gt;DATA&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Authz Failed&lt;/STRONG&gt;&lt;/U&gt;&amp;nbsp;&amp;nbsp; 00000000000003D29917AC99&amp;nbsp; &amp;lt;------&amp;nbsp; Here it shows that&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the Phone MAC address is in the &lt;U&gt;&lt;STRONG&gt;DATA domain but it is seems that it is a bogus output&lt;/STRONG&gt;&lt;/U&gt; as the command &lt;U&gt;&lt;STRONG&gt;sh authentication sessions&lt;/STRONG&gt;&lt;/U&gt; interface gigabitEthernet 4/23 shows that the phone is critical authorized in the VOICE domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Critical Authorization is in effect for domain(s) VOICE&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas about this inconsistency between these two show commands?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The working interface commands are the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4/23&lt;BR /&gt;&amp;nbsp;description VoIP-Tests&lt;BR /&gt;&amp;nbsp;switchport access vlan 100&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 90&lt;BR /&gt;&amp;nbsp;switchport port-security maximum 5&lt;BR /&gt;&amp;nbsp;switchport port-security&lt;BR /&gt;&amp;nbsp;switchport port-security aging time 5&lt;BR /&gt;&amp;nbsp;switchport port-security violation restrict&lt;BR /&gt;&amp;nbsp;switchport port-security aging type inactivity&lt;BR /&gt;&amp;nbsp;switchport port-security aging static&lt;BR /&gt;&amp;nbsp;logging event link-status&lt;BR /&gt;&amp;nbsp;&lt;U&gt;&lt;STRONG&gt;authentication control-direction in&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;&amp;nbsp;authentication event server dead action authorize voice&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-auth&lt;BR /&gt;&amp;nbsp;authentication order mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication periodic&lt;BR /&gt;&amp;nbsp;authentication timer reauthenticate server&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change added&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change removed&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 5&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;&amp;nbsp;spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditter.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 10:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3775890#M486729</guid>
      <dc:creator>Ditter</dc:creator>
      <dc:date>2019-01-09T10:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: MAB based Voice Vlan authorization in case of ISE failure</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3824621#M486730</link>
      <description>&lt;P&gt;No one has commented on the &lt;STRONG&gt;output behavior&lt;/STRONG&gt;, showing the wrong domain (eg: DATA Domain for phones)&lt;/P&gt;&lt;P&gt;Is seems even the complete opposite is bugged:&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58593" target="_self"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58593&lt;/A&gt;&lt;/P&gt;&lt;P&gt;When there is not even a phone/voice domain client...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/655758"&gt;@Ditter&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi Mnagired,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the Phone MAC address is in the &lt;U&gt;&lt;STRONG&gt;DATA domain but it is seems that it is a bogus output&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Fri, 22 Mar 2019 21:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-based-voice-vlan-authorization-in-case-of-ise-failure/m-p/3824621#M486730</guid>
      <dc:creator>rmotzer</dc:creator>
      <dc:date>2019-03-22T21:17:39Z</dc:date>
    </item>
  </channel>
</rss>

