<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE authenticating Guest VMs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496281#M496843</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see all the MACs in the cam tables but only some of the MACs in the auth session table. It is not any set amount missing between different ports either, Some have 6 of 8 Authenticating others have 4 of 8 authenticating. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I asked about the comment in bold is that is what TAC sent me in an email and I have never seen that mentioned in all the posts here about Authenticating Guest VMs on an access port. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Jun 2018 06:13:47 GMT</pubDate>
    <dc:creator>Cory Peterson</dc:creator>
    <dc:date>2018-06-22T06:13:47Z</dc:date>
    <item>
      <title>ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496279#M496836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;Can anyone confirm if this comment is correct or not? I have never heard this statement before and have authenticated Guest VMs many times in the past. I recently ran in to an issue where some of the guests are not even showing in the auth session database on the switch or ISE and reached out to TAC.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;STRONG&gt;"Dot1x or MAB authentication for VMs is known for not working properly or not working at all, and is not supported."&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;Thank You,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;-Cory&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2018 21:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496279#M496836</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-06-21T21:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496280#M496841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm in bridged mode the guest VMs should have unique MACs and show up on the switch port to be authenticated.&amp;nbsp; In NAT mode only the host's MAC would show up.&amp;nbsp; Are you seeing the MAC's show up on the switch port when you so "show auth session" or "show access-session"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2018 02:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496280#M496841</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-06-22T02:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496281#M496843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see all the MACs in the cam tables but only some of the MACs in the auth session table. It is not any set amount missing between different ports either, Some have 6 of 8 Authenticating others have 4 of 8 authenticating. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I asked about the comment in bold is that is what TAC sent me in an email and I have never seen that mentioned in all the posts here about Authenticating Guest VMs on an access port. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2018 06:13:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496281#M496843</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-06-22T06:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496282#M496845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the first I heard of it. If possible, please share the TAC case number so we may take a look and see more context.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2018 20:36:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496282#M496845</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-06-22T20:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496283#M496846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have not done much with the case yet but collect logs and Show Tech, and before we did much I got that response from TAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TAC Case#684675337&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for looking in to this!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2018 21:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496283#M496846</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-06-22T21:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496284#M496847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see your case has all mac addresses in "show mac add int &amp;lt;&amp;gt;" but not in "show auth sessions int &amp;lt;&amp;gt;". &lt;SPAN style="font-size: 10pt;"&gt;If possible, I would suggest to try (1) a hub and some physical wired devices on the same 4510R+E with Sup8-E and (2) a different switch model, such as 3650. This is likely a bug on the switch platform.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VM issues I usually running into in our lab are because they are connecting to a VMware port-group, which in turn to the VMware vSwitch and then to the physical interface. Thus, we usually need to use some particular means to get DOT1X to work, especially with the native supplicants, or they would fail over to MAB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried 9 clients on the same interface of 3650 (on 3.6.3E) in our lab and all showed up in both "show auth sessions int &amp;lt;&amp;gt;" and "show mac add int &amp;lt;&amp;gt;".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2018 02:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496284#M496847</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-06-23T02:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496285#M496848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cory, Hit me up on Skype tomorrow, I have dealt with some interesting behavior with vmware over the past couple years.&amp;nbsp; We can at least go over my lessons learned and maybe something will relate to the issue you are having.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2018 04:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496285#M496848</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-06-25T04:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authenticating Guest VMs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496286#M496849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cory, we have always used Windows VMs for our ISE Sales Trainings so you absolutely can do it!&lt;/P&gt;&lt;P&gt;The key is to directly map a VM to a specific physical port (wireless/wired USB dongle, UCS ethernet port, etc.).&lt;/P&gt;&lt;P&gt;Altenatively, ensure you have bridged the VMware NIC to the host computer NIC.&lt;/P&gt;&lt;P&gt;Do not use VMware NAT! If you use VMware NAT, the VM's MAC will not show on the port and all traffic will look like that of the host computer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2018 16:55:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-guest-vms/m-p/3496286#M496849</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2018-06-25T16:55:10Z</dc:date>
    </item>
  </channel>
</rss>

