<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: If 802.1x fails globally?? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702355#M508476</link>
    <description>ISE won't trigger anything because it doesn't know anything about the cert renewal.  That is all via the client talking to AD/PKI.  I am not sure what the client will do honestly.  I have seen clients periodically retry Dot1x and if they do the switch will attempt to authenticate the device with Dot1x and switch out of MAB.  The other thing you could try (not sure if I would do this) is cranking down the reauth timer on the rule you use for this expired cert situation.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 06 Sep 2018 17:54:15 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2018-09-06T17:54:15Z</dc:date>
    <item>
      <title>If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684750#M508462</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it should happen, that something goes wrong and ISE cant authenticate devices on switch ports via 802.1x, what immediately actions could remove 802.1x from switches or allow all devices onto the network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Michael&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 08:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684750#M508462</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-08-09T08:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684781#M508463</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;In the event that the switch is unable to communicate with ISE,&amp;nbsp; the switch will mark the radius servers as dead. If you have the interface level commands configured such as:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;authentication event server dead action authorize vlan 11&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;authentication event server dead action authorize voice&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;...&lt;/STRONG&gt;&lt;/EM&gt;existing authenticated sessions will continue, any new connections made will be authorized (data to vlan 11 (in this example) and voice).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 09:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684781#M508463</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-09T09:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684800#M508464</link>
      <description>&lt;P&gt;Makes perfect sense if ISE fails.&amp;nbsp;Thanks for the info.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 09:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684800#M508464</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-08-09T09:49:13Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684831#M508465</link>
      <description>You'll probably want these global commands, to detect if the aaa server is dead and then mark it as down:-&lt;BR /&gt;&lt;BR /&gt;radius-server dead-criteria time 5 tries 4&lt;BR /&gt;radius-server deadtime 30&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 09 Aug 2018 10:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3684831#M508465</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-09T10:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702027#M508466</link>
      <description>&lt;P&gt;I'm back on this topic.&lt;/P&gt;
&lt;P&gt;I had an case were my switches were running with auth open, but the GPO that sets 802.1x on clients weren't deployed yet. Testing a policy for MAB and guest portal, all the users failed dot1x, and then got to MAB. All the users got redirected to the portal.&lt;/P&gt;
&lt;P&gt;Luckily this only happened to a handful of users, so the impact were limited. But if all 500+ users got hit, how would they recover?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 13:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702027#M508466</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-09-06T13:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702029#M508467</link>
      <description>&lt;P&gt;If MAB is still working then ISE is still working, the outcome you saw is what is expected.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 13:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702029#M508467</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-09-06T13:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702033#M508468</link>
      <description>But if all the users hits the guest portal they're "stuck" here.&lt;BR /&gt;What I did, was I disabled the redirect, and then ran "clear auth session" on the affected swtiches. Then the users shouldn't unplug their cable to trigger dot1x.&lt;BR /&gt;Could it be done with a port bounce from the end devices overview?</description>
      <pubDate>Thu, 06 Sep 2018 13:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702033#M508468</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-09-06T13:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702046#M508469</link>
      <description>&lt;P&gt;Your production switches should be in monitor mode, while in monitor mode you should have all results in your policy set to "permit access". This will allow you to test policy and ensure everyone is hitting the correct policy. Anyone hitting the wrong policy can then be fixed/remediated before going to enforcement mode where they can lose network access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Working through a methodology of Monitor mode and moving to enforcement mode will help to alleviate any issue you may run across.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also only test on a non production switch so you do not affect users.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 13:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702046#M508469</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-09-06T13:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702052#M508470</link>
      <description>&lt;P&gt;I get what your saying, and&amp;nbsp;my switches are running in monitor mode. Despite the PermitAll at the end of every policy, users fails 802.1x, and then do MAB. Then the wired mab -&amp;gt; redirect catches the request and sends the users off to the portal. Like you wrote before, this is expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 13:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702052#M508470</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-09-06T13:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702058#M508471</link>
      <description>&lt;P&gt;If you are in monitor mode there should be no redirect setup. Can you share some screenshots of your policy?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 13:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702058#M508471</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-09-06T13:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702082#M508472</link>
      <description>&lt;P&gt;I restricted the policy to only be applied to my desktop switch. NAS 192.168.2.25.&lt;/P&gt;
&lt;P&gt;The GUEST_REGISTRATION is the redirect, and GUEST_PORTAL_ACCESS allows the users afterwards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lets just imagine that the certificate for dot1x expires and all wired endpoints are redirected to the portal. Then we change the certificate, and all endpoints need to trigger dot1x again?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 14:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702082#M508472</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-09-06T14:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702102#M508473</link>
      <description>&lt;P&gt;You can change settings in ISE and build a policy to allow the authentication of expired Certs, then when they go to authorization you can give them limited access to renew their Certs, this will avoid them being sent to the webauth portal.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 14:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702102#M508473</guid>
      <dc:creator>Cory Peterson</dc:creator>
      <dc:date>2018-09-06T14:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702128#M508474</link>
      <description>&lt;P&gt;The other option if you don't want to accept expired certs is you could profile these devices as AD domain joined devices using the AD profiler.&amp;nbsp; This assumes they are AD domain joined.&amp;nbsp; Then in your MAB rule you could give them enough access to renew certs.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 14:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702128#M508474</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-06T14:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702352#M508475</link>
      <description>&lt;P&gt;With both solutions, clients will be allowed to renew their certificates, but will or can ISE trigger CoA when a new certificate is issued to the client? Or is it necessary to trigger dot1x on the port to process the client again?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 17:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702352#M508475</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-09-06T17:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702355#M508476</link>
      <description>ISE won't trigger anything because it doesn't know anything about the cert renewal.  That is all via the client talking to AD/PKI.  I am not sure what the client will do honestly.  I have seen clients periodically retry Dot1x and if they do the switch will attempt to authenticate the device with Dot1x and switch out of MAB.  The other thing you could try (not sure if I would do this) is cranking down the reauth timer on the rule you use for this expired cert situation.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Sep 2018 17:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702355#M508476</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-06T17:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702367#M508477</link>
      <description>If the client is issued a certificate from AD using GPO and if configured the client will automatically renew certificates before expiration, usually a couple of months before expiration. Therefore this renewal process would all be transparent to ISE, you are reliant on AD/GPO doing it's job.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 06 Sep 2018 18:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702367#M508477</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-06T18:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: If 802.1x fails globally??</title>
      <link>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702368#M508478</link>
      <description>&lt;P&gt;my thought exactly, and since MAB auth is connected, there will be no CoA. What if we imagined that a client with an expired certificate gets profiled with CorpPC_EXPRIED, and with the new certificate it gets the old profile back CorpPC, and then the new profile triggers CoA?&lt;/P&gt;
&lt;P&gt;On the other hand, if a client has an expired certificate the machine hasn't been in contact we the domain for a long time, then there might be a valid reason to contact the IT department &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm going to pick at this again, what if the server side certificate expires, the one ISE uses to authenticate clients, and all endpoints get MAB auth and hits the portal. How would we fix this after the certificate have been updated?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 18:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/if-802-1x-fails-globally/m-p/3702368#M508478</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-09-06T18:06:50Z</dc:date>
    </item>
  </channel>
</rss>

