<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE w/ FlexConnect APs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491652#M516978</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking to find how to connect a FlexConnect AP to a port and have it authenticate, but all users connecting wirelessly through it not be prompted for authentication from the switch.&amp;nbsp; I've seen a few solutions using interface templates, but they each require the port to be configured with multi-host, which would require configuring a port special for each AP, as the rest of the environment ports are configured as multi-auth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client I am creating this for specifically does not want a port with multi-host in which a user could disconnect an AP, connect something like a phone which authenticates, then connect their laptop to the phone and have full access.&amp;nbsp; Is there a way, with interface templates or otherwise, to use the below interface configuration, and configure a port for a FlexConnect or Autonomous AP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet 1/0/1&lt;/P&gt;&lt;P&gt; ip access-group ACL-DEFAULT in&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize vlan 123&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication order dot1x mab&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication periodic&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication violation restrict&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt; dot1x timeout held-period 300&lt;/P&gt;&lt;P&gt; dot1x timeout quiet-period 300&lt;/P&gt;&lt;P&gt; dot1x timeout ratelimit-period 300&lt;/P&gt;&lt;P&gt; mab &lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 May 2018 13:27:01 GMT</pubDate>
    <dc:creator>Razmeth</dc:creator>
    <dc:date>2018-05-24T13:27:01Z</dc:date>
    <item>
      <title>ISE w/ FlexConnect APs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491652#M516978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking to find how to connect a FlexConnect AP to a port and have it authenticate, but all users connecting wirelessly through it not be prompted for authentication from the switch.&amp;nbsp; I've seen a few solutions using interface templates, but they each require the port to be configured with multi-host, which would require configuring a port special for each AP, as the rest of the environment ports are configured as multi-auth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client I am creating this for specifically does not want a port with multi-host in which a user could disconnect an AP, connect something like a phone which authenticates, then connect their laptop to the phone and have full access.&amp;nbsp; Is there a way, with interface templates or otherwise, to use the below interface configuration, and configure a port for a FlexConnect or Autonomous AP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet 1/0/1&lt;/P&gt;&lt;P&gt; ip access-group ACL-DEFAULT in&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize vlan 123&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication order dot1x mab&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication periodic&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication violation restrict&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt; dot1x timeout held-period 300&lt;/P&gt;&lt;P&gt; dot1x timeout quiet-period 300&lt;/P&gt;&lt;P&gt; dot1x timeout ratelimit-period 300&lt;/P&gt;&lt;P&gt; mab &lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 13:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491652#M516978</guid>
      <dc:creator>Razmeth</dc:creator>
      <dc:date>2018-05-24T13:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE w/ FlexConnect APs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491653#M516979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If they are using FlexConnect most likely those ports will turn into trunk ports some day.&amp;nbsp; i would just plan to use AutoSmart ports to remove the ISE configuration when the AP is plugged in.&amp;nbsp; When the AP is unplugged it goes back to a standard access port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The result in ISE for your Access points tells the switch to run the smart port macro.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;!&amp;nbsp; show macro auto interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;!&amp;nbsp; Note: older IOS version use -eq instead of == in the if statements&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;no macro auto global control device&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;no macro auto global control detection&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;no macro auto global control trigger&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;macro auto global processing&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;shell trigger ISE-AP-CONFIG Cisco Access Points&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;macro auto execute ISE-AP-CONFIG {&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;if [[ $LINKUP == YES ]]; then &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;conf t &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; default interface $INTERFACE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; interface $INTERFACE &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; description Access Point&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; macro description $TRIGGER &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; switchport mode trunk&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; switchport trunk native vlan 123&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; switchport trunk allowed vlan 123&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; spanning-tree portfast trunk&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; exit &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;fi &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;if [[ $LINKUP == NO ]]; then &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; conf t &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; default interface $INTERFACE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt; interface $INTERFACE &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group ACL-DEFAULT in&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication event fail action next-method&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication event server dead action authorize voice&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication event server dead action authorize vlan 123&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication event server alive action reinitialize&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication host-mode multi-auth&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication order dot1x mab&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication priority dot1x mab&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication port-control auto&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication periodic&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication timer reauthenticate server&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication violation restrict&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x timeout tx-period 10&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x timeout held-period 300&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x timeout quiet-period 300&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x timeout ratelimit-period 300&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x pae authenticator&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&amp;nbsp;&amp;nbsp; exit &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;fi&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 15:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491653#M516979</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-05-24T15:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE w/ FlexConnect APs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491654#M516980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've sen some mention in certain posts of issues where if the macro had been run, with an AP plugged in, then the switch lost power, the macro configuration would be permanent and not reset.&amp;nbsp; Do you know if this is still a concern?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 16:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491654#M516980</guid>
      <dc:creator>Razmeth</dc:creator>
      <dc:date>2018-05-24T16:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE w/ FlexConnect APs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491655#M516982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven’t tested that.  I would almost consider that is a bug.  If the AP comes up after the reboot and the port is in the Up condition then the macro should be there.  When the AP is unplugged I would expect the Down condition to run.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 16:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-w-flexconnect-aps/m-p/3491655#M516982</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-05-24T16:35:39Z</dc:date>
    </item>
  </channel>
</rss>

