<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hello, i have a solution 802 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709446#M54531</link>
    <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have a solution 802.1x but radius server is Cisco ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in my case , config switch contain:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication banner ^Accessing AAA-Servers^C&lt;BR /&gt;aaa authentication fail-message ^AAA Authentication FAILED.^C&lt;BR /&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authentication login NOTACACS local&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authentication dot1x default group radius local&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group tacacs+ local&amp;nbsp;&lt;BR /&gt;aaa authorization commands 1 default group tacacs+ if-authenticated&amp;nbsp;&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ if-authenticated&amp;nbsp;&lt;BR /&gt;aaa authorization network default group radius local&amp;nbsp;&lt;BR /&gt;aaa accounting send stop-record authentication failure&lt;BR /&gt;aaa accounting delay-start&lt;BR /&gt;aaa accounting suppress null-username&lt;BR /&gt;aaa accounting nested&lt;BR /&gt;aaa accounting update periodic 1&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;BR /&gt;aaa accounting system default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip radius source-interface Vlan(managment)&amp;nbsp;vrf default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 32 include-in-access-req&amp;nbsp;&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server host X.X.X.X auth-port 1645 acct-port 1646 key 7 XXXXXX&lt;BR /&gt;radius-server host X.X.X.X auth-port 1645 acct-port 1646 key 7 XXXXXX&lt;BR /&gt;radius-server key 7 XXXXXX&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;I hope this helps&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
    <pubDate>Tue, 04 Aug 2015 08:19:36 GMT</pubDate>
    <dc:creator>Tiago Marques</dc:creator>
    <dc:date>2015-08-04T08:19:36Z</dc:date>
    <item>
      <title>Cisco Catalyst 2960-S switch configured for 802.1x does not send Radius access request to Radius server</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709445#M54529</link>
      <description>&lt;P&gt;Setup&lt;/P&gt;&lt;P&gt;Cisco Catalyst 2960-S running 15.0.2-SE8&lt;/P&gt;&lt;P&gt;Radius Server running freeRadius on Centos 6.4&lt;/P&gt;&lt;P&gt;Client(Supplicant) running&amp;nbsp;Windows 7&lt;/P&gt;&lt;P&gt;When Windows client is connected to switch port(port 12 in my configuration) that has 802.1x authentication enabled, Wireshark show Catalyst is sending EAP Request and client responds&amp;nbsp;with EAP Response. But the request to Radius server is not made. The test utility for radius "test aaa group radius testuser password new-code" works.&lt;BR /&gt;Below is my running config. Any advice would be greatly appreciated.&lt;BR /&gt;myswitch#show running-&lt;BR /&gt;myswitch#show running-config&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 2094 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname myswitch&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 $1$Z1z6$kqvVYRQdVRZ0h8aDTV5DR0 enable password password !&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x group group radius aaa accounting dot1x default start-stop group radius !&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;switch 1 provision ws-c2960s-24ts-l&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending interface FastEthernet0 &amp;nbsp;no ip address &amp;nbsp;shutdown !&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/6&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/7&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/9&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/11&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/12&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/13&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/14&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/16&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/17&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/18&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/19&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/20&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/21&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/22&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/23&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/24&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/25&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/26&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/27&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/28&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 10.1.2.12 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip sla enable reaction-alerts&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging host 10.1.2.1 transport tcp port 514 radius-server host 10.1.2.1 auth-port 1812 acct-port 1646 timeout 3 retransmit 3 key testing123 !&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;password password&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;password password&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/16&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/17&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/18&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/19&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709445#M54529</guid>
      <dc:creator>p.kamath1</dc:creator>
      <dc:date>2019-03-11T05:57:16Z</dc:date>
    </item>
    <item>
      <title>hello, i have a solution 802</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709446#M54531</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have a solution 802.1x but radius server is Cisco ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in my case , config switch contain:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication banner ^Accessing AAA-Servers^C&lt;BR /&gt;aaa authentication fail-message ^AAA Authentication FAILED.^C&lt;BR /&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authentication login NOTACACS local&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authentication dot1x default group radius local&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group tacacs+ local&amp;nbsp;&lt;BR /&gt;aaa authorization commands 1 default group tacacs+ if-authenticated&amp;nbsp;&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ if-authenticated&amp;nbsp;&lt;BR /&gt;aaa authorization network default group radius local&amp;nbsp;&lt;BR /&gt;aaa accounting send stop-record authentication failure&lt;BR /&gt;aaa accounting delay-start&lt;BR /&gt;aaa accounting suppress null-username&lt;BR /&gt;aaa accounting nested&lt;BR /&gt;aaa accounting update periodic 1&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;BR /&gt;aaa accounting system default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip radius source-interface Vlan(managment)&amp;nbsp;vrf default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 32 include-in-access-req&amp;nbsp;&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server host X.X.X.X auth-port 1645 acct-port 1646 key 7 XXXXXX&lt;BR /&gt;radius-server host X.X.X.X auth-port 1645 acct-port 1646 key 7 XXXXXX&lt;BR /&gt;radius-server key 7 XXXXXX&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;I hope this helps&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 08:19:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709446#M54531</guid>
      <dc:creator>Tiago Marques</dc:creator>
      <dc:date>2015-08-04T08:19:36Z</dc:date>
    </item>
    <item>
      <title>Did you run wireshark on the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709447#M54533</link>
      <description>&lt;P&gt;Did you run wireshark on the server seeing that the request arrived from the switch? If so did you make sure there is a response from the server? For Windows Server NPS (I've never tried Centos), you need to make sure that the request is associated to a policy which then either authenticates or denies access. Usually it's a matter of attributes such as Vendor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the configuration, it seems to me a bit off for the AAA. Try removing the:&lt;/P&gt;&lt;P&gt;"aaa authentication dot1x group group radius" line and using this instead:&lt;/P&gt;&lt;P&gt;"aaa authentication dot1x default group radius". After the word dot1x&amp;nbsp; you're meant to supply either an authentication list or the word default if you don't want to use a list.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 08:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709447#M54533</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2015-08-04T08:35:08Z</dc:date>
    </item>
    <item>
      <title>This is the running config</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709448#M54534</link>
      <description>&lt;P&gt;This is the running config that seems to work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;myswitch#show running-config&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 3849 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 05:17:41 UTC Mon Jan 2 2006&lt;BR /&gt;!&lt;BR /&gt;version 15.0&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname myswitch&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 $1$Z1z6$kqvVYRQdVRZ0h8aDTV5DR0&lt;BR /&gt;enable password password&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;switch 1 provision ws-c2960s-24ts-l&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/6&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/7&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/9&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/11&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/12&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication violation replace&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/13&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/14&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/16&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/17&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/18&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/19&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/20&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/22&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/23&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/24&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/25&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/26&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/27&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/28&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 10.1.2.12 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface GigabitEthernet1/0/1&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging host 10.1.2.1 transport tcp port 514&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius-server host 10.1.2.1 auth-port 1812 timeout 3 retransmit 3 key testing123&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;password password&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;password password&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 20:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709448#M54534</guid>
      <dc:creator>p.kamath1</dc:creator>
      <dc:date>2015-08-04T20:05:37Z</dc:date>
    </item>
    <item>
      <title>Glad things worked out :)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709449#M54537</link>
      <description>&lt;P&gt;Glad things worked out &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 20:08:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709449#M54537</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2015-08-04T20:08:12Z</dc:date>
    </item>
    <item>
      <title>Note that 2960S is not device</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709450#M54539</link>
      <description>&lt;P&gt;Note that 2960S is not device of Small Business product line, so you are off-topic here. This thread should be moved to &lt;A href="https://supportforums.cisco.com/community/5936/aaa-identity-and-nac"&gt;AAA, Identity and NAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2015 19:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709450#M54539</guid>
      <dc:creator>Dan Lukes</dc:creator>
      <dc:date>2015-08-09T19:25:21Z</dc:date>
    </item>
    <item>
      <title>This discussion has been</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709451#M54540</link>
      <description>&lt;P&gt;This discussion has been reposted from LAN, Switching and Routing to the &lt;A href="https://supportforums.cisco.com/community/5936/aaa-identity-and-nac"&gt;AAA, Identity and NAC&lt;/A&gt; community.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 22:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-catalyst-2960-s-switch-configured-for-802-1x-does-not-send/m-p/2709451#M54540</guid>
      <dc:creator>rosaho</dc:creator>
      <dc:date>2015-08-13T22:08:00Z</dc:date>
    </item>
  </channel>
</rss>

