<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x and MAB authentication using a Workgroup in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395076#M548525</link>
    <description>Hi Arne,&lt;BR /&gt;&lt;BR /&gt;Excellent.&lt;BR /&gt;&lt;BR /&gt;I will try all that you have suggested.&lt;BR /&gt;&lt;BR /&gt;I do have a Cisco Catalyst switch, a Windows 7 (just not an AD or&lt;BR /&gt;Certificate server) so was wondering also if there is a&lt;BR /&gt;quick to match on the Windows Workstation (non-domain) attribute to just&lt;BR /&gt;create an authentication and authorization policy to make things work.&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;BR /&gt;</description>
    <pubDate>Wed, 06 Jun 2018 16:09:45 GMT</pubDate>
    <dc:creator>latenaite2011</dc:creator>
    <dc:date>2018-06-06T16:09:45Z</dc:date>
    <item>
      <title>802.1x and MAB authentication using a Workgroup</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3394731#M548523</link>
      <description>&lt;P&gt;Just wondering what is the best way to test 802.1x and MAB authentication using a workgroup without an AD or certificate environment.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3394731#M548523</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2020-02-21T18:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and MAB authentication using a Workgroup</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3394756#M548524</link>
      <description>&lt;P&gt;you can fake this with a clever lab setup - all the tools are available in open source.&amp;nbsp; Have a look at my 3 part series of how to do this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="Rapid prototyping ISE Policies without any real networking hardware (part 1)" href="https://communities.cisco.com/community/technology/security/pa/ise/blog/2017/05/04/rapid-prototyping-ise-policies-without-any-real-networking-hardware" target="_self"&gt;Rapid prototyping ISE Policies without any real networking hardware (part 1)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A title="Rapid prototyping ISE Policies without any real networking hardware (part 2)" href="https://communities.cisco.com/community/technology/security/pa/ise/blog/2017/05/04/rapid-prototyping-ise-policies-without-any-real-networking-hardware-part-2" target="_self"&gt;Rapid prototyping ISE Policies without any real networking hardware (part 2)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A title="Rapid prototyping ISE Policies without any real networking hardware (part 3)" href="https://communities.cisco.com/community/technology/security/pa/ise/blog/2017/05/04/rapid-prototyping-ise-policies-without-any-real-networking-hardware-part-3" target="_self"&gt;Rapid prototyping ISE Policies without any real networking hardware (part 3)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I use this all the time to test EAP-EAP, EAP-TLS, PAP/ASCII auth&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 05:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3394756#M548524</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-06-06T05:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and MAB authentication using a Workgroup</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395076#M548525</link>
      <description>Hi Arne,&lt;BR /&gt;&lt;BR /&gt;Excellent.&lt;BR /&gt;&lt;BR /&gt;I will try all that you have suggested.&lt;BR /&gt;&lt;BR /&gt;I do have a Cisco Catalyst switch, a Windows 7 (just not an AD or&lt;BR /&gt;Certificate server) so was wondering also if there is a&lt;BR /&gt;quick to match on the Windows Workstation (non-domain) attribute to just&lt;BR /&gt;create an authentication and authorization policy to make things work.&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Jun 2018 16:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395076#M548525</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2018-06-06T16:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and MAB authentication using a Workgroup</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395296#M548526</link>
      <description>&lt;P&gt;well you could always create local identities (accounts) on ISE and then authenticate against those.&amp;nbsp; Not sure what you mean exactly by matching on workgroup attributes?&amp;nbsp; Maybe an example (I am not a Microsoft jockey ;-&amp;gt; )&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 22:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395296#M548526</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-06-06T22:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and MAB authentication using a Workgroup</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395355#M548527</link>
      <description>Hi Anre,&lt;BR /&gt;&lt;BR /&gt;I am good with this. Thank you for the reply.&lt;BR /&gt;&lt;BR /&gt;I was able to test your radclient tool and works fine. Thank you!&lt;BR /&gt;&lt;BR /&gt;I was able to get MAB authentication working on a laptop that was&lt;BR /&gt;configured part of a Endpoint group and was trying to test with a different&lt;BR /&gt;laptop newly plugged in.  I wasn't able to connect, which is fail, but the&lt;BR /&gt;"show authen session" fails that is it Authz Failed (see below), but I&lt;BR /&gt;don't see the Mab authentication ( I have made sure that 802.1x is&lt;BR /&gt;disabled).&lt;BR /&gt;&lt;BR /&gt;Port 7 is configured similar to the one that was working.  So why wouldn't&lt;BR /&gt;it show mab for method?&lt;BR /&gt;&lt;BR /&gt;Secondly, I was testing port 2/0/6 again and had disconnected the cable for&lt;BR /&gt;a different test and thought I would try connect, now that computer can't&lt;BR /&gt;connect and don't get authen successful.  I noticed that the mac address of&lt;BR /&gt;that computer is not under the Endpoint Group that I added it to (which&lt;BR /&gt;matched the policy that I created it for). Why would  a mac address get&lt;BR /&gt;deleted from a Identity Group under Work Centers, Device Admin - Identity&lt;BR /&gt;Groups - Endpoint Identity Groups - Workgroup..&lt;BR /&gt;&lt;BR /&gt;Gi2/0/7    0026.b99f.09b5  N/A      DATA     Authz Failed&lt;BR /&gt; C0A8015D000001E20C2BCE18&lt;BR /&gt;&lt;BR /&gt;Does the mac address get deleted every time a computer disconnects?&lt;BR /&gt;&lt;BR /&gt;So what would happen to we manually add a mac address to a Whitelist&lt;BR /&gt;EndPoint Identity group and that gets deleted if the computer is&lt;BR /&gt;disconnected, we have to add it back everytime?&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2018 00:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395355#M548527</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2018-06-07T00:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and MAB authentication using a Workgroup</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395356#M548528</link>
      <description>&lt;P&gt;Although I understand the theory of MAB, I don't have much experience with wired switches at the moment. I mostly deal with MAB in the context of wireless guest.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using profiling then perhaps the endpoint gets moved from one Endpoint Identity Group to another. I don't use profiling so I wouldn't know.&amp;nbsp; When I have placed a MAC address in an Endpoint Identity Group then it has always remained there, unless I deleted it via the Context Visibility page, or if I deleted a Sponsored Guest Account via the Sponsor Portal (and that is then the expected behaviour).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jun 2018 01:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395356#M548528</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-06-07T01:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x and MAB authentication using a Workgroup</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395366#M548529</link>
      <description>Hi Arne,&lt;BR /&gt;&lt;BR /&gt;Yes, looks like it was because of me deleting the endpoint from the Context&lt;BR /&gt;Visibility.&lt;BR /&gt;&lt;BR /&gt;That is how I tested with dot1x too so have to see how to go about being&lt;BR /&gt;able to test this again under 802.1x if the mac has&lt;BR /&gt;been provided.&lt;BR /&gt;&lt;BR /&gt;thank you!&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2018 02:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-and-mab-authentication-using-a-workgroup/m-p/3395366#M548529</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2018-06-07T02:19:45Z</dc:date>
    </item>
  </channel>
</rss>

