<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dot1x fail vlan doesn't work in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-fail-vlan-doesn-t-work/m-p/3321229#M550441</link>
    <description>&lt;P&gt;You are quite close, you need to look at your authorization policies instead of your authentication policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like from what you have if a client can't authenticate you reject their access, but what&amp;nbsp;I think you want to have happen is that if a client can't authenticate, send them on to the&amp;nbsp;authorization policy which will assign the correct VLAN now that we know the client is not properly authenticated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do your authorization policies look like? You could essentially have a default policy that says if a client fails authentication for any reason put them in the fallback VLAN.&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jan 2018 21:31:37 GMT</pubDate>
    <dc:creator>Ben Walters</dc:creator>
    <dc:date>2018-01-29T21:31:37Z</dc:date>
    <item>
      <title>Dot1x fail vlan doesn't work</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-fail-vlan-doesn-t-work/m-p/3321044#M550440</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;
&lt;P&gt;I have to implement in my company the Dot1x for the wired.&lt;/P&gt;
&lt;P&gt;As supplicant we use Anyconnect software, as authenticator WS-C3560-24PS with IPservices 12.2(58)SE2 and as authentication server Cisco ISE v.2.3.&lt;/P&gt;
&lt;P&gt;- - - - - - - -&lt;/P&gt;
&lt;P&gt;The scenario is a Multi Domain with Cisco IP Phone and client; the Cisco IP Phone have to be authenticated by MAB while the Client with AnyConnect Dot1x (with domain credentials and a pre-uploaded profile during the installation).&lt;/P&gt;
&lt;P&gt;The Cisco ISE reads the AD tree.&lt;/P&gt;
&lt;P&gt;- - - - - - - -&lt;/P&gt;
&lt;P&gt;My targets are easy:&lt;/P&gt;
&lt;P&gt;1) The Cisco IP Phone should be authenticate by MAB and put in a Voice VLAN.&lt;/P&gt;
&lt;P&gt;2a) The client should have the possibility of authenticate itself before the Windows Login (to log in to the Domain Controller).&lt;/P&gt;
&lt;P&gt;2b) The client should be authenticate by Dot1x if the credentials of domain inserted are right.&lt;/P&gt;
&lt;P&gt;It should be inserted in a VLAN decided by Cisco ISE (DVLAN).&lt;/P&gt;
&lt;P&gt;3) If the client inserts for 3 times wrong credentials, it must be put in a fallback vlan.&lt;/P&gt;
&lt;P&gt;4) If the client doesn't have a supplicant Dot1x, it must be put in a fallback vlan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- - - - - - - - - - - - - - -- - - - - - -&lt;/P&gt;
&lt;P&gt;Now all works except the fallback Vlan (with windows native dot1x client works, but with anyconnect few times).&lt;/P&gt;
&lt;P&gt;I poste my configuration on the switch:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization network default group radius &lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting system default start-stop group radius&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt;&amp;nbsp;client x.x.x.x server-key xxxx&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip device tracking&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/21&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 3&lt;BR /&gt;&amp;nbsp;authentication event fail retry 1 action authorize vlan 69&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-domain&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 1&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 30 tries 3&lt;BR /&gt;radius-server host x.x.x.x auth-port 1812 acct-port 1813 key x.x.x.x&lt;BR /&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- - - - - - - - - - - - - - -- - - - - - -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have also attached two screenshot from Cisco ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-fail-vlan-doesn-t-work/m-p/3321044#M550440</guid>
      <dc:creator>leofalconi</dc:creator>
      <dc:date>2020-02-21T18:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x fail vlan doesn't work</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-fail-vlan-doesn-t-work/m-p/3321229#M550441</link>
      <description>&lt;P&gt;You are quite close, you need to look at your authorization policies instead of your authentication policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like from what you have if a client can't authenticate you reject their access, but what&amp;nbsp;I think you want to have happen is that if a client can't authenticate, send them on to the&amp;nbsp;authorization policy which will assign the correct VLAN now that we know the client is not properly authenticated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do your authorization policies look like? You could essentially have a default policy that says if a client fails authentication for any reason put them in the fallback VLAN.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 21:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-fail-vlan-doesn-t-work/m-p/3321229#M550441</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2018-01-29T21:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x fail vlan doesn't work</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-fail-vlan-doesn-t-work/m-p/3321488#M550442</link>
      <description>&lt;P&gt;Yes,&lt;/P&gt;
&lt;P&gt;the correct flow should be this:&lt;/P&gt;
&lt;P&gt;- the client put the right username/password of domain? Go in a Corporate VLAN.&lt;/P&gt;
&lt;P&gt;- the client out the wrong usename/password for three times? Go in a FallBack VLAN (Only Internet Access).&lt;/P&gt;
&lt;P&gt;- the client doesn't have a supplicant dot1x? Go in a FallBack VLAN (Only Internet Access).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I'm handling the VLAN fallback from the switch but with anyconnect I have some problems.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;authentication event fail retry 3 action authorize vlan 69&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;How could I handle this configuration from ISE? Is it possible define in the default Authorization Policy the counter 3?&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 09:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-fail-vlan-doesn-t-work/m-p/3321488#M550442</guid>
      <dc:creator>leofalconi</dc:creator>
      <dc:date>2018-01-30T09:13:03Z</dc:date>
    </item>
  </channel>
</rss>

