<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Configuration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045654#M558878</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 1. You need to make sure that the Windows supplicant is properly configured for the EAP(802.1x) method that ISE expects.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 2. Make sure "aaa authorization network" is configured if you receive any authorisations from ISE (like ACL or VLAN), if you receive a VLAN make sure the VLAN is created on the switch, if you receive a VLAN name, make sure a VLAN on the switch with the exact same name exists. Use this document as a reference to validate your configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Mar 2020 17:00:17 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2020-03-13T17:00:17Z</dc:date>
    <item>
      <title>802.1x Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045206#M558857</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently in the process of configure 802.1x for my classified network. Here is what I am working with:&lt;/P&gt;&lt;P&gt;Windows 10 workstations (suplicants using windows suplicant software)&lt;/P&gt;&lt;P&gt;C3900 switch stack (authenticator)&lt;/P&gt;&lt;P&gt;Cisco ISE (Radius authentication server)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the supplicants. Configured the switches with global aaa commands and interface with dot1x commands, and configured the Radius server in the cisco ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the problem... When I try to authenticate from the workstation, it authenticates my user sucessfully but the workstation is denied. When I look at the Radius logs in the ISE, it tells me that authentication is resulting in pass for my user credentials, but the workstation is being denied. As a result, I am allowed to login in the workstation, but no access to the network is granted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was hoping someone can point me in the right direction on how to fix this issue. I could provide more details if necessary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 19:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045206#M558857</guid>
      <dc:creator>AbelBurgos5029</dc:creator>
      <dc:date>2020-03-12T19:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045220#M558859</link>
      <description>&lt;P&gt;Would need to see your dot1x configuration that you have on the switch along with the error message you are getting on ISE in the Live Logs.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 20:28:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045220#M558859</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-03-12T20:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045442#M558864</link>
      <description>&lt;P&gt;As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp; suggested we need to see yourconfig with logs on ISE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is some reference guide if you like to investigate and read for your intrest:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/sec/b_166_sec_9300_cg/configuring_ieee_802_1x_port_based_authentication.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/sec/b_166_sec_9300_cg/configuring_ieee_802_1x_port_based_authentication.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 11:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045442#M558864</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-03-13T11:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045490#M558868</link>
      <description>&lt;P&gt;Since its on a classified environment, I cant share the full configurations, but the port I am testing has the following 802.1x configs on it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#ip access-group PRE-AUTH in - this is a ACL i created to allow access to some things prior authorization such as DHCP.&lt;/P&gt;&lt;P&gt;#authentication open&lt;/P&gt;&lt;P&gt;#authentication port-control auto&lt;/P&gt;&lt;P&gt;#dot1x pae authenticator&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ISE server Radius Live logs is giving me the following error:&lt;/P&gt;&lt;P&gt;"The client stopped responding to EAP session and started a new one"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried different options on the client authentication tab, but nothing seems to fix the issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "Automatically use my Windows logon name and password (and domain if any)" checkbox is not selected because it is not allowing me to select it. I assume this is something that needs to be changed in the Group Policy, but have not been able to figure out how to do that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps. Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 12:55:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045490#M558868</guid>
      <dc:creator>AbelBurgos5029</dc:creator>
      <dc:date>2020-03-13T12:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045596#M558872</link>
      <description>From a 8021x onboarding perspective what exactly are you trying to accomplish? What I mean by this is, what sec protocol are you attempting to use? Are you wishing to accomplish both user and computer authentication prior to pushing authz policy? If so, eap-chaining is supported via EAP-Fast that requires you to use Cisco AnyConnect NAM.  Or are you looking to utilize eap-tls for comp auth only?  Can you share how you have the native supplicant configured? It will help us better assist you.</description>
      <pubDate>Fri, 13 Mar 2020 15:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045596#M558872</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-03-13T15:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045654#M558878</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 1. You need to make sure that the Windows supplicant is properly configured for the EAP(802.1x) method that ISE expects.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 2. Make sure "aaa authorization network" is configured if you receive any authorisations from ISE (like ACL or VLAN), if you receive a VLAN make sure the VLAN is created on the switch, if you receive a VLAN name, make sure a VLAN on the switch with the exact same name exists. Use this document as a reference to validate your configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 17:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4045654#M558878</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-13T17:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4048872#M559017</link>
      <description>&lt;P&gt;How are you trying to&amp;nbsp; authenticate the machines (MAC, certificate, etc.)?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 18:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration/m-p/4048872#M559017</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-03-19T18:54:16Z</dc:date>
    </item>
  </channel>
</rss>

