<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNAC policy templates 802.1X/Mab in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4060711#M559456</link>
    <description>&lt;P&gt;Thanks Greg.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue I have is that the 3 service templates all show 'access-session port-control auto'. Should this be the case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;template DefaultWiredDot1xClosedAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xxx&lt;BR /&gt;mab&lt;BR /&gt;access-session closed&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xClosedAuth_1X_MAB&lt;BR /&gt;!&lt;BR /&gt;template DefaultWiredDot1xLowImpactAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xxx&lt;BR /&gt;mab&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xLowImpactAuth_1X_MAB&lt;BR /&gt;!&lt;BR /&gt;template DefaultWiredDot1xOpenAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xxx&lt;BR /&gt;mab&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB&lt;/P&gt;</description>
    <pubDate>Tue, 07 Apr 2020 10:04:00 GMT</pubDate>
    <dc:creator>Aileron88</dc:creator>
    <dc:date>2020-04-07T10:04:00Z</dc:date>
    <item>
      <title>DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4060048#M559430</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hoping someone can clear up some confusion. I'm looking at the default policy maps that DNA pushes to NADs for 802.1X/MAB and the Open Auth, Low Impact and Closed mode templates all look almost identical bar a couple of very small differences. See below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Open Authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;5 class DOT1X_FAILED do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure&lt;BR /&gt;10 activate service-template DefaultCriticalAuthVlan_SRV_TEMPLATE&lt;BR /&gt;20 activate service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;BR /&gt;30 authorize&lt;BR /&gt;40 pause reauthentication&lt;BR /&gt;20 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;30 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;40 class MAB_FAILED do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authentication-restart 60&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;BR /&gt;event aaa-available match-all&lt;BR /&gt;10 class IN_CRITICAL_AUTH do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;20 class NOT_IN_CRITICAL_AUTH do-until-failure&lt;BR /&gt;10 resume reauthentication&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event inactivity-timeout match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;event authentication-success match-all&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 restrict&lt;BR /&gt;event authorization-failure match-all&lt;BR /&gt;10 class AUTHC_SUCCESS-AUTHZ_FAIL do-until-failure&lt;BR /&gt;10 authentication-restart 60&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Low Impact&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber PMAP_DefaultWiredDot1xLowImpactAuth_1X_MAB&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;5 class DOT1X_FAILED do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure&lt;BR /&gt;10 activate service-template DefaultCriticalAuthVlan_SRV_TEMPLATE&lt;BR /&gt;20 activate service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;BR /&gt;25 activate service-template DefaultCriticalAccess_SRV_TEMPLATE&lt;BR /&gt;30 authorize&lt;BR /&gt;40 pause reauthentication&lt;BR /&gt;20 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;30 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;40 class MAB_FAILED do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authentication-restart 60&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;BR /&gt;event aaa-available match-all&lt;BR /&gt;10 class IN_CRITICAL_AUTH do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;20 class NOT_IN_CRITICAL_AUTH do-until-failure&lt;BR /&gt;10 resume reauthentication&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event inactivity-timeout match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;event authentication-success match-all&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 restrict&lt;BR /&gt;event authorization-failure match-all&lt;BR /&gt;10 class AUTHC_SUCCESS-AUTHZ_FAIL do-until-failure&lt;BR /&gt;10 authentication-restart 60&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Closed Mode&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber PMAP_DefaultWiredDot1xClosedAuth_1X_MAB&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;5 class DOT1X_FAILED do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure&lt;BR /&gt;10 activate service-template DefaultCriticalAuthVlan_SRV_TEMPLATE&lt;BR /&gt;20 activate service-template DefaultCriticalVoice_SRV_TEMPLATE&lt;BR /&gt;30 authorize&lt;BR /&gt;40 pause reauthentication&lt;BR /&gt;20 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;30 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;40 class MAB_FAILED do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authentication-restart 60&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;BR /&gt;event aaa-available match-all&lt;BR /&gt;10 class IN_CRITICAL_AUTH_CLOSED_MODE do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;20 class NOT_IN_CRITICAL_AUTH_CLOSED_MODE do-until-failure&lt;BR /&gt;10 resume reauthentication&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event inactivity-timeout match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;event authentication-success match-all&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 restrict&lt;BR /&gt;event authorization-failure match-all&lt;BR /&gt;10 class AUTHC_SUCCESS-AUTHZ_FAIL do-until-failure&lt;BR /&gt;10 authentication-restart 60&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They also have identical interface templates. I'm only showing one but they're the same across all 3 templates:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;template DefaultWiredDot1xOpenAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xxx&lt;BR /&gt;mab&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my question is, previoulsy we would have commands such as 'authentication open' on the port to implement monitor-mode and ignore the access-reject messages. With these default templates pushed from DNAC, it would seem that you do not get access if the port recieves an access-reject even in open mode and the control is based solely on the ISE policy. Is there something I'm missing here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 15:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4060048#M559430</guid>
      <dc:creator>Aileron88</dc:creator>
      <dc:date>2020-04-06T15:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4060580#M559449</link>
      <description>&lt;P&gt;The main difference between the &lt;EM&gt;&lt;STRONG&gt;PMAP_DefaultWiredDot1xOpenAuth_1X_MAB&lt;/STRONG&gt;&lt;/EM&gt; and &lt;EM&gt;&lt;STRONG&gt;PMAP_DefaultWiredDot1xLowImpactAuth_1X_MAB&lt;/STRONG&gt;&lt;/EM&gt; policy-maps is that the latter adds the &lt;STRONG&gt;&lt;EM&gt;DefaultCriticalAccess_SRV_TEMPLATE&lt;/EM&gt;&lt;/STRONG&gt;. This Service Template applies a permissive Critical ACL to override the restrictive Pre-Auth ACL configured on the switchport for Low Impact Mode.&lt;/P&gt;
&lt;P&gt;The &lt;EM&gt;&lt;STRONG&gt;PMAP_DefaultWiredDot1xClosedAuth_1X_MAB&lt;/STRONG&gt;&lt;/EM&gt; policy-map removes the &lt;STRONG&gt;&lt;EM&gt;DefaultCriticalAccess_SRV_TEMPLATE&lt;/EM&gt;&lt;/STRONG&gt; and uses a different class-map (&lt;EM&gt;&lt;STRONG&gt;IN_CRITICAL_AUTH_CLOSED_MODE&lt;/STRONG&gt;&lt;/EM&gt;) that also includes the Critical VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the IBNS 2.0 framework used by newer switches and DNAC, the old 'authentication open' syntax is replaced by 'access-session open' and the default mode on the interfaces is open access. Both Monitor Mode and Low Impact Mode use open access, so the templates do not require this configuration. If you look at the template &lt;STRONG&gt;&lt;EM&gt;DefaultWiredDot1xClosedAuth&lt;/EM&gt;&lt;/STRONG&gt;, you should see the 'access-session closed' command.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 05:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4060580#M559449</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-04-07T05:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4060711#M559456</link>
      <description>&lt;P&gt;Thanks Greg.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue I have is that the 3 service templates all show 'access-session port-control auto'. Should this be the case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;template DefaultWiredDot1xClosedAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xxx&lt;BR /&gt;mab&lt;BR /&gt;access-session closed&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xClosedAuth_1X_MAB&lt;BR /&gt;!&lt;BR /&gt;template DefaultWiredDot1xLowImpactAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xxx&lt;BR /&gt;mab&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xLowImpactAuth_1X_MAB&lt;BR /&gt;!&lt;BR /&gt;template DefaultWiredDot1xOpenAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport access vlan xxx&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan xxx&lt;BR /&gt;mab&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 10:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4060711#M559456</guid>
      <dc:creator>Aileron88</dc:creator>
      <dc:date>2020-04-07T10:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4061284#M559464</link>
      <description>&lt;P&gt;Yes. That command enables port-based authentication, so it applies to all three deployment modes.&lt;/P&gt;
&lt;P&gt;See this chapter on &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-9/configuration_guide/sec/b_169_sec_9500_cg/ieee_802_1x_vlan_assignment.html#task_vwm_qv3_kdb" target="_self"&gt;Enabling IEEE 802.1X Authentication and Authorization&lt;/A&gt; for more info.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 22:58:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4061284#M559464</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-04-07T22:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4158889#M563082</link>
      <description>&lt;P&gt;I'm using open auth and dot1x/MAB mode. My clients fails since there are no "switchport access vlan" in my template configured by DNAC. How come you have that in yours and how do i add it? DHCP doesn't work while dot1x is running and my devices fails since they have to be profiled in ISE based on DHCP information.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;template DefaultWiredDot1xOpenAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout supp-timeout 7&lt;BR /&gt;dot1x max-req 3&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 2046&lt;BR /&gt;mab&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xOpenAuth_1X_MAB&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4158889#M563082</guid>
      <dc:creator>Cyptic man</dc:creator>
      <dc:date>2020-09-29T17:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4159746#M563120</link>
      <description>&lt;P&gt;Please assign VLAN from ISE. The newer DNA Center releases are behaving as you described. IIRC the older ones have the critical data VLAN in these templates.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 23:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4159746#M563120</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-09-30T23:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4531225#M572199</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have we just started our deployment of DNA Center. However, I don't see any templates having to do with 802.1x out of the box. Where can I find them? This newer 802.1x IBNS 2.0 command is giving me a hard time creating a template manually.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 00:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4531225#M572199</guid>
      <dc:creator>BenLora79498</dc:creator>
      <dc:date>2022-01-14T00:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4531234#M572200</link>
      <description>&lt;P&gt;If you're doing SDA (SD Access) in DNAC, you won't see the template in DNAC GUI. DNAC just pushes the commands down to the Edge device when you provision the device. If you are not doing SDA, then I guess you'd need to feed each command through DNAC templates. I don't see the benefit in that - DNAC went backwards in my opinion (versus what Prime was able to do more intelligently) - I am not saying that Prime can do a better job - just saying that pushing "conf t" commands to a device can be done with free tools as well (or copy and paste from an Excel template generator). Template-based config is not the future. SDA finally improves the situation by avoiding the need for having to care about hundreds of commands.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only place where I have seen any form of Machine-Generated templates is in a Cisco VIRL/CML IOS Layer2 image where the Auto Identity feature seems to exist. Another great feature but shrouded in mystery. AI (Auto Identity) had templates baked into the IOS that you could call up. &lt;A href="https://community.cisco.com/t5/switching/does-ibns-2-0-auto-identity-ai-exist-for-ios-xe/td-p/4170657" target="_self"&gt;Have a look at this old posting&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 01:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4531234#M572200</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-01-14T01:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4531805#M572219</link>
      <description>&lt;P&gt;Thank you, Arne&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a bit frustrating from my point of view. Not everyone is going to go in the direction of SDA. And now that DNAC only supports&amp;nbsp;&lt;SPAN&gt;IBNS 2.0 command it's making our deployment of 802.x much more difficult than it needs to be. Cisco should provide a way to implement 802.1x from a simple configuration via DNAC. The whole premise of DNAC is to make things simple, yet this is far from the case as it relates to deploying 802.1x.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 20:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4531805#M572219</guid>
      <dc:creator>BenLora79498</dc:creator>
      <dc:date>2022-01-14T20:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC policy templates 802.1X/Mab</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4554994#M572849</link>
      <description>&lt;P&gt;100% true..dnac made the life difficult with ibns way of dot1x configuration for non SDA environment.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Feb 2022 08:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-policy-templates-802-1x-mab/m-p/4554994#M572849</guid>
      <dc:creator>hasitha siriwardhana</dc:creator>
      <dc:date>2022-02-18T08:20:38Z</dc:date>
    </item>
  </channel>
</rss>

