<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authenticating Trunk Ports - VLAN list in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authenticating-trunk-ports-vlan-list/m-p/3346868#M55968</link>
    <description>&lt;P&gt;Hi John,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even if you change the switchport mode to trunk, I'm not sure you'll be able to pass client's traffic because each MAC will have to be authenticated from switch perspective.(you'll need most likely a multi-host mode, so that one MAC - AP - would grant access to all MACs.&lt;/P&gt;
&lt;P&gt;Stil, multi-auth would usually place all other MACs into the same VLAN of the first authenticated host. You have to double check.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still, the good news is that you can use a service-template (I don't have ISE interface available now to check - this is how I remeber it's called - it's one of the first options in the authz profile settings) and send to the switch a specific string. When that string is received, the switch can apply a macro to your interface doing what you don't want to do manually &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a quick hint:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1/XE_330SG/configuration/guide/config/automacr.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1/XE_330SG/configuration/guide/config/automacr.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't have anything more specific now, but I think that will do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Mar 2018 15:56:33 GMT</pubDate>
    <dc:creator>Octavian Szolga</dc:creator>
    <dc:date>2018-03-12T15:56:33Z</dc:date>
    <item>
      <title>Authenticating Trunk Ports - VLAN list</title>
      <link>https://community.cisco.com/t5/network-access-control/authenticating-trunk-ports-vlan-list/m-p/2666560#M55966</link>
      <description>&lt;P&gt;I have a requirement to authenticate trunk ports to wireless access-points on our Cisco switch, By default all ports are access ports and we run MAB authentication. I have managed to change the port to a trunk using Cisco-av-pair attribute in ACS (cisco-av-pair = deivce-traffic-class=switch)&lt;/P&gt;&lt;P&gt;My problem now is that I need to add a VLAN allowed list on the port once it has changed to a trunk port (switchport trunk allowed vlan x,y,z). ideally we would not want to statically assign the VLAN's on each port as an AP could be on any port and may wish to authenticate other trunk ports using different VLAN's in the future.&amp;nbsp;Below is the configuration used on the ports.&lt;/P&gt;&lt;P&gt;cisp enable&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/2&lt;BR /&gt;&amp;nbsp;description *** Client Device ***&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;no logging event link-status&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication event server dead action reinitialize vlan 3&lt;BR /&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;BR /&gt;&amp;nbsp;authentication order mab dot1x webauth&lt;BR /&gt;&amp;nbsp;authentication priority mab dot1x webauth&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication fallback GUEST_FALLBACK&lt;BR /&gt;&amp;nbsp;mab eap&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 3&lt;BR /&gt;&amp;nbsp;dot1x timeout supp-timeout 10&lt;BR /&gt;&amp;nbsp;dot1x max-reauth-req 1&lt;BR /&gt;&amp;nbsp;dot1x timeout auth-period 600&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;John&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authenticating-trunk-ports-vlan-list/m-p/2666560#M55966</guid>
      <dc:creator>John Quick</dc:creator>
      <dc:date>2019-03-11T05:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Trunk Ports - VLAN list</title>
      <link>https://community.cisco.com/t5/network-access-control/authenticating-trunk-ports-vlan-list/m-p/3345682#M55967</link>
      <description>&lt;P&gt;I am looking at doing something similar to this for some flexconnect APs that I want to deploy.&amp;nbsp; I would imagine that adding a switchport trunk allowed vlans x,y,z to the initial port config would suffice and that the access vlan would become the native vlan for the trunk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this what you did or did you accomplish this some other way?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 16:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authenticating-trunk-ports-vlan-list/m-p/3345682#M55967</guid>
      <dc:creator>dmurech0488</dc:creator>
      <dc:date>2018-03-09T16:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Trunk Ports - VLAN list</title>
      <link>https://community.cisco.com/t5/network-access-control/authenticating-trunk-ports-vlan-list/m-p/3346868#M55968</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even if you change the switchport mode to trunk, I'm not sure you'll be able to pass client's traffic because each MAC will have to be authenticated from switch perspective.(you'll need most likely a multi-host mode, so that one MAC - AP - would grant access to all MACs.&lt;/P&gt;
&lt;P&gt;Stil, multi-auth would usually place all other MACs into the same VLAN of the first authenticated host. You have to double check.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still, the good news is that you can use a service-template (I don't have ISE interface available now to check - this is how I remeber it's called - it's one of the first options in the authz profile settings) and send to the switch a specific string. When that string is received, the switch can apply a macro to your interface doing what you don't want to do manually &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a quick hint:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1/XE_330SG/configuration/guide/config/automacr.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1/XE_330SG/configuration/guide/config/automacr.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't have anything more specific now, but I think that will do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Mar 2018 15:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authenticating-trunk-ports-vlan-list/m-p/3346868#M55968</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-03-12T15:56:33Z</dc:date>
    </item>
  </channel>
</rss>

