<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IBNS 2 with Microsoft NPS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4102533#M561175</link>
    <description>&lt;P&gt;It depends on your endpoint supplicant configuration.&lt;/P&gt;
&lt;P&gt;One of the options should be for it to automatically provide the user's login credentials:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 354px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/76628i1FCD1B7CCE5C91D2/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If you have this checked it will NOT prompt for the username/password!&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jun 2020 23:15:04 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2020-06-12T23:15:04Z</dc:date>
    <item>
      <title>IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099488#M561023</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Been attempting to setup Dot1x auth with Microsoft NPS server and have had a really hard time finding documentation for this because everything out there is IBNS 2 with ISE, which I don't have ISE and we aren't planning on getting it at this time.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to configure based on the below guide using single host mode. I'm looking to have a very basic setup to start building my confidence in this setup.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-x-series-switches/207193-Configure-IBNS-2-0-for-Single-Host-and-M.html#anc0" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-x-series-switches/207193-Configure-IBNS-2-0-for-Single-Host-and-M.html#anc0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've contact TAC and they say my switch config is correct but then send me to&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-top" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-top&lt;/A&gt;&amp;nbsp;for the NPS configuration which is not helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To describe what happens at this point, i do the configurations, plug in my laptop to test auth and it just connects me right to the port without prompting for credentials.&amp;nbsp; This doesn't seem to be correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any tips or guidance would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2020 17:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099488#M561023</guid>
      <dc:creator>jon101</dc:creator>
      <dc:date>2020-06-08T17:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099507#M561025</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;have you enabled dot1x authentication on the wired auto config and what is the configuration settings?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on the switch&lt;/P&gt;&lt;P&gt;show authentication session &amp;lt;interface&amp;gt; detail --&amp;gt; to show if its dot1x or mab authentication which is happen?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2020 17:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099507#M561025</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2020-06-08T17:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099613#M561032</link>
      <description>Here is my output:&lt;BR /&gt;&lt;BR /&gt;Interface MAC Address Method Domain Status Fg Session ID&lt;BR /&gt;--------------------------------------------------------------------------------------------&lt;BR /&gt;Gi1/0/5 a401.a051.4c0f dot1x UNKNOWN Unauth 0705000A0000001194AE5DAB&lt;BR /&gt;&lt;BR /&gt;Key to Session Events Blocked Status Flags:&lt;BR /&gt;&lt;BR /&gt;A - Applying Policy (multi-line status for details)&lt;BR /&gt;D - Awaiting Deletion&lt;BR /&gt;F - Final Removal in progress&lt;BR /&gt;I - Awaiting IIF ID allocation&lt;BR /&gt;P - Pushed Session&lt;BR /&gt;R - Removing User Profile (multi-line status for details)&lt;BR /&gt;U - Applying User Profile (multi-line status for details)&lt;BR /&gt;X - Unknown Blocker&lt;BR /&gt;&lt;BR /&gt;Runnable methods list:&lt;BR /&gt;Handle Priority Name&lt;BR /&gt;11 5 dot1xSup&lt;BR /&gt;2 5 dot1x&lt;BR /&gt;12 10 webauth&lt;BR /&gt;1 15 mab&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Jun 2020 19:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099613#M561032</guid>
      <dc:creator>jon101</dc:creator>
      <dc:date>2020-06-08T19:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099689#M561035</link>
      <description>&lt;P&gt;You have not provided any useful information about the endpoint's 802.1X supplicant configuration nor the switch.&lt;/P&gt;
&lt;P&gt;Please see &lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_self"&gt;How to Ask The Community for Help&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;The Windows wired supplicant is disabled by default and it is unclear if you have enabled it and what behavior you configured.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 349px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/76293i2DFCBFDACBD1A35E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 301px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/76294iEA0E9817491583A1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 300px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/76295i6BB8D72ED33A5F15/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2020 23:13:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099689#M561035</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-06-08T23:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099764#M561043</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2011/11/17/configuring-cisco-switch-dot1x-authentication-with-windows-nps-radius/" target="_blank"&gt;https://integratingit.wordpress.com/2011/11/17/configuring-cisco-switch-dot1x-authentication-with-windows-nps-radius/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the wired see this basic configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=ftC3NLPDgDo" target="_blank"&gt;https://www.youtube.com/watch?v=ftC3NLPDgDo&lt;/A&gt;&amp;nbsp;--&amp;gt; there is two part video you can go through the configuration how he has done the same.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2020 04:30:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4099764#M561043</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2020-06-09T04:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100250#M561078</link>
      <description>&lt;P&gt;Here is all of the configuration that i've done up to this point:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch configuration that is relevant:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa group server radius NPS_SERVERS&lt;BR /&gt;server name NDC&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication enable default none&lt;BR /&gt;aaa authentication dot1x default group NPS_SERVERS&lt;BR /&gt;aaa authorization network default group NPS_SERVERS&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting identity default start-stop group NPS_SERVERS&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 192.168.0.10 server-key 7 password&lt;BR /&gt;aaa session-id common&lt;BR /&gt;match result-type aaa-timeout&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;policy-map type control subscriber TEST&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 authenticate using dot1x priority 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;switchport mode access&lt;BR /&gt;access-session host-mode single-host&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;service-policy type control subscriber TEST&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;BR /&gt;!&lt;BR /&gt;radius server NDC&lt;BR /&gt;address ipv4 192.168.0.10 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 password&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;H2&gt;NPS Configuration&lt;/H2&gt;&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NPS_Config_LI.jpg" style="width: 642px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/76363i85FB5A7275A3044B/image-size/large?v=v2&amp;amp;px=999" role="button" title="NPS_Config_LI.jpg" alt="NPS_Config_LI.jpg" /&gt;&lt;/span&gt;&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Endpoint NIC Conifg&lt;/H2&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NicConfig.PNG" style="width: 788px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/76362iB5ACC9566E2C2049/image-size/large?v=v2&amp;amp;px=999" role="button" title="NicConfig.PNG" alt="NicConfig.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 09 Jun 2020 17:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100250#M561078</guid>
      <dc:creator>jon101</dc:creator>
      <dc:date>2020-06-09T17:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100254#M561079</link>
      <description>Hi Nitesh,&lt;BR /&gt;Thanks for your post. I've reviewed both your posts and the first isn't using the IBNS 2.0. The second is using certificates to authenticate, which i'm looking wanting it to prompt for a password.</description>
      <pubDate>Tue, 09 Jun 2020 17:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100254#M561079</guid>
      <dc:creator>jon101</dc:creator>
      <dc:date>2020-06-09T17:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100533#M561092</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Understand the concept the switch from certificate to username and password is the selection of Peap instead of using Certficate and the ISE policy where you say using PEAP as protocol and domain machine in the authorization to do the authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jun 2020 05:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100533#M561092</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2020-06-10T05:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100535#M561093</link>
      <description>&lt;P&gt;The config looks ok. what happens when you connect to the laptop to the port?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it still showing unknown?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;try to run a debug aaa dot1x to see where it fails.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jun 2020 05:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4100535#M561093</guid>
      <dc:creator>saxenanitesh8522</dc:creator>
      <dc:date>2020-06-10T05:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4101842#M561150</link>
      <description>&lt;P&gt;Debug aaa dot1x doesn't work on my switch.&amp;nbsp; Here is the&amp;nbsp;debug dot1x all.&amp;nbsp; &amp;nbsp;I've also included&amp;nbsp;debug aaa authentication &amp;amp; debug aaa authorization at the bottom.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jun 11 14:33:24 MST: dot1x-ev:[Gi1/0/36] Interface state changed to UP&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:DOT1X Supplicant not enabled on GigabitEthernet1/0/36&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth Gi1/0/36: initial state auth_initialize has enter&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023: initialising&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth Gi1/0/36: during state auth_initialize, got event 0(cfg_auto)&lt;BR /&gt;Jun 11 14:33:24 MST: @@@ dot1x_auth Gi1/0/36: auth_initialize -&amp;gt; auth_disconnected&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023: disconnected&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth Gi1/0/36: idle during state auth_disconnected&lt;BR /&gt;Jun 11 14:33:24 MST: @@@ dot1x_auth Gi1/0/36: auth_disconnected -&amp;gt; auth_restart&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023: entering restart&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Sending create new context event to EAP for 0x0E000023 (54e1.adad.2b35)&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth_bend Gi1/0/36: initial state auth_bend_initialize has enter&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023: entering init state&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth_bend Gi1/0/36: initial state auth_bend_initialize has idle&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_initialize, got event 16383(idle)&lt;BR /&gt;Jun 11 14:33:24 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_initialize -&amp;gt; auth_bend_idle&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering idle state&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Created a client entry (0x0E000023)&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Dot1x authentication started for 0x0E000023 (54e1.adad.2b35)&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting !EAP_RESTART on Client 0x0E000023&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth Gi1/0/36: during state auth_restart, got event 6(no_eapRestart)&lt;BR /&gt;Jun 11 14:33:24 MST: @@@ dot1x_auth Gi1/0/36: auth_restart -&amp;gt; auth_connecting&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:enter connecting state&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023: restart connecting&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting RX_REQ on Client 0x0E000023&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth Gi1/0/36: during state auth_connecting, got event 10(eapReq_no_reAuthMax)&lt;BR /&gt;Jun 11 14:33:24 MST: @@@ dot1x_auth Gi1/0/36: auth_connecting -&amp;gt; auth_authenticating&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023: authenticating state entered&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:connecting authenticating action&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting AUTH_START for 0x0E000023&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_idle, got event 4(eapReq_authStart)&lt;BR /&gt;Jun 11 14:33:24 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_idle -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet: length: 0x0005&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet: type: 0x1&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:idle request action&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet: length: 0x000F&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 1,LEN= 15&lt;/P&gt;&lt;P&gt;Jun 11 14:33:24 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.000f&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-packet: length: 0x000F&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:24 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:24 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x2 length: 0x0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x00A6&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 166&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.00a6&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x00A6&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x05D8&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x3 length: 0x05D8&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 6&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0200&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x4 length: 0x0200&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x00AF&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 175&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.00af&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x00AF&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x003D&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x5 length: 0x003D&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 6&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0006&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0024&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x6 length: 0x0024&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x002E&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 46&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.002e&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x002E&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0033&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x7 length: 0x0033&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0033&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 51&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0033&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0033&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x003C&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x8 length: 0x003C&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0064&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 100&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0064&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0064&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0052&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0x9 length: 0x0052&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0025&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 37&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0025&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0025&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_REQ for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 7(eapReq)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_request&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering request state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x006A&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x1 id: 0xB length: 0x006A&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: type: 0x19&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response request action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x006A&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Dequeued pkt: Int Gi1/0/36 CODE= 2,TYPE= 25,LEN= 106&lt;/P&gt;&lt;P&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Received pkt saddr =54e1.adad.2b35 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.006a&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x006A&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAPOL_EAP for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Response sent to the server from 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:request response action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Received an EAP Fail&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting EAP_FAIL for 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: during state auth_bend_response, got event 10(eapFail)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_response -&amp;gt; auth_bend_fail&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting response state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering fail state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:response fail action&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth_bend Gi1/0/36: idle during state auth_bend_fail&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth_bend Gi1/0/36: auth_bend_fail -&amp;gt; auth_bend_idle&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering idle state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting AUTH_FAIL on Client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth Gi1/0/36: during state auth_authenticating, got event 15(authFail)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth Gi1/0/36: auth_authenticating -&amp;gt; auth_authc_result&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:exiting authenticating state&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023:entering authc result state&lt;BR /&gt;Jun 11 14:33:25 MST: %DOT1X-5-FAIL: Authentication failed for client (54e1.adad.2b35) on Interface Gi1/0/36 AuditSessionID C0A800030000 00499A041BF9&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Added username in dot1x&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] Dot1x did not receive any key data&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[54e1.adad.2b35, Gi1/0/36] Received Authz fail (result: 3) for the client 0x0E000023 (54e1.adad.2b35)&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] Posting_AUTHZ_FAIL on Client 0x0E000023&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x_auth Gi1/0/36: during state auth_authc_result, got event 22(authzFail)&lt;BR /&gt;Jun 11 14:33:25 MST: @@@ dot1x_auth Gi1/0/36: auth_authc_result -&amp;gt; auth_held&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-sm:[54e1.adad.2b35, Gi1/0/36] 0x0E000023: held&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[0180.c200.0003, Gi1/0/36] Sending EAPOL packet to group PAE address&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-ev:[Gi1/0/36] Sending out EAPOL packet to MAC 0180.c200.0003&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet: length: 0x0004&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:EAP code: 0x4 id: 0xB length: 0x0004&lt;BR /&gt;Jun 11 14:33:25 MST: dot1x-packet:[54e1.adad.2b35, Gi1/0/36] EAPOL packet sent to client 0x0E000023&lt;BR /&gt;Jun 11 14:33:26 MST: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/36, changed state to up&lt;BR /&gt;Jun 11 14:33:27 MST: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/36, changed state to up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this help at all? My expectation is that when i plug in the ethernet cable that it will prompt me credentials.&amp;nbsp; Am i correct in my assumption?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 20:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4101842#M561150</guid>
      <dc:creator>jon101</dc:creator>
      <dc:date>2020-06-11T20:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4102533#M561175</link>
      <description>&lt;P&gt;It depends on your endpoint supplicant configuration.&lt;/P&gt;
&lt;P&gt;One of the options should be for it to automatically provide the user's login credentials:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 354px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/76628i1FCD1B7CCE5C91D2/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If you have this checked it will NOT prompt for the username/password!&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 23:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4102533#M561175</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-06-12T23:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: IBNS 2 with Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4103574#M561239</link>
      <description>&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks so much for replying. I've unchecked that hoping that it will prompt for a username and password and it still doesn't.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any other thoughts. Have you seen IBNS 2.0 work with Microsoft NPS server before?&amp;nbsp; I literally can only find configurations with ISE or using non IBNS 2.0 configurations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 17:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ibns-2-with-microsoft-nps/m-p/4103574#M561239</guid>
      <dc:creator>jon101</dc:creator>
      <dc:date>2020-06-15T17:25:58Z</dc:date>
    </item>
  </channel>
</rss>

