<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Endpoints moving from dot1x to MAB. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4126928#M561959</link>
    <description>&lt;P&gt;The configuration looks fine.&amp;nbsp; It seems as though the PC is going to sleep or not receiving the EAPOL frames from the switch when the session timeout hits.&amp;nbsp; PC isn't responding to 802.1x authentication attempts so it times out and goes to MAB.&lt;/P&gt;&lt;P&gt;I know you said that there is a GPO to prevent the machines from going to sleep, but sometimes GPO's fail to apply to the machines properly for a number of reasons.&amp;nbsp; When this happens, can you call the user or physically visit the machine to ensure it is not sleeping?&amp;nbsp; If it is awake, then maybe the EAPOL frames aren't being passed by the phone.&lt;/P&gt;&lt;P&gt;When this happens, what does the switchport show?&amp;nbsp; Authenticated via MAB?&amp;nbsp; What happens if you were to just do a "clear access-session interface gx/y"?&amp;nbsp; Does that then trigger it to work?&amp;nbsp; Or just the port-bounce?&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jul 2020 20:38:57 GMT</pubDate>
    <dc:creator>Colby LeMaire</dc:creator>
    <dc:date>2020-07-28T20:38:57Z</dc:date>
    <item>
      <title>Endpoints moving from dot1x to MAB.</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4126321#M561949</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope you can help with this issue. I am seeing an issue with several endpoints and NADs, where the endpoint status in ISE doesn't match the endpoint status on the NAD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the status of a Windows endpoint that hangs off a 7945G from the NAD perspective:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;JC.WDP.HOUSE.9200#sh access-session int g1/0/27 det&lt;BR /&gt;Interface: GigabitEthernet1/0/27&lt;BR /&gt;IIF-ID: 0x1B4514C1&lt;BR /&gt;MAC Address: 001d.7060.b708&lt;BR /&gt;IPv6 Address: fe80::21d:70ff:fe60:b708&lt;BR /&gt;IPv4 Address: 10.2.134.112&lt;BR /&gt;User-Name: CP-7945G-SEP001D7060B708&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: VOICE&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: 3600s (local), Remaining: 3587s&lt;BR /&gt;Timeout action: Reauthenticate&lt;BR /&gt;Acct update timeout: 172800s (local), Remaining: 172787s&lt;BR /&gt;Common Session ID: 0ACA020A000025769202DA2B&lt;BR /&gt;Acct Session ID: 0x00002fbe&lt;BR /&gt;Handle: 0xe500058a&lt;BR /&gt;Current Policy: Dot1x-CoJC&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecured&lt;/P&gt;&lt;P&gt;Server Policies:&lt;BR /&gt;Session-Timeout: 7200 sec&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;dot1x Authc Success&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;Interface: GigabitEthernet1/0/27&lt;BR /&gt;IIF-ID: 0x10EEAD4F&lt;BR /&gt;MAC Address: 6400.6a87.1775&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 10.2.34.209&lt;BR /&gt;User-Name: JAMESELLIS-D&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: 3600s (local), Remaining: 3583s&lt;BR /&gt;Timeout action: Reauthenticate&lt;BR /&gt;Acct update timeout: 172800s (local), Remaining: 172783s&lt;BR /&gt;Common Session ID: 0ACA020A000025759202A7A7&lt;BR /&gt;Acct Session ID: 0x00002fbd&lt;BR /&gt;Handle: 0xc20004e2&lt;BR /&gt;Current Policy: Dot1x-CoJC&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecured&lt;/P&gt;&lt;P&gt;Server Policies:&lt;BR /&gt;Session-Timeout: 7200 sec&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;dot1x Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE currently has this Windows endpoint as hitting the default policy. We are still in monitor mode, and our default is a permit. If I bounce the port, the endpoint will authenticate and authorize via Dot1X. A couple of hours later, it will be back to the default policy, via MAB. I see this happening at several locations, so I am suspecting it is an issue with my NAD config, or my ISE config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's what my NAD config looks like:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius JC-ISE&lt;BR /&gt;server name JC-ISE2&lt;BR /&gt;server name JC-ISE1&lt;BR /&gt;ip radius source-interface Vlan200&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ ISE&lt;BR /&gt;server name JC-ISE1&lt;BR /&gt;server name JC-ISE2&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;aaa authentication login CONSOLE local&lt;BR /&gt;aaa authentication dot1x default group JC-ISE&lt;BR /&gt;aaa authorization exec default local group tacacs+&lt;BR /&gt;aaa authorization network default group JC-ISE&lt;BR /&gt;aaa authorization network auth-list group JC-ISE&lt;BR /&gt;aaa authorization auth-proxy default group JC-ISE&lt;BR /&gt;aaa authorization configuration default group JC-ISE&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting identity default start-stop group JC-ISE&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting system default start-stop group JC-ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map type control subscriber Dot1x-CoJC&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 authenticate using dot1x priority 10&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;5 class Dot1x_Failed do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;10 class AAA-Down_UnAuth_Host do-until-failure&lt;BR /&gt;10 clear-authenticated-data-hosts-on-port&lt;BR /&gt;20 activate service-template Critical_Access&lt;BR /&gt;30 activate service-template Critical_Voice&lt;BR /&gt;40 authorize&lt;BR /&gt;50 pause reauthentication&lt;BR /&gt;20 class AAA-Down_Auth_Host do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;30 class Dot1x_No-Resp do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;40 class MAB_Failed do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authentication-restart 60&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x priority 10&lt;BR /&gt;event aaa-available match-all&lt;BR /&gt;10 class Critical_Auth do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;20 class NOT_Critical_Auth do-until-failure&lt;BR /&gt;10 resume reauthentication&lt;BR /&gt;event inactivity-timeout match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;event authentication-success match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 restrict&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;template Port-Dot1x-CoJC&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;switchport access vlan 234&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport nonegotiate&lt;BR /&gt;switchport voice vlan 334&lt;BR /&gt;mab&lt;BR /&gt;access-session host-mode multi-domain&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;service-policy type control subscriber Dot1x-CoJC&lt;BR /&gt;service-policy input AutoQos-4.0-CiscoPhone-Input-Policy&lt;BR /&gt;service-policy output AutoQos-4.0-Output-Policy&lt;BR /&gt;description ** Endpoint **&lt;BR /&gt;ip dhcp snooping limit rate 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet1/0/27&lt;BR /&gt;device-tracking attach-policy IP-Tracking&lt;BR /&gt;source template Port-Dot1x-CoJC&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our desktop group has verified that the endpoint has a power policy that prevents it from going into sleep mode. I would estimate 10-12% of our desktops are suffering from this issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 20:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4126321#M561949</guid>
      <dc:creator>David Harrell</dc:creator>
      <dc:date>2020-07-27T20:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoints moving from dot1x to MAB.</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4126928#M561959</link>
      <description>&lt;P&gt;The configuration looks fine.&amp;nbsp; It seems as though the PC is going to sleep or not receiving the EAPOL frames from the switch when the session timeout hits.&amp;nbsp; PC isn't responding to 802.1x authentication attempts so it times out and goes to MAB.&lt;/P&gt;&lt;P&gt;I know you said that there is a GPO to prevent the machines from going to sleep, but sometimes GPO's fail to apply to the machines properly for a number of reasons.&amp;nbsp; When this happens, can you call the user or physically visit the machine to ensure it is not sleeping?&amp;nbsp; If it is awake, then maybe the EAPOL frames aren't being passed by the phone.&lt;/P&gt;&lt;P&gt;When this happens, what does the switchport show?&amp;nbsp; Authenticated via MAB?&amp;nbsp; What happens if you were to just do a "clear access-session interface gx/y"?&amp;nbsp; Does that then trigger it to work?&amp;nbsp; Or just the port-bounce?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 20:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4126928#M561959</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-07-28T20:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoints moving from dot1x to MAB.</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4127459#M561978</link>
      <description />
      <pubDate>Wed, 29 Jul 2020 15:40:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4127459#M561978</guid>
      <dc:creator>netadmin cojc</dc:creator>
      <dc:date>2020-07-29T15:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoints moving from dot1x to MAB.</title>
      <link>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4127463#M561979</link>
      <description>&lt;P&gt;Thanks for the reply. Yes, the port shows as MAB instead of Dot1x, and the username has changed to the MAC of the workstation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface: GigabitEthernet1/0/27&lt;BR /&gt;IIF-ID: 0x1347829A&lt;BR /&gt;MAC Address: 6400.6a87.1775&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 10.2.34.209&lt;BR /&gt;User-Name: 64-00-6A-87-17-75&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: 3600s (local), Remaining: 2037s&lt;BR /&gt;Timeout action: Reauthenticate&lt;BR /&gt;Acct update timeout: 172800s (local), Remaining: 167608s&lt;BR /&gt;Common Session ID: 0ACA020A0000270F9AE1581F&lt;BR /&gt;Acct Session ID: 0x000032af&lt;BR /&gt;Handle: 0x4000071d&lt;BR /&gt;Current Policy: Dot1x-CoJC&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;/P&gt;&lt;P&gt;Server Policies:&lt;BR /&gt;Session-Timeout: 3600 sec&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;dot1x Stopped&lt;BR /&gt;mab Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've asked our VoIP engineer to check the phone loads, as there is a bug that seems to cause this issue (&lt;SPAN&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCsz59661" target="_blank" rel="noopener"&gt;CSCsz59661&lt;/A&gt;). That is from 2018, and I&amp;nbsp;think we are running a newer load on our phones than what is listed in the CSC. I'm not much of a VoIP tech, so I'm going to let the VoIP engineer double check for me.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Clearing the access-session doesn't appear to be enough to get the workstation to authenticate via dot1x. It authenticates again with MAB, and the MAC is shown as the username.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;::EDIT:: I&amp;nbsp;attempted a clear&amp;nbsp;access-session on another switch, that the workstation had moved to MAB, and is also behind a 7945G. This time the workstation correctly moved back to dot1x. I think I may spend the day searching for a workstation that is moving to MAB, that does not tether from a 7945.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 16:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/endpoints-moving-from-dot1x-to-mab/m-p/4127463#M561979</guid>
      <dc:creator>David Harrell</dc:creator>
      <dc:date>2020-07-29T16:09:59Z</dc:date>
    </item>
  </channel>
</rss>

