<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: no access-session port-control force-authorized in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4175588#M563567</link>
    <description>&lt;P&gt;step 1, access-session port-control force-authorized&lt;/P&gt;&lt;P&gt;step 2,no access-session port-control force-authorized&lt;/P&gt;&lt;P&gt;After step 2, the port is in&amp;nbsp;force-authorized(default) or&amp;nbsp;force-unauthorized, is there anyway to verify this?&lt;/P&gt;&lt;P&gt;"no access-session port-control force-authorized" means taking away&amp;nbsp;force-authorized?&lt;/P&gt;&lt;P&gt;Basically step 1 and 2 is to re-initialize authorization?&lt;/P&gt;</description>
    <pubDate>Thu, 29 Oct 2020 05:33:34 GMT</pubDate>
    <dc:creator>getaway51</dc:creator>
    <dc:date>2020-10-29T05:33:34Z</dc:date>
    <item>
      <title>no access-session port-control force-authorized</title>
      <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4174414#M563537</link>
      <description>&lt;P&gt;May I know if command "no access-session port-control force-authorized" after "access-session port-control force-authorized" will force all port to become Unauthorized?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-session port-control force-authorized&lt;/P&gt;&lt;P&gt;no access-session port-control force-authorized&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so does this means all ports applying this command will not be operational due to Unauthorized? or is there another meaning here?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 14:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4174414#M563537</guid>
      <dc:creator>getaway51</dc:creator>
      <dc:date>2020-10-27T14:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: no access-session port-control force-authorized</title>
      <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4174923#M563554</link>
      <description>&lt;P&gt;No it won't. The force-authorized is the default port-control setting, so if you apply it and then you negate it it won't change anything. The port-control will stick with force-authorized until you configure it to be otherwise, whether force-unauthorized or auto.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 11:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4174923#M563554</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-28T11:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: no access-session port-control force-authorized</title>
      <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4175588#M563567</link>
      <description>&lt;P&gt;step 1, access-session port-control force-authorized&lt;/P&gt;&lt;P&gt;step 2,no access-session port-control force-authorized&lt;/P&gt;&lt;P&gt;After step 2, the port is in&amp;nbsp;force-authorized(default) or&amp;nbsp;force-unauthorized, is there anyway to verify this?&lt;/P&gt;&lt;P&gt;"no access-session port-control force-authorized" means taking away&amp;nbsp;force-authorized?&lt;/P&gt;&lt;P&gt;Basically step 1 and 2 is to re-initialize authorization?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 05:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4175588#M563567</guid>
      <dc:creator>getaway51</dc:creator>
      <dc:date>2020-10-29T05:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: no access-session port-control force-authorized</title>
      <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4175978#M563572</link>
      <description>&lt;PRE&gt;After step 2, the port is in force-authorized(default) or force-unauthorized, is there anyway to verify this?&lt;/PRE&gt;&lt;P&gt;do &lt;STRONG&gt;sh run int gix/x&lt;/STRONG&gt;, you won't see the command &lt;STRONG&gt;access-session port-control force-authorized&lt;/STRONG&gt;, that's because it is the default, which means the port is in &lt;STRONG&gt;force-authorized&lt;/STRONG&gt; state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;"no access-session port-control force-authorized" means taking away force-authorized?&lt;/PRE&gt;&lt;P&gt;This command will not change the port state, since it is not applicable in this case. So, even if you apply it, the switch port will remain in &lt;STRONG&gt;force-authorized&lt;/STRONG&gt; state. If you want to change the port state, you need to use the command &lt;STRONG&gt;access-session port-control force-unauthroized&lt;/STRONG&gt; or &lt;STRONG&gt;access-session port-control auto&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Basically step 1 and 2 is to re-initialize authorization?&lt;/PRE&gt;&lt;P&gt;Step 1 will place the port state in &lt;STRONG&gt;force-authorized&lt;/STRONG&gt; state, step 2 won't change anything, it will not affect the port state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 17:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4175978#M563572</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-29T17:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: no access-session port-control force-authorized</title>
      <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4176209#M563581</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;May I know in what situation we apply "&lt;SPAN&gt;access-session port-control force-unauthorized"?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Also this cmd used in wht scenario-"no access-session port-control force-authorized" ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 03:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4176209#M563581</guid>
      <dc:creator>getaway51</dc:creator>
      <dc:date>2020-10-30T03:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: no access-session port-control force-authorized</title>
      <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4176483#M563586</link>
      <description>&lt;P&gt;A use case I would think of for the&amp;nbsp;&lt;STRONG&gt;access-session port-control force-unauthorized&lt;/STRONG&gt;&amp;nbsp;command would be if you are doing a maintenance work on the switch and you don't want any user to be able to authenticate or pass traffic over that port. It would be kinda similar to shutting down the port.&lt;/P&gt;&lt;P&gt;Regarding negating the &lt;STRONG&gt;force-authorized&lt;/STRONG&gt;, I can't think of any use case, since negating it would not change the port state. A similar example of this would be any default command on the switch port, where changing it would require hardcoding the different value. For example, on the switch ports the &lt;STRONG&gt;arp timeout&lt;/STRONG&gt; command is default to 14400, if you try to issue &lt;STRONG&gt;no arp timeout 14400&lt;/STRONG&gt; nothing would change, because this command requires defining the values that are different than the default ones to be changed.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 14:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4176483#M563586</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-30T14:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: no access-session port-control force-authorized</title>
      <link>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4177715#M563614</link>
      <description>&lt;P&gt;Worth noting though, if you already have a port configured with "access-session port-control auto", and apply "access-session port-control force-authorized", it immediately disables dot1x and mab on the port as soon as it is entered. If there was an authentication session on the port, it's immediately gone.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can be a very helpful command for help desks depending on the security policy of the enterprise if a problem is encountered with authentication.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2020 03:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-access-session-port-control-force-authorized/m-p/4177715#M563614</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-11-03T03:43:26Z</dc:date>
    </item>
  </channel>
</rss>

