<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAC Auth interface config in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4180425#M563676</link>
    <description>&lt;P&gt;This is all covered step by step in&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;&amp;nbsp;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 08 Nov 2020 05:29:43 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2020-11-08T05:29:43Z</dc:date>
    <item>
      <title>MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176166#M563578</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking to configure MAC-Authentication in our switches. Do you have any interface config you can share that is used in the production environment? Below is what I have so far. Am I missing anything or needs to be removed? What about some sort of timeout settings we can use?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Gi1/0/1&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;switchport voice vlan 30&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication event server dead action authorize&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication order mab&lt;BR /&gt;authentication priority mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer restart 1&lt;BR /&gt;mab&lt;BR /&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 22:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176166#M563578</guid>
      <dc:creator>tlxbx</dc:creator>
      <dc:date>2020-10-29T22:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176206#M563580</link>
      <description>&lt;P&gt;High level your configuration is ok.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but if this first-time deployment and testing, i will start with basic config and add more options as move one..since if it is not working you get hard time to what line causing the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so start with below :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/config_guide_c17-663759.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/config_guide_c17-663759.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 02:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176206#M563580</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-10-30T02:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176390#M563582</link>
      <description>&lt;P&gt;Agreeing with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;to start with less, test, and build from there.&amp;nbsp; Are you planning on allowing both a data and voice device on same port?&amp;nbsp; Here is a breakdown of the different host modes for a better understanding:&lt;/P&gt;
&lt;P class="pBu1_Bullet1"&gt;Single-host mode:&lt;/P&gt;
&lt;P class="pB2_Body2"&gt;In single-host mode, only a single MAC or IP address can be authenticated by any method on a port. If a different MAC address is detected on the port after an endpoint has authenticated with 802.1X, MAB, or Web Authentication, a security violation is triggered on the port. This is the default behavior.&lt;/P&gt;
&lt;P class="pBu1_Bullet1"&gt;Multi-domain-authentication (MDA) host mode:&lt;/P&gt;
&lt;P class="pB2_Body2"&gt;MDA was specifically designed to address the requirements of IP telephony in an 802.1X environment. When MDA is configured, two endpoints are allowed on the port: one in the voice VLAN, and one in the data VLAN. Additional MAC addresses trigger a security violation.&lt;/P&gt;
&lt;P class="pBu1_Bullet1"&gt;Multi-auth host mode:&lt;/P&gt;
&lt;P class="pB2_Body2"&gt;If the port is configured for multi-auth mode, multiple endpoints can be authenticated in the data VLAN. Each new MAC address that appears on the port is separately authenticated. Multi-auth can be used for bridged virtual environments or to support hubs.&lt;/P&gt;
&lt;P class="pBu1_Bullet1"&gt;Multi-host mode:&lt;/P&gt;
&lt;P class="pB2_Body2"&gt;Unlike multi-auth host mode, which authenticates every MAC address, multi-host mode authenticates the first MAC address and then allows an unlimited number of other MAC addresses. Because of the security implications of multi-host, multi-auth is typically a better choice than multi-host.&lt;/P&gt;
&lt;P class="pB2_Body2"&gt;HTH!&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 12:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176390#M563582</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-10-30T12:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176448#M563585</link>
      <description>&lt;P&gt;thank you both. what would be a simple config as i am new to this?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 13:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176448#M563585</guid>
      <dc:creator>tlxbx</dc:creator>
      <dc:date>2020-10-30T13:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176782#M563591</link>
      <description>&lt;P&gt;The basic config was available the URL was posted before on other thread (look at the URL Botom of the page)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Main this as mentioned by&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210"&gt;@Mike.Cifelli&lt;/a&gt;&amp;nbsp; what kind of deployment you have based on that config should go into interface config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is a good explanation of each one for your reference ( as mentioned go with the basic config build from there)&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.network-node.com/blog/2015/12/30/switch-configuration-for-dot1x" target="_blank"&gt;http://www.network-node.com/blog/2015/12/30/switch-configuration-for-dot1x&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Oct 2020 08:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4176782#M563591</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-10-31T08:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4177407#M563606</link>
      <description>&lt;P&gt;Thank you. I enjoyed reading the document and cleared many questions I had.&lt;/P&gt;&lt;P&gt;I want to follow up on "2.4.6 Inaccessible RADIUS Server". How can I configure the switch to detect if our RADIUS server goes down so we can take action to put clients on same vlans configured on the ports?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 14:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4177407#M563606</guid>
      <dc:creator>tlxbx</dc:creator>
      <dc:date>2020-11-02T14:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4177567#M563611</link>
      <description>&lt;P&gt;You have the ability to configure AAA dead-server detection.&amp;nbsp; See here for more detail:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-aaa-dead-server.html#GUID-46F1AAA9-273A-4DAF-9A1D-4354D335848F" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-3s/sec-usr-aaa-xe-3s-book/sec-aaa-dead-server.html#GUID-46F1AAA9-273A-4DAF-9A1D-4354D335848F&lt;/A&gt;. HTH!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 20:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4177567#M563611</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-11-02T20:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: MAC Auth interface config</title>
      <link>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4180425#M563676</link>
      <description>&lt;P&gt;This is all covered step by step in&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;&amp;nbsp;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Nov 2020 05:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mac-auth-interface-config/m-p/4180425#M563676</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-11-08T05:29:43Z</dc:date>
    </item>
  </channel>
</rss>

