<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco VoIP phones onboarding via MAB, then auth via 802.1x ? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196005#M564251</link>
    <description>&lt;P&gt;Hello, how do most people use ISE to authorize Cisco VoIP phones on their network out of the box?&amp;nbsp; In my testing I had created a MAB policy that allowed profiled Cisco VoIP phones to authenticate and the authorization policy assigned them a dACL that restricted them to DCHP, and the option 151 TFTP server for them to pull their config. Once they pulled their config 802.1x is enabled and they reboot and authenticate via EAP-TLS.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue I found with this method is for a brand new phone, ISE will fail the MAB authentication the first time it tries to connect because the MAC was not yet profiled.&amp;nbsp; Once it fails though the endpoint exists in ISE's endpoint list and it is profiled successfully as a Cisco phone.&amp;nbsp; If you re-connect the phone 30 seconds or so later MAB will pass the 2nd time.&amp;nbsp; I tried to figure this out on my own but I haven't been able to find a solution I like.&amp;nbsp; I changed my dot1x policy-map on the switch to re-try MAB every 60 seconds on failure which achieves the desired end result.&amp;nbsp; The problem is endpoints that are turned off, or should be denied just keep trying to authenticate every 60 seconds on a never ending loop....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I being dumb here?&amp;nbsp; Is there a better way to do what I'm wanting to do, or get ISE to profile a device BEFORE it makes its first authentication decision?&amp;nbsp; Below is my switch config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber Dot1x-Default&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 authenticate using dot1x priority 10&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 restrict&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x&lt;BR /&gt;event authentication-failure match-all&lt;BR /&gt;10 class AAA-Down do-all&lt;BR /&gt;10 authorize&lt;BR /&gt;20 activate service-template CRITICAL&lt;BR /&gt;30 terminate dot1x&lt;BR /&gt;40 terminate mab&lt;BR /&gt;20 class Dot1x-Failed do-until-failure&lt;BR /&gt;10 authenticate using mab&lt;BR /&gt;30 class MAB_FAILED do-until-failure&lt;BR /&gt;10 authentication-restart 60&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;description 802.1x TEST&lt;BR /&gt;subscriber aging probe&lt;BR /&gt;switchport access vlan 310&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 510&lt;BR /&gt;device-tracking&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;access-session host-mode multi-domain&lt;BR /&gt;access-session closed&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;service-policy type control subscriber Dot1x-Default&lt;BR /&gt;ip dhcp snooping limit rate 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Dec 2020 15:42:29 GMT</pubDate>
    <dc:creator>andrew_cooper</dc:creator>
    <dc:date>2020-12-09T15:42:29Z</dc:date>
    <item>
      <title>Cisco VoIP phones onboarding via MAB, then auth via 802.1x ?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196005#M564251</link>
      <description>&lt;P&gt;Hello, how do most people use ISE to authorize Cisco VoIP phones on their network out of the box?&amp;nbsp; In my testing I had created a MAB policy that allowed profiled Cisco VoIP phones to authenticate and the authorization policy assigned them a dACL that restricted them to DCHP, and the option 151 TFTP server for them to pull their config. Once they pulled their config 802.1x is enabled and they reboot and authenticate via EAP-TLS.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue I found with this method is for a brand new phone, ISE will fail the MAB authentication the first time it tries to connect because the MAC was not yet profiled.&amp;nbsp; Once it fails though the endpoint exists in ISE's endpoint list and it is profiled successfully as a Cisco phone.&amp;nbsp; If you re-connect the phone 30 seconds or so later MAB will pass the 2nd time.&amp;nbsp; I tried to figure this out on my own but I haven't been able to find a solution I like.&amp;nbsp; I changed my dot1x policy-map on the switch to re-try MAB every 60 seconds on failure which achieves the desired end result.&amp;nbsp; The problem is endpoints that are turned off, or should be denied just keep trying to authenticate every 60 seconds on a never ending loop....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I being dumb here?&amp;nbsp; Is there a better way to do what I'm wanting to do, or get ISE to profile a device BEFORE it makes its first authentication decision?&amp;nbsp; Below is my switch config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type control subscriber Dot1x-Default&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 authenticate using dot1x priority 10&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 restrict&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x&lt;BR /&gt;event authentication-failure match-all&lt;BR /&gt;10 class AAA-Down do-all&lt;BR /&gt;10 authorize&lt;BR /&gt;20 activate service-template CRITICAL&lt;BR /&gt;30 terminate dot1x&lt;BR /&gt;40 terminate mab&lt;BR /&gt;20 class Dot1x-Failed do-until-failure&lt;BR /&gt;10 authenticate using mab&lt;BR /&gt;30 class MAB_FAILED do-until-failure&lt;BR /&gt;10 authentication-restart 60&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;description 802.1x TEST&lt;BR /&gt;subscriber aging probe&lt;BR /&gt;switchport access vlan 310&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 510&lt;BR /&gt;device-tracking&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;access-session host-mode multi-domain&lt;BR /&gt;access-session closed&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;service-policy type control subscriber Dot1x-Default&lt;BR /&gt;ip dhcp snooping limit rate 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 15:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196005#M564251</guid>
      <dc:creator>andrew_cooper</dc:creator>
      <dc:date>2020-12-09T15:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VoIP phones onboarding via MAB, then auth via 802.1x ?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196132#M564257</link>
      <description>&lt;P&gt;i think you should try the first&amp;nbsp;&lt;SPAN&gt;ISE to profile a device BEFORE it makes its first authentication&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 17:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196132#M564257</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2020-12-09T17:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VoIP phones onboarding via MAB, then auth via 802.1x ?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196151#M564258</link>
      <description>&lt;P&gt;Yes that was one of my questions.&amp;nbsp; How do I get ISE to profile based on MAC OUI before it performs the first authentication&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 18:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196151#M564258</guid>
      <dc:creator>andrew_cooper</dc:creator>
      <dc:date>2020-12-09T18:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VoIP phones onboarding via MAB, then auth via 802.1x ?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196279#M564262</link>
      <description>&lt;P&gt;I suspect the issue here is that you have default AuthZ Policy that is sending an ACCESS_REJECT and when first connected. MAB happens immediately upon connecting, so the phone is hitting that default policy and and receiving the ACCESS_REJECT response.&lt;/P&gt;
&lt;P&gt;When endpoints receive an ACCESS_REJECT they typically go into a waiting period before retrying authentication (retry period depends on the endpoint supplicant and settings).&lt;/P&gt;
&lt;P&gt;A better approach is to use a default AuthZ policy that sends an ACCESS-ACCEPT with a restrictive DACL (permit only DHCP, DNS, TFTP, etc). This way the phone will connect and get an ACCESS-ACCEPT with restricted access. Once the profiling completes based on DHCP and CDP info received by ISE, it should send a CoA to change the AuthZ of the phone.&lt;/P&gt;
&lt;P&gt;Using this approach also mitigates issues with endpoints constantly retrying authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 22:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196279#M564262</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-12-09T22:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VoIP phones onboarding via MAB, then auth via 802.1x ?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196973#M564279</link>
      <description>&lt;P&gt;In this scenario would you change the default authentication policy to "if User not found = continue" ?&amp;nbsp; Right now it rejects authentication because the MAC is not yet an internal endpoint.&amp;nbsp; I just did a little bit of testing and found it would only work if I allowed Voice Domain Permission as part of the Autz Profile for the restrictive DACL.&amp;nbsp; I assume this is expected behavior when using multi-domain mode?&amp;nbsp; Thanks for your help!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 23:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4196973#M564279</guid>
      <dc:creator>andrew_cooper</dc:creator>
      <dc:date>2020-12-10T23:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VoIP phones onboarding via MAB, then auth via 802.1x ?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4197022#M564284</link>
      <description>&lt;P&gt;Yes, you would need an AuthC Policy rule for MAB with 'If User not Found = Continue' to allow the session to "fall-through" to the AuthZ process to provide authorisation based on endpoint profile. I typically use a separate AuthC Policy matching on Wired_MAB and using the 'Internal Endpoints' ID store, but you could do the same with the Default AuthC Policy.&lt;/P&gt;
&lt;P&gt;Regardless of the switchport mode (Multi-Domain, Multi-Auth, etc), when dot1x/MAB are enabled, the switchport requires the RADIUS server to respond with the Voice Domain Permission to authorise the phone on the configured Voice VLAN.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 04:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-voip-phones-onboarding-via-mab-then-auth-via-802-1x/m-p/4197022#M564284</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-12-11T04:20:05Z</dc:date>
    </item>
  </channel>
</rss>

