<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authentication open in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267194#M564570</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have a question about the authentication open command.&lt;/P&gt;&lt;P&gt;Until today I thought that the command allows any traffic (if no preauth ACL is used) &lt;U&gt;&lt;STRONG&gt;until&lt;/STRONG&gt;&lt;/U&gt; the authentication and authorization is finished.&lt;/P&gt;&lt;P&gt;So if the result is access-reject the endpoint should be able to communicate just a short while until the reject is received.&lt;/P&gt;&lt;P&gt;Recently I have noticed that even if authentication fails or authorization returns access-reject, the endpoint still has access to the network.&lt;/P&gt;&lt;P&gt;So I would like to confirm the exact behavior of the command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jan 2021 16:46:17 GMT</pubDate>
    <dc:creator>jan.murin</dc:creator>
    <dc:date>2021-01-05T16:46:17Z</dc:date>
    <item>
      <title>Authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267194#M564570</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have a question about the authentication open command.&lt;/P&gt;&lt;P&gt;Until today I thought that the command allows any traffic (if no preauth ACL is used) &lt;U&gt;&lt;STRONG&gt;until&lt;/STRONG&gt;&lt;/U&gt; the authentication and authorization is finished.&lt;/P&gt;&lt;P&gt;So if the result is access-reject the endpoint should be able to communicate just a short while until the reject is received.&lt;/P&gt;&lt;P&gt;Recently I have noticed that even if authentication fails or authorization returns access-reject, the endpoint still has access to the network.&lt;/P&gt;&lt;P&gt;So I would like to confirm the exact behavior of the command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 16:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267194#M564570</guid>
      <dc:creator>jan.murin</dc:creator>
      <dc:date>2021-01-05T16:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267269#M564572</link>
      <description>&lt;P&gt;The expected behavior of authentication open, the default state, is to allow all communication prior to authentication or on failure. This is unless you send a DACL or use a pre-auth ACL.&lt;BR /&gt;&lt;BR /&gt;You could send a deny ip DACL + access accept with the default deny rule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 18:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267269#M564572</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2021-01-05T18:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267272#M564573</link>
      <description>&lt;P&gt;this command purpose is to use it in pre-deployment of dot1x or in piloting phase , it will pass eap traffic along with other traffic, if the result from AAA server is permit access or reject the port still pass the traffic, you use this command when you dont want to cause any interruption for the users until you confirm dot1x and authentication works fine, then you should make authentication close after that and relay only on&amp;nbsp; AAA server&amp;nbsp; to give the permission&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 18:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267272#M564573</guid>
      <dc:creator>yalbikaw</dc:creator>
      <dc:date>2021-01-05T18:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267448#M564584</link>
      <description>&lt;P&gt;As I know,&lt;BR /&gt;all user connect to port are effect by pre-auth ACL&amp;nbsp;&lt;BR /&gt;and if the user auth then the DACL or filter-id is use with pre-auth ACL, simply it put on top of pre-auth ACL.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 23:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4267448#M564584</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-01-05T23:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication open</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4268212#M564610</link>
      <description>&lt;P&gt;Thanks a lot for all answers&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 07:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-open/m-p/4268212#M564610</guid>
      <dc:creator>jan.murin</dc:creator>
      <dc:date>2021-01-07T07:01:20Z</dc:date>
    </item>
  </channel>
</rss>

