<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wired 802.1x: MAB for Silent Endpoint in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405798#M567415</link>
    <description>&lt;P&gt;We are using dynamic VLAN under authorization. All the ports are configured with a dummy vlan and depending upon endpoint type, ISE sends CoA to change it to right VLAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tested quite a few config combination. It only works when the port is in open mode and configured in right vlan (not the dummy vlan). With this configuration it doesn't add any value from security perspective. Have opened a case with TAC as well in parallels to see if they can help.&lt;/P&gt;</description>
    <pubDate>Thu, 20 May 2021 03:11:09 GMT</pubDate>
    <dc:creator>biswajit.pradhan</dc:creator>
    <dc:date>2021-05-20T03:11:09Z</dc:date>
    <item>
      <title>Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4403961#M567329</link>
      <description>&lt;P&gt;I'm sure people might have come across this problem numerous times previously. However, I was unabe to get something on this page. So posting this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a deployment where we are turning on wired NAC with dot1x with MAB as failover. My understanding is that switch will allow a single packet from an endpoint which doesn't support 802.1x once EAP times out and thus learns the MAC address of the endpoint. Then switch starts the MAB. All good for endpoints which are active. Now in our deployment, there are couple of endpoints which are on static IP (means n dhcp request packets) and very silent. How does we accommodate these endpoints on MAB?&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 10:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4403961#M567329</guid>
      <dc:creator>biswajit.pradhan</dc:creator>
      <dc:date>2021-05-17T10:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4403966#M567330</link>
      <description>&lt;P&gt;come across some issue around with medical device, looking some documents around.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as mentioned below (hope this help you)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 10:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4403966#M567330</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-17T10:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405089#M567373</link>
      <description>&lt;P&gt;One way is to enable Wake on LAN feature (authentication control direction in) which allows traffic from the network to the client prior to authentication via certain broadcast frame that the client may respond to. Another surefire way is to use open mode (authentication open). Yet another option is to change the order of MAB and 802.1X so MAB happens first (authentication order mab dot1x).&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 03:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405089#M567373</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2021-05-20T03:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405246#M567375</link>
      <description>&lt;PRE&gt;Another surefire way is to use open mode (authentication open)&lt;/PRE&gt;
&lt;P&gt;how do we deal with this, if the device go silent for Long , they only able to communicate with server when the data required to send ?&lt;/P&gt;
&lt;P&gt;how is this process works ? what is the security challenges here ? if we use Authenticate Open ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 May 2021 08:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405246#M567375</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-19T08:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405654#M567400</link>
      <description>&lt;P&gt;A special interface template may be used for silent endpoints’ switchports (or for all the potential switchports where such clients are probable). This config should have MAB as first in order or at least concurrent MAB and 802.1X (available in IBNS 2.0).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, this might not be suitable for &lt;STRONG&gt;all&lt;/STRONG&gt; types of silent devices. You have to test each type extensively:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;whether the port becomes open after power cycle&lt;/LI&gt;&lt;LI&gt;whether the port becomes open after cable disconnect/reconnect&lt;/LI&gt;&lt;LI&gt;whether the port becomes open after a ping attempt to the client&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;It might be revealed that some kind of devices are not reliably allowed onto the network timely. You might need to set up &amp;nbsp;a continuous ping application.&lt;/P&gt;</description>
      <pubDate>Wed, 19 May 2021 20:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405654#M567400</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2021-05-19T20:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405798#M567415</link>
      <description>&lt;P&gt;We are using dynamic VLAN under authorization. All the ports are configured with a dummy vlan and depending upon endpoint type, ISE sends CoA to change it to right VLAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tested quite a few config combination. It only works when the port is in open mode and configured in right vlan (not the dummy vlan). With this configuration it doesn't add any value from security perspective. Have opened a case with TAC as well in parallels to see if they can help.&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 03:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405798#M567415</guid>
      <dc:creator>biswajit.pradhan</dc:creator>
      <dc:date>2021-05-20T03:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405805#M567418</link>
      <description>&lt;P&gt;I just realized there is another option which is to do MAB first then 802.1X. This way, the switch is not ignoring the initial DHCP request from the client when the device connects.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The open mode allows access to the network prior to authentication. One can apply pre-auth ACL and control what access it has prior to the authentication which is commonly called low-impact mode. I suggest going through following for more information.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId-785487082" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId-785487082&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 03:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4405805#M567418</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2021-05-20T03:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: Wired 802.1x: MAB for Silent Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4412110#M567673</link>
      <description>&lt;P&gt;Unfortunately the endpoints are on static IP. Even if you configure DHCP it will be authenticated for the first time then once idle timeout occurs, switch will drop and if somebody tries to access the endpoint now, it will fail. So to keep the endpoint generating traffic either have to keep DHC lease time aggressive (Half of lese time &amp;lt; Idle timeout) or find another solution. I found another solution. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Allowed all (wanted broadcast/ARP basically) traffic from switch to endpoint in pre-auth stage (CLI: authentication control-direction in), configured the port on actual access vlan rather than dummy vlan and changed dot1x order to mab dot1x. Wit this the endpoints comes online even in closed mode as switch will send arp request whenever anyone trying to access the endpoint from outside. Within one RTO it was getting authenticated and online.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 17:16:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-mab-for-silent-endpoint/m-p/4412110#M567673</guid>
      <dc:creator>biswajit.pradhan</dc:creator>
      <dc:date>2021-06-02T17:16:52Z</dc:date>
    </item>
  </channel>
</rss>

