<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1X in Trunk Links in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535613#M572336</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326026"&gt;@Leo Laohoo&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;great explanation, I will contact the consultant and have a word with him. I'm not going to apply a system that can literally kill the network if a mac starts flapping and that it has a great probability of making my life extremely hard.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;I would ask the following tough, being MACSec impossible to apply and 802.1X being a time bomb, do you recommend any other way of protecting a trunk link from a man in the middle attack?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jan 2022 09:17:23 GMT</pubDate>
    <dc:creator>simoesmarco8626982</dc:creator>
    <dc:date>2022-01-21T09:17:23Z</dc:date>
    <item>
      <title>802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535189#M572317</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope to find everyone well&lt;/P&gt;&lt;P&gt;I found a topic from 2014 about this subject that stated that 802.1X couldn't be applied in trunk links, but I've read as well in a Cisco article that 802.1X could be applied in trunk links. Is this true?&lt;/P&gt;&lt;P&gt;I asked this because I needed to put to Cisco Catalyst 9000 connected to each other in trunk but to use 802.1X to authenticate with each other. Is this possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 16:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535189#M572317</guid>
      <dc:creator>simoesmarco8626982</dc:creator>
      <dc:date>2022-01-20T16:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535205#M572318</link>
      <description>&lt;P&gt;Personally i would not advise dot1x to Trunk or port-channel links.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;I asked this because I needed to put to Cisco Catalyst 9000 connected to each other in trunk but to use 802.1X to authenticate with each other. Is this possible?&lt;/PRE&gt;
&lt;P&gt;what is the use case here, even though cisco switches connected each other, access ports still be 802.1X authentication right.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check guide lines :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-e/sec-usr-8021x-15-e-book/config-ieee-802x-pba.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-e/sec-usr-8021x-15-e-book/config-ieee-802x-pba.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 17:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535205#M572318</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-20T17:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535216#M572319</link>
      <description>&lt;P&gt;Thank you for the reply Balaji&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The story is the following, I had the consultant requesting initially that all the links between switches should be encrypted and I was using macsec to do this. The issue is, the trunk links are connected to High Capacity radios 80Ghz (10Gbps), and these radios don't forward the macsec frames from one switch to the other switch on the other side, basically they act like a switch themselves.&lt;/P&gt;&lt;P&gt;Because I wasn't able to implement MacSec on the trunk links between switches due to the radios, the consultant came up with the idea of implementing 802.1X now when the network is already in production.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So basically all the access ports now would use port authentication to authenticate the hosts and the trunk links would need to authenticate with the other switch as well.&lt;/P&gt;&lt;P&gt;Is this feasible? I never worked with 802.1X and only did some labs and I'm afraid of implementing all of this now in a production enviroment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 17:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535216#M572319</guid>
      <dc:creator>simoesmarco8626982</dc:creator>
      <dc:date>2022-01-20T17:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535221#M572320</link>
      <description>&lt;P&gt;is the issue with only Access points&amp;nbsp; :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="display: inline;"&gt;The IEEE 802.1X protocol is supported only on Layer 2 static-access ports, Layer 2 static-trunk ports, voice VLAN-enabled ports, and Layer 3 routed ports.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="olh_note"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="olh_note"&gt;&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;STRONG&gt;Note&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD class="olh_note"&gt;&lt;HR /&gt;
&lt;SECTION class="p"&gt;Ethernet interfaces can be configured either as access ports or as trunk ports with the following specifications:
&lt;UL&gt;
&lt;LI style="margin-top: 0.5em; margin-bottom: .5em; line-height: 1.2em;"&gt;&lt;A target="_blank" name="GUID-084B0048-146A-4B42-805F-27C57A6FBDCE__li_9C4B57CCDE0A4D36BA79823BF22BF082"&gt;&lt;/A&gt;
&lt;P style="display: inline;"&gt;An access port can have only one VLAN configured on the interface; it can carry traffic for only one VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI style="margin-top: 0.5em; margin-bottom: .5em; line-height: 1.2em;"&gt;&lt;A target="_blank" name="GUID-084B0048-146A-4B42-805F-27C57A6FBDCE__li_91A1B7614A2242308D067BAE3E11347D"&gt;&lt;/A&gt;
&lt;P style="display: inline;"&gt;A trunk port can have two or more VLANs configured on the interface; it can carry traffic for several VLANs simultaneously.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 20 Jan 2022 17:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535221#M572320</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-20T17:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535248#M572321</link>
      <description>&lt;P&gt;Thank you Balaji.&lt;/P&gt;&lt;P&gt;If you don't mind me asking, why wouldn't you advise configuring dot1x in trunk links?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 18:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535248#M572321</guid>
      <dc:creator>simoesmarco8626982</dc:creator>
      <dc:date>2022-01-20T18:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535366#M572325</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1061683"&gt;@simoesmarco8626982&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;why wouldn't you advise configuring dot1x in trunk links?&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Because it does not make any sense.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For 802.1x configured for Trunk links, this means that ALL MAC addresses heard from the Trunk link will be evaluated.&amp;nbsp; What happens if one of those MAC addresses is going to be misbehaving?&amp;nbsp;&amp;nbsp;&lt;BR /&gt;Has anyone tried troubleshooting an 802.1x issue on a Trunk link?&amp;nbsp; It is extremely difficult.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;802.1x on each access ports makes it easy because troubleshooting and identifying is fairly "low key".&amp;nbsp; Shove 802.1x onto a Trunk link and things will get hairy very fast.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Plus, add a wee bit of complexity by sticking a flapping client and watch the precious Catalyst 9k memory melt.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 21:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535366#M572325</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2022-01-20T21:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535478#M572326</link>
      <description>&lt;P&gt;hope&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326026"&gt;@Leo Laohoo&lt;/a&gt;&amp;nbsp;nailed with the answer...is there anything we can help more?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 02:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535478#M572326</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-21T02:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535522#M572331</link>
      <description>&lt;P&gt;Never tried it, but I've always been curious if it works:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116681-config-neat-cise-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116681-config-neat-cise-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Maybe it applies for this case.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 05:46:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535522#M572331</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2022-01-21T05:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535613#M572336</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326026"&gt;@Leo Laohoo&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;great explanation, I will contact the consultant and have a word with him. I'm not going to apply a system that can literally kill the network if a mac starts flapping and that it has a great probability of making my life extremely hard.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;I would ask the following tough, being MACSec impossible to apply and 802.1X being a time bomb, do you recommend any other way of protecting a trunk link from a man in the middle attack?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 09:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535613#M572336</guid>
      <dc:creator>simoesmarco8626982</dc:creator>
      <dc:date>2022-01-21T09:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535616#M572337</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/290657"&gt;@Massimo Baschieri&lt;/a&gt;&amp;nbsp;, the only issue is that is using Cisco ISE and the customer for what it needs to be done would never pay the amount cisco asks for the ISE. Taking that it would be an option&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 09:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4535616#M572337</guid>
      <dc:creator>simoesmarco8626982</dc:creator>
      <dc:date>2022-01-21T09:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X in Trunk Links</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4537749#M572387</link>
      <description>&lt;P&gt;This might interest you:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/17-7/release_notes/ol-17-7-9300.html#concept_dcb_fd2_3mb" target="_blank"&gt;Software Features in Cisco IOS XE Cupertino 17.7.1&lt;/A&gt;&amp;nbsp;&amp;gt; Serviceability&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="16.157635467980295%"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;access-session host-mode multi-host peer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="83.74384236453201%"&gt;
&lt;P class="p"&gt;The command was modified.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;peer&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;keyword was introduced. Use this command to enable authentication and authorization of a device before any other devices on the fabric edge port. Ensure that the extended node is the peer device that is connected to the fabric edge port.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 25 Jan 2022 06:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-in-trunk-links/m-p/4537749#M572387</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-01-25T06:14:29Z</dc:date>
    </item>
  </channel>
</rss>

