<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Device Authentiction with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549313#M572700</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Arne, yes, agree, the key is that they a device needs to have the supplicant installed. The alternative is MAB. However, isn't it also possible to install a temporary web-based client through posture/provisioning /remediation provided that the client is non-compliant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Netmart&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Feb 2022 05:35:09 GMT</pubDate>
    <dc:creator>Netmart</dc:creator>
    <dc:date>2022-02-10T05:35:09Z</dc:date>
    <item>
      <title>802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4546371#M572609</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am wondering, whether the following interface config would allow access of phone and workstation to network, meaning do they get successfully authenticated via ISE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface Te1/12&lt;/P&gt;&lt;P&gt;description ISE dot1x Port&lt;/P&gt;&lt;P&gt;switchport access vlan 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;switchport mode access&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;switchport voice vlan20&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;device-tracking attach-policy IPDT_MAX_3&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authentication periodic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authentication timer reauthenticate server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-session host-mode &lt;/STRONG&gt;&lt;STRONG&gt;multi-domain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-session port-control auto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;snmp trap mac-notification change added&lt;/P&gt;&lt;P&gt;snmp trap mac-notification change removed&lt;/P&gt;&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;&lt;I&gt;d&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;ot1x &lt;/STRONG&gt;&lt;STRONG&gt;pae&lt;/STRONG&gt;&lt;STRONG&gt; authenticator&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 7&lt;/P&gt;&lt;P&gt;dot1x mac-reauth-req 3&lt;/P&gt;&lt;P&gt;Spanning-tree portfast&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-policy type control subscriber &lt;/STRONG&gt;POLICY_Te1/12&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your advice.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Feb 2022 21:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4546371#M572609</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2022-02-06T21:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4546403#M572610</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/244740"&gt;@Netmart&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;Can you share what is inside the service policy&amp;nbsp;&lt;SPAN&gt;POLICY_Te1/12 ?&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 04:32:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4546403#M572610</guid>
      <dc:creator>Amine ZAKARIA</dc:creator>
      <dc:date>2022-02-07T04:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4546572#M572617</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I am wondering, whether the following interface config would allow access of phone and workstation to network&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;-You are attempting to operate with the correct mode:&amp;nbsp;&lt;STRONG&gt;access-session host-mode&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;multi-domain&lt;/STRONG&gt; =&amp;nbsp;&lt;SPAN&gt;Specifies that only one client per domain (DATA or VOICE) can be authenticated at a time.&amp;nbsp; However, you will need to test because we cant see what is in the service policy attached to interface.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 12:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4546572#M572617</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-02-07T12:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549065#M572697</link>
      <description>&lt;P&gt;The switch port config shown will only process 802.1X frames (EAPOL). If any attached devices do not have a supplicant, then they won't be authorized onto either DATA or VOICE Domain. If you need to process non-supplicant devices, then also add the MAB command to the interface.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 23:02:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549065#M572697</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-02-09T23:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549313#M572700</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Arne, yes, agree, the key is that they a device needs to have the supplicant installed. The alternative is MAB. However, isn't it also possible to install a temporary web-based client through posture/provisioning /remediation provided that the client is non-compliant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Netmart&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 05:35:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549313#M572700</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2022-02-10T05:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549315#M572701</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;Thank you for clarification.&lt;/P&gt;&lt;P&gt;Only the wording is still a bit confusing to me.&lt;/P&gt;&lt;P&gt;"only one client per DATA or VOICE domain can be authenticated at a time.&lt;/P&gt;&lt;P&gt;Meaning only a PC OR&amp;nbsp; phone can run at a time on the port&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;Only one PC AND Phone can run per time at a port?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 05:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549315#M572701</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2022-02-10T05:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549410#M572709</link>
      <description>&lt;P&gt;multi-domain is one of a variety of security mechanism that limits the number of MAC addresses that will be learned on that interface. In this case, multi-domain means,&lt;/P&gt;
&lt;P&gt;1 MAC address in the DATA domain&lt;/P&gt;
&lt;P&gt;1 MAC address in the VOICE domain&lt;/P&gt;
&lt;P&gt;If you were to violate that by assigning the phone to a VLAN in the DATA domain, and then also attaching a PC to the phone's data port, then the switch will err-disable the port because now you'll have 2 MAC addresses in the DATA domain. Or, more commonly, if you attach a small hub or switch to the phone, thinking you can hook a few devices up ... it won't work.&lt;/P&gt;
&lt;P&gt;The are other options like multi-host, etc. - you can google it&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 09:09:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549410#M572709</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-02-10T09:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549416#M572710</link>
      <description>&lt;P&gt;If a client doesn't have a supplicant, then it will never speak EAPOL (EAP over LAN). This is a layer 2 protocol. You either have it or you don't. If you don't, then the switch will accept "normal" traffic when mab is enabled on that port. Switch sends MAC address to ISE to authorize and if successful then the port is authorized and then it's business as usual (DHCP etc.). What the client then does with a web based client etc. all runs while the port is in MAB auth'd mode.&amp;nbsp; And you can do whatever compliance checks you need/like. If the client is found to be non-compliant then you can reauth it and stick the device into another VLAN. Problem with VLAN switching in that scenario (where the PC already has an IP address via DHCP) is that you'd probably need to bounce the port to force the client to perform DHCP again.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 09:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549416#M572710</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-02-10T09:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Device Authentiction with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549800#M572720</link>
      <description>&lt;P&gt;Thank you for clearing this up..&lt;/P&gt;&lt;P&gt;The figure below actually actually illustrating your findings.&lt;/P&gt;&lt;P&gt;By default, 802.1x only EAP is allowed, Authentication Open all ports allowed, or if no supplicant [no EAPOL] MAB is the alternative.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="802.1x.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/143527i87A3E4FF0D384279/image-size/large?v=v2&amp;amp;px=999" role="button" title="802.1x.png" alt="802.1x.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 18:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-device-authentiction-with-ise/m-p/4549800#M572720</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2022-02-10T18:02:01Z</dc:date>
    </item>
  </channel>
</rss>

