<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Missing Something Obvious for 802.1x? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/4571745#M573507</link>
    <description>&lt;P&gt;Some of our Windows &lt;A href="https://manifestationmagicalexanderwilson.com/how-to-manifest-a-breakup/" target="_self"&gt;1&lt;/A&gt;0 workstations have been having authentication issues since the 1903 upgrade&lt;A href="https://www.wmseoconsulting.com/wordpress-website-design-packages/" target="_blank" rel="noopener"&gt;.&lt;/A&gt; Do you know of any more sources of information on this topic? &lt;A href="https://support.microsoft.com/en-gb/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-gb/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment&lt;/A&gt;?&lt;/P&gt;</description>
    <pubDate>Fri, 18 Mar 2022 13:32:15 GMT</pubDate>
    <dc:creator>saadqazi3452837</dc:creator>
    <dc:date>2022-03-18T13:32:15Z</dc:date>
    <item>
      <title>Missing Something Obvious for 802.1x?</title>
      <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737112#M56984</link>
      <description>&lt;P&gt;Could I get a second pair of eyes on this switch&amp;nbsp;configuration?&lt;/P&gt;
&lt;P&gt;I'm setting up a&amp;nbsp;2960X (WS-C2960XR-48LPD-I) with IOS image c2960x-universalk9-mz.152-3.E2&amp;nbsp;for ISE-based wired authentication. I have all the global commands and my RADIUS&amp;nbsp;server (ISE 1.4) is reachable and RADIUS shared secret is verified at both ends. A RADIUS server test from the cli returns successful results. EAPOL test of the supplicant returns success as well.&lt;/P&gt;
&lt;P&gt;I get no 802.1x action on the port though. Am I missing something obvious or hitting a bug? I thought I'd ask here before opening a TAC case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
#sh authentication sessions int gi1/0/36 det
No sessions match supplied criteria.
#sh int gi1/0/36 status

Port      Name               Status       Vlan       Duplex  Speed Type 
Gi1/0/36  ISE Test - Jack #B connected    1          a-full a-1000 10/100/1000BaseTX
#

#dot1x test eapol-capable int gi1/0/36
#
014057: Oct 23 16:49:49 EDT: %DOT1X-6-INFO_EAPOL_PING_RESPONSE: The interface Gi1/0/36 has an 802.1x capable client with MAC 28d2.4492.bc6f
#&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
#sh run | i system-auth
dot1x system-auth-control
#

#sh run | sec radius server
radius server &amp;lt;redacted&amp;gt;
&amp;nbsp;address ipv4 &amp;lt;redacted&amp;gt; auth-port 1812 acct-port 1813
&amp;nbsp;automate-tester username isetest
&amp;nbsp;key 7 &amp;lt;redacted&amp;gt;
#sh run | sec aaa &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;
aaa new-model
aaa group server radius ISE
&amp;nbsp;server name &amp;lt;redacted&amp;gt;
aaa authentication enable default enable
aaa authentication dot1x default group ISE
aaa authorization network default group ISE&amp;nbsp;
aaa accounting dot1x default start-stop group ISE
aaa server radius dynamic-author
&amp;nbsp;client &amp;lt;redacted&amp;gt; server-key 7 &amp;lt;redacted&amp;gt;
aaa session-id common
#
#sh run int gi1/0/36
Current configuration : 636 bytes
!
interface GigabitEthernet1/0/36
 description ISE Test - Jack #B7 in Workroom
 switchport mode access
 ip access-group ACL-ALLOW in
 authentication event fail action next-method
 authentication event server dead action reinitialize vlan 53
 authentication event server dead action authorize voice
 authentication host-mode multi-auth
 authentication open
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 authentication periodic
 authentication violation restrict
 mab
 dot1x pae authenticator
 dot1x timeout tx-period 10
 spanning-tree portfast
 spanning-tree bpduguard enable
end&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:10:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737112#M56984</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-11T06:10:55Z</dc:date>
    </item>
    <item>
      <title>Seems fine to me, did you try</title>
      <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737113#M56985</link>
      <description>&lt;P&gt;Seems fine to me, did you try a simple debug aaa authentication/authorization? or debug radius if that gives you no output?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2015 23:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737113#M56985</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-10-23T23:59:32Z</dc:date>
    </item>
    <item>
      <title>Thanks Jan - I think I</title>
      <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737114#M56986</link>
      <description>&lt;P&gt;Thanks Jan - I think I figured it out. I was turning it over in my head on the drive home.&lt;/P&gt;
&lt;P&gt;This particular customer has a lot of ports in VLAN 1 (yes I know - not a best practice but it's a brownfield and I'm not at liberty to change everything just yet). So those ports (including the one I was testing with) did not have&lt;/P&gt;

&lt;PRE&gt;
switchport access vlan 1&lt;/PRE&gt;

&lt;P&gt;...as they default to VLAN&amp;nbsp;1&lt;/P&gt;
&lt;P&gt;Lack of that command causes the RADIUS authentication sequence to never kick off - which is why I saw nothing at all when I had turned on the debugs. (I tried both aaa auth and radius debugs.)&lt;/P&gt;
&lt;P&gt;I went in remotely just now and put the same commands I was using on my test port plus I hard set the VLAN 1 on a port that had a printer connected. I checked the authentication session for that port (and the radius debug) and - voila - we have a session.&lt;/P&gt;
&lt;P&gt;It's a hard habit to break&amp;nbsp;to set "switchport access vlan 1"; but I guess the couple hours I spent banging my head on this one will reinforce the lesson. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Weekend - time for a break!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Oct 2015 00:25:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737114#M56986</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-10-24T00:25:39Z</dc:date>
    </item>
    <item>
      <title>I was going to suggest</title>
      <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737115#M56987</link>
      <description>&lt;P&gt;I was going to suggest something similar.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Had a customer whose switch was doing something similar. Turned out the 2960 (I dont remember which iOS version, 12.2 possibly) needed the &lt;STRONG&gt;switchport&lt;/STRONG&gt; command and then authentications were fine.&lt;/P&gt;
&lt;P&gt;I missed the fact there was no &lt;STRONG&gt;switchport access vlan&lt;/STRONG&gt; command on your snippet!&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2015 13:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/2737115#M56987</guid>
      <dc:creator>phosawyer</dc:creator>
      <dc:date>2015-11-06T13:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks Jan - I think I</title>
      <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/3397321#M56988</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you elaborate why, when the command 'switchport access vlan 1' is missing from a switchport, RADIUS authentication never starts? Why is it required to have a port explicitly in a VLAN?&lt;/P&gt;
&lt;P&gt;Thanks for the info.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Br,&lt;/P&gt;
&lt;P&gt;Dario&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jun 2018 11:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/3397321#M56988</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2018-06-11T11:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Something Obvious for 802.1x?</title>
      <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/4570680#M573475</link>
      <description>&lt;P&gt;Thank you for sharing with us, and we sincerely hope you will continue to update or post other articles&lt;A href="https://percentagecalculatorfree.com/calculating-your-percent-to-goal/" target="_self"&gt;.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 09:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/4570680#M573475</guid>
      <dc:creator>lionwala012</dc:creator>
      <dc:date>2022-03-15T09:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Something Obvious for 802.1x?</title>
      <link>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/4571745#M573507</link>
      <description>&lt;P&gt;Some of our Windows &lt;A href="https://manifestationmagicalexanderwilson.com/how-to-manifest-a-breakup/" target="_self"&gt;1&lt;/A&gt;0 workstations have been having authentication issues since the 1903 upgrade&lt;A href="https://www.wmseoconsulting.com/wordpress-website-design-packages/" target="_blank" rel="noopener"&gt;.&lt;/A&gt; Do you know of any more sources of information on this topic? &lt;A href="https://support.microsoft.com/en-gb/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-gb/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment&lt;/A&gt;?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 13:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/missing-something-obvious-for-802-1x/m-p/4571745#M573507</guid>
      <dc:creator>saadqazi3452837</dc:creator>
      <dc:date>2022-03-18T13:32:15Z</dc:date>
    </item>
  </channel>
</rss>

