<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dynamic vlan - Behavor in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589001#M573964</link>
    <description>&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;I was reading about dynamic vlan on ISE. I am confused about the behavior of it&lt;/P&gt;&lt;P&gt;I have&amp;nbsp; on ISe 4 groups/AD&amp;nbsp; by&amp;nbsp; dynamic vlan. Sometimes some users find it difficult to join to the network&amp;nbsp; but not always, . I was read that dynamic vlan is not highly recommended because it is mandated to configure a default vlan. When the GPO pushes the ISE, it breaks the protocol ( can't understand this part). As well could there be a problem with the&amp;nbsp; DHCP , I guess it will be for the DHCP it has a&amp;nbsp; lease and&amp;nbsp; it tries to get the&amp;nbsp; IP VLAN by default, although . I read days ago a articule it siad the&amp;nbsp; supplicant" endpoint" with Windows Servipack 2 is very smart&amp;nbsp; no&amp;nbsp; there is any change on the network arround 8021.x, it always assigns the same IP.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In my switch All of those ports have the same vlan name&amp;nbsp; "external" . If an external user is connected each ports, he will&amp;nbsp; gets the external connection when these users do not have any certificates. For this reason, they will go into policy for external Users. The rest user of the domain deppending AD group will obtein theirs vlan&lt;/P&gt;&lt;P&gt;My questions are:&lt;/P&gt;&lt;P&gt;Is there any solution to avoid this? It almost never happens, but when it does, the user is angry.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Apr 2022 11:02:29 GMT</pubDate>
    <dc:creator>athan1234</dc:creator>
    <dc:date>2022-04-08T11:02:29Z</dc:date>
    <item>
      <title>Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589001#M573964</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;I was reading about dynamic vlan on ISE. I am confused about the behavior of it&lt;/P&gt;&lt;P&gt;I have&amp;nbsp; on ISe 4 groups/AD&amp;nbsp; by&amp;nbsp; dynamic vlan. Sometimes some users find it difficult to join to the network&amp;nbsp; but not always, . I was read that dynamic vlan is not highly recommended because it is mandated to configure a default vlan. When the GPO pushes the ISE, it breaks the protocol ( can't understand this part). As well could there be a problem with the&amp;nbsp; DHCP , I guess it will be for the DHCP it has a&amp;nbsp; lease and&amp;nbsp; it tries to get the&amp;nbsp; IP VLAN by default, although . I read days ago a articule it siad the&amp;nbsp; supplicant" endpoint" with Windows Servipack 2 is very smart&amp;nbsp; no&amp;nbsp; there is any change on the network arround 8021.x, it always assigns the same IP.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In my switch All of those ports have the same vlan name&amp;nbsp; "external" . If an external user is connected each ports, he will&amp;nbsp; gets the external connection when these users do not have any certificates. For this reason, they will go into policy for external Users. The rest user of the domain deppending AD group will obtein theirs vlan&lt;/P&gt;&lt;P&gt;My questions are:&lt;/P&gt;&lt;P&gt;Is there any solution to avoid this? It almost never happens, but when it does, the user is angry.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 11:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589001#M573964</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2022-04-08T11:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589020#M573967</link>
      <description>&lt;P&gt;&lt;SPAN&gt;When the GPO pushes the ISE, it breaks the protocol ( can't understand this part).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Not following what you mean here.&amp;nbsp; Take a look here:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;ISE Secure Wired Access Prescriptive Deployment Guide - Cisco Community&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Specifically at 'Dynamic VLAN Assignment' section.&amp;nbsp; HTH!&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 11:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589020#M573967</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-04-08T11:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589875#M574025</link>
      <description>&lt;P&gt;I try o stay away from Dynamic VLAN assignment on wired LAN because the end devices don't handle it well. Once the Ethernet link is up, and then you switch the VLAN on the switch port, the client can't know that you have done this. So how can it tell its IP stack to ask for new DHCP?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Windows has a solution for this when using the Wired 802.1X supplicant - there is a small checkbox in the supplicant config to make the supplicant "VLAN switching aware" - it's an extra DHCP "reset" that happens in that case to sort out the IP stack.&lt;/P&gt;
&lt;P&gt;You find it under the Windows Wired supplicant Advanced Settings, under the "Enable single sign on for this network" and then tick the box "This network uses separate LANs for machine and user authentication"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have used this with a customer who was doing 802.1X EAP-PEAP user authentication - each user was potentially put on a different VLAN depending on their AD Group. When user logs off, then Computer authentication happens, and also that put the PC into a default data VLAN (for group policy config purposes etc.) - again, a dynamic VLAN switch would trigger a DHCP reset because the supplicant was configured to do so.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 05:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589875#M574025</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-11T05:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589946#M574033</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;, and thank you for your response.It's a huge help.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'd like to ask you a question about it.&lt;BR /&gt;Imagine&amp;nbsp; the user must change his or her password or exit the domain and re-enter it.&lt;BR /&gt;He'll need to connect to the default vlan in order to reach the AD . These checks will make it more difficult for the user to obtain the VLAN by default on the siwitch&amp;nbsp; in order to reach AD?&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Best&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Apr 2022 07:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4589946#M574033</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2022-04-11T07:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590040#M574035</link>
      <description>&lt;P&gt;I would say that whichever VLAN is used for users and Computers (boot up) should have IP reachability to AD domain controllers. Not sure why one would not have that. I have not tested it but I am fairly sure that if a user has logged on successfully and then resets their domain &amp;nbsp;password with ctrl-alt-del then there is no network event. This means user stays on same vlan. VLAN change can only happens during logon and logoff.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 09:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590040#M574035</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-11T09:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590083#M574038</link>
      <description>&lt;P&gt;Yes you are right . Thanks for everything&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 11:06:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590083#M574038</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2022-04-11T11:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590650#M574080</link>
      <description>&lt;P&gt;I've always been curious to know the meaning of the&amp;nbsp;&lt;SPAN&gt;"Enable single sign on for this network" option on windows supplicant and never found an exhausitve explanation, do you know the impact on the authentication process of this option?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 04:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590650#M574080</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2022-04-12T04:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic vlan - Behavor</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590664#M574081</link>
      <description>&lt;P&gt;I have also been curious about this and I have never lab'd it up enough to know what happens under the covers. I spent hours searching Microsoft documents on this and I never got the feeling that any of it made sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But the VLAN switch works as advertised.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 05:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-vlan-behavor/m-p/4590664#M574081</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-12T05:17:44Z</dc:date>
    </item>
  </channel>
</rss>

