<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Use authentication violation shutdown but not shutting down the po in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601138#M574397</link>
    <description>&lt;P&gt;thanks for checking this out - I thought perhaps the command&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;switchport port-security maximum 1&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;could be added to the NAC enabled multi-host port? We always say that the traditional switch port security and NAC are mutually exclusive - but in this case perhaps you need that command to trigger the violation while the port is in NAC mode. I have not seen any IBNS commands to set these limits.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Apr 2022 20:38:43 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2022-04-27T20:38:43Z</dc:date>
    <item>
      <title>Use authentication violation shutdown but not shutting down the port</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4599372#M574348</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am using MAB on a port together with the authentication violation shutdown command, but when I connect a device with a MAC that does not belong to any group, Cisco ISE denies access, but the port on the switch remains connected.&lt;/P&gt;&lt;P&gt;If I do a show interfaces status on the switch the port should be err-disabled, but it is still connected.&lt;/P&gt;&lt;P&gt;Shouldn't it work the same way as the switchport port-security violation shutdown command and set the port to err-disabled?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 15:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4599372#M574348</guid>
      <dc:creator>albertofdez</dc:creator>
      <dc:date>2022-04-25T15:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600023#M574370</link>
      <description>&lt;P&gt;I don't have the authoritative answer on this, but a failed authentication is not a violation - and therefore the "violation" logic would not be executed. I would like someone to correct me if I am wrong, but a session violation is an event where the maximum number of allowed MAC addresses has been authorized on a port, thus causing either a notification, or a shutdown.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my experience of using mult-domain host mode, the port will automatically err-disable if there is more then 2 MAC addresses in the DATA domain (no C3PL or legacy "authentication violation .." logic required).&lt;/P&gt;
&lt;P&gt;If anyone has more information on what exactly a &lt;U&gt;&lt;STRONG&gt;session violation&lt;/STRONG&gt;&lt;/U&gt; is, please share here.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 11:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600023#M574370</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-26T11:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600098#M574374</link>
      <description>&lt;P&gt;Would you post the interface configuration and possibly show auth session interface if possible.&amp;nbsp; Is this deployment in closed mode or maybe low impact open with a pre auth acl?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 13:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600098#M574374</guid>
      <dc:creator>michael.burke</dc:creator>
      <dc:date>2022-04-26T13:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600325#M574378</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/230490"&gt;@albertofdez&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;take the following example:&lt;/P&gt;
&lt;PRE class="lia-align-justify"&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface FastEthernet0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; switchport access vlan 10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; switchport mode access&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication control-direction in&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication event fail action next-method&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication event server dead action reinitialize vlan 10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication event server alive action reinitialize&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication host-mode &lt;STRONG&gt;&lt;U&gt;multi-auth&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication order dot1x mab&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication priority dot1x mab&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication port-control auto&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication periodic&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication timer reauthenticate server&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication timer inactivity server&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication &lt;STRONG&gt;&lt;U&gt;violation restrict&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; mab&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; dot1x pae authenticator&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; dot1x timeout tx-period 7&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; spanning-tree portfast&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;end&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;if I connect a &lt;STRONG&gt;TIP&lt;/STRONG&gt; and a &lt;STRONG&gt;Notebook&lt;/STRONG&gt; on &lt;STRONG&gt;Fa0/1&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;#show authentication interface Fa0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Client list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Interface MAC Address Method Domain Status Session ID&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Fa0/1 1111.1111.1111 mab DATA Authz Success 000000000000000000000001&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Fa0/1 2222.2222.2222 dot1x DATA Authz Success 000000000000000000000002&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Available methods list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle Priority Name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;3      0        dot1x&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;2      1        mab&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Runnable methods list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle Priority Name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;3      0        dot1x&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;2      1        mab&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;but now, I will change my configuration to:&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface FastEthernet0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication host-mode &lt;STRONG&gt;&lt;U&gt;multi-domain&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;in other words, &lt;U&gt;one Voice&lt;/U&gt; and &lt;U&gt;one Data&lt;/U&gt; (only):&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;#show authentication interface Fa0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Security violation caused by &lt;U&gt;2222.2222.2222&lt;/U&gt;: &lt;STRONG&gt;&lt;U&gt;Port is restricted&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Client list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Interface MAC Address Method Domain Status Session ID&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Fa0/1 2222.2222.2222 dot1x UNKNOWN Running 000000000000000000000003&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Fa0/1 1111.1111.1111 mab DATA Authz Success 000000000000000000000004&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;if I change again my configuration to:&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface FastEthernet0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt; authentication &lt;U&gt;violation shutdown&lt;/U&gt;&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;then&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;#show authentication interface Fa0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Security violation caused by 2222.2222.2222: &lt;U&gt;&lt;STRONG&gt;Port is shutdown&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;Client list: &lt;U&gt;&lt;STRONG&gt;empty&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Available methods list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle Priority Name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;3      0        dot1x&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;2      1        mab&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Runnable methods list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle Priority Name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;3      0        dot1x&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;2      1        mab&lt;BR /&gt;&lt;BR /&gt;#show interfaces Fa0/1&lt;BR /&gt;FastEthernet0/1 is down, line protocol is down (&lt;U&gt;&lt;STRONG&gt;err-disabled&lt;/STRONG&gt;&lt;/U&gt;)&lt;BR /&gt;...&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 19:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600325#M574378</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-04-26T19:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600344#M574380</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;- the explanation was very clear. As mentioned in my earlier response, I have experienced this behaviour in my IBNS 2.0 configs where the violation logic is expressed in C3PL language - but what I found strange is that when I tested multi-domain and caused an intentional violation, I got the err-disable by default, and I did not need to specify any C3PL commands - it seems that the default action in IBNS 2.0 for violation is "shutdown". I will retest one of these days to confirm.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess the overall point to &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/230490"&gt;@albertofdez&lt;/a&gt;&amp;nbsp;is that a violation is not caused when authentication fails. A violation is something that happens when you break the rules about how many MAC addresses are allowed to be authenticated. In multi-domain this is obvious (1 voice, 1 data) -&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;in multi-host, do you know how to configure the switch port to set an arbitrary limit to say, 3 MAC addresses to cause the violation?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 20:48:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600344#M574380</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-26T20:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600705#M574384</link>
      <description>&lt;P&gt;Thank you very much Arne and Marcelo for your help and information, I was clear about the multi-auth and multi-domain behavior, but I thought that in any case an authentication failure was also considered as a violation and therefore the port would be set to err-disabled.&lt;/P&gt;&lt;P&gt;Do you know if there is any port level command or configuration in Cisco ISE to set the port to shutdown if there is an authentication failure on the port?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 09:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600705#M574384</guid>
      <dc:creator>albertofdez</dc:creator>
      <dc:date>2022-04-27T09:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600806#M574386</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/230490"&gt;@albertofdez&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;I dind't recall any &lt;STRONG&gt;Port Level&lt;/STRONG&gt; command or configuration on &lt;STRONG&gt;ISE&lt;/STRONG&gt; to set the &lt;STRONG&gt;Port Shutdown&lt;/STRONG&gt; if there is an &lt;STRONG&gt;Authentication Failure&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;At &lt;STRONG&gt;Context Visibility &amp;gt; Endpoints&lt;/STRONG&gt;, you are able to choose an &lt;STRONG&gt;Endpoint&lt;/STRONG&gt; and select &lt;STRONG&gt;Change Authorization &amp;gt; CoA Session Terminate with Port Shutdown&lt;/STRONG&gt;, but this is &lt;U&gt;only possible&lt;/U&gt; if you have a &lt;STRONG&gt;Session&lt;/STRONG&gt; (Authentication and Authorization Success).&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 12:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4600806#M574386</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-04-27T12:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601130#M574395</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;- there might be some potential to use an EEM (Embedded Event Manager) script on the switch to trigger a shutdown when it detects the Access-Reject for the port(s) in question. It's been a while since I used EEM, but if you can find a SYSLOG event to trigger on then you might have a solution.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 20:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601130#M574395</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-27T20:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601133#M574396</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/230490"&gt;@albertofdez&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;I tried the &lt;STRONG&gt;multi-host&lt;/STRONG&gt; option, after the following change:&lt;/P&gt;
&lt;PRE class="lia-align-justify"&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface FastEthernet0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp;authentication host-mode &lt;U&gt;&lt;STRONG&gt;multi-host&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P class="lia-align-justify"&gt;then&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;#show authentication interface Fa0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Client list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Interface MAC Address Method Domain Status Session ID&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Fa0/1 &lt;U&gt;&lt;STRONG&gt;2222.2222.2222&lt;/STRONG&gt;&lt;/U&gt; dot1x DATA Authz Success 000000000000000000000005&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Available methods list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle Priority Name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;3      0        dot1x&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;2      1        mab&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Runnable methods list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle Priority Name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;3      0        dot1x&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;2      1        mab&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;#show ip device tracking interface Fa0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Device Tracking = Enabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Device Tracking Probe Count = 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Device Tracking Probe Interval = 30&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Device Tracking Probe Delay Interval = 10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;-----------------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Address MAC Address Vlan Interface STATE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;-----------------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10.10.10.1 &lt;U&gt;&lt;STRONG&gt;1111.1111.1111&lt;/STRONG&gt;&lt;/U&gt; 10 FastEthernet0/5 ACTIVE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10.10.10.2 &lt;U&gt;&lt;STRONG&gt;2222.2222.2222&lt;/STRONG&gt;&lt;/U&gt; 10 FastEthernet0/5 ACTIVE&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total number interfaces enabled: 10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Enabled interfaces:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8,&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Fa0/9, Fa0/10, Fa0/11&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;#show mac address-table | inc Fa0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10 &lt;U&gt;&lt;STRONG&gt;1111.1111.1111&lt;/STRONG&gt;&lt;/U&gt; &lt;U&gt;&lt;STRONG&gt;DYNAMIC&lt;/STRONG&gt;&lt;/U&gt; Fa0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10 &lt;U&gt;&lt;STRONG&gt;2222.2222.2222&lt;/STRONG&gt;&lt;/U&gt; STATIC Fa0/1&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;in other words, since I am only able to check one &lt;STRONG&gt;MAC&lt;/STRONG&gt; on the &lt;STRONG&gt;Authentication&lt;/STRONG&gt; command (even though the &lt;STRONG&gt;Device Tracking&lt;/STRONG&gt; and &lt;STRONG&gt;MAC Address-Table&lt;/STRONG&gt; command have two &lt;STRONG&gt;MACs&lt;/STRONG&gt;), I am not able to generate an &lt;STRONG&gt;err-disable/violation&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: for "desperate times" : ) ... use:&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface FastEthernet0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp;switchport port-security&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp;switchport port-security maximum 1&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Apr 27 14:48:03: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/1, putting Fa0/1 in err-disable state&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 20:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601133#M574396</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-04-27T20:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601138#M574397</link>
      <description>&lt;P&gt;thanks for checking this out - I thought perhaps the command&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;FONT face="courier new,courier" size="2"&gt;switchport port-security maximum 1&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;could be added to the NAC enabled multi-host port? We always say that the traditional switch port security and NAC are mutually exclusive - but in this case perhaps you need that command to trigger the violation while the port is in NAC mode. I have not seen any IBNS commands to set these limits.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 20:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601138#M574397</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-27T20:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601736#M574414</link>
      <description>&lt;P&gt;Thank you very much for your help.&lt;/P&gt;&lt;P&gt;I have tried the option &lt;STRONG&gt;CoA Session Terminate with Port Shutdown&lt;/STRONG&gt;&amp;nbsp;and it works perfectly, but as you say it only works if the endpoint has a &lt;STRONG&gt;Session&lt;/STRONG&gt; (Authentication and Authorization Success).&lt;/P&gt;&lt;P&gt;I have thought about creating an authorization profile and put it in the last line, with this options&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Captura.JPG" style="width: 455px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/150151iF10B47766A606DFE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Captura.JPG" alt="Captura.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have about 15 rules and in this way if a new endpoint does not match any condition already created, it allows access and then disabled the port.&lt;/P&gt;&lt;P&gt;Could it work?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 12:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4601736#M574414</guid>
      <dc:creator>albertofdez</dc:creator>
      <dc:date>2022-04-28T12:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: Use authentication violation shutdown but not shutting down the po</title>
      <link>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4602003#M574420</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/230490"&gt;@albertofdez&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;although the &lt;STRONG&gt;Attribute Detail&lt;/STRONG&gt; has a &lt;STRONG&gt;disable-host-port&amp;nbsp;&lt;/STRONG&gt;command, the &lt;STRONG&gt;Session&lt;/STRONG&gt; did not exist on that particular time, it probably will not work !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;It's possible to use &lt;STRONG&gt;ANC&lt;/STRONG&gt; and &lt;STRONG&gt;API &lt;/STRONG&gt;for that (take a look at &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01101.pdf" target="_blank" rel="noopener"&gt;Setup Adaptive Network Control&lt;/A&gt;, special attention to &lt;STRONG&gt;Figure 2. ANC Shutdown Flow&lt;/STRONG&gt;)&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 18:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-authentication-violation-shutdown-but-not-shutting-down-the/m-p/4602003#M574420</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-04-28T18:25:17Z</dc:date>
    </item>
  </channel>
</rss>

