<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Switch Port configuration for Meraki Access Point in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4731199#M578593</link>
    <description>&lt;P&gt;Huh?&amp;nbsp; Why aren't you performing 802.1X on the Merkai APs for the clients?&amp;nbsp; Are you looking to authenticate the AP ITSELF via 802.1X or Clients?&lt;/P&gt;</description>
    <pubDate>Thu, 01 Dec 2022 20:26:43 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2022-12-01T20:26:43Z</dc:date>
    <item>
      <title>802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4730600#M578573</link>
      <description>&lt;P&gt;Does anyone know what the current setting is for a 802.1x switch port configuration for the switch for a Meraki Access Point?&amp;nbsp; Is it a configuration similar to A or B below (a regular trunk port for an Access Point).&amp;nbsp; I have been B but not sure how it would trigger 802.1x without the 802.1x setting.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;a)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface X/X&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport mode trunk&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport trunk allowed vlan x&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip access-group ACL_DEFAULT in&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication event fail action next-method&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication host-mode multi-auth&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication open&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication order dot1x mab&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication priority dot1x mab&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication port-control auto&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;or&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;b)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface X/X&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; switch mode trunk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; switch trunk allowed x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also - as for the Windows supplicant client, is the 802.1x setting&amp;nbsp;below required too for the Wifi&amp;nbsp;settings -&amp;nbsp;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_Clients_for_802.1X_and_Meraki_Authentication" target="_blank"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_Clients_for_802.1X_and_Meraki_Authentication &lt;/A&gt;and the WlAN AutoConfig service needs to be enabled/started automatically like a 802.1x setting?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks in advance!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(regular port for trunk for an Access Point)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 21:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4730600#M578573</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2022-11-30T21:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4731199#M578593</link>
      <description>&lt;P&gt;Huh?&amp;nbsp; Why aren't you performing 802.1X on the Merkai APs for the clients?&amp;nbsp; Are you looking to authenticate the AP ITSELF via 802.1X or Clients?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 20:26:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4731199#M578593</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-12-01T20:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4731377#M578601</link>
      <description>&lt;P&gt;Thanks Ahollifield for the response.&amp;nbsp; I am looking to authenticate the clients connecting to the SSID through that first AP (one it works, we will deploy the rest). I thought I saw a different environment where there was not 802.1x config at all on it so wanted to check.&amp;nbsp; It did work at one point with the 802.1x config on it and doesn't work after, even after we tried a different switch port and re-applied the setting here for the Wifi-adapter on the adapter:&amp;nbsp;&amp;nbsp;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_Clients_for_802.1X_and_Meraki_Authentication" target="_blank"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_Clients_for_802.1X_and_Meraki_Authentication&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;So sounds like it should have the 802.1x configuration? We did do one thing on the ISE policy to add the domain computers as condition (in addition to the domain users) but after that didn't work, we removed the domain computers and after that it never worked again.&amp;nbsp; Just wondering what would cause it not to work again and what the proper setting is also for domain computers and domain users as conditions with the Meraki APs.&amp;nbsp; thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2022 08:05:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4731377#M578601</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2022-12-02T08:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4731382#M578602</link>
      <description>&lt;P&gt;If you want to authenticate the clients, then the Switchport needs a basic trink configuration allowing all VLANs that your Wireless users are assigned to in addition to the AP VLAN.&lt;/P&gt;
&lt;P&gt;You will likely have multiple rules in your ISE policy. At leat one for the users (perhaps multiple based on department or other information) and one for the Domain computers. But this depends on your needs. You don't have to authenticate the machine or the user. But you can do both. Just make sure that the supplicant config matches your policy-config.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2022 08:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4731382#M578602</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-12-02T08:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4736184#M578751</link>
      <description>&lt;P&gt;Thanks Karsten for the reply.&amp;nbsp; I will try that and was going to ask about the computer authentication configuration.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a question that is somewhat related:&amp;nbsp; Just wondering if there the following is supported if the option is checked to automatically use Windows Logon to avoid having users to relogin:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Uncheck&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Automatically use my Windows logon name&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_Clients_for_802.1X_and_Meraki_Authentication" target="_blank"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_Clients_for_802.1X_and_Meraki_Authentication&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;We tried it and it didn't work and was wondering that is why the documentation says to leave it unchecked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Dec 2022 12:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4736184#M578751</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2022-12-10T12:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4736618#M578762</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306399"&gt;@latenaite2011&lt;/a&gt;&amp;nbsp;If your ISE RADIUS live log indicated an error, what is it? Otherwise, I think you need open a case with Cisco Meraki support.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Dec 2022 17:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4736618#M578762</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-12-11T17:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4739997#M578850</link>
      <description>&lt;P data-source-line="921"&gt;I encourage you to watch our webinars including this one which shows you how to do it:&lt;/P&gt;
&lt;P data-source-line="921"&gt;▶ &lt;A class="" title="https://youtu.be/w3bLEI6dUIo" href="https://youtu.be/w3bLEI6dUIo" data-from-md="" target="_blank"&gt;Secure Cisco Meraki Wireless with ISE&lt;/A&gt;&lt;/P&gt;
&lt;P data-source-line="923"&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=0s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=0s" data-from-md="" target="_blank"&gt;00:00&lt;/A&gt; Intro &amp;amp; Agenda&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=42s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=42s" data-from-md="" target="_blank"&gt;00:42&lt;/A&gt; ISE Compatibility (RADIUS &amp;amp; TACACS protocols)&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=72s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=72s" data-from-md="" target="_blank"&gt;01:12&lt;/A&gt; Meraki Hardware &amp;amp; Software Capabilities&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=118s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=118s" data-from-md="" target="_blank"&gt;01:58&lt;/A&gt; Endpoint Authentication and Trust&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=175s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=175s" data-from-md="" target="_blank"&gt;02:55&lt;/A&gt; Authentication &amp;amp; Network Access Security is a Spectrum&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=385s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=385s" data-from-md="" target="_blank"&gt;06:25&lt;/A&gt; Meraki Dashboard&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=449s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=449s" data-from-md="" target="_blank"&gt;07:29&lt;/A&gt; SSIDs and Access Control Options&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=520s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=520s" data-from-md="" target="_blank"&gt;08:40&lt;/A&gt; Methods for Securing Meraki Wireless with ISE&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=587s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=587s" data-from-md="" target="_blank"&gt;09:47&lt;/A&gt; MAC Authentication Bypass (MAB)&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=696s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=696s" data-from-md="" target="_blank"&gt;11:36&lt;/A&gt; Meraki RADIUS Authentication Test&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=716s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=716s" data-from-md="" target="_blank"&gt;11:56&lt;/A&gt; Demo: Meraki Dashboard SSIDs for Open Hotspot and ISE Configuration Overview&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1168s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1168s" data-from-md="" target="_blank"&gt;19:28&lt;/A&gt; Centralized Web Authentication (CWA) with ISE vs Meraki Splash Page&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1370s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1370s" data-from-md="" target="_blank"&gt;22:50&lt;/A&gt; Demo: Guest HotSpot WebAuth with Acceptable User Policy using GuestEndpoints Group Filtering&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1680s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1680s" data-from-md="" target="_blank"&gt;28:00&lt;/A&gt; Pre-Shared Keys in Meraki (but not with ISE)&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1793s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1793s" data-from-md="" target="_blank"&gt;29:53&lt;/A&gt; Enable iPSK in Meraki with ISE&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1816s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1816s" data-from-md="" target="_blank"&gt;30:16&lt;/A&gt; Meraki Config Updates may take several minutes sometimes!&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1903s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1903s" data-from-md="" target="_blank"&gt;31:43&lt;/A&gt; Identity PSK (iPSK) and RADIUS:Tunnel-Password(69)&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1965s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=1965s" data-from-md="" target="_blank"&gt;32:45&lt;/A&gt; Demo: iPSK for IOT Devices, IOT_WiFi Policy, and Authorization Profiles&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2484s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2484s" data-from-md="" target="_blank"&gt;41:24&lt;/A&gt; IEEE 802.1X Overview&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2586s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2586s" data-from-md="" target="_blank"&gt;43:06&lt;/A&gt; Certificate Authentication Profile (CAP) for certificate authentication&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2603s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2603s" data-from-md="" target="_blank"&gt;43:23&lt;/A&gt; Endpoint Supplicant Provisioning&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2661s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2661s" data-from-md="" target="_blank"&gt;44:21&lt;/A&gt; Meraki Systems Manager (SM)&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2669s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2669s" data-from-md="" target="_blank"&gt;44:29&lt;/A&gt; Demo: 802.1X with corp SSID and ISE Configuration&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2795s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2795s" data-from-md="" target="_blank"&gt;46:35&lt;/A&gt; Demo: 802.1X Username+Password&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2852s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=2852s" data-from-md="" target="_blank"&gt;47:32&lt;/A&gt; Demo: Meraki System Manager Payload for corp SSID and digital certificate&lt;BR /&gt;&lt;A title="https://youtu.be/w3bLEI6dUIo&amp;amp;t=3150s" href="https://youtu.be/w3bLEI6dUIo&amp;amp;t=3150s" data-from-md="" target="_blank"&gt;52:30&lt;/A&gt; ISE Webinars and Resources&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2022 23:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4739997#M578850</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-12-15T23:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4742768#M578921</link>
      <description>Thanks Thomas great video - Some help useful tips already and will try&lt;BR /&gt;during next sessions.  thanks!&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4742768#M578921</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2022-12-20T17:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4745831#M578993</link>
      <description>Hey Thomas,&lt;BR /&gt;&lt;BR /&gt;I went through this video but didn't see anything for the switchport&lt;BR /&gt;configuration. What would the switch port configuration be for the&lt;BR /&gt;802.1x/MAB for the Meraki AP?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance!&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Dec 2022 05:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4745831#M578993</guid>
      <dc:creator>latenaite2011</dc:creator>
      <dc:date>2022-12-28T05:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4756826#M579297</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306399"&gt;@latenaite2011&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You want to authenticate Wireless clients connecting to that AP? If yes then the authentication happens on the wireless part of the network and you need to set it up in the Meraki Dashboard. On the switch you just need to set trunk port with native vlan (AP management vlan). Switch will not do any authentication - the clients are already authenticated when they connect to WiFi.&lt;/P&gt;
&lt;P&gt;If you have enabled 802.1X authentication on the switch and would like set the authentication also for the AP port then it's little bit tricky. You need to authenticate only the AP and leave the bridged Wireless clients without authentication. So you need to use multi-host authentication mode. Also set the AP port to access mode and switch it to trunk via interface template during AP authentication. This is how I do it with ISE. I have Cisco switch and Meraki AP.&lt;/P&gt;
&lt;P&gt;Br,&lt;/P&gt;
&lt;P&gt;Jiri&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 15:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/4756826#M579297</guid>
      <dc:creator>jkyt@nnit.com</dc:creator>
      <dc:date>2023-01-18T15:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/5230520#M593463</link>
      <description>&lt;P&gt;dear&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/996512"&gt;jkyt@nnit.com&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your answer, i am blocked at this step "&lt;SPAN&gt;Also set the AP port to access mode and switch it to trunk via interface template during AP authentication."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;is it possble to share a sample of your conf please ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you very much&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 11:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/5230520#M593463</guid>
      <dc:creator>m-leguyader</dc:creator>
      <dc:date>2024-11-29T11:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/5230567#M593465</link>
      <description>&lt;P&gt;Something like this (IBNS2.0+), not a perfect solution but I'm not aware of any better when you need flex connect:&lt;/P&gt;
&lt;P&gt;#interface template assigned by ISE during AP authorization&lt;BR /&gt;#switch interface to trunk&lt;BR /&gt;template AP-Authz&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 120&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;#template with 802.1X settings for AP in flex connect mode - host-mode multi-host&lt;BR /&gt;template AP-WiredDot1xClosedAuth&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 6&lt;BR /&gt;&amp;nbsp;dot1x max-reauth-req 3&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;access-session control-direction in&lt;BR /&gt;&amp;nbsp;access-session host-mode multi-host&lt;BR /&gt;&amp;nbsp;access-session closed&lt;BR /&gt;&amp;nbsp;access-session port-control auto&lt;BR /&gt;&amp;nbsp;authentication periodic&lt;BR /&gt;&amp;nbsp;authentication timer reauthenticate server&lt;BR /&gt;&amp;nbsp;service-policy type control subscriber WiredDot1xClosedAuth_MAB_1X&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;#interace configuration - assigning AP-WiredDot1xClosedAuth template&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;&amp;nbsp;description *WIFI*&lt;BR /&gt;&amp;nbsp;switchport access vlan 120&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;device-tracking attach-policy IPDT&lt;BR /&gt;&amp;nbsp;ip arp inspection trust&lt;BR /&gt;&amp;nbsp;no logging event link-status&lt;BR /&gt;&amp;nbsp;load-interval 30&lt;BR /&gt;&amp;nbsp;no snmp trap link-status&lt;BR /&gt;&amp;nbsp;source template AP-WiredDot1xClosedAuth&lt;BR /&gt;&amp;nbsp;spanning-tree portfast trunk&lt;BR /&gt;&amp;nbsp;spanning-tree guard root&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 13:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/5230567#M593465</guid>
      <dc:creator>jkyt@nnit.com</dc:creator>
      <dc:date>2024-11-29T13:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Switch Port configuration for Meraki Access Point</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/5230604#M593466</link>
      <description>&lt;P&gt;Thanks you very much&amp;nbsp;&lt;/P&gt;&lt;P&gt;And on your ISE, you just enter in the authZ profile the interface template :&amp;nbsp;&lt;SPAN&gt;AP-Authz ? no VLAN or DACL ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 15:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-switch-port-configuration-for-meraki-access-point/m-p/5230604#M593466</guid>
      <dc:creator>m-leguyader</dc:creator>
      <dc:date>2024-11-29T15:48:12Z</dc:date>
    </item>
  </channel>
</rss>

