<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Catalyst switches: Endless access-session for failed MAC addresses in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4732959#M578654</link>
    <description>&lt;P&gt;Hi Arne,&lt;BR /&gt;thank you for the reply. So it's the same behavior in IOS 15.2(7) (2960-X) and IOS-XE 17.6 (9300)&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Do you have Device-Tracking enabled?&amp;nbsp; If yes, then perhaps the symptoms you're seeing are a software defect (in my opinion).&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Yes Device Tracking is enabled on both platforms and works like expected. However for these MAC addresses, the IP addresses are not learned, because I just send arbitary traffic from them, which is not ARP or ND. Device tracking won't learn any IP for the MAC from the data plane. But this should not influence the behavior from my point of view.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;In a healthy system I have never seen a switch create a session when there is no MAC address on the interface (show mac address interface xxx) - the presence of the MAC address is the trigger for the session manager (SMD) to do some processing.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;And this is still the case. So the access session is created as soon as the MAC is learned on the switch port. &lt;BR /&gt;However, the access session for a given MAC is not cleared when the MAC address is removed (MAC timeout).&lt;/P&gt;</description>
    <pubDate>Tue, 06 Dec 2022 06:03:01 GMT</pubDate>
    <dc:creator>Johannes Luther</dc:creator>
    <dc:date>2022-12-06T06:03:01Z</dc:date>
    <item>
      <title>Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4730876#M578584</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;
&lt;P&gt;I'm using Catalyst switches and want to perform open mode (NAC monitor) mode using IBNS 2.0 configuration.&lt;BR /&gt;The RADIUS server is a Cisco ISE.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Switch ports&lt;/STRONG&gt;: The ports are configured in open mode in the host-mode multi-auth.&lt;BR /&gt;&lt;STRONG&gt;ISE:&amp;nbsp;&lt;/STRONG&gt;The default rule at the end of the policy is a DENY. Unknown MACs should be denied.&lt;BR /&gt;I know there is also the strategy to deploy a PERMIT rule with a corresponding DACL - but I don't like this approach.&lt;BR /&gt;&lt;BR /&gt;I'm not using any kind of Profiler ... knows MACs are permitted - unknown are not ... simple as that.&lt;BR /&gt;&lt;BR /&gt;I'm running some lab tests and want to test the monitor mode functionality. This means, that multiple MAC addresses may be allowed behind a switch port. So I have a legitimate MAC / Client behind my switch port and simulate other clients by MAC spoofing (scapy snippet). I want to prove, that the port is not going into error disable and the MACs are learned on the port.&lt;BR /&gt;&lt;BR /&gt;So far so good... when I launch my MAC spoofing the following happens:&lt;BR /&gt;- MAC addresses are learned on the port (show mac address-table int &amp;lt;ID&amp;gt;)&lt;BR /&gt;- Access-session for MAC address is triggered and after some time authentication fails (MAB immediately, 802.1X after 90 seconds) for the MAC address&lt;BR /&gt;&lt;BR /&gt;=&amp;gt; Still, so far so good...&lt;/P&gt;
&lt;P&gt;After the session fails, the authentication is restarted after 60 seconds. Here's a shortened config snipped of the policy:&lt;/P&gt;
&lt;PRE&gt;policy-map type control subscriber MY_POLICY&lt;BR /&gt;[...]&lt;BR /&gt;  event authentication-failure match-first&lt;BR /&gt;  [...]&lt;BR /&gt;    40 class MAB_FAILED do-until-failure&lt;BR /&gt;      10 terminate mab&lt;BR /&gt;      20 authentication-restart 60&lt;BR /&gt;    60 class always do-until-failure&lt;BR /&gt;      10 terminate dot1x&lt;BR /&gt;      20 terminate mab&lt;BR /&gt;      30 authentication-restart 60&lt;/PRE&gt;
&lt;P&gt;So for a given failed MAC the auth is retried and retried again and again ....&lt;/P&gt;
&lt;P&gt;However after some time (300 seconds), the MAC address of the failed client is removed from the MAC address table. However, the access session is restarted and restarted again for this MAC, although it's no longer in the MAC address table.&lt;/P&gt;
&lt;P&gt;So the MAC address is tried to reauthenticate via MAB forever ... or at least until the port is bounced or the access session is cleared.&lt;/P&gt;
&lt;P&gt;How to overcome this? Is there any config knob? I know, that I could enable a PERMIT Rule at the end of the ISE authz rules to solve it in combination with the "idle-timeout" ... however there must be another way to remove the access sessions for not existing MACs....&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 11:31:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4730876#M578584</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2022-12-01T11:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4732833#M578650</link>
      <description>&lt;P&gt;Do you have Device-Tracking enabled?&amp;nbsp; If yes, then perhaps the symptoms you're seeing are a software defect (in my opinion).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a healthy system I have never seen a switch create a session when there is no MAC address on the interface (show mac address interface xxx) - the presence of the MAC address is the trigger for the session manager (SMD) to do some processing.&lt;/P&gt;
&lt;P&gt;I have also tried in the past, to debug Catalysts 802.1X/MAB but the logs can be hard to interpret. It might be worth giving this a try&lt;/P&gt;
&lt;P&gt;My cheat sheet below&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="en-GB"&gt;IOS-XE split out the 802.1X Session Management into a separate Linux process called 'smd' (Session Manager Daemon)&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="en-GB"&gt;Forget everything you have learned in last 25 years of IOS debugging - it no longer works (the classic debug commands are still there, but they are defunct)&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="en-GB"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="en-GB"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Set the debugs&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;===================&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; dot1x-all debug&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; radius-authen debug&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; aaa-authen debug&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; eap-all debug&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; auth-mgr-all debug&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;View the trace levels&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;=========================&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;" lang="en-GB"&gt;show platform software trace level smd switch active R0&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;View the logs with&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;==============================&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;show platform software trace message smd switch active R0&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;After test complete, reset the debugs to normal again!!!&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;===========&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; dot1x-all notice&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; radius-authen notice&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; aaa-authen notice&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; eap-all notice&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;set platform software trace smd switch active R0&lt;/SPAN&gt;&lt;SPAN&gt; auth-mgr-all notice&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2022 21:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4732833#M578650</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-12-05T21:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4732959#M578654</link>
      <description>&lt;P&gt;Hi Arne,&lt;BR /&gt;thank you for the reply. So it's the same behavior in IOS 15.2(7) (2960-X) and IOS-XE 17.6 (9300)&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Do you have Device-Tracking enabled?&amp;nbsp; If yes, then perhaps the symptoms you're seeing are a software defect (in my opinion).&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Yes Device Tracking is enabled on both platforms and works like expected. However for these MAC addresses, the IP addresses are not learned, because I just send arbitary traffic from them, which is not ARP or ND. Device tracking won't learn any IP for the MAC from the data plane. But this should not influence the behavior from my point of view.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;In a healthy system I have never seen a switch create a session when there is no MAC address on the interface (show mac address interface xxx) - the presence of the MAC address is the trigger for the session manager (SMD) to do some processing.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;And this is still the case. So the access session is created as soon as the MAC is learned on the switch port. &lt;BR /&gt;However, the access session for a given MAC is not cleared when the MAC address is removed (MAC timeout).&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 06:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4732959#M578654</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2022-12-06T06:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733459#M578665</link>
      <description>&lt;P&gt;Could the following thread help with your issue?&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/switching/idle-timeout-and-probing-for-access-session-ibns2-0/td-p/3693787" target="_blank"&gt;https://community.cisco.com/t5/switching/idle-timeout-and-probing-for-access-session-ibns2-0/td-p/3693787&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create a service template with inactivity-timer set&lt;/LI&gt;&lt;LI&gt;When a client fails authentication, this service-template is applied to the session&lt;/LI&gt;&lt;LI&gt;when the inactivity-timer expires, the session is cleared&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;&lt;P&gt;service-template INACTIVITY-TIMER&lt;BR /&gt;inactivity-timer 60 probe&lt;BR /&gt;......&lt;BR /&gt;event authentication-failure match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 activate service-template INACTIVITY-TIMER&lt;BR /&gt;event inactivity-timeout match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 clear-session&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 16:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733459#M578665</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-12-06T16:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733860#M578681</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/255857"&gt;@andrewswanson&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;thank you very much! Very, very helpful. Tried it in my lab and it's working with little modifications.&lt;BR /&gt;I didn't use the "probe" keyword in the "inactivity-timer", because there might be endpoints, which are not in den device-tracking database, because their IP has not been learned through device tracking compatible protocols (like ARP).&lt;/P&gt;
&lt;P&gt;However, the keyword "inactivity" implies, that the event is triggered when the endpoint (MAC) does not send frames. Unfortunately this is incorrect. The inactivity timer is reset as soon as a new event for the endpoint is triggered, regardless whether the endpoint is active.&lt;/P&gt;
&lt;P&gt;Example&lt;/P&gt;
&lt;PRE&gt;policy-map type control subscriber MY_POLICY&lt;BR /&gt;[...]&lt;BR /&gt;  event authentication-failure match-first&lt;BR /&gt;  [...]&lt;BR /&gt;    40 class MAB_FAILED do-until-failure&lt;BR /&gt;      10 terminate mab&lt;BR /&gt;      15 activate service-template INACTIVITY-TIMER&lt;BR /&gt;      20 authentication-restart 60&lt;BR /&gt;    60 class always do-until-failure&lt;BR /&gt;      10 terminate dot1x&lt;BR /&gt;      20 terminate mab&lt;BR /&gt;      25 activate service-template INACTIVITY-TIMER&lt;BR /&gt;      30 authentication-restart 60&lt;/PRE&gt;
&lt;P&gt;In the example above, the inactivity-timer must be less than 60 seconds, because this is the authentication restart time.&lt;BR /&gt;As soon as the authentication restarts, the inactivity timer is reset. If the inactivity timer is reset the newly introduced event "inactivity-timeout" never triggers....&lt;/P&gt;
&lt;P&gt;I thought about the whole topic and played around with the absolute timeout as well.... However I wasn't happy with the outcome.&lt;BR /&gt;Why even restart after a failed MAB attempt? The endpoint sends frames if it want to communicate. So I don't need to restart anything - I just need a way to backpressure failed MAB attempts for some time, right?&lt;/P&gt;
&lt;P&gt;One way would be to tweak (somehow) the policy or using EEM:&lt;BR /&gt;So the EEM approach would be&lt;/P&gt;
&lt;PRE&gt;event manager applet REMOVE_AUTH_MANAGER_SESSION&lt;BR /&gt; event mat interface regexp .* type delete hold-down 1 ratelimit 5&lt;BR /&gt; action 1.0 syslog msg "MAC address deleted: $_mat_mac_address (interface: $_mat_intf_name). Try to clear access-session"&lt;BR /&gt; action 2.0 cli command "clear access-session mac $_mat_mac_address"&lt;/PRE&gt;</description>
      <pubDate>Wed, 07 Dec 2022 08:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733860#M578681</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2022-12-07T08:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733891#M578683</link>
      <description>&lt;P&gt;Nevermind the EEM applet ... it's kinda useless, because it's triggered on MAC changes from dynamic to static as well... Clearing freshly authorized sessions, resulting in an endless auth loop.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞Could be solved with some clever conditions within the EEM script ... but the more I think of it, I find it kind of "dirty"&lt;BR /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 09:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733891#M578683</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2022-12-07T09:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733926#M578684</link>
      <description>&lt;P&gt;Hi, set the command&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt; authentication timer unauthorized 300&lt;/LI-CODE&gt;
&lt;P&gt;under the interface. This removes sessions which were in the unauthorized state for 300 seconds (or whatever time you like).&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 09:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733926#M578684</guid>
      <dc:creator>martin.fischer</dc:creator>
      <dc:date>2022-12-07T09:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733950#M578685</link>
      <description>&lt;P&gt;I think "&lt;STRONG&gt;authentication timer unauthorized 300&lt;/STRONG&gt;" is a legacy (ibns 1) command. It would interesting to see the result of configuring an interface with this command (in ibns 1 mode) and checking if/how "&lt;STRONG&gt;authentication display new-style&lt;/STRONG&gt;" converts this to ibns 2.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 10:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733950#M578685</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-12-07T10:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733968#M578686</link>
      <description>&lt;P&gt;Just checked this in CML - the interface retains the&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;STRONG&gt;authentication timer unauthorized 300&lt;/STRONG&gt;&lt;SPAN&gt;" command after conversion to ibns 2 so this may be an option worth looking at?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 10:52:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733968#M578686</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-12-07T10:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733996#M578687</link>
      <description>&lt;P&gt;Yes, it's an IBNS 2.0 compatible command like most of the other authentication timer xyz commands.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 11:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4733996#M578687</guid>
      <dc:creator>martin.fischer</dc:creator>
      <dc:date>2022-12-07T11:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4734827#M578720</link>
      <description>&lt;PRE&gt;switch(config-if)#authentication timer inactivity 300&lt;BR /&gt;Command deprecated(authentication timer inactivity 300 ) - use cpl config&lt;/PRE&gt;
&lt;P&gt;Does not work with IBNS 2.0 on my 2960X. And (even if it would work), the command is not compatible with interface templates.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 12:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4734827#M578720</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2022-12-08T12:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4734870#M578721</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316548"&gt;@Johannes Luther&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;The command you entered is not the same as I suggested (you used timer &lt;STRONG&gt;inactivity&lt;/STRONG&gt; instead of &lt;STRONG&gt;unauthorized&lt;/STRONG&gt;).&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 13:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4734870#M578721</guid>
      <dc:creator>martin.fischer</dc:creator>
      <dc:date>2022-12-08T13:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4734929#M578726</link>
      <description>&lt;P&gt;Silly me ... command is working on the interface level (not template).&lt;/P&gt;
&lt;P&gt;And... it's working ... crazy...&lt;/P&gt;
&lt;P&gt;Now it would be good to have something similar in the IBNS 2.0 policy ..&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 14:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4734929#M578726</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2022-12-08T14:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst switches: Endless access-session for failed MAC addresses</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4735044#M578730</link>
      <description>&lt;P&gt;Perhaps another option would be for ISE to send the RADIUS Idle-timeout attribute for failed MAB authentications? I assume ISE currently responds only with Access-Reject.&lt;/P&gt;&lt;P&gt;If that works, it would shift policy decisions onto ISE rather than the switch ibns 2 policy.&lt;/P&gt;&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT - just read that this attribute is only sent&amp;nbsp;in an Access-Accept or Access-Challenge so wouldn't work in this scenario&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 17:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switches-endless-access-session-for-failed-mac/m-p/4735044#M578730</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2022-12-08T17:14:09Z</dc:date>
    </item>
  </channel>
</rss>

