<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 802.1x port authentication - IP Phone bypass in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4748532#M579051</link>
    <description>&lt;P&gt;We need to find a way of bypassing 802.1x port authentication for Avaya IP phones.&amp;nbsp; The switch ports on our Cisco 9200 switches all have 802.1x authentication with NPS acting as the radius (No ISE or ACS servers).&lt;/P&gt;
&lt;P&gt;This works fine for PC's/Laptops when plugged in but doesn't work when plugging in Avaya phones and piggy backing the laptop through the phone.&lt;/P&gt;
&lt;P&gt;I'm aware of how to achieve this using host-mode&amp;nbsp;&lt;SPAN&gt;multi-domain and MAB when an ACS server is used but we have Microsoft NPS running instead.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Separating laptops and phones in to separate switches/ports is not an option as we would have to find another 500 ports.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Jan 2023 14:22:06 GMT</pubDate>
    <dc:creator>andy_4578</dc:creator>
    <dc:date>2023-01-03T14:22:06Z</dc:date>
    <item>
      <title>802.1x port authentication - IP Phone bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4748532#M579051</link>
      <description>&lt;P&gt;We need to find a way of bypassing 802.1x port authentication for Avaya IP phones.&amp;nbsp; The switch ports on our Cisco 9200 switches all have 802.1x authentication with NPS acting as the radius (No ISE or ACS servers).&lt;/P&gt;
&lt;P&gt;This works fine for PC's/Laptops when plugged in but doesn't work when plugging in Avaya phones and piggy backing the laptop through the phone.&lt;/P&gt;
&lt;P&gt;I'm aware of how to achieve this using host-mode&amp;nbsp;&lt;SPAN&gt;multi-domain and MAB when an ACS server is used but we have Microsoft NPS running instead.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Separating laptops and phones in to separate switches/ports is not an option as we would have to find another 500 ports.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 14:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4748532#M579051</guid>
      <dc:creator>andy_4578</dc:creator>
      <dc:date>2023-01-03T14:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication - IP Phone bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4748569#M579052</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Review this thread :&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/802-1x-authentication-for-cisco-2960-and-avaya-ip-phone/td-p/2876422" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/802-1x-authentication-for-cisco-2960-and-avaya-ip-phone/td-p/2876422&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 15:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4748569#M579052</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-01-03T15:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication - IP Phone bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4748577#M579053</link>
      <description>&lt;P&gt;check below Blog :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://mikepembo.wordpress.com/2016/11/07/dynamic-vlan-assignment-cisco-and-nps/comment-page-1/" target="_blank"&gt;https://mikepembo.wordpress.com/2016/11/07/dynamic-vlan-assignment-cisco-and-nps/comment-page-1/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://mikepembo.wordpress.com/2016/11/14/802-1x-mac-authentication-bypass-mab-to-an-nps-server/" target="_blank"&gt;https://mikepembo.wordpress.com/2016/11/14/802-1x-mac-authentication-bypass-mab-to-an-nps-server/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 15:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4748577#M579053</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-01-03T15:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication - IP Phone bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4749141#M579065</link>
      <description>&lt;P&gt;Configuring MAC Authentication Bypass for the Avaya phones is an option, but the responses above would be better.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 15:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4749141#M579065</guid>
      <dc:creator>Delano Thompson</dc:creator>
      <dc:date>2023-01-04T15:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x port authentication - IP Phone bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4749517#M579079</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Thanks for the responses, im still working on getting MAB working with NPS, without the phone in play 802.1x works perfectly along with automatic vlan assignment - adding the phone to the mix just shuts down the switchport at the point the phone tries to register on the network, the port then goes to an err-disable state. It might be a firmware issue on the phones although the managed by another company so cant change it.&lt;/P&gt;
&lt;P&gt;Also creating a connection request policy in NPS for each of the phone/MAC might be a bit much.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 10:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-authentication-ip-phone-bypass/m-p/4749517#M579079</guid>
      <dc:creator>andy_4578</dc:creator>
      <dc:date>2023-01-05T10:24:54Z</dc:date>
    </item>
  </channel>
</rss>

