<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VLAN Toggle issue during 802.1x authentication. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4753145#M579179</link>
    <description>&lt;P&gt;Hi Friend sorry for late reply,&amp;nbsp;&lt;BR /&gt;I build my own model for 802.1x I start this model one half year ago and until now I dont finish it, hope finish it soon.&amp;nbsp;&lt;BR /&gt;anyway&amp;nbsp;&lt;BR /&gt;the first auth assign the client right VLAN,&amp;nbsp;&lt;BR /&gt;the second auth assing wrong VLAN, but why ?&lt;BR /&gt;I have theory but I want from you try it in one port and if it success then use it in other port.&amp;nbsp;&lt;BR /&gt;my theory is that you config inactivity time 300, this make SW not authz, now after the client active again the SW start new auth process, the client exchange the right secret and SW forward it to radius server,&amp;nbsp;&lt;BR /&gt;but here the issue,&amp;nbsp; if the SW when it not authz the port NOT send message to radius to make it know that client is not available then the radius still have client in db.&amp;nbsp;&lt;BR /&gt;what we need&amp;nbsp;&lt;BR /&gt;we need change inactivity to be reauth and make server assign the reauth timeout.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;authentication&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;timer&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;reauthenticate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;seconds&lt;SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;server&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jan 2023 19:20:38 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-01-11T19:20:38Z</dc:date>
    <item>
      <title>VLAN Toggle issue during 802.1x authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751283#M579136</link>
      <description>&lt;P&gt;Folks,&lt;BR /&gt;We have seen some challenges with 802.1x authentications. The challenge is that authentications work but then during normal operation the 802.1x authentication fails for some reason and the PC goes in the Guest VLAN(or the default VLAN).&lt;BR /&gt;&lt;BR /&gt;We are clueless on why this behavior is being seen. This is seen on Windows/MAC books and even at times on machines which do not have a docking stations.&lt;BR /&gt;&lt;BR /&gt;Our switch port configuration is pretty straightforward. Here is it:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 8&lt;BR /&gt;&amp;nbsp;switchport port-security maximum 8&lt;BR /&gt;&amp;nbsp;switchport port-security aging time 1&lt;BR /&gt;&amp;nbsp;switchport port-security aging type inactivity&lt;BR /&gt;&amp;nbsp;switchport port-security&lt;BR /&gt;&amp;nbsp;ip device tracking probe interval 30&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-domain&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication timer inactivity 300&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 5&lt;BR /&gt;&amp;nbsp;spanning-tree portfast edge&lt;BR /&gt;&amp;nbsp;spanning-tree bpduguard enable&lt;BR /&gt;&amp;nbsp;spanning-tree guard root&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;VLAN 3 is the production VLAN which the end user must get if the correct user certificate is present.&lt;BR /&gt;It works with the correct certificate being presented, but then for whatever reasons during the day toggle between Production VLAN and Guest VLAN keeps happening.&lt;BR /&gt;&lt;BR /&gt;We tried changing the "dot1x timeout tx-period 5" to "dot1x timeout tx-period 10" but this does not help as well.&lt;BR /&gt;&lt;BR /&gt;Any suggestions?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;N!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 11:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751283#M579136</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2023-01-09T11:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN Toggle issue during 802.1x authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751287#M579137</link>
      <description>&lt;P&gt;are you sure that the Radius/Tacacs/ISE server is alive when this happened ?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 11:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751287#M579137</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-09T11:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN Toggle issue during 802.1x authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751288#M579138</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/47004"&gt;@network_geek1979&lt;/a&gt; port security and dot1x configured on the same interface is not supported nor needed, please remove and retest. Can you provide the output of "show run aaa"&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 12:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751288#M579138</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-01-09T12:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN Toggle issue during 802.1x authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751855#M579144</link>
      <description>&lt;P&gt;Yes, we are 100% sure that the radius server is active.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 09:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4751855#M579144</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2023-01-10T09:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN Toggle issue during 802.1x authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4752042#M579148</link>
      <description>&lt;P&gt;Hi, I have it pasted below. (&lt;EM&gt;IP addresses are just changed&lt;/EM&gt;)&lt;/P&gt;&lt;P&gt;*******************************************************&lt;/P&gt;&lt;P&gt;switch#sh run aaa&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group tacacs+ enable&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization exec default group tacacs+ none&lt;BR /&gt;aaa authorization network default group radius&lt;BR /&gt;aaa authorization configuration default group tacacs+&lt;BR /&gt;aaa authorization commands 0 default group tacacs+ none&lt;BR /&gt;aaa authorization commands 1 default group tacacs+ none&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ none&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization console&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting connection default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 0 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;BR /&gt;aaa accounting system default start-stop group tacacs+&lt;BR /&gt;aaa accounting dot1x default start-stop group radius&lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;username admin privilege 15 password 7 009988776655&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;&amp;nbsp; client 1.1.1.1 server-key 7 AOAOAOAOAOAO&lt;BR /&gt;&amp;nbsp; client 2.2.2.2 server-key 7 BOBOBOBOBOBO&lt;BR /&gt;&amp;nbsp; client 3.3.3.3 server-key 7 COCOCOCOCOCO&lt;BR /&gt;&amp;nbsp; client 4.4.4.4 server-key 7 DODODODODODO&lt;BR /&gt;&amp;nbsp; client 5.5.5.5 server-key 7 EOEOEOEOEOEO&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius server server1.mydomain.com&lt;BR /&gt;&amp;nbsp; address ipv4 1.1.1.1 auth-port 1812 acct-port 1813&lt;BR /&gt;&amp;nbsp; key 7 11223344ABCDE445566&lt;BR /&gt;!&lt;BR /&gt;radius server server2.mydomain.com&lt;BR /&gt;&amp;nbsp; address ipv4 2.2.2.2 auth-port 1812 acct-port 1813&lt;BR /&gt;&amp;nbsp; key 7 11223344ABCDE445566&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 30 tries 3&lt;BR /&gt;radius-server deadtime 10&lt;BR /&gt;tacacs server tac01&lt;BR /&gt;&amp;nbsp; address ipv4 8.8.1.1&lt;BR /&gt;&amp;nbsp; key 7 1122334455667788&lt;BR /&gt;tacacs server tac02&lt;BR /&gt;&amp;nbsp; address ipv4 9.8.1.1&lt;BR /&gt;&amp;nbsp; key 7 1122334455667788&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius NACGROUP&lt;BR /&gt;&amp;nbsp; server name server1.mydomain.com&lt;BR /&gt;&amp;nbsp; server name server2.mydomain.com&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;switch#&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 11:44:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4752042#M579148</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2023-01-10T11:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN Toggle issue during 802.1x authentication.</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4753145#M579179</link>
      <description>&lt;P&gt;Hi Friend sorry for late reply,&amp;nbsp;&lt;BR /&gt;I build my own model for 802.1x I start this model one half year ago and until now I dont finish it, hope finish it soon.&amp;nbsp;&lt;BR /&gt;anyway&amp;nbsp;&lt;BR /&gt;the first auth assign the client right VLAN,&amp;nbsp;&lt;BR /&gt;the second auth assing wrong VLAN, but why ?&lt;BR /&gt;I have theory but I want from you try it in one port and if it success then use it in other port.&amp;nbsp;&lt;BR /&gt;my theory is that you config inactivity time 300, this make SW not authz, now after the client active again the SW start new auth process, the client exchange the right secret and SW forward it to radius server,&amp;nbsp;&lt;BR /&gt;but here the issue,&amp;nbsp; if the SW when it not authz the port NOT send message to radius to make it know that client is not available then the radius still have client in db.&amp;nbsp;&lt;BR /&gt;what we need&amp;nbsp;&lt;BR /&gt;we need change inactivity to be reauth and make server assign the reauth timeout.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;authentication&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;timer&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;reauthenticate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;seconds&lt;SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;server&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 19:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-toggle-issue-during-802-1x-authentication/m-p/4753145#M579179</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-11T19:20:38Z</dc:date>
    </item>
  </channel>
</rss>

