<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1X When Server Unreachable in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796522#M580581</link>
    <description>&lt;P&gt;Yes, that how it work,&amp;nbsp;&lt;BR /&gt;the dot1 will check alive of server it use for auth the port not all server you config in SW.&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication dot1x default group NAC&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Mar 2023 12:46:04 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-03-17T12:46:04Z</dc:date>
    <item>
      <title>802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796455#M580573</link>
      <description>&lt;P&gt;We have RADIUS setup on our switches with 2x RADIUS servers used for authenticating admin access to the switch's, and 1x RADIUS server used for port authentication for devices (not ISE).&lt;/P&gt;&lt;P&gt;When the RADIUS server for port authentication is lost, I need to the ports to fail open onto the VLAN that are statically set on the port.&lt;/P&gt;&lt;P&gt;I can use the "radius-server dead-criteria" command but is there anyway to specific which RADIUS server to detect on as if the 2x RADIUS servers for admin access go down, I don't want this to cause the switchports to fail open?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 11:21:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796455#M580573</guid>
      <dc:creator>DM812</dc:creator>
      <dc:date>2023-03-17T11:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796461#M580575</link>
      <description>&lt;P&gt;make server group&amp;nbsp;&lt;BR /&gt;assign one server (the one that you want to detect it alive) under the server group&amp;nbsp;&lt;BR /&gt;use this server group for the aaa auth dot1x&amp;nbsp;&lt;BR /&gt;I think this what you need here.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;NOTE:- always use LOCAL as failback if there is something wrong in your config, and also config username/password &amp;amp; enable passowrd for LOCAL access&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 11:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796461#M580575</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-17T11:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796469#M580577</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/780474"&gt;@DM812&lt;/a&gt; you can use critcal authentication feature, which will authorise new sessions into the default (or dedicated) VLAN when the RADIUS server is unreachable.&lt;/P&gt;
&lt;P&gt;Example: &lt;A href="https://integratingit.wordpress.com/2020/12/02/802-1x-critical-authentication/" target="_blank"&gt;https://integratingit.wordpress.com/2020/12/02/802-1x-critical-authentication/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId-1018207729" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId-1018207729&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 11:44:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796469#M580577</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-17T11:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796493#M580579</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;If I understood properly, you use on server for manage authentication to the switch (TACACS) and another server as NAC (Radius), right?&lt;BR /&gt;&amp;nbsp;If you want to have redundancy for NAC, you need to have more the one NAC running on your network. Then, on the switch&amp;nbsp; side you can add this:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;aaa group server radius RADIUS&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; server name&amp;nbsp; &amp;lt;Server1&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; server name&amp;nbsp;&amp;lt;Server2&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;aaa authentication dot1x default group RADIUS&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;aaa authorization network default group RADIUS&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;aaa accounting dot1x default start-stop group RADIUS&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;aaa server radius dynamic-author&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;client x.x.x.x&amp;nbsp; server-key 6 &amp;lt;key&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; client x.x.x.x&amp;nbsp; server-key 6 &amp;lt;key&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;radius server&amp;nbsp; &amp;lt;Server1&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;address ipv4 x.x.x.x&amp;nbsp; auth-port 1812 acct-port 1813&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;automate-tester username &amp;lt;user&amp;gt;&amp;nbsp; ignore-acct-port idle-time 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;key 6 &amp;lt;key&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;radius server &amp;lt;Server2&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;address ipv4 x.x.x.x&amp;nbsp; auth-port 1812 acct-port 1813&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;automate-tester username &amp;lt;user&amp;gt;&amp;nbsp; ignore-acct-port idle-time 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;key 6 &amp;lt;key&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 12:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796493#M580579</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-03-17T12:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796520#M580580</link>
      <description>&lt;P&gt;We have the below config...&lt;/P&gt;&lt;P&gt;aaa group server radius SwitchManagementSSH&lt;BR /&gt;server name NPS1&lt;BR /&gt;server name NPS2&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius NAC&lt;BR /&gt;server name NAC1&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group SwitchManagementSSH local&lt;BR /&gt;aaa authentication dot1x default group NAC&lt;BR /&gt;aaa authorization exec default group SwitchManagementSSH local&lt;BR /&gt;aaa authorization network default group NAC&lt;BR /&gt;aaa accounting dot1x default start-stop group NAC&lt;/P&gt;&lt;P&gt;So SSH access to the switch uses the NPS servers, whereas device auth (what is plugged into the switchports) uses the NAC server.&lt;/P&gt;&lt;P&gt;If the NAC server goes down (this is actually 3 servers in a cluster) but the NPS servers stay up, I want the ports to fail open to a specific VLAN.&lt;/P&gt;&lt;P&gt;The switchports currently have the below authentication config...&lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate 65535&lt;BR /&gt;authentication timer restart 10800&lt;BR /&gt;authentication violation replace&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout quiet-period 30&lt;BR /&gt;dot1x timeout tx-period 10&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 12:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796520#M580580</guid>
      <dc:creator>DM812</dc:creator>
      <dc:date>2023-03-17T12:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796522#M580581</link>
      <description>&lt;P&gt;Yes, that how it work,&amp;nbsp;&lt;BR /&gt;the dot1 will check alive of server it use for auth the port not all server you config in SW.&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication dot1x default group NAC&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 12:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796522#M580581</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-17T12:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796527#M580583</link>
      <description>&lt;P&gt;Great thanks, so if I apply the below config to the switchport, it will only fail open if the RADIUS server used in the "&lt;SPAN&gt;aaa group server radius NAC" group is down due to the command "aaa authentication dot1x default group NAC"?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;authentication event server dead action authorize vlan 10 (will allow data and set to use VLAN 10?)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;authentication event server dead action authorize voice (will allow voice on the VLAN that is statically set on the port?)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;authentication event server alive action reinitialize (once the server is back up, it will try to authenticate again?)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 12:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796527#M580583</guid>
      <dc:creator>DM812</dc:creator>
      <dc:date>2023-03-17T12:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796541#M580585</link>
      <description>&lt;P&gt;Correct&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 13:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4796541#M580585</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-17T13:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4800698#M580730</link>
      <description>&lt;P&gt;After testing, when I look in the MAC table it shows the Cisco IP phone and PC in both the voice and data VLANs (although both devices get an IP in their respective VLANs and ping/work fine), any ideas?&lt;/P&gt;&lt;P&gt;8 0087.64a9.dd3a STATIC Gi1/0/1&lt;BR /&gt;8 9c2d.cd38.4bbb STATIC Gi1/0/1&lt;BR /&gt;32 0087.64a9.dd3a STATIC Gi1/0/1&lt;BR /&gt;32 9c2d.cd38.4bbb STATIC Gi1/0/1&lt;/P&gt;&lt;P&gt;There seems to be issues with the "&lt;SPAN&gt;authentication event server alive action reinitialize" command as when added the devices drop pings and seem to re-auth even when the RADIUS servers are still down (I have an ACL on to block traffic to these servers from the local switch).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 13:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4800698#M580730</guid>
      <dc:creator>DM812</dc:creator>
      <dc:date>2023-03-24T13:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4801602#M580762</link>
      <description>&lt;P&gt;I will check this new Info. today&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Mar 2023 21:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4801602#M580762</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-26T21:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X When Server Unreachable</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4801611#M580764</link>
      <description>&lt;P&gt;The legacy IBNS framework you are using on the switch does not effectively understand how to handle the failure and recovery of the AAA servers. From what I recall, the switch will simply mark the AAA servers alive after a period of time and wait for the next session failures before marking them dead again. As far as I know, these issues were never resolved in the legacy framework.&lt;/P&gt;
&lt;P&gt;If your switch supports the IBNS 2.0 framework, you would be better converting to that configuration as it has enhancements for these scenarios as well as other functions that the legacy framework did not provide. See more information on the IBNS 2.0 framework (and specifically the Critical Authorization function) in the &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId-1018207729" target="_blank" rel="noopener"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Mar 2023 21:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-when-server-unreachable/m-p/4801611#M580764</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-03-26T21:57:15Z</dc:date>
    </item>
  </channel>
</rss>

