<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1X Port-Based Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856975#M582303</link>
    <description>&lt;P&gt;Where can i check if I am in "open" authentication mode ?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The supplicant on my Windows device was already set up to utilize 802.1X authentication, similar to the example provided except the "Provide server certificate" configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 18 Jun 2023 11:03:00 GMT</pubDate>
    <dc:creator>michaelglosker</dc:creator>
    <dc:date>2023-06-18T11:03:00Z</dc:date>
    <item>
      <title>802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856932#M582297</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I'm currently exploring the setup of 802.1x port-based authentication with Cisco switches and Active Directory.&lt;/P&gt;&lt;P&gt;Once the configuration was completed on both the switch and the NPS server, I attempted to perform a &lt;STRONG&gt;test aaa&lt;/STRONG&gt;. Upon reviewing the NPS audit log, I found that the request was marked as successful. However, when I connected my laptop to the Ethernet port, I didn't receive any authentication request to the NPS server. Instead, I was able to connect directly to the network. Furthermore, when I tried connecting a non-domain computer to the Ethernet port, it was also able to connect to the network, despite 802.1x being implemented on that port.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm wondering why my domain laptop was able to connect to the network without requiring any authentication? And When configuring port-based authentication, shouldn't it prompt the user for credentials when they attempt to connect to the Ethernet port?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;During the configuration process on the switch, I followed the instructions provided in the following guide:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/17-3/configuration_guide/sec/b_173_sec_9300_cg/configuring_ieee_802_1x_port_based_authentication.html#id_101606" target="_new"&gt;Link to Cisco Configuration Guide&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 09:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856932#M582297</guid>
      <dc:creator>michaelglosker</dc:creator>
      <dc:date>2023-06-18T09:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856935#M582298</link>
      <description>&lt;P&gt;&lt;SPAN&gt;My final goal is allow only to the AD users to connect to the network&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 09:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856935#M582298</guid>
      <dc:creator>michaelglosker</dc:creator>
      <dc:date>2023-06-18T09:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856949#M582299</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1072934"&gt;@michaelglosker&lt;/a&gt; if you are in "open" authentication mode you will get network access regardless of whether you pass or fail authentication.&lt;/P&gt;
&lt;P&gt;You need to configure the supplicant on windows (or anyconnect) to use 802.1X authentication, select the protocol (EAP MSCHAPv2/TLS etc), whether to pass through the credentials (or prompt) and to use machine/user authentication.&amp;nbsp;If using AD use GPO to deploy these settings, the authentications will then be transparent, the users will not be prompted for authentication. &lt;A href="https://integratingit.wordpress.com/2019/07/13/configuring-windows-gpo-for-802-1x-authentication/" target="_self"&gt;Example&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 09:33:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856949#M582299</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-18T09:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856956#M582300</link>
      <description>&lt;P&gt;Can I see the config ?&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 09:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856956#M582300</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-18T09:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856963#M582301</link>
      <description>&lt;P&gt;&lt;STRONG&gt;AAA Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.10.10.100 server-key 7 08701E1D5D&lt;BR /&gt;client 10.10.20.24 server-key 7 0055415550&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius server radius_server&lt;BR /&gt;address ipv4 10.10.20.24 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 0055415550&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius radius_group&lt;BR /&gt;server name radius_server&lt;BR /&gt;deadtime 5&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Interface config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet2/0/13&lt;BR /&gt;&lt;BR /&gt;switchport access vlan 22&lt;BR /&gt;switchport mode access&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;service-policy type control subscriber DOT1X&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 10:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856963#M582301</guid>
      <dc:creator>michaelglosker</dc:creator>
      <dc:date>2023-06-18T10:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856964#M582302</link>
      <description>&lt;P&gt;Many commands missing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check this link&lt;/P&gt;
&lt;P&gt;&lt;A href="http://myccie.weebly.com/dot1x-and-nps-lab.html" target="_blank"&gt;http://myccie.weebly.com/dot1x-and-nps-lab.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 10:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856964#M582302</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-18T10:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856975#M582303</link>
      <description>&lt;P&gt;Where can i check if I am in "open" authentication mode ?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The supplicant on my Windows device was already set up to utilize 802.1X authentication, similar to the example provided except the "Provide server certificate" configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 11:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856975#M582303</guid>
      <dc:creator>michaelglosker</dc:creator>
      <dc:date>2023-06-18T11:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856976#M582304</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1072934"&gt;@michaelglosker&lt;/a&gt; well based on your configuration it looks like you have a policy called DOT1X so you are using IBNS 2.0 configuration, so based on what you provided I assume you are in open mode.&lt;/P&gt;
&lt;P&gt;You have not provided a lot of configuration, is dot1x actually enabled globally? Have you configure AAA authentication, authorisation and accounting method list? Class/Policy maps?&lt;/P&gt;
&lt;P&gt;Run "show authentication session" if there are no sessions then it's likely AAA/802.1X is not properly setup.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-x-series-switches/207193-Configure-IBNS-2-0-for-Single-Host-and-M.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-x-series-switches/207193-Configure-IBNS-2-0-for-Single-Host-and-M.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 11:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856976#M582304</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-18T11:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856979#M582305</link>
      <description>&lt;P&gt;This is the commands that i used:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device(config)# aaa new-model&lt;BR /&gt;Device(config)# aaa authentication dot1x default group radius&lt;BR /&gt;Device(config)# dot1x system-auth-control&lt;BR /&gt;Device(config)# aaa authorization network default group radius&lt;BR /&gt;Device(config)# radius server&lt;BR /&gt;Device(config-radius-server)# address ipv4 10.10.20.24&lt;BR /&gt;Device(config-radius-server)# key key&lt;/P&gt;&lt;P&gt;Device(config)# interface gigabitethernet 2/0/13&lt;BR /&gt;Device(config-if)# switchport mode access&lt;BR /&gt;Device(config-if)# access-session port-control auto&lt;BR /&gt;Device(config-if)# dot1x pae authenticator&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show authentication session result:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Interface MAC Address Method Domain Status Fg Session ID&lt;BR /&gt;--------------------------------------------------------------------------------------------&lt;BR /&gt;Gi2/0/13&amp;nbsp; &amp;nbsp; &amp;nbsp;MAC&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dot1x&amp;nbsp; &amp;nbsp;DATA&amp;nbsp; &amp;nbsp; Unauth 640A0A0A00000015CE5C7CFB&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 11:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4856979#M582305</guid>
      <dc:creator>michaelglosker</dc:creator>
      <dc:date>2023-06-18T11:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4857014#M582309</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Is it mandatory to create a certificate as part of the process?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 14:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4857014#M582309</guid>
      <dc:creator>michaelglosker</dc:creator>
      <dc:date>2023-06-18T14:12:46Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4857019#M582311</link>
      <description>&lt;P&gt;You mention domain' of you use simple username/password I think you can match user to it domain.&lt;/P&gt;
&lt;P&gt;So using cert. Is needed&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2023 14:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4857019#M582311</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-18T14:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4858683#M582339</link>
      <description>&lt;P&gt;The test aaa command initiates the traffic from the NAD, the switch in this case, and it is different from when you connect an endpoint to the switch port, this is why the logs could be different. Regarding the certificates, it is not mandatory, that depends on how you want to authenticate the endpoints and the users.&lt;/P&gt;
&lt;P&gt;For example you can decide to do EAP-TLS (certificates) for the machine authentication and then EAP-PEAP (username/password) for the user authentication. Those settings can be adjusted as you want on the NIC dot1x properties and in addition to that you would need to create the right policies on the NPS server to match the incoming authentication requests.&lt;/P&gt;
&lt;P&gt;The recommandation would be to use EAP-TLS or even TEAP if possible as both these protocols are more secure comparing to EAP-PEAP.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 13:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-port-based-authentication/m-p/4858683#M582339</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-20T13:10:58Z</dc:date>
    </item>
  </channel>
</rss>

