<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Concurrent MAB/Dot1x Again in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4864647#M582616</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/99976"&gt;@paul&lt;/a&gt;&amp;nbsp;, we aren't doing simultaneous dot1x/mab.&amp;nbsp; We are currently doing dot1x-then-mab.&amp;nbsp; We do this because Macs will not do the dot1x unless the switch starts the conversation.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But we would like to do either simultaneous dot1x/mab or maybe mab-then-dot1x because the dot1x timers mess up the devices that are trying to get on and do DHCP.&amp;nbsp; As noted, some clients will give up on DHCP rather quickly!&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I found a creative solution.&amp;nbsp; We also never send a access-reject on a MAB policy map.&amp;nbsp; I tweaked this event to handle that case...&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;  event authentication-success match-all
    ! If AUTH with ISE was successful and if it was MAB…
    10 class MAB do-until-failure
       ! Send the EAP-Request/Identity message.
       ! This should trigger both MAC OSX and Windows 10 devices 
       ! to start the dot1X process.
       10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/LI-CODE&gt;&lt;P&gt;With this setup we do the mab-then-dot1x serially, which totally bypasses the bug (behavior defect) that Cisco is referencing.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Probably 85% of our wired devices are BYOD and never do the dot1x, so the load on ISE is pretty low; most devices do the MAB and never end up doing the dot1x.&amp;nbsp; Because we are doing MAB first we bypass all the dot1x retry timers, so devices get on really fast and can get an IP via DHCP.&lt;/P&gt;&lt;P&gt;Does this solve all problems?&amp;nbsp; For devices that do dot1x it is a little bit slower because it does have to complete the MAB first before it can start the dot1x.&amp;nbsp; But again, that's only happening for 15% of our devices.&amp;nbsp; Also, the MAB happens very quickly because there&amp;nbsp; are no back-end Windows AD lookups or anything else that would take dozens of milliseconds.&lt;/P&gt;&lt;P&gt;I can send the full IBNS config to you if you like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jun 2023 12:42:02 GMT</pubDate>
    <dc:creator>danmassa</dc:creator>
    <dc:date>2023-06-29T12:42:02Z</dc:date>
    <item>
      <title>Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4192961#M564148</link>
      <description>&lt;P&gt;Yes I know I have exhausted this topic on my previous post (&lt;A href="https://community.cisco.com/t5/network-access-control/cpl-template-mab-dot1x-simultaneously/td-p/3749539" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-access-control/cpl-template-mab-dot1x-simultaneously/td-p/3749539&lt;/A&gt;) but I wanted to post again to ask a question of the BU on this topic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a recap, CDW's standard since IBNS 2.0 came out is to do concurrent MAB/Dot1x.&amp;nbsp; We have 10s of millions of switchports running concurrent MAB/Dot1x without an issue.&amp;nbsp; We still use concurrent MAB/Dot1x on all of our installs today.&amp;nbsp; So I started to ask myself "Why have we never seen a problem, but Cisco BU/TAC says their could be?"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I look a the main bug that documents this issue, &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuy05270/?rfs=iqvred" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuy05270/?rfs=iqvred&lt;/A&gt;, the verbiage reads like this:&lt;/P&gt;
&lt;P&gt;"ISE is dropping Radius-Access requests when Switch sends dot1x and MAB at the same time&lt;/P&gt;
&lt;P&gt;live logs will show what looks like multiple failed mab authentications and possibly client suppression."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks second line seems to imply live logs showing failed MAB attempts which might mean MAB rules that use Access-Reject in the result so ISE might get confused and do client suppression.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our CDW best practices we never issue Access Rejects for MAB results for two reasons:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;If the switch port is in Open mode the Access Reject is ignored.&lt;/LI&gt;
&lt;LI&gt;If you are issuing Access Rejects as your bottom MAB rule you are denying ISE the ability profile new devices using NMAP and SNMP data collection.&amp;nbsp; Our default rule is an Access Accept with a limited access DACL to allow ISE PSNs to profile unknown devices.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Is there any chance the fact that we never issue an Access Reject to our MAB results the reason we have never seen issues with concurrent MAB/Dot1x?&amp;nbsp; If so can we get the wording changed on the bug to include a work around of never issuing an Access Reject for MAB results?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2020 19:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4192961#M564148</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2020-12-03T19:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4260862#M564382</link>
      <description>&lt;P&gt;Probably those in attachement are the kind of issue the bug refers to.&lt;/P&gt;&lt;P&gt;I can see very few of them and it seems that host recover very quickly as you can see in the logs&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 16:19:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4260862#M564382</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2020-12-18T16:19:36Z</dc:date>
    </item>
    <item>
      <title>Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4817278#M581269</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you had any confirmation from ISE BU regarding this scenario? That you never experience issues due never sending an "access-reject" to MAB use cases, when using dot1x/mab simultaneous on the switches?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Fernando&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 00:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4817278#M581269</guid>
      <dc:creator>Fernando G</dc:creator>
      <dc:date>2023-04-19T00:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4817705#M581279</link>
      <description>&lt;P&gt;The BU hasn't said anything more on this issue that I know of, but they really can't take a position that concurrent Dot1x/MAB is not supported any more.&amp;nbsp; Meraki put this feature in 2 years ago into their switches.&amp;nbsp; We still use it on all our installs and have been doing it for 4+ years with no issues.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 12:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4817705#M581279</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2023-04-19T12:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4817864#M581289</link>
      <description>&lt;P&gt;Same experience as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;above&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 16:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4817864#M581289</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-19T16:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4818071#M581308</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/96791"&gt;@paul&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;for your feedback.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That gives me confidence in suggesting that option. The user experience in doing so it's so much better.&lt;/P&gt;
&lt;P&gt;It's really weird from Cisco ISE BU not to clarify the scenarios that they support or not, with IBNS 2.0 simultaneous dot1x/mab auth requests.. A competitor NAC solution that I also deploy as part of my job. Support that feature without any issue&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fernando.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 01:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4818071#M581308</guid>
      <dc:creator>Fernando G</dc:creator>
      <dc:date>2023-04-20T01:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4818865#M581325</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only thing I would add is to please keep an eye on the ISE Context Visibility for such endpoints. I can't say 100% for sure, but most of the endpoints that I checked in my 3.0p4 network show that MAB was used for authentication, and when I go to the switch, the session was authorized with 802.1X. So yes, the concurrent auth method&lt;STRONG&gt; does work&lt;/STRONG&gt; and the endpoints are happy. But ISE can often report the wrong Auth state. It seems that if MAB comes in first and completes, then ISE will record that - even if 10ms later, 802.1X trumps that session and remains in that state. ISE will still report MAB. I think that is perhaps what the ISE BU needs to address (or perhaps will never address).&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 20:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4818865#M581325</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-04-20T20:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4818907#M581331</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/805400"&gt;@arn&lt;/a&gt; 100% true.&amp;nbsp; I always educate my customer on the inaccuracies of the Context Visibility screen.&amp;nbsp; There are many situations outside of simultaneous MAB/Dot1x where the CV shows the wrong data.&amp;nbsp; I identified issues back in 2.3 with this (have bug numbers) but they have never been fixed.&amp;nbsp; It is why I still need to support an Excel Macro I wrote back in ISE 1.1 that accurately processes RADIUS Auth data to let customers know the last rule the MAC addresses hit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 21:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4818907#M581331</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2023-04-20T21:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4864647#M582616</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/99976"&gt;@paul&lt;/a&gt;&amp;nbsp;, we aren't doing simultaneous dot1x/mab.&amp;nbsp; We are currently doing dot1x-then-mab.&amp;nbsp; We do this because Macs will not do the dot1x unless the switch starts the conversation.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But we would like to do either simultaneous dot1x/mab or maybe mab-then-dot1x because the dot1x timers mess up the devices that are trying to get on and do DHCP.&amp;nbsp; As noted, some clients will give up on DHCP rather quickly!&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I found a creative solution.&amp;nbsp; We also never send a access-reject on a MAB policy map.&amp;nbsp; I tweaked this event to handle that case...&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;  event authentication-success match-all
    ! If AUTH with ISE was successful and if it was MAB…
    10 class MAB do-until-failure
       ! Send the EAP-Request/Identity message.
       ! This should trigger both MAC OSX and Windows 10 devices 
       ! to start the dot1X process.
       10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;/LI-CODE&gt;&lt;P&gt;With this setup we do the mab-then-dot1x serially, which totally bypasses the bug (behavior defect) that Cisco is referencing.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Probably 85% of our wired devices are BYOD and never do the dot1x, so the load on ISE is pretty low; most devices do the MAB and never end up doing the dot1x.&amp;nbsp; Because we are doing MAB first we bypass all the dot1x retry timers, so devices get on really fast and can get an IP via DHCP.&lt;/P&gt;&lt;P&gt;Does this solve all problems?&amp;nbsp; For devices that do dot1x it is a little bit slower because it does have to complete the MAB first before it can start the dot1x.&amp;nbsp; But again, that's only happening for 15% of our devices.&amp;nbsp; Also, the MAB happens very quickly because there&amp;nbsp; are no back-end Windows AD lookups or anything else that would take dozens of milliseconds.&lt;/P&gt;&lt;P&gt;I can send the full IBNS config to you if you like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 12:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4864647#M582616</guid>
      <dc:creator>danmassa</dc:creator>
      <dc:date>2023-06-29T12:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4864650#M582617</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/99976"&gt;@paul&lt;/a&gt;&amp;nbsp;I am attaching the full modified IBNS config...&lt;/P&gt;&lt;P&gt;I'm interested to hear your thoughts.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 12:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4864650#M582617</guid>
      <dc:creator>danmassa</dc:creator>
      <dc:date>2023-06-29T12:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4999860#M586493</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/160185"&gt;@danmassa&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;would appreciate you sharing it.&lt;BR /&gt;tnx in advance&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 13:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4999860#M586493</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-01-18T13:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4999885#M586497</link>
      <description>&lt;P&gt;Here it is...&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 13:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4999885#M586497</guid>
      <dc:creator>danmassa</dc:creator>
      <dc:date>2024-01-18T13:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent MAB/Dot1x Again</title>
      <link>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4999914#M586500</link>
      <description>&lt;P&gt;tnx dude&amp;nbsp;&lt;/P&gt;
&lt;P&gt;noticed it reading just 1msg below :0)&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 14:30:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/concurrent-mab-dot1x-again/m-p/4999914#M586500</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-01-18T14:30:46Z</dc:date>
    </item>
  </channel>
</rss>

