<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Flexconnect AP with MAB validation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926852#M584166</link>
    <description>&lt;P&gt;No, all wireless traffic is centrally switched to WLC which authenticates wireless clients with ISE.&lt;/P&gt;&lt;P&gt;The only authentication the switch does is to authenticate/authorize the AP.&lt;/P&gt;&lt;P&gt;Thats very different from what the original post was about - I just thought this may be a way of doing something similar with Flexconnect by authenticating/authorizing the AP on an access port and turning it into a trunk.&lt;/P&gt;</description>
    <pubDate>Wed, 20 Sep 2023 21:35:12 GMT</pubDate>
    <dc:creator>andrewswanson</dc:creator>
    <dc:date>2023-09-20T21:35:12Z</dc:date>
    <item>
      <title>Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926378#M584137</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We are working on a new deployment where we use access points in Flexconnect mode and not locale as do on the rest of our branches.&lt;/P&gt;&lt;P&gt;Normally we use MAB validation of each AP, and we wish to continue to use MAB validation of our access points, but im coming in doubt if this is possible to do in Flexconnect mode?&lt;/P&gt;&lt;P&gt;Access Points gets IPs in Vlan 100 and our clients are switched in vlan 200. How would this configuration be to support this?&lt;/P&gt;&lt;P&gt;Of cause we have to use access-session host-mode multi-hosts as we got more MAC adresses on the port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface XX&lt;BR /&gt;description Flexconnect AP&lt;BR /&gt;switchport trunk native vlan 100&lt;BR /&gt;switchport trunk allowed vlan 100,200&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;spanning-tree portfast trunk&lt;BR /&gt;mab&lt;BR /&gt;dot1x timeout tx-period 2&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;source template FLEX_DefaultWiredDot1xClosedAuth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;template FLEX_WiredDot1xClosedAuth&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;switchport trunk native vlan 100&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;mab&lt;BR /&gt;access-session host-mode multi-domain&lt;BR /&gt;access-session closed&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;service-policy type control subscriber PMAP_DefaultWiredDot1xClosedAuth_1X_MAB&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 06:53:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926378#M584137</guid>
      <dc:creator>RoadRunner4k</dc:creator>
      <dc:date>2023-09-20T06:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926588#M584145</link>
      <description>&lt;P&gt;Use multi-host.&lt;/P&gt;
&lt;P&gt;That being said most customers in my experience don't perform 802.1X/MAB authentication on trunk ports.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 13:49:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926588#M584145</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-09-20T13:49:06Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926710#M584158</link>
      <description>&lt;P&gt;I have a similar policy in place for some local APs that are used for MDNS snooping.&lt;BR /&gt;The template below is configured as "switchport mode access" - when ISE authenticates the MDNS AP, it authorizes with RADIUS attribute "cisco-av-pair = device-traffic-class=switch" which converts the interface into a trunk after the AP has been authorized.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;template WIRELESS-MDNS&lt;BR /&gt;spanning-tree portfast trunk&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;switchport access vlan &amp;lt;AP_VLAN&amp;gt;&lt;BR /&gt;switchport trunk native &amp;lt;AP_VLAN&amp;gt;&lt;BR /&gt;switchport trunk allowed &amp;lt;AP_VLAN&amp;gt;,&amp;lt;MDNS_VLAN&amp;gt;&lt;BR /&gt;switchport mode access&lt;BR /&gt;source template MAB_INTERFACE_TEMPLATE&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 16:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926710#M584158</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2023-09-20T16:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926790#M584162</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/255857"&gt;@andrewswanson&lt;/a&gt;&amp;nbsp;- what does the command "show derived interface xyz" look like after the WAP has been authorized? I thought I tried this in the past with multi-host, and it was non-deterministic. The trick is to ensure that the port is authorized while there are no wireless clients associated to it, otherwise you will get their MAC addresses and that will fail authorization.&lt;/P&gt;
&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;- NAC on trunk ports is generally to be avoided.&amp;nbsp; But keen to hear what your experience is.&lt;/P&gt;
&lt;P&gt;One big caveat with multi-host that caught me out recently is devices that use NIC Teaming. E.g. a VMWare ESXi host with two interfaces, but in NIC Teaming mode. Both links active, but MAC address of the vmKernel only on one. Multi-host works great when you boot up the ESXi, the vmKernel frames authorize the port, and then the VMs piggy-back on that.&amp;nbsp; But if you were to reload the switch that the active interface is on, then NIC Teaming on the Host detects this, and switches to link #2. Guess what happens next?&amp;nbsp; Can you guarantee that the first Ethernet frame will be from the vmKernel MAC? No.&amp;nbsp; Oooops. Chances are that the VMs will send their frames first, and boom!&amp;nbsp; Interface is not authorized (ISE rejected it). The answer is then to add all the MACs of all the VMs and use multi-auth instead. But what a pain.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 20:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926790#M584162</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-09-20T20:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926808#M584164</link>
      <description>&lt;P&gt;Hi Arne&lt;/P&gt;&lt;P&gt;See below for output from switch - these APs are in local mode - usually only require to be connected to an access port. Some are used for MDNS snooping so we need to have the interface configured as a trunk:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;output from 3650 stack running 16.09.08&lt;/P&gt;&lt;P&gt;show run&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4/0/6&lt;BR /&gt;ipv6 traffic-filter DENYV6 in&lt;BR /&gt;snmp trap mac-notification change added&lt;BR /&gt;snmp trap mac-notification change removed&lt;BR /&gt;source template WIRELESS-MDNS&lt;BR /&gt;ip verify source&lt;/P&gt;&lt;P&gt;Where:&lt;/P&gt;&lt;P&gt;template WIRELESS-MDNS&lt;BR /&gt;spanning-tree portfast trunk&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;switchport access vlan &amp;lt;AP_VLAN&amp;gt;&lt;BR /&gt;switchport trunk native vlan &amp;lt;AP_VLAN&amp;gt;&lt;BR /&gt;switchport trunk allowed vlan &amp;lt;AP_VLAN&amp;gt;,&amp;lt;MDNS_VLAN&amp;gt;&lt;BR /&gt;switchport mode access&lt;BR /&gt;source template MAB_POLICY&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;show derived after successful authorization:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4/0/6&lt;BR /&gt;switchport access vlan &amp;lt;AP_VLAN&amp;gt;&lt;BR /&gt;switchport trunk native vlan &amp;lt;AP_VLAN&amp;gt;&lt;BR /&gt;switchport trunk allowed vlan &amp;lt;AP_VLAN&amp;gt;,&amp;lt;MDNS_VLAN&amp;gt;&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;ipv6 traffic-filter DENYV6 in&lt;BR /&gt;access-session control-direction in&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;mab&lt;BR /&gt;snmp trap mac-notification change added&lt;BR /&gt;snmp trap mac-notification change removed&lt;BR /&gt;spanning-tree portfast trunk&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;service-policy type control subscriber MAB_POLICY&lt;BR /&gt;ip verify source&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 21:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926808#M584164</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2023-09-20T21:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926816#M584165</link>
      <description>&lt;P&gt;Right'o. So you're still doing multi-auth (which is the hidden/default access-session host-mode) - I assume the clients connect to a PSK SSID (I don't see any 802.1X on the switch)?&amp;nbsp; But still, your RADIUS server has to perform MAB for all the clients - do you just authorize them, or how do you manage a potentially large (and unknown) number of wireless clients in the RADIUS server?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 21:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926816#M584165</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-09-20T21:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926852#M584166</link>
      <description>&lt;P&gt;No, all wireless traffic is centrally switched to WLC which authenticates wireless clients with ISE.&lt;/P&gt;&lt;P&gt;The only authentication the switch does is to authenticate/authorize the AP.&lt;/P&gt;&lt;P&gt;Thats very different from what the original post was about - I just thought this may be a way of doing something similar with Flexconnect by authenticating/authorizing the AP on an access port and turning it into a trunk.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 21:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926852#M584166</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2023-09-20T21:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926935#M584168</link>
      <description>&lt;P&gt;My idea is to have a normal access port with MAB validation on from start (and then on ISE have a endpoint database with APs in Flex mode) once ISE sees these access points it should return this&amp;nbsp;cisco-av-pair = interface-template-name=AP-FLEX&lt;/P&gt;&lt;P&gt;template AP-FLEX&lt;BR /&gt;switchport trunk native vlan (AP VLAN)&lt;BR /&gt;switchport trunk allowed vlan (AP VLAN) + (DATA VLAN)&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;spanning-tree portfast trunk&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess that should work ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 05:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4926935#M584168</guid>
      <dc:creator>RoadRunner4k</dc:creator>
      <dc:date>2023-09-21T05:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4927497#M584188</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/94789"&gt;@RoadRunner4k&lt;/a&gt;&amp;nbsp; - my concern is that unless you also add the command&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;access-session host-mode multi-host&lt;/LI-CODE&gt;
&lt;P&gt;to your template, you will be left in multi-auth mode, which means that every MAC learned on the interface (via the wireless SSID) will be subject to NAC on the switch interface. That is not tenable. You want only the WAP to authorize the interface, and then all MAC addresses that come afterwards (client endpoints) will not be subjected to NAC on the switch.&lt;/P&gt;
&lt;P&gt;You can perform client endpoint MAB in ISE, if the SSID is enabled with 802.1X or MAC Filtering. Then the WAP/WLC sends the RADIUS request to ISE.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 21:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4927497#M584188</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-09-21T21:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Flexconnect AP with MAB validation</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4929162#M584252</link>
      <description>&lt;P&gt;Thank you so much. I will try this in our lab before adding it to production.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 07:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-ap-with-mab-validation/m-p/4929162#M584252</guid>
      <dc:creator>RoadRunner4k</dc:creator>
      <dc:date>2023-09-26T07:00:03Z</dc:date>
    </item>
  </channel>
</rss>

