<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring IEEE 802.1x Port-Based Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024623#M587674</link>
    <description>&lt;P&gt;Hello, thank you for your response.&lt;/P&gt;&lt;P&gt;Indeed, the ports to which end devices are connected are configured with 802.1X to authenticate the identity and allow the device to access resources.&lt;/P&gt;&lt;P&gt;I also agree with you regarding the inter-switch link, the port should be in trunk mode.&lt;/P&gt;&lt;P&gt;Regarding STP, yes, it is correctly configured to choose another path if necessary.&lt;/P&gt;&lt;P&gt;My question precisely concerns the scenario where another path is used due to the loss of a link. How do you configure ports as supplicant or authenticator in a network topology with loops?&lt;/P&gt;&lt;P&gt;Because, as illustrated in the latest diagram related to my initial message, if the link between SW1 and SW2 is lost, STP allows taking the path between SW3 and SW2. However, the G0/1 port of SW3 is initially configured as a supplicant and not as an authenticator. This has the consequence that any device can connect to the switch via the port:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d'écran 2024-02-26 190815.png" style="width: 604px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/211101i7579465DB505BC32/image-dimensions/604x283?v=v2" width="604" height="283" role="button" title="Capture d'écran 2024-02-26 190815.png" alt="Capture d'écran 2024-02-26 190815.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
    <pubDate>Mon, 26 Feb 2024 18:09:23 GMT</pubDate>
    <dc:creator>thomasbst</dc:creator>
    <dc:date>2024-02-26T18:09:23Z</dc:date>
    <item>
      <title>Configuring IEEE 802.1x Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024506#M587667</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;As part of a project, I need to implement 802.1X within my company. Therefore, I have set up a physical lab consisting of 2 switches and two PCs:&lt;/P&gt;&lt;P&gt;- Two Cisco Catalyst 2960 Series switches with Cisco IOS® Software, Release 15.0(2)SE5&lt;BR /&gt;- PC with Microsoft Windows 11&lt;BR /&gt;- PC with Microsoft Windows Server which acts as a RADIUS server (ADCS, ADDS, NPS).&lt;/P&gt;&lt;P&gt;I have successfully configured both switches and the RADIUS server to enable supplicant authentication (Windows 11 PC) using the PEAP-MS-CHAPv2 protocol. Now, I am looking to implement authentication for the switches themselves. Here is the topology of the lab:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d'écran 2024-02-26 162328.png" style="width: 557px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/211086i999002542A9A43C2/image-dimensions/557x128?v=v2" width="557" height="128" role="button" title="Capture d'écran 2024-02-26 162328.png" alt="Capture d'écran 2024-02-26 162328.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I configured port G0/1 of SW1 as the authenticator and port G0/0 as the supplicant. The authentication of switch SW2 is working correctly. Below are the configurations made:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW1 :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet0/1&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication host-mode multi-host&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SW2 :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;eap profile auth_switch&lt;BR /&gt;method md5&lt;/P&gt;&lt;P&gt;dot1x credentials auth_switch&lt;BR /&gt;username switch&lt;BR /&gt;password 0 **********&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;dot1x pae supplicant&lt;BR /&gt;dot1x credentials auth_switch&lt;BR /&gt;dot1x supplicant eap profile auth_switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here is my question: How should I configure the ports of the switches (as authenticator or supplicant) in the context of a topology with loops? For example, with the following topology:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d'écran 2024-02-26 163009.png" style="width: 541px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/211088i00A6AFCA72ABA83D/image-dimensions/541x253?v=v2" width="541" height="253" role="button" title="Capture d'écran 2024-02-26 163009.png" alt="Capture d'écran 2024-02-26 163009.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I configure the ports as follows (red = port as authenticator, green = port as supplicant):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d'écran 2024-02-26 163338.png" style="width: 559px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/211090iA2694455422151CF/image-dimensions/559x263?v=v2" width="559" height="263" role="button" title="Capture d'écran 2024-02-26 163338.png" alt="Capture d'écran 2024-02-26 163338.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The loss of the link between SW1 and SW2 exposes the network because port G0/1 of SW3 is not initially configured as an authenticator. Therefore, any device can connect to the network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How to overcome this issue?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 15:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024506#M587667</guid>
      <dc:creator>thomasbst</dc:creator>
      <dc:date>2024-02-26T15:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IEEE 802.1x Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024534#M587669</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/routers/access/800/829/software/configuration/guide/b_IR800config/b_IR800config_chapter_01100.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/routers/access/800/829/software/configuration/guide/b_IR800config/b_IR800config_chapter_01100.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 16:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024534#M587669</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-26T16:18:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IEEE 802.1x Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024536#M587670</link>
      <description>&lt;P&gt;Hope most of the use case ports are in administrative control , best practice alwyas end device connected ports we runing 802.1X expected to identity to alow the device to access resources.&lt;/P&gt;
&lt;P&gt;If you connecting switches to the port, they should not be part of 802.1X they should be trunk port. ( as per my view).&lt;/P&gt;
&lt;P&gt;if you properly configure STP and priority, when teh switch 1 to switch 2 loss of connection, other path automatically unlock and STP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 16:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024536#M587670</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-02-26T16:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IEEE 802.1x Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024611#M587673</link>
      <description>&lt;P&gt;Hello, thank you for your response.&lt;/P&gt;&lt;P&gt;I have reviewed the documentation you sent, it states: "Before CISP is enabled, the 802.1X authentication must be completed as both supplicant and authenticator."&lt;/P&gt;&lt;P&gt;My question pertains to 802.1X authentication between switches in a network topology with loops. The CISP protocol does not seem to assist me in resolving my issue, unless I am mistaken.&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 18:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024611#M587673</guid>
      <dc:creator>thomasbst</dc:creator>
      <dc:date>2024-02-26T18:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring IEEE 802.1x Port-Based Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024623#M587674</link>
      <description>&lt;P&gt;Hello, thank you for your response.&lt;/P&gt;&lt;P&gt;Indeed, the ports to which end devices are connected are configured with 802.1X to authenticate the identity and allow the device to access resources.&lt;/P&gt;&lt;P&gt;I also agree with you regarding the inter-switch link, the port should be in trunk mode.&lt;/P&gt;&lt;P&gt;Regarding STP, yes, it is correctly configured to choose another path if necessary.&lt;/P&gt;&lt;P&gt;My question precisely concerns the scenario where another path is used due to the loss of a link. How do you configure ports as supplicant or authenticator in a network topology with loops?&lt;/P&gt;&lt;P&gt;Because, as illustrated in the latest diagram related to my initial message, if the link between SW1 and SW2 is lost, STP allows taking the path between SW3 and SW2. However, the G0/1 port of SW3 is initially configured as a supplicant and not as an authenticator. This has the consequence that any device can connect to the switch via the port:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d'écran 2024-02-26 190815.png" style="width: 604px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/211101i7579465DB505BC32/image-dimensions/604x283?v=v2" width="604" height="283" role="button" title="Capture d'écran 2024-02-26 190815.png" alt="Capture d'écran 2024-02-26 190815.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 18:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ieee-802-1x-port-based-authentication/m-p/5024623#M587674</guid>
      <dc:creator>thomasbst</dc:creator>
      <dc:date>2024-02-26T18:09:23Z</dc:date>
    </item>
  </channel>
</rss>

