<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco APs MAB in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160582#M591209</link>
    <description>&lt;P&gt;Flexconnect exposes all the mac addresses for the wireless hosts to the switch port, how do you manage this with mab?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Aug 2024 04:10:27 GMT</pubDate>
    <dc:creator>Massimo Baschieri</dc:creator>
    <dc:date>2024-08-14T04:10:27Z</dc:date>
    <item>
      <title>Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160138#M591199</link>
      <description>&lt;P&gt;&lt;BR /&gt;Hi,&lt;/P&gt;
&lt;P&gt;What´s is the best way to authenticate the APs in flexconnect? MAB or NEAT?&lt;/P&gt;
&lt;P&gt;Version: Cisco ISE 3.3&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 12:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160138#M591199</guid>
      <dc:creator>Leonardo Santana</dc:creator>
      <dc:date>2024-08-13T12:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160147#M591200</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317733"&gt;@Leonardo Santana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even with the additional complexity introduced by CISP, &lt;STRONG&gt;NEAT&lt;/STRONG&gt; remains the better option for authenticating APs in a FlexConnect environment due to its superior security and network integrity (scalability also). MAB might still be used in environments where simplicity is more critical than security, but &lt;STRONG&gt;for production networks&lt;/STRONG&gt;, particularly those that are sensitive to security and scalability, &lt;STRONG&gt;NEAT is the recommended approach&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 12:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160147#M591200</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-08-13T12:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160348#M591201</link>
      <description>&lt;P&gt;100% depends on the organization's security policies.&amp;nbsp; You can also enable a local supplicant on the AP:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/217848-configure-802-1x-supplicant-for-access-p.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/217848-configure-802-1x-supplicant-for-access-p.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 16:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160348#M591201</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-08-13T16:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160357#M591205</link>
      <description>&lt;P&gt;According to Ciscolive I reviewed before MAB is good for auth AP.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 16:17:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160357#M591205</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-13T16:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160582#M591209</link>
      <description>&lt;P&gt;Flexconnect exposes all the mac addresses for the wireless hosts to the switch port, how do you manage this with mab?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 04:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160582#M591209</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2024-08-14T04:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160615#M591211</link>
      <description>&lt;P&gt;You don't.&amp;nbsp; Most of my customers exclude FlexConnect APs from authentication (it's a trunk port after all).&amp;nbsp; The other way is to use Smart Port Macros.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 05:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5160615#M591211</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-08-14T05:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5161363#M591231</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thanks for your answer, our customer just want to configure the APs with MAB. This config below will work?&lt;/P&gt;
&lt;P&gt;interface gigax/x&lt;BR /&gt;description "&amp;gt;_MERAKI_LAN&amp;lt;"&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport trunk allowed vlan x,x,x,x,x&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;switchport nonegotiate&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication host-mode multi-host&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;logging event trunk-status&lt;BR /&gt;logging event bundle-status&lt;BR /&gt;load-interval 30&lt;BR /&gt;duplex full&lt;BR /&gt;ip dhcp snooping trust&lt;/P&gt;
&lt;P&gt;If the AP is in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Flex Connect mode, local switching&lt;/STRONG&gt;, then an additional configuration has to be made on the switch interface to allow multiple MAC addresses on the port, since the client traffic is released at the AP level :&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;authentication host-mode multi-host&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/217848-configure-802-1x-supplicant-for-access-p.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/217848-configure-802-1x-supplicant-for-access-p.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 12:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5161363#M591231</guid>
      <dc:creator>Leonardo Santana</dc:creator>
      <dc:date>2024-08-15T12:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco APs MAB</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5161698#M591255</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317733"&gt;@Leonardo Santana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks fine.&lt;/P&gt;
&lt;P&gt;And yes, since the AP is in FlexConnect mode with local switching, it's crucial to allow for multiple MAC addresses on the port... which you've done with authentication host-mode multi-host.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2024 08:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aps-mab/m-p/5161698#M591255</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-08-16T08:45:41Z</dc:date>
    </item>
  </channel>
</rss>

