<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE3.4 and EntraID REST - dot1x switching to MAB behavior in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245377#M594109</link>
    <description>&lt;P&gt;From reading:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I understand the fact that you cannot do Device authentication towards EntraID, and the User authentication will happen when the user logs into the laptop.&amp;nbsp;I'm seeing behavior where laptops will authenticate using dot1x successfully, but then suddenly their MAC address will enter the ISE logs doing MAB, it will be profiled to some MFC and it will fail authentication.&lt;/P&gt;
&lt;P&gt;Is there any behavior that can explain this? For example a user locking his laptop, will it still do eap-tls auth using the user cert in case of a reauth trigger or something?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jan 2025 21:40:06 GMT</pubDate>
    <dc:creator>nani_gvd</dc:creator>
    <dc:date>2025-01-09T21:40:06Z</dc:date>
    <item>
      <title>ISE3.4 and EntraID REST - dot1x switching to MAB behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245377#M594109</link>
      <description>&lt;P&gt;From reading:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I understand the fact that you cannot do Device authentication towards EntraID, and the User authentication will happen when the user logs into the laptop.&amp;nbsp;I'm seeing behavior where laptops will authenticate using dot1x successfully, but then suddenly their MAC address will enter the ISE logs doing MAB, it will be profiled to some MFC and it will fail authentication.&lt;/P&gt;
&lt;P&gt;Is there any behavior that can explain this? For example a user locking his laptop, will it still do eap-tls auth using the user cert in case of a reauth trigger or something?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 21:40:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245377#M594109</guid>
      <dc:creator>nani_gvd</dc:creator>
      <dc:date>2025-01-09T21:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE3.4 and EntraID REST - dot1x switching to MAB behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245394#M594112</link>
      <description>&lt;P&gt;This sounds like wired NAC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the switch configuration is using IBNS 2.0 and there is parallel (concurrent) MAB and 802.1X configured, then ISE will accept both simultaneously for the same endpoint and that can potentially cause issues. If on the other hand, the switch performs strict 802.1X first, then MAB, then an 802.1X authorized endpoint should never cause issues, because the endpoint is authorized on 802.1X (EAPOL frames) and every subsequent Ethernet frame that comes along, will not cause a session restart.&lt;/P&gt;
&lt;P&gt;So either your IBNS 2.0 Policy Map needs tweaking, or the IBSN 1.0 interface config has the wrong order/priority configured.&amp;nbsp; Can you share the relevant switch configs&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show policy-map type control subscriber
show derived int xxxx (an example interface)&lt;/LI-CODE&gt;
&lt;P&gt;When a user locks their PC, there is no network authentication event. For EAP-PEAP and EAP-TLS, Network authentication events occur when&lt;/P&gt;
&lt;P&gt;PC boots (machine auth)&lt;/P&gt;
&lt;P&gt;User logs in (user auth)&lt;/P&gt;
&lt;P&gt;User logs out (machine auth)&lt;/P&gt;
&lt;P&gt;For EAP-TEAP, you can chain the network auths for each of the above, so that user and machine auth happens at the same time.&lt;/P&gt;
&lt;P&gt;But none of this should cause a MAB authentication.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 23:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245394#M594112</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-09T23:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE3.4 and EntraID REST - dot1x switching to MAB behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245402#M594113</link>
      <description>&lt;P&gt;Thank for the reply.&lt;/P&gt;
&lt;P&gt;- IBNS1.0 and indeed wired NAC. Do need to add they are wired behind a docking station, but as far as I know it's setup to be in "bypass". (Nevertheless I don't trust docking stations...)&lt;/P&gt;
&lt;P&gt;see the attached log below. The user authenticates using a user certificate succesfully. For filtering purposes I created a Profile "employee" (don't mind the longer string at the 11:58:19 entra, I changed the profile name at one point.). Purging happens every 30 days.&lt;/P&gt;
&lt;P&gt;1) on 01-02 the user successfully authenticates with user certificate. I created a Profile for these kind of successful attempts together with an Identity Group. MAC is added to the "Employee" Endpoint group.&lt;/P&gt;
&lt;P&gt;2) some days later , a MAB for that same MAC enters the logs, it gets succesfully authenticated against the Employee endpoint group.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) some seconds later the same MAC is profiled as Dell device, which I don't have a policy for , so it's being rejected. I cannot find a reason why this change is happening regarding the profiling and why this is now entering ISE as a MAB request.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-01-10 00_23_28-image (7).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237300i7771B3620544E575/image-size/large?v=v2&amp;amp;px=999" role="button" title="2025-01-10 00_23_28-image (7).png" alt="2025-01-10 00_23_28-image (7).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;port config (open mode)&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;switchport access vlan 14&lt;BR /&gt;switchport mode access&lt;BR /&gt;ip access-group acl_allow_any in&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action authorize vlan 14&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;storm-control broadcast level 20.00&lt;BR /&gt;storm-control multicast level 15.00&lt;BR /&gt;storm-control action shutdown&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 23:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245402#M594113</guid>
      <dc:creator>nani_gvd</dc:creator>
      <dc:date>2025-01-09T23:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE3.4 and EntraID REST - dot1x switching to MAB behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245424#M594114</link>
      <description>&lt;P&gt;As a dirty hack, you could try putting the MAB Authorization Rule high enough in the processing logic, to allow it to always match, even if the endpoint gets profiled as a Dell device.&amp;nbsp; I don't know what your Policy Set looks like, but that would ensure you always catch/Authorize endpoints that are in that Endpoint Identity Group.&lt;/P&gt;
&lt;P&gt;But it still bothers me that there is a MAB event at all. It smells of a re-authentication.&lt;/P&gt;
&lt;P&gt;What is the output for such an endpoint?&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show access-session int x/y/z detail&lt;/LI-CODE&gt;
&lt;P&gt;If you are performing re-authorization (for whatever reason) then you might want to ensure that ISE is returning the following attributes (in my example, 65535 seconds is roughly 18 hours)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1736468322097.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237306i3FD1ED3169F53BE5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1736468322097.png" alt="ArneBier_0-1736468322097.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_1-1736468345654.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237307i60D37707E10A78D0/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_1-1736468345654.png" alt="ArneBier_1-1736468345654.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;These settings tell the switch to NOT terminate the connection whilst a re-auth is happening - if re-auth was successful, then session is re-auth'd and the connection never dropped during that short period. And ther terminate action flag tells the switch to use the LAST SUCCESSFUL method that caused the endpoint to end up in Authorized state - in your case it was 802.1X - that means the switch won't (or should not) consider MAB henceforth. Of course if you shut no/shut or disconnect the link, then the NAC process starts again normally (802.1X first, then MAB).&lt;/P&gt;
&lt;P&gt;Give that a try.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 00:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245424#M594114</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-10T00:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE3.4 and EntraID REST - dot1x switching to MAB behavior</title>
      <link>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245922#M594136</link>
      <description>&lt;P&gt;thanks for the info, I have applied this, and will monitor the situation.&amp;nbsp;&lt;BR /&gt;keep you posted.&lt;/P&gt;
&lt;P&gt;in the meantime stumbled upon similar posts. The first post is also showing a used using the same type of docking with similar issues.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/td-p/3928695" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/windows-pc-s-using-mab-instead-of-dot1x-spontaneously/td-p/3928695&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/intermittent-authentication-failures-on-wired-pc-using-native/td-p/3839705" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/intermittent-authentication-failures-on-wired-pc-using-native/td-p/3839705&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2025 13:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise3-4-and-entraid-rest-dot1x-switching-to-mab-behavior/m-p/5245922#M594136</guid>
      <dc:creator>nani_gvd</dc:creator>
      <dc:date>2025-01-11T13:07:42Z</dc:date>
    </item>
  </channel>
</rss>

