<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco C1300 Voice vlan via radius like an ios switch? Possible or in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274746#M595618</link>
    <description>&lt;P&gt;Looks like you are making progress. But I don't believe that you can make every endpoint session have its own VLAN - that's not how access interfaces work - and access mode interface can only operate on a single VLAN - sure, you can dynamically change it via RADIUS, but that affects the entire interface (and all authorized endpoints on that interface will be in the same VLAN).&lt;/P&gt;
&lt;P&gt;Did you find out how to tell the C1300 that and endpoint must use the voice VLAN?&lt;/P&gt;</description>
    <pubDate>Tue, 25 Mar 2025 02:23:47 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2025-03-25T02:23:47Z</dc:date>
    <item>
      <title>Cisco C1300 Voice vlan via radius like an ios switch? Possible or not?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274600#M595611</link>
      <description>&lt;P&gt;Hi, Cisco promotes the Catalyst C1300 as the successor to the C1000, but it lacks key features like proper RADIUS-based Voice VLAN assignment and multi-domain authentication. This is misleading, as the C1300 cannot handle enterprise-level voice/data separation the same way the C1000 or Catalyst IOS-based switches do.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Any Workaround?&lt;/P&gt;&lt;P&gt;regards Burkhard&lt;BR /&gt;&lt;BR /&gt;PS Unfortunally our customer bought a lot... without a pilot...&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 15:46:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274600#M595611</guid>
      <dc:creator>BURKHARD LANDWEHR</dc:creator>
      <dc:date>2025-03-24T15:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco C1300 Voice vlan via radius like an ios switch? Possible or</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274690#M595613</link>
      <description>&lt;P&gt;Ufff - not fun. I've never worked with (or even heard of) one of these switches.&lt;/P&gt;
&lt;P&gt;I suppose, since you can only operate one active &lt;EM&gt;access VLAN&lt;/EM&gt; at the same time, both voice and data traffic would land in the same VLAN. And that is the issue, right? How to keep those separate. Apart from the Catalyst DATA/VOICE domain feature, the only other option would be 802.1Q trunking - but very few endpoints would even support that - so that's out of the question.&amp;nbsp; Can the C1300 do Private VLANs (I have dark memories of this in my CCNA days ... but never seen it in production).&lt;/P&gt;
&lt;P&gt;Keen to hear what others suggest.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 20:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274690#M595613</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-03-24T20:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco C1300 Voice vlan via radius like an ios switch? Possible or</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274694#M595614</link>
      <description>&lt;P&gt;Not even sure since it lists voice vlan. But not sure how/what is used to define it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="6"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;STRONG&gt;VLAN&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Support for up to 4093 VLANs simultaneously&lt;/P&gt;&lt;P class=""&gt;Port-based and 802.1Q tag-based VLANs, MAC-based VLAN, protocol-based VLAN, IP subnet-based VLAN&lt;/P&gt;&lt;P class=""&gt;Management VLAN&lt;/P&gt;&lt;P class=""&gt;Private VLAN with promiscuous, isolated, and community port&lt;/P&gt;&lt;P class=""&gt;Private VLAN Edge (PVE), also known as protected ports, with multiple uplinks Guest VLAN, unauthenticated VLAN&lt;/P&gt;&lt;P class=""&gt;Dynamic VLAN assignment via RADIUS server along with 802.1X client authentication Customer premises equipment (CPE) VLAN&lt;/P&gt;&lt;P class=""&gt;Auto surveillance VLAN (ASV)&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class=""&gt;&lt;STRONG&gt;Voice VLAN&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class=""&gt;Voice traffic is automatically assigned to a voice-specific VLAN and treated with appropriate levels of QoS. Voice Services Discovery Protocol (VSDP) delivers networkwide zero-touch deployment of voice endpoints and call control devices&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 24 Mar 2025 21:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274694#M595614</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2025-03-24T21:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco C1300 Voice vlan via radius like an ios switch? Possible or</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274713#M595616</link>
      <description>&lt;P&gt;The &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/campus-lan-switches-access/Catalyst-1200-and-1300-Switches/cli/C1300-cli/voice-vlan.html#wp3357581398" target="_self"&gt;CLI guide&lt;/A&gt; gives a glimmer of hope&lt;/P&gt;
&lt;H3 class="title sectiontitle"&gt;Example&lt;/H3&gt;
&lt;P class="p"&gt;The following example enables OUI voice VLAN configuration on gi1/0/2.&lt;/P&gt;
&lt;PRE id="wp3357581398__ID-00000678" class="pre codeblock"&gt;&lt;CODE&gt;switchxxxxxx(config)# &lt;STRONG id="wp3357581398__ID-00000679" class="ph b"&gt;interface gi1/0/2&lt;/STRONG&gt;
switchxxxxxx(config-if)# &lt;STRONG id="wp3357581398__ID-0000067b" class="ph b"&gt;voice vlan enable&lt;/STRONG&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;And it looks like the dumbed it down to allowed MAC OUI prefixes to make some kind of kindergarten plug and play scenario - I don't know if MAB/802.1X will work here:&lt;/P&gt;
&lt;SECTION id="wp1639076870__ID-00000507" class="section"&gt;
&lt;H3 class="title sectiontitle"&gt;Default Configuration&lt;/H3&gt;
&lt;P class="p"&gt;The default voice VLAN OUI table is:&lt;/P&gt;
&lt;/SECTION&gt;
&lt;DIV class="tableContainer"&gt;
&lt;TABLE id="wp1639076870__ID-00000509" class="table" border="1" width="100%"&gt;&lt;CAPTION&gt;&amp;nbsp;&lt;/CAPTION&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;
&lt;THEAD id="wp1639076870__ID-0000050d" class="thead"&gt;
&lt;TR id="wp1639076870__ID-0000050e"&gt;
&lt;TH id="wp1639076870__ID-0000050f" class="entry"&gt;
&lt;P class="p"&gt;OUI&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="wp1639076870__ID-00000512" class="entry"&gt;
&lt;P class="p"&gt;Description&lt;/P&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY id="wp1639076870__ID-00000514" class="tbody"&gt;
&lt;TR id="wp1639076870__ID-00000515"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-00000518" class="ph b"&gt;00:01:e3&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Siemens AG Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="wp1639076870__ID-0000051b"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-0000051e" class="ph b"&gt;00:03:6b&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Cisco Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="wp1639076870__ID-00000521"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-00000524" class="ph b"&gt;00:09:6e&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Avaya Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="wp1639076870__ID-00000527"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-0000052a" class="ph b"&gt;00:0f:e2&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Huawei-3COM Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="wp1639076870__ID-0000052d"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-00000530" class="ph b"&gt;00:60:b9&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;NEC/Philips Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="wp1639076870__ID-00000533"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-00000536" class="ph b"&gt;00:d0:1e&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Pingtel Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="wp1639076870__ID-00000539"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-0000053c" class="ph b"&gt;00:e0:75&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;Veritel Polycom Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="wp1639076870__ID-0000053f"&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;&lt;STRONG id="wp1639076870__ID-00000542" class="ph b"&gt;00:e0:bb&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="entry"&gt;
&lt;P class="p"&gt;3COM Phone&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;P&gt;What you'd have to find out (perhaps have to resort to opening a TAC case) is what RADIUS attributes are required to achieve the same thing that we would do on a Catalyst (Cisco AVPair to enable voice domain).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 22:28:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274713#M595616</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-03-24T22:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco C1300 Voice vlan via radius like an ios switch? Possible or</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274744#M595617</link>
      <description>&lt;P&gt;I figured out this:&lt;BR /&gt;Interface:&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;dot1x host-mode multi-sessions&lt;BR /&gt;dot1x authentication 802.1x mac&lt;BR /&gt;dot1x radius-attributes vlan static&lt;BR /&gt;dot1x port-control auto&lt;BR /&gt;&lt;BR /&gt;Radius Result:&lt;BR /&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;Tunnel-Medium-Type = 0:6&lt;BR /&gt;Tunnel-Private-Group-ID = 0:20&lt;BR /&gt;Tunnel-Type = 0:13&lt;/P&gt;&lt;P&gt;SW-Test-01#show dot1x users&lt;/P&gt;&lt;P&gt;MAC Auth Auth Session VLAN&lt;BR /&gt;Port Username Address Method Server Time&lt;BR /&gt;-------- ---------------- ----------------- ------ ------ -------------- ----&lt;BR /&gt;gi1 001AE8DFC791 00:1a:e8:df:c7:91 MAC Remote 08:16:58 20&lt;BR /&gt;gi1 9829A6879BE8 98:29:a6:87:9b:e8 MAC Remote 08:17:15 1&lt;BR /&gt;&lt;BR /&gt;Tomorrow I will check if the customer could work...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Than every device get´s the right vlan and is possible two have more than one vlan per port.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 01:41:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274744#M595617</guid>
      <dc:creator>BURKHARD LANDWEHR</dc:creator>
      <dc:date>2025-03-25T01:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco C1300 Voice vlan via radius like an ios switch? Possible or</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274746#M595618</link>
      <description>&lt;P&gt;Looks like you are making progress. But I don't believe that you can make every endpoint session have its own VLAN - that's not how access interfaces work - and access mode interface can only operate on a single VLAN - sure, you can dynamically change it via RADIUS, but that affects the entire interface (and all authorized endpoints on that interface will be in the same VLAN).&lt;/P&gt;
&lt;P&gt;Did you find out how to tell the C1300 that and endpoint must use the voice VLAN?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 02:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274746#M595618</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-03-25T02:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco C1300 Voice vlan via radius like an ios switch? Possible or</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274826#M595624</link>
      <description>&lt;P&gt;It seems to be, that the c1300 is exact doing this. Look in the documentation (attached). Problematical scentense:&amp;nbsp;Tagged traffic belonging to the unauthenticated VLANs is always bridged regardless if a host is authorized or not. But when you read the whole text it should be possible to "redirect" the taffic in the guest vlan which could be a black hole. Voice-VLAN is not possible like in IOS.&lt;/P&gt;&lt;P&gt;sh mac address-table | i gi1&lt;BR /&gt;1 98:29:a6:87:9b:e8 gi1 dynamic&lt;BR /&gt;20 00:1a:e8:df:c7:91 gi1 dynamic&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;sh ip dhcp snooping binding&lt;BR /&gt;Total number of binding: 4&lt;/P&gt;&lt;P&gt;MAC Address IP Address Lease (sec) Type VLAN Interface&lt;BR /&gt;------------------ --------------- ------------ ---------- ---- ----------&lt;BR /&gt;34:b8:83:a5:3d:dc 10.17.31.73 39351 learned 1 gi47&lt;BR /&gt;98:29:a6:87:9b:e8 10.17.31.22 39334 learned 1 gi1&lt;BR /&gt;a2:56:76:0e:83:28 10.40.68.102 1648 learned 4 gi47&lt;BR /&gt;00:1a:e8:df:c7:91 10.10.94.119 64412 learned 20 gi1&lt;/P&gt;&lt;P&gt;This radius profile works also, names are allowed too.&lt;BR /&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;Tunnel-Medium-Type = 0:6&lt;BR /&gt;Tunnel-Private-Group-ID = 0:TK-Anlage&lt;BR /&gt;Tunnel-Type = 0:13&lt;BR /&gt;&lt;BR /&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;Tunnel-Medium-Type = 0:6&lt;BR /&gt;Tunnel-Private-Group-ID = 0:Data&lt;BR /&gt;Tunnel-Type = 0:13&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet46&lt;BR /&gt;dot1x host-mode multi-sessions&lt;BR /&gt;dot1x guest-vlan enable&lt;BR /&gt;dot1x authentication 802.1x mac&lt;BR /&gt;dot1x radius-attributes vlan static&lt;BR /&gt;dot1x max-hosts 3&lt;BR /&gt;dot1x port-control auto&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Multi-Sessions Mode&lt;/P&gt;&lt;P&gt;Unlike the single-host and multi-host modes (port-based modes) the multi-sessions mode manages the authentication status for each host connected to the port (session-based mode). If the multi-sessions mode is configured on a port the port does have any authentication status. Any number of hosts can be authorized on the port. The command can limit the maximum number of authorized hosts allowed on the port.&lt;/P&gt;&lt;P&gt;Each authorized client requires a TCAM rule. If there is no available space in the TCAM, the authentication is rejected.&lt;/P&gt;&lt;P&gt;When using the dot1x host-mode command to change the port mode to single-host or multi-host when authentication is enabled, the port state is set to unauthorized.&lt;/P&gt;&lt;P&gt;If the dot1x host-mode command changes the port mode to multi-session when authentication is enabled, the state of all attached hosts is set to unauthorized.&lt;/P&gt;&lt;P&gt;To change the port mode to single-host or multi-host, set the port (dot1x port-control) to force-unauthorized, change the port mode to single-host or multi-host, and set the port to authorization auto.&lt;/P&gt;&lt;P&gt;Tagged traffic belonging to the unauthenticated VLANs is always bridged regardless if a host is authorized or not.&lt;/P&gt;&lt;P&gt;When the guest VLAN is enabled, untagged and tagged traffic from unauthorized hosts not belonging to the unauthenticated VLANs is bridged via the guest VLAN.&lt;/P&gt;&lt;P&gt;Traffic from an authorized hosts is bridged in accordance with the port static configuration. A user can specify that untagged and tagged traffic from the authorized host not belonging to the unauthenticated VLANs will be remapped to a VLAN that is assigned by a RADIUS server during the authentication process.&lt;/P&gt;&lt;P&gt;The switch does not remove from FDB the host MAC address learned on the port when its authentication status is changed from authorized to unauthorized. The MAC address will be removed after the aging timeout expires.&lt;/P&gt;&lt;P&gt;802.1x enabled on a port associated with a port channel has the following limitations:&lt;/P&gt;&lt;P&gt;Only the 802.1X-based authentication is supported.&lt;/P&gt;&lt;P&gt;Only the multi-host (legacy 802.1x mode) mode is supported.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 09:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-c1300-voice-vlan-via-radius-like-an-ios-switch-possible-or/m-p/5274826#M595624</guid>
      <dc:creator>BURKHARD LANDWEHR</dc:creator>
      <dc:date>2025-03-25T09:52:42Z</dc:date>
    </item>
  </channel>
</rss>

