<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Configuration on Wired LAN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317145#M597621</link>
    <description>&lt;P&gt;this sample for config&amp;nbsp;&lt;BR /&gt;notice the dead criteria and automate test&amp;nbsp;&lt;BR /&gt;for dead time here is 3 but I see other ciscolive recommend 10&amp;nbsp;&lt;BR /&gt;I am with using long time 10.&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (295).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249663iCBB0D048803C596A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (295).png" alt="Screenshot (295).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 04 Aug 2025 11:14:32 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2025-08-04T11:14:32Z</dc:date>
    <item>
      <title>802.1x Configuration on Wired LAN</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317087#M597612</link>
      <description>&lt;P&gt;The 802.1X authentication feature is used on the wired LAN of the Catalyst 9K/1K/2960 switch. The authentication server uses Cisco ISE.&lt;/P&gt;
&lt;P&gt;The switch has the following settings, and the 802.1X feature is working, but I am not sure if this setting is appropriate. It is better not to have this setting, it is better to have this setting, the parameter value xxx is the recommended value, etc.&lt;/P&gt;
&lt;P&gt;aaa group server radius ISE-Group&lt;BR /&gt;server name ISE-1&lt;BR /&gt;server name ISE-2&lt;BR /&gt;server name ISE-3&lt;BR /&gt;deadtime 5&lt;BR /&gt;load-balance method least-outstanding&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group ISE-Group&lt;BR /&gt;aaa authorization network default group ISE-Group &lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting dot1x default start-stop group ISE-Group&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.0.0.1 server-key 7 xxxxxxxxxxxxx&lt;BR /&gt;client 10.0.0.2 server-key 7 xxxxxxxxxxxxx&lt;BR /&gt;client 10.0.0.3 server-key 7 xxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf upper-case&lt;BR /&gt;radius-server attribute 31 send nas-port-detail mac-only&lt;BR /&gt;radius-server dead-criteria time 60 tries 5&lt;BR /&gt;radius-server deadtime 30&lt;BR /&gt;radius-server vsa send cisco-nas-port&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-1&lt;BR /&gt;address ipv4 10.0.0.1 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 xxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-2&lt;BR /&gt;address ipv4 10.0.0.2 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 xxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;radius server ISE-3&lt;BR /&gt;address ipv4 10.0.0.3 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 xxxxxxxxxxxxx&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 08:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317087#M597612</guid>
      <dc:creator>Translator</dc:creator>
      <dc:date>2025-08-04T08:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration on Wired LAN</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317089#M597613</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I'm not sure if this post is appropriate to respond to, but I'll give it a try anyway.........&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;The config is solid and aligns with standard 802.1X + Cisco ISE deployments. Using&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;aaa group server radius&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with load-balance&amp;nbsp;&lt;STRONG&gt;least-outstanding&amp;nbsp;and&amp;nbsp;deadtime 5&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is good for efficiency and failover. However, the global&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;radius-server deadtime 30&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;may conflict, stick with just the group-level&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;deadtime 5&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;for clarity.&lt;/P&gt;&lt;P class=""&gt;Key settings like&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;attribute 6 on-for-login-auth&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;attribute 31 mac format ietf upper-case&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are correct for ISE integration. The 48-hour accounting interval is fine unless tight session tracking is needed. As for the CoA s properly configured for ISE-triggered VLAN changes or session termination—just ensure CoA is enabled in ISE policies. AND Overall, the config works well, but the only suggestion that i have it is to : remove the duplicate deadtime setting to avoid confusion. Let me know if you need help fine-tuning timers or CoA behavior.....&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/215525-use-radius-for-device-administration-wit.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/215525-use-radius-for-device-administration-wit.html&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;hope it helps...&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;-Enes&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 08:30:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317089#M597613</guid>
      <dc:creator>Enes Simnica</dc:creator>
      <dc:date>2025-08-04T08:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration on Wired LAN</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317095#M597615</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285700"&gt;@cja56910tf&lt;/a&gt;&amp;nbsp;in addition to what has already been mentioned, you should consider configure device sensor for profiling -&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200292-Configure-Device-Sensor-for-ISE-Profilin.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200292-Configure-Device-Sensor-for-ISE-Profilin.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can also refer to the Cisco Wired Prescriptive Guide for detailed information on the required settings -&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If security is a concern, consider use Radius over DTLS to protect the RADIUS communication.&amp;nbsp;&lt;A href="https://community.cisco.com/t5/networking-knowledge-base/configuring-radius-over-dtls-with-cat9k-and-ise-3-0/ta-p/4438427" target="_blank"&gt;https://community.cisco.com/t5/networking-knowledge-base/configuring-radius-over-dtls-with-cat9k-and-ise-3-0/ta-p/4438427&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Don't use Type 7 password as they are insecure, use Type 6-9&amp;nbsp;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/networking-knowledge-base/configuring-type-6-passwords-in-ios-xe/ta-p/4438495" target="_blank"&gt;https://community.cisco.com/t5/networking-knowledge-base/configuring-type-6-passwords-in-ios-xe/ta-p/4438495&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 08:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317095#M597615</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-08-04T08:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Configuration on Wired LAN</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317145#M597621</link>
      <description>&lt;P&gt;this sample for config&amp;nbsp;&lt;BR /&gt;notice the dead criteria and automate test&amp;nbsp;&lt;BR /&gt;for dead time here is 3 but I see other ciscolive recommend 10&amp;nbsp;&lt;BR /&gt;I am with using long time 10.&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (295).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249663iCBB0D048803C596A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (295).png" alt="Screenshot (295).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 11:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-configuration-on-wired-lan/m-p/5317145#M597621</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-04T11:14:32Z</dc:date>
    </item>
  </channel>
</rss>

