<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAB on Cisco 9300 Stack in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545193#M600235</link>
    <description>&lt;P&gt;thanks to all&lt;/P&gt;&lt;P&gt;hers is the official statement from TAC&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This is not a bug, but rather a known behavioral side-effect of how MAB interacts with internal switch functions&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;so i think i have to live with this cosmetic display error in ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Apr 2026 06:25:57 GMT</pubDate>
    <dc:creator>swelsch</dc:creator>
    <dc:date>2026-04-14T06:25:57Z</dc:date>
    <item>
      <title>MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5544978#M600223</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have configured dot1x/mab on a cisco 9300 stack ( 5 member )&lt;/P&gt;&lt;P&gt;it works for the client, but i get not only authentication session from the mac of the client, also from physical interface and base mac of the first switch member.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gi5/0/1 080f.e575.d500 mab DATA Auth 334263640000009476CE4404&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Client MAC&lt;BR /&gt;Gi5/0/1 080f.e575.d501 N/A UNKNOWN Unauth 33426364000000B376F8E409&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; MAC of Gi5/0/1&lt;BR /&gt;Gi5/0/1 40f4.9f29.1e80 N/A UNKNOWN Unauth 334263640000009376CE3D9C&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; base MAC of switch 1&lt;/P&gt;&lt;P&gt;so i get 3 authentication to my ISE, the client is OK, the other are unknown mac on ise, so they get a fail&lt;/P&gt;&lt;P&gt;thanks for any response&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 08:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5544978#M600223</guid>
      <dc:creator>swelsch</dc:creator>
      <dc:date>2026-04-13T08:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5544980#M600224</link>
      <description>&lt;P&gt;Cisco IOS XE Software, Version 17.15.05&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 08:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5544980#M600224</guid>
      <dc:creator>swelsch</dc:creator>
      <dc:date>2026-04-13T08:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545018#M600226</link>
      <description>&lt;P&gt;How does your configuration look on Port 5/0/1? along with&amp;nbsp;show access-session interface Gi5/0/1 details&lt;/P&gt;
&lt;P&gt;If your port is currently in multi-auth or multi-sessions mode, it will try to authenticate every MAC address it sees.&lt;/P&gt;
&lt;P&gt;There are different ways to resolve this - let's get the config and output what was requested above.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 11:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545018#M600226</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2026-04-13T11:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545022#M600227</link>
      <description>&lt;P&gt;RT-5OG-01#sh run int g5/0/1&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 868 bytes&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5/0/1&lt;BR /&gt;switchport access vlan 2999&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 2010&lt;BR /&gt;device-tracking attach-policy IPDT_POLICY&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action reinitialize vlan 2005&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate 28800&lt;BR /&gt;authentication timer inactivity 28800&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;auto qos trust dscp&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;service-policy input AutoQos-4.0-Trust-Dscp-Input-Policy&lt;BR /&gt;service-policy output AutoQos-4.0-Output-Policy&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;RT-5OG-01#sh access-session int g5/0/1&lt;BR /&gt;Interface MAC Address Method Domain Status Fg Session ID&lt;BR /&gt;--------------------------------------------------------------------------------------------&lt;BR /&gt;Gi5/0/1 080f.e575.d500 mab DATA Auth 334263640000009476CE4404&lt;BR /&gt;Gi5/0/1 080f.e575.d501 N/A UNKNOWN Unauth 33426364000000B376F8E409&lt;BR /&gt;Gi5/0/1 40f4.9f29.1e80 N/A UNKNOWN Unauth 334263640000009376CE3D9C&lt;/P&gt;&lt;P&gt;Key to Session Events Blocked Status Flags:&lt;/P&gt;&lt;P&gt;A - Applying Policy (multi-line status for details)&lt;BR /&gt;D - Awaiting Deletion&lt;BR /&gt;F - Final Removal in progress&lt;BR /&gt;I - Awaiting IIF ID allocation&lt;BR /&gt;P - Pushed Session&lt;BR /&gt;R - Removing User Profile (multi-line status for details)&lt;BR /&gt;U - Applying User Profile (multi-line status for details)&lt;BR /&gt;X - Unknown Blocker&lt;/P&gt;&lt;P&gt;Runnable methods list:&lt;BR /&gt;Handle Priority Name&lt;BR /&gt;11 5 dot1xSup&lt;BR /&gt;10 5 dot1x&lt;BR /&gt;14 10 webauth&lt;BR /&gt;12 15 mab&lt;/P&gt;&lt;P&gt;RT-5OG-01#&lt;/P&gt;&lt;P&gt;there is only one host connected to the port&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 12:09:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545022#M600227</guid>
      <dc:creator>swelsch</dc:creator>
      <dc:date>2026-04-13T12:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545041#M600228</link>
      <description>&lt;P&gt;IP Device Tracking (IPDT) actively generates and learns MAC addresses from the local infrastructure on access ports.&lt;BR /&gt;When MAB + multi-factor authentication is enabled, each learned MAC address equates to one authentication attempt.&lt;/P&gt;&lt;P&gt;Try disabling the interface tracking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no device-tracking attach-policy IPDT_POLICY&lt;BR /&gt;no ip device tracking&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 13:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545041#M600228</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2026-04-13T13:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545064#M600229</link>
      <description>&lt;P&gt;thanks, but without device tracking i had an issue with cached authenticated session&lt;/P&gt;&lt;P&gt;access-session control-direction in will fix the problem with the physical mac, but not the base mac of the stack member&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 14:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545064#M600229</guid>
      <dc:creator>swelsch</dc:creator>
      <dc:date>2026-04-13T14:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545070#M600230</link>
      <description>&lt;P&gt;The MAC address on the stack isn't a bug; it can simply reach the authentication state machine.&lt;/P&gt;&lt;P&gt;I see two options:&lt;/P&gt;&lt;P&gt;1. Configure multi-domain host mode (best practice)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;authentication host-mode multi-domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2. Keep multi-auth, so you need a local reject, not an ISE one.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;authentication mab infrastructure-mac ignore&lt;/SPAN&gt; (I don't know if this command is available in your version)&lt;/P&gt;&lt;P&gt;I would leave your configuration like this:&lt;/P&gt;&lt;P&gt;interface Gi5/0/1&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport access vlan 2999&lt;BR /&gt;switchport voice vlan 2010&lt;/P&gt;&lt;P&gt;authentication control-direction in&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication violation restrict&lt;/P&gt;&lt;P&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;/P&gt;&lt;P&gt;no device-tracking attach-policy IPDT_POLICY&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 15:45:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545070#M600230</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2026-04-13T15:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545081#M600231</link>
      <description>&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;but multi-domain is no option, because our IP phones ( alcatel ) will boot in the data domain and get then the voice vlan and join into the voice domain. So in the first moment, i will have 2 host in the data domain, which will not work in multi-domain.&lt;/P&gt;&lt;P&gt;and to get rid off the "first" auth session from the phone, i need device-tracking&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 15:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545081#M600231</guid>
      <dc:creator>swelsch</dc:creator>
      <dc:date>2026-04-13T15:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545084#M600232</link>
      <description>&lt;P&gt;I use it this way and have never had any problems.&lt;/P&gt;&lt;P&gt;Well, I tried to help you, but it seems you already know everything. Good luck.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 15:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545084#M600232</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2026-04-13T15:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545086#M600233</link>
      <description>&lt;P&gt;Maybe this will help you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/verify-ip-device-tracking-post-mab-configuration-on-switch/ta-p/5148985" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/verify-ip-device-tracking-post-mab-configuration-on-switch/ta-p/5148985&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 16:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545086#M600233</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2026-04-13T16:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545089#M600234</link>
      <description>&lt;OL start="6"&gt;
&lt;LI&gt;By default, an 802.1X-enabled switch port accepts only one MAC address. Since the idea of open mode is to ensure that there is no disruption, enabling multi-auth host mode is recommended, which allows for one IP Phone an unlimited number of workstations/data_endpoints to authenticate on the interface.
&lt;PRE&gt;c9300-Sw(config-if)#authentication host-mode multi-auth&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Host modes&lt;/STRONG&gt;–Four host modes can be configured on a port.&lt;/LI&gt;
&lt;/UL&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Host Mode&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Number of Endpoints&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Interface Command&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Single Host&lt;BR /&gt;(default in IBNS 1.0)&lt;/TD&gt;
&lt;TD&gt;1 Voice/Data device&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;access-session host-mode single-host&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Multi-Domain Authentication (MDA)&lt;/TD&gt;
&lt;TD&gt;1 Voice and 1 Data device&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;access-session host-mode multi-domain&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Multi-Host Mode&lt;/TD&gt;
&lt;TD&gt;1 Voice and Unlimited Data
&lt;P&gt;(At least one MAC address must authenticate successfully)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;access-session host-mode multi-host&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Multi-Auth Mode&lt;/TD&gt;
&lt;TD&gt;1 Voice and Unlimited Data
&lt;P&gt;(Each MAC address must authenticate)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;access-session host-mode multi-auth&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN class="T286Pc" data-complete="true" data-sfc-cb="" data-sfc-root="c" data-sfc-cp=""&gt;&lt;STRONG class="Yjhzub" data-complete="true" data-sfc-cb="" data-sfc-root="c"&gt;Multi-Auth (Current):&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Authenticates every MAC. This is why you see the client, the interface MAC, and the base MAC all trying to log in.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="T286Pc" aria-owns="action-menu-parent-container" data-complete="true" data-sfc-cb="" data-sfc-root="c" data-sfc-cp=""&gt;&lt;STRONG class="Yjhzub" data-complete="true" data-sfc-cb="" data-sfc-root="c"&gt;Multi-Domain (Recommended):&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Optimized for "IP Phone + PC." It allows one device per domain. Once your client (080f.e575.d500) hits the DATA domain, the switch stops trying to authenticate other "data" MACs on that port.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="T286Pc" aria-owns="action-menu-parent-container" data-complete="true" data-sfc-cb="" data-sfc-root="c" data-sfc-cp=""&gt;Let's try below :&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;&lt;SPAN class="undefined" aria-owns="action-menu-parent-container"&gt;conf t
interface GigabitEthernet5/0/1
 no authentication host-mode multi-auth
 authentication host-mode multi-domain&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;If single host, you can also try :&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;&lt;SPAN class="undefined" aria-owns="action-menu-parent-container"&gt;interface Gi5/0/1
 authentication host-mode single-host&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;Is this the only port with this issue, or is this configuration the same across all ports? Are any of them working as expected?&lt;/P&gt;
&lt;P&gt;17.15.5 is the latest code; I have only tested 17.12.6 so far.&lt;/P&gt;
&lt;P&gt;check wire and wireless deployment guide :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 16:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545089#M600234</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2026-04-13T16:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: MAB on Cisco 9300 Stack</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545193#M600235</link>
      <description>&lt;P&gt;thanks to all&lt;/P&gt;&lt;P&gt;hers is the official statement from TAC&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This is not a bug, but rather a known behavioral side-effect of how MAB interacts with internal switch functions&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;so i think i have to live with this cosmetic display error in ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 06:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-on-cisco-9300-stack/m-p/5545193#M600235</guid>
      <dc:creator>swelsch</dc:creator>
      <dc:date>2026-04-14T06:25:57Z</dc:date>
    </item>
  </channel>
</rss>

