<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Neno,After several TAC in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612405#M72478</link>
    <description>&lt;P&gt;Hi Neno,&lt;/P&gt;&lt;P&gt;After several TAC cases to try and get smart ports working, it turns out smart port macros aren't supported for FlexConnect/HREAP access points; only local mode access points.&lt;/P&gt;&lt;P&gt;So the only options are to change away from FlexConnect, tag the native VLAN (only supported on 3750s and not 2960s), or implement management VLAN access lists (which is best practise anyway). &amp;nbsp;&lt;/P&gt;&lt;P&gt;No other way to secure access point ports unfortunately.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jul 2015 05:44:08 GMT</pubDate>
    <dc:creator>mojocoops</dc:creator>
    <dc:date>2015-07-23T05:44:08Z</dc:date>
    <item>
      <title>FlexConnect Access Point - Wired 802.1X or MAB Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612401#M72474</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;We are piloting wired 802.1X but have hit a snag - FlexConnect AP switchport configuration requires the port be configured as trunk, with the native VLAN for management and access VLAN(s) for client data.&lt;/P&gt;&lt;P&gt;I know 802.1X cannot be configured on trunk port, but how can we configure MAB on trunk ports such as these?&lt;/P&gt;&lt;P&gt;Otherwise, is there another way we can authenticate these FlexConnect APs on a switch using ISE?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612401#M72474</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2019-03-11T05:07:57Z</dc:date>
    </item>
    <item>
      <title>Hi Stephen. You are correct,</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612402#M72475</link>
      <description>&lt;P&gt;Hi Stephen. You are correct, 802.1x should not be configured on a trunk port. Moreover, you would run into an issue with clients if you are running local switching mode. Here is the flow:&lt;/P&gt;&lt;P&gt;1. AP, authenticates via MAB and profiling&lt;/P&gt;&lt;P&gt;2. Client authenticates via PEAP/EAP-TLS, etc&lt;/P&gt;&lt;P&gt;3. Now the client's traffic is locally switched, thus, the client mac address is showing on the same port where the AP is connected. The NAD (Switch) sees this new mac address and it is expecting it to perform 802.1x or MAB based authentication. The supplicant, however, does not know that and as far it is concerned it was already authenticated.&lt;/P&gt;&lt;P&gt;So I have ran into this issue in my deployments and you have the following options (listed in preference order):&lt;/P&gt;&lt;P&gt;1. Eliminate FlexConnect &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;2. Utilize AutoSmartPorts where:&lt;/P&gt;&lt;P&gt;- If an AP is connected, then 802.1x configuration is removed, port-security is enabled and locked to a single MAC address and trunk configuration is enabled&lt;/P&gt;&lt;P&gt;- If the AP is removed, then port is configured as standard access port, port-security is removed and 802.1x is configured&lt;/P&gt;&lt;P&gt;More info on auto smart ports:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/switches/lan/auto_smartports/15-0_1_se/configuration/guide/asp_cg.html"&gt;http://www.cisco.com/c/en/us/td/docs/switches/lan/auto_smartports/15-0_1_se/configuration/guide/asp_cg.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;3. You can configure the port in a "multi-host" mode where after the first device is authenticated all subsequent devices are allowed on the network.&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 18:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612402#M72475</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-10-23T18:41:25Z</dc:date>
    </item>
    <item>
      <title>Thanks Neno!Number 1 isn't an</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612403#M72476</link>
      <description>&lt;P&gt;Thanks Neno!&lt;/P&gt;&lt;P&gt;Number 1 isn't an option for our remote branches (where we need 802.1X and port security the most when APs are exposed).&lt;/P&gt;&lt;P&gt;I'll have a read about smart ports.&lt;/P&gt;&lt;P&gt;Are you able to provide a configuration example for multi-host mode with MAB that will work with a trunk port?&lt;/P&gt;&lt;P&gt;Also&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 23:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612403#M72476</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2014-10-23T23:57:05Z</dc:date>
    </item>
    <item>
      <title>Hi Stephan. The 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612404#M72477</link>
      <description>&lt;P&gt;Hi Stephan. The 802.1x configuration on the trunk port is exactly the same as it is on an access port. I was able to get it work and did not have any issues. When I asked Cisco "Exactly what part of 802.1x is not supported on a trunk" I was not given a straight answer &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Now, I never deployed it because the customer did not like the&amp;nbsp;&lt;STRONG&gt;multi-host&amp;nbsp;&lt;/STRONG&gt;mode so I don't know what the long term consequences are. Thus, take that option/solution with a grain of salt. Otherwise the command is&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;authentication host-mode multi-host&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If solution #1 is not an option then I would highly recommend that you use the auto-smart ports. They are pretty powerful and you can do a lot of different things with the default and custom built macros. They can also be a little tricky so make sure you test it in your lab first. The first time I did it all of my trunk ports got auto-configured and let's just say that a lot of things stopped working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 00:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612404#M72477</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-10-24T00:39:28Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,After several TAC</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612405#M72478</link>
      <description>&lt;P&gt;Hi Neno,&lt;/P&gt;&lt;P&gt;After several TAC cases to try and get smart ports working, it turns out smart port macros aren't supported for FlexConnect/HREAP access points; only local mode access points.&lt;/P&gt;&lt;P&gt;So the only options are to change away from FlexConnect, tag the native VLAN (only supported on 3750s and not 2960s), or implement management VLAN access lists (which is best practise anyway). &amp;nbsp;&lt;/P&gt;&lt;P&gt;No other way to secure access point ports unfortunately.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 05:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612405#M72478</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2015-07-23T05:44:08Z</dc:date>
    </item>
    <item>
      <title>Stephen, I have used ise</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612406#M72479</link>
      <description>&lt;P&gt;Stephen,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have used ise triggered smart port mcros in the past, to change a port to a trunk, when certain devices are attached, for example an AP, based on it's mac address, and that works fine, auto smart ports don't need to "support" anything really, as they are just running config commands on a port, based on what ise tells it to do.&lt;/P&gt;&lt;P&gt;Is this not the scenario you are using ?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 15:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612406#M72479</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-07-23T15:01:55Z</dc:date>
    </item>
    <item>
      <title>Hi Jan,Tried using macros</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612407#M72480</link>
      <description>&lt;P&gt;Hi Jan,&lt;/P&gt;&lt;P&gt;Tried using macros based on MAC addresses but they still weren't triggering, TAC suspected a bug with IOS version&amp;nbsp;12.2(55)SE5. &amp;nbsp;They suggested upgrade to IOS 15 however then we run into bug&amp;nbsp;&lt;SPAN style="color: rgb(82, 82, 82); font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 14px; line-height: 20.1599998474121px;"&gt;CSCta05071 relating to CoA for wired 802.1X.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;What IOS version were you successfully running this on?&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 23:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612407#M72480</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2015-07-23T23:02:56Z</dc:date>
    </item>
    <item>
      <title>I believe after much</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612408#M72481</link>
      <description>&lt;P&gt;I believe after much instability and bugs found in 12.2(55)SE5 or 6 i think was out at the time, we ended up with 12.2(58)SE2 as the most stable, and where it worked. As i&amp;nbsp;remember one thing to disable is the.auto processing of macros, or it will start to trigger on the built in macros instead of just the ones you give it from ISE.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 23:07:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612408#M72481</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-07-23T23:07:04Z</dc:date>
    </item>
    <item>
      <title>Thanks Jan.Yes I made that</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612409#M72482</link>
      <description>&lt;P&gt;Thanks Jan.&lt;/P&gt;&lt;P&gt;Yes I made that mistake once on my lab setup, and it reconfigured the trunk uplink to the router and so I lost connectivity to it - had to fix via console &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 23:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612409#M72482</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2015-07-23T23:28:49Z</dc:date>
    </item>
    <item>
      <title>Hi Neno. Tried to implement</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612410#M72483</link>
      <description>&lt;P&gt;Hi Neno.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried to implement MAB authentication on a trunk port but I didn't get it to work properly. How did you set it up? Did you configure native vlan or did you leave it on default?&lt;/P&gt;&lt;P&gt;We are running a POC where we need MAB with FlexConnect AP's&lt;/P&gt;&lt;P&gt;Here's the portconfig:&lt;/P&gt;&lt;P&gt;Switch#sh run | begin interface GigabittEthernet1/0/18&lt;BR /&gt;interface FastEthernet1/0/18&lt;BR /&gt;&amp;nbsp;description SA-DEFAULT_1.1&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 123&amp;nbsp; !* Have tried with default setting also&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;switchport protected&lt;BR /&gt;&amp;nbsp;switchport block unicast&lt;BR /&gt;&amp;nbsp;ip arp inspection limit rate 20&lt;BR /&gt;&amp;nbsp;no logging event link-status&lt;BR /&gt;&amp;nbsp;no logging event power-inline-status&lt;BR /&gt;&amp;nbsp;load-interval 30&lt;BR /&gt;&amp;nbsp;srr-queue bandwidth share 1 30 35 5&lt;BR /&gt;&amp;nbsp;priority-queue out&lt;BR /&gt;&amp;nbsp;authentication control-direction in&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication event server dead action authorize&lt;BR /&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-host&amp;nbsp;&amp;nbsp;&amp;nbsp; ! No success with this entry and Trunk&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication violation restrict&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;ipv6 traffic-filter IPV6 in&lt;BR /&gt;&amp;nbsp;mls qos trust cos&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 2&lt;BR /&gt;&amp;nbsp;dot1x timeout supp-timeout 20&lt;BR /&gt;&amp;nbsp;storm-control broadcast level pps 1k&lt;BR /&gt;&amp;nbsp;storm-control multicast level pps 2k&lt;BR /&gt;&amp;nbsp;storm-control action trap&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;&amp;nbsp;spanning-tree bpdufilter enable&lt;BR /&gt;&amp;nbsp;spanning-tree bpduguard enable&lt;BR /&gt;&amp;nbsp;spanning-tree guard loop&lt;BR /&gt;&amp;nbsp;service-policy input XXXXXX&lt;BR /&gt;&amp;nbsp;ip verify source&lt;BR /&gt;&amp;nbsp;ip dhcp snooping limit rate 20&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2015 08:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612410#M72483</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2015-09-22T08:38:41Z</dc:date>
    </item>
    <item>
      <title>What version of code are you</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612411#M72484</link>
      <description>&lt;P&gt;What version of code are you running? I did forget to mention that you need to be on the 15.x train.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2015 15:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612411#M72484</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-09-22T15:11:17Z</dc:date>
    </item>
    <item>
      <title>Hi Neno.</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612412#M72485</link>
      <description>&lt;P&gt;Hi Neno.&lt;/P&gt;
&lt;P&gt;I'm running on 15.0(2)SE9 with IP base on a Cat 3750E&lt;/P&gt;
&lt;P&gt;After upgrade to above release we actually got the smartport macros to be triggered by ISE. However this state is not secure and it looks like ISE is expecting a second auth that never happens since it regards the port as multiple device port. Do you have any idea to solve this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;sh authentication interface g1/0/44&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;Client list:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;Interface&amp;nbsp; MAC Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; Domain&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp; Gi1/0/44&amp;nbsp;&amp;nbsp; 1c6a.7a58.6308&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DATA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authz Success&amp;nbsp; 0A3EE006000008A19F6303A7&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;Available methods list:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp; Handle&amp;nbsp; Priority&amp;nbsp; Name&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;Runnable methods list:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp; Handle&amp;nbsp; Priority&amp;nbsp; Name&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;as111.slu2#sh authentication sess interface g1/0/44&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet1/0/44&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; 1c6a.7a58.6308&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address:&amp;nbsp; Unknown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; 1C-6A-7A-58-63-08&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authz Success&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Policy:&amp;nbsp; Should Secure&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Status:&amp;nbsp; Unsecure&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; single-host&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; in&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorized By:&amp;nbsp; Authentication Server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan Policy:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACS ACL:&amp;nbsp; xACSACLx-IP-dACL-MI-CAPWAP-55fa71f9&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; 0A3EE006000008A19F6303A7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; 0x000013D7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0xB30008A2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;Runnable methods list:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp; State&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&amp;nbsp;&amp;nbsp;&amp;nbsp; Failed over&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 11:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/2612412#M72485</guid>
      <dc:creator>Mats Nilson</dc:creator>
      <dc:date>2016-03-24T11:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Hi Neno.</title>
      <link>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/3231326#M72486</link>
      <description>&lt;P&gt;Hi Mats,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just wondering if were successful in sorting out this issue? I'm running into a similar issue with our FlexConnect APs. We ran into two different sets of issues with our Multi-Host setup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) At few of our branches, we noticed that the first MAC learnt is a workstations MAC which is connected through the AP. Technically, AP must be the first MAC seen by switch. Don't know whats causing this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) The dACL we issued via ISE is restrictive and only allows certain ports. This seems to be breaking the connectivity of the workstations connected to the SSID. So, I'm suspecting if I have a missing port in my dACL or the dACL is applied to the entire session instead of applying it to the first MAC seen by the switch. By the same ACL we are issuing for our LWAPP APs &amp;amp; they seem to be working absolutely fine. Below is the dACL I have -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;remark Allow Control and Provisioning of Wireless Access Points (CAPWAP) protocols.&lt;/P&gt;
&lt;P&gt;permit udp any any range 5246 5248&lt;/P&gt;
&lt;P&gt;permit udp any range 5246 5248 any&lt;/P&gt;
&lt;P&gt;remark Allow Lightweight Access Point Protocol (LWAPP)&lt;/P&gt;
&lt;P&gt;permit udp any any range 12222 12224&lt;/P&gt;
&lt;P&gt;permit udp any range 12222 12224 any&lt;/P&gt;
&lt;P&gt;remark Allow remote access (telnet and SSH)&lt;/P&gt;
&lt;P&gt;permit tcp any range 22 23 any&lt;/P&gt;
&lt;P&gt;remark Allow DHCP&lt;/P&gt;
&lt;P&gt;permit udp any any eq 67&lt;/P&gt;
&lt;P&gt;permit udp any any eq 68&lt;/P&gt;
&lt;P&gt;remark Allow DNS&lt;/P&gt;
&lt;P&gt;permit udp any any eq 53&lt;/P&gt;
&lt;P&gt;remark Allow RDLP&lt;/P&gt;
&lt;P&gt;permit udp any any eq 6352&lt;/P&gt;
&lt;P&gt;remark Allow NSI Protocol&lt;/P&gt;
&lt;P&gt;permit udp any any eq 37540&lt;/P&gt;
&lt;P&gt;permit udp any any eq 37550&lt;/P&gt;
&lt;P&gt;remark Allow TFTP&lt;/P&gt;
&lt;P&gt;permit udp any any eq 69&lt;/P&gt;
&lt;P&gt;remark Allow FTP&lt;/P&gt;
&lt;P&gt;permit tcp any any eq 21&lt;/P&gt;
&lt;P&gt;remark Allow Syslog&lt;/P&gt;
&lt;P&gt;permit udp any any eq 514&lt;/P&gt;
&lt;P&gt;permit icmp any any&lt;/P&gt;
&lt;P&gt;deny ip any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you reckon there could be few more ports for FlexConnects?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Vivek&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2017 07:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/flexconnect-access-point-wired-802-1x-or-mab-authentication/m-p/3231326#M72486</guid>
      <dc:creator>Vivek Ganapathi</dc:creator>
      <dc:date>2017-12-13T07:20:46Z</dc:date>
    </item>
  </channel>
</rss>

