<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have run into this issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460821#M86709</link>
    <description>&lt;P&gt;I have run into this issue before, there is a command on the switch port so that if authentication fails to use the next-method. Can you post the output of your port settings and the version and type of switch you are using?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;</description>
    <pubDate>Fri, 11 Apr 2014 16:59:07 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2014-04-11T16:59:07Z</dc:date>
    <item>
      <title>MAB/802.1x and Alkatel IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460820#M86708</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a distributed deployment&amp;nbsp;where Alkatel ip-touch&amp;nbsp;phones are authentictaed via MAB. Alkatel ip touch phones has 802.1x enabled by default and the phone tries eapol first and then switch authenticates via MAB which is fine. Once authenticated its working as expected. The issue is the phone keeps on periodic retry after x amount of minutes for 802.1x again which triggers the phone to reboot again and goes via the whole process. This interupts the voice. We could disable 802.1x but its per phone basis. Has anyone came across this issue and found a way to diable globally via the call manager etcc. or any workarounf from ISE/switch side?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460820#M86708</guid>
      <dc:creator>Gaj Ana</dc:creator>
      <dc:date>2019-03-11T04:37:44Z</dc:date>
    </item>
    <item>
      <title>I have run into this issue</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460821#M86709</link>
      <description>&lt;P&gt;I have run into this issue before, there is a command on the switch port so that if authentication fails to use the next-method. Can you post the output of your port settings and the version and type of switch you are using?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 16:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460821#M86709</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2014-04-11T16:59:07Z</dc:date>
    </item>
    <item>
      <title>Hi Tarik, Thanks for the</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460822#M86710</link>
      <description>&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply, please find below the switch&amp;nbsp; port config lines, its a 370x switch, IPbase&amp;nbsp; and universalon 15.2-1.E1 image&lt;/P&gt;&lt;P&gt;Note- Since the 8021x is enabled by default the phone initially tries 802.1x and after failing&amp;nbsp;, the switch&amp;nbsp;&amp;nbsp;goes to the next auth method which is MAB which is successful. The issue is the phone again initiales a 802.1x packet after some time and the whole process starts again and because 8021x is failed the phone reboots again. I think this is the way this type of phone work and we cannot do much unless disable 802.1x or install the Alkatel CA certs in the ISE cert store?&lt;/P&gt;&lt;P&gt;Interface gi x/y&lt;/P&gt;&lt;P&gt;switchport access vlan&amp;nbsp;xx&lt;/P&gt;&lt;P&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan&amp;nbsp;yy&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip access-group ACL_ALLOW in&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication event server dead action reinitialize vlan&amp;nbsp;xx&lt;/P&gt;&lt;P&gt;&amp;nbsp;authentication event server dead action authorize voice&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-auth&lt;BR /&gt;&amp;nbsp;authentication open&lt;BR /&gt;&amp;nbsp;authentication order mab dot1x&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;/P&gt;&lt;P&gt;&amp;nbsp;authentication timer reauthenticate server&lt;BR /&gt;&amp;nbsp;authentication violation restrict&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change added&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change removed&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 10&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Apr 2014 06:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460822#M86710</guid>
      <dc:creator>Gaj Ana</dc:creator>
      <dc:date>2014-04-12T06:07:39Z</dc:date>
    </item>
    <item>
      <title>I have a couple of questions</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460823#M86711</link>
      <description>&lt;P&gt;I have a couple of questions regarding the behavior of the phone.&lt;/P&gt;&lt;P&gt;In most cases endpoints will not prompt re-authentication (computing devices are an exception), unless a timer on the switchport or a link event prompts re-authentication which you can start by running a show authentication sessions interface xxx details.&lt;/P&gt;&lt;P&gt;If the phones are performing eap-tls then your best option would be to use that feature as opposed on relying on strictly profiling.&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;</description>
      <pubDate>Sat, 12 Apr 2014 07:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460823#M86711</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2014-04-12T07:06:59Z</dc:date>
    </item>
    <item>
      <title>Hi Tarik,The dot1x debugs in</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460824#M86712</link>
      <description>&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;The&amp;nbsp;dot1x debugs in switch showed after certain time switch receives a reauth packet "Apr&amp;nbsp; 8 04:40:24.194: dot1x-packet:[xxxx.yyyy.zzzz, Gi1/0/1] queuing an EAPOL pkt on Auth Q" from the endpoint and the whole process starts again. The endpoint reboots itself once it sees a 8021x failure. "Show auth sess int x/y details" shows MAB as the successfull auth method until the re-request for 802x comes from the endpoint.&lt;/P&gt;&lt;P&gt;Regarding the timers as mentioned in the switch port config above , the port rely on the radius server (ie ISE)&amp;nbsp;"authentication timer reauthenticate server" for the reauth timer and I assume this will be the session time when the device initially connects.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regs&lt;/P&gt;&lt;P&gt;G&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Apr 2014 05:34:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460824#M86712</guid>
      <dc:creator>Gaj Ana</dc:creator>
      <dc:date>2014-04-13T05:34:44Z</dc:date>
    </item>
    <item>
      <title> Hi, May i  ask what alcatel</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460825#M86713</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;May i&amp;nbsp; ask what alcatel model do you have, because i'm facing a similar problem with them you can see my posts on the forum&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2014 19:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460825#M86713</guid>
      <dc:creator>christoulakis</dc:creator>
      <dc:date>2014-04-21T19:41:32Z</dc:date>
    </item>
    <item>
      <title>HiThese are ip touch 4068,</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460826#M86715</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;These are ip touch 4068, 4028 phones. I tried testing with Alkatel Enterprise root CA and manufacturing certs installed in ISE cert store but still "unknown CA error" showed up. Further Wire-shark capture for dot1x showed in "client hello" the certs presented by the phones are signed by a issuer "Wired Phones". Trying to get this and test it again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regs&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2014 01:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460826#M86715</guid>
      <dc:creator>Gaj Ana</dc:creator>
      <dc:date>2014-04-22T01:17:34Z</dc:date>
    </item>
    <item>
      <title> For my understanding the</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460827#M86717</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For my understanding the phone works fine via MAB, the problem appears with dot1x,&amp;nbsp; right?&lt;/P&gt;&lt;P&gt;Have you tried to tested except EAP/TLS with the next and only available option EAP/MD5&amp;nbsp; and see if you will face a similar behavior? that will be interesting&amp;nbsp; test.&lt;/P&gt;&lt;P&gt;I have come to a venturous conclusion that some devices mostly Printers and IP phones if they do not find ISE they blocked and cannot talk with anything else, as a result they continuously reboot. In contrast PCs/ workstations if failed they can Login despite the failed messages that will apearead on your ISE console.&lt;/P&gt;&lt;P&gt;Probably our cases have many similarities and are quiet difficult to analyzed, even from the experts&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;T.C&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2014 19:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460827#M86717</guid>
      <dc:creator>christoulakis</dc:creator>
      <dc:date>2014-04-22T19:38:07Z</dc:date>
    </item>
    <item>
      <title>yeh MAB works fine. I did not</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460828#M86718</link>
      <description>&lt;P&gt;yeh MAB works fine. I did not test MD5, for 8021x and MD5 the phone presents default user ALCIPT and i assume default password is "password" ???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is since most phones are being deployed its hard to disable 8021x or activate MD5 on per phone basis, at the same time 8021x cannot be disable globally from the PBX manager. Therefore I'm trying with the default Alkatel certs.&lt;/P&gt;&lt;P&gt;if you goto the Alktel business portal, there are links to download the enterprise and Intermediate and and manufacturing certs but&amp;nbsp;&amp;nbsp; "Wired Phones" Intermediate cert is missing&amp;nbsp; from the link &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Regs&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2014 13:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460828#M86718</guid>
      <dc:creator>Gaj Ana</dc:creator>
      <dc:date>2014-04-23T13:06:15Z</dc:date>
    </item>
    <item>
      <title>Hi,I have the same issue. Did</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460829#M86720</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have the same issue. Did you have become it funktional with 802.1x an did you have become the right certificate for "Wired Phones"?&lt;/P&gt;&lt;P&gt;Regs and thanks for a reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2015 09:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460829#M86720</guid>
      <dc:creator>mvolk</dc:creator>
      <dc:date>2015-01-30T09:00:10Z</dc:date>
    </item>
    <item>
      <title>Hi Marc Yes, we got it</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460830#M86722</link>
      <description>&lt;P&gt;Hi Marc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, we got it working. The certificates from the Alkatel business portal doesn't work as these are not the correct CA's signed the certificate of the phone. You have to obtain the correct CA "Wired Phones" from your Alkatel local vendor. You can also verify the CA by accessing the phone setup menu or by looking at the initial TLS hand-shake using wire-shark.&lt;/P&gt;&lt;P&gt;Please note- by using the default Alkatel certs it will be a one way TLS (ie server authenticates client). We only tested with 4028,4038,4068 ip-touch phones.&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jan 2015 11:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460830#M86722</guid>
      <dc:creator>Gaj Ana</dc:creator>
      <dc:date>2015-01-31T11:54:59Z</dc:date>
    </item>
    <item>
      <title>HI G,thanks for your response</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460831#M86724</link>
      <description>&lt;P&gt;HI G,&lt;/P&gt;&lt;P&gt;thanks for your response. Now I have received the wired phone certificate.&lt;/P&gt;&lt;P&gt;Which configuration on ISE I must exclict make to auth the phone now via the&amp;nbsp; one way TLS?&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 17:55:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460831#M86724</guid>
      <dc:creator>mvolk</dc:creator>
      <dc:date>2015-02-09T17:55:10Z</dc:date>
    </item>
    <item>
      <title>Hi MarcGreat that you have</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460832#M86726</link>
      <description>&lt;P&gt;Hi Marc&lt;/P&gt;&lt;P&gt;Great that you have the certs.&lt;/P&gt;&lt;P&gt;ISE doesn't know about one way tls. In this scenario (one way tls) ise only authenticates the client. First import the wired phone cert in-to ise cert store and trust for tls.(tick check box). Create a certificate authentication profile (CAP) (with subject name as the attribute) to be used as the identity store in authentication policy. Create a identity source sequence with local and the above CAP as identity stores. The local identity store is required as these phones will first authenticate via MAB during initial boot and once 802.1x process starts they will re-authenticate via CAP. Then create a authentication policy with the above identity source sequence. This has to be after the MAB rule. Then create appropriate authorization policy.example you can use custom profiling conditions (if alkatel profiles are not available in ise) to profile and authorize the phone or some other means.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 17:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460832#M86726</guid>
      <dc:creator>Gaj Ana</dc:creator>
      <dc:date>2015-02-10T17:21:40Z</dc:date>
    </item>
    <item>
      <title>Hi G,so long time ago, but</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460833#M86727</link>
      <description>&lt;P&gt;Hi G,&lt;/P&gt;&lt;P&gt;so long time ago, but now I had implemeted the solution for the alcatel phones and it works good.&lt;/P&gt;&lt;P&gt;I would be say now thans for your help!&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 07:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/2460833#M86727</guid>
      <dc:creator>mvolk</dc:creator>
      <dc:date>2015-04-15T07:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Hi G,so long time ago, but</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3209462#M86728</link>
      <description>&lt;P&gt;Hi, sorry to revive this old thread, but I have the same problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any chance you could share the "Wired Phones" certificate if you managed to get hold of it?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 08:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3209462#M86728</guid>
      <dc:creator>Erik Ingeberg</dc:creator>
      <dc:date>2017-11-02T08:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: Hi G,so long time ago, but</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3303483#M86729</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also really need this certificate for the exact reasons outlined here.&amp;nbsp; Can anybody tell me where i can get a hold of it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My vendor is clueless and unable to supply it,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 17:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3303483#M86729</guid>
      <dc:creator>STEVE ROWING</dc:creator>
      <dc:date>2017-12-28T17:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Hi G,so long time ago, but</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3707087#M86730</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can somebody please share the "Wired Phones" CA cert? &lt;/P&gt;
&lt;P&gt;Thanks, &lt;BR /&gt;Octavian&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 13:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3707087#M86730</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-09-14T13:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: Hi Marc Yes, we got it</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3707463#M86731</link>
      <description />
      <pubDate>Sat, 15 Sep 2018 08:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/3707463#M86731</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-09-15T08:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Hi G,so long time ago, but</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/4803498#M580805</link>
      <description>&lt;P&gt;did you get the certificate?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 08:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/4803498#M580805</guid>
      <dc:creator>peter.matuska1</dc:creator>
      <dc:date>2023-03-29T08:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: MAB/802.1x and Alkatel IP Phones</title>
      <link>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/4803576#M580807</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Yes I did. Back then I exported the "Wired Phones" CA cert fom wireshark.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't have 'Alcatel Enterprise Solution' root CA though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 08:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mab-802-1x-and-alkatel-ip-phones/m-p/4803576#M580807</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2023-03-29T08:33:40Z</dc:date>
    </item>
  </channel>
</rss>

