<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 801.x bypass in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497964#M300795</link>
    <description>&lt;P&gt;Folks ,Is it possible to bypass 802.1x authentication for a wireless client (iPad) in Meraki ?&lt;/P&gt;</description>
    <pubDate>Tue, 15 Apr 2025 07:40:36 GMT</pubDate>
    <dc:creator>piasterloo</dc:creator>
    <dc:date>2025-04-15T07:40:36Z</dc:date>
    <item>
      <title>801.x bypass</title>
      <link>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497964#M300795</link>
      <description>&lt;P&gt;Folks ,Is it possible to bypass 802.1x authentication for a wireless client (iPad) in Meraki ?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 07:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497964#M300795</guid>
      <dc:creator>piasterloo</dc:creator>
      <dc:date>2025-04-15T07:40:36Z</dc:date>
    </item>
    <item>
      <title>Re: 801.x bypass</title>
      <link>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497965#M300796</link>
      <description>&lt;P&gt;&lt;STRIKE&gt;Yes, It is, you need to use the allow list.&lt;/STRIKE&gt;&lt;/P&gt;&lt;P&gt;I'm sorry for the wrong information, I just realized it now.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 09:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497965#M300796</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2025-04-15T09:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: 801.x bypass</title>
      <link>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497966#M300797</link>
      <description>&lt;P&gt;A client still needs to authenticate to the SSID before any Allow/Deny lists come into play. Adding the client to the allow list would simply bypass any splash or firewall settings.&lt;/P&gt;&lt;P&gt;You'll need to create a separate SSID, however seeing as iPads do support .1x auth, what's the user case you're attempting to solve here? Cert based auth for devices like iPads works well. &lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 13:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497966#M300797</guid>
      <dc:creator>ConnorL1</dc:creator>
      <dc:date>2025-04-15T13:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: 801.x bypass</title>
      <link>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497967#M300798</link>
      <description>&lt;P&gt;100%, you can't bypass 802.1X that happens before an IP is issued. Any bypass like MAB would have to be on the actual RADIUS server...&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 14:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/801-x-bypass/m-p/5497967#M300798</guid>
      <dc:creator>DainBrammage</dc:creator>
      <dc:date>2025-04-15T14:43:44Z</dc:date>
    </item>
  </channel>
</rss>

