08-18-2022 06:04 AM
Hi
802.1x-based NAC for wired ports controls L2 access to switch ports. To gain access to the network, the device must authenticate itself (e.g. with a device certificate). Authentication is performed by the operating system (Windows 10). This means that Windows must be up for 802.1x operation.
On the other hand, BitLocker Network Unlock is a function to avoid users having to enter the PIN to unlock the TPM in order to obtain the decryption key. Network Unlock is run by UEFI before Windows boots and is based on DHCP.
Is there an option to allow DHCP traffic to pass on a switch port before 802.1x authentication has taken place?
Thanks
Thomas
Solved! Go to Solution.
08-18-2022 03:25 PM - edited 08-20-2022 10:41 AM
You can config Low-impact mode,
this give you pre-auth ACL which can you specify to allow DHCP packet before full auth access Client.
08-20-2022 10:34 AM
This is effectively a form of compliance/posture. 802.1X ideally allows no access until and endpoint or user is authenticated. You are asking for limited network access before authentication.
Yes, this can be done with a default VLAN and ACL applied on the switchport to limit traffic to DHCP and whatever server(s) you need for BitLocker to communicate with.
See the ISE Secure Wired Access Prescriptive Deployment Guide > Pre-Authentication and Post-Authentication Access Control with Low Impact for how to do it.
08-18-2022 08:44 AM
not sure never come across this - we have deployment with bitlocker (here is how it works)
that only for boot up, not for networking, once bitlocker entered, system boots up and 802.1X will start process based on the profiles.
or am i misundestood your query ?
08-18-2022 02:18 PM
Hi BB
Network Unlock needs network access before Windows boots and therefore before 802.1x authentication can be done.
08-18-2022 11:10 AM
so you need the client get ip from DHCP before auth with 802.1x?
08-18-2022 02:22 PM
client don't need IP address but it uses DHCP to exchange necessary data for unlock with a central server (accessible via an IP helper on the default gateway).
And yes, that's before 802.1x auth
08-18-2022 03:25 PM - edited 08-20-2022 10:41 AM
You can config Low-impact mode,
this give you pre-auth ACL which can you specify to allow DHCP packet before full auth access Client.
08-20-2022 10:34 AM
This is effectively a form of compliance/posture. 802.1X ideally allows no access until and endpoint or user is authenticated. You are asking for limited network access before authentication.
Yes, this can be done with a default VLAN and ACL applied on the switchport to limit traffic to DHCP and whatever server(s) you need for BitLocker to communicate with.
See the ISE Secure Wired Access Prescriptive Deployment Guide > Pre-Authentication and Post-Authentication Access Control with Low Impact for how to do it.
09-13-2022 02:28 AM
Thanks a lot for your help.
Low impact mode can be used.
After some tests we decided to implement a two step authentication.
first step makes MAB against a MAC address database of all known devices. If successful, port will be mapped to a preAuth VLAN. preAuth VLAN has limited access to services need at this stage (DHCP for Bitlocker Network unlock).
Second step starts when OS is up. This is 802.1x authentication with VLAN assignment based on OU in AD.
It works like expected.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide