01-19-2019 06:30 AM
Since my old topic about the frequency of 802.1x Wired deployments in the industry was already answered, I decided to start the next discussion of another question that poped in my head. Today as I was playing with this stuff I realized the limitation of an 802.1x solution. The NADs must always have visibility of the RADIUS (ISE) server. This is a bit concerning because I have nearly a 100 branch offices where I am planning to deploy 802.1x for wired ethernet. These offices connect to the Data Center over a DMVPN topology over the Internet. As it happens quite frequently, internet goes down at a given site. This causes VPN tunnels to drop and loss of all connectivity with the DC where ISE server is deployed. We have backup connectivity over cellular however that's also location dependent and may not always come up. We could add a secondary ISP however sometimes separate ISPs still use the same last-mile carrier and if the problem is with that carrier itself, we're dead in water. (It's happened a few times). A situation such as this would break not only WAN connectivity but also LAN connectivity. Typically our users, if for some reason drop WAN connectivity, they can continue to work on LAN servers. However now they won't even be able to do that which would cause a *hitloads of new headaches.
Is there another way out of this? I understand redundancy of connectivity is the answer but we don't have MPLS and are strictly Internet dependent.
Solved! Go to Solution.
01-19-2019 06:38 AM
01-19-2019 06:38 AM
01-19-2019 06:49 AM
Thank you. This is exactly what I was looking for.
Critical Authentication
In closed mode, the endpoints do not have network access unless they authenticate successfully or are given fail open access because of ISE authorization policy. What if the ISE server itself is unreachable? The best practice recommendation is therefore, to configure the fail open access locally on the switch.
01-20-2019 12:13 AM - edited 01-20-2019 12:19 AM
Keep in mind:
If you value that your endpoints authenticate via 802.1x even during a WAN outage, you should consider other options. Critical VLANs are a compromise and not a secure business continuity plan. Minimizing single points of failure should be an objective for any branch site of importance.
Even if the last mile is the same infrastructure between different ISPs, having different ISPs is still a better MTBF. Other things you can consider is duplicating your WAN gear at the branches and/or PSUs on the routers.
If you do choose to take up another ISP, you may want to take a look at SD-WAN solutions.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide