04-25-2025 03:42 AM
Hi
I have established an 802.1x environment utilizing credential and certificate-based authentication by configuring the Cisco 3650 switch along with a virtual machine that includes Active Directory and Network Policy Server.
The credentials and certificate, tested on one virtual machine and one physical machine, appear to be functioning properly.
I have also evaluated scenario i.e., where 802.1x with certificate-based authentication, along with a fallback to MAC address, appears to be functioning effectively.
I intended to establish a redundant server, which has been set up with Active Directory and Network Policy Server, mirroring the same policy configurations as the primary server, and the secondary server has also been configured in the switch.
I would appreciate it if some experts could provide clarification on a few below questions I have.
Can anyone assist me with my questions? I would appreciate it if you could share the relevant links and commands for configuration.
04-28-2025 01:41 PM
05-05-2025 03:42 AM
My question is: 802.1x certificate validation fails for some reason, like the expired certificate, and trying to connect using MAB fallback mechanism with nps, however, nps is down, so it needs to re-authenticate with some other options, and
Can we choose the local switch as an option for the computer to authenticate when NPS/AD is down?
Possible solutions received from AI for my question:
When 802.1X certificate validation fails and the system attempts to use MAC Authentication Bypass (MAB) as a fallback mechanism with Network Policy Server (NPS), but NPS is down, the authentication process becomes more complex. In this scenario, the system needs to re-authenticate with the local switch for that computer to authenticate. Let's break down this process and explore the potential solutions.
Solution 1:
Configuring Local Authentication on the Switch
Solution 2:
Configuring Local Authentication for computers on the Switch for 802.1x
Solution 3:
Configure 802.1X first, then MAB, and falls back to local switch for authentication step by step configuration
Here’s a step-by-step configuration for a Cisco switch to attempt 802.1X authentication first, then fallback to MAB (MAC Authentication Bypass), and finally fallback to local authentication (such as placing the device in a restricted VLAN or applying a local ACL) if the RADIUS server is unreachable. This covers the scenario shown in your screenshot, where 802.1X authentication failed due to a user account problem.
Step 1: Enable AAA and Define Authentication Methods
configure terminal
aaa new-model
aaa authentication dot1x default group radius local
aaa authentication mab default group radius local
aaa authorization network default group radius local
This tries RADIUS first, then falls back to the local switch database if RADIUS is unavailable
Step 2: Configure RADIUS Server
radius server RADIUS-SERVER
address ipv4 <RADIUS-IP> auth-port 1812 acct-port 1813
key <shared-secret>
!
aaa group server radius RADIUS-GROUP
server name RADIUS-SERVER
!
(Replace <RADIUS-IP> and <shared-secret> with your actual RADIUS server’s IP and secret.)
Step 3: Configure the Interface for 802.1X, MAB, and Fallback
interface GigabitEthernet1/0/8
switchport mode access
authentication port-control auto
dot1x pae authenticator
mab
authentication order dot1x mab
authentication priority dot1x mab
authentication event fail action next-method
authentication event server dead action authorize vlan 999
authentication host-mode single-host
authentication order dot1x mab: Tries 802.1X first, then MAB3456.
authentication event fail action next-method: If 802.1X fails, try MAB46.
authentication event server dead action authorize vlan 999: If RADIUS is unreachable, place the device in VLAN 999 (a restricted VLAN for local fallback)6.
authentication port-control auto: Enables authentication on the port.
Step 4: (Optional) Configure Local User for MAB Fallback
If you want the switch to authenticate a device locally by MAC address (for MAB fallback):
username 000C2915X24C password 000C2915X24C
Use the MAC address as the username and password (format must match how the switch presents the MAC)
Step 5: (Optional) Apply an ACL to the Fallback VLAN
To restrict access for devices placed in the fallback VLAN:
ip access-list extended LOCAL-FALLBACK-ACL
permit ip any any ! (Or restrict as needed)
!
interface vlan 999
ip access-group LOCAL-FALLBACK-ACL in
This ensures limited access for devices authenticated locally when RADIUS is down.
Step 6: Save and Verify
end
write memory
show authentication sessions interface GigabitEthernet1/0/8
show dot1x all
show logging
Use these commands to verify authentication state and logs
I am not sure whether this solution works but when i checked in some AI it suggested me the above 3 solutions and i have shared them with commands. Kindly please help me to check and let me know if these solution using switch as authenticator works when NPS/AD is down.
I appreciate any help you can provide on this, thanks in advance!!
Ashok M
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide