cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
23026
Views
25
Helpful
11
Replies

Authentication open vs authentication order mab | dot1x

Ibrahim Jamil
Level 6
Level 6

Hello Freinds

 

is okay inder the interface connected to Dot1xPC and MAB PC to use authentication open , instead of

 

authentication order mab for MAB PC

 

&

 

authentication order dot1x for Dot1xPC

 

thanks

11 Replies 11

Ben Walters
Level 4
Level 4

Both dot1x and MAB are methods of authentication for a port, whereas authentication open provides no authentication for a port, it allows all traffic through if a host is authenticated successfully or not.  

 

It is used when setting up dot1x configurations in monitor mode. You could have both dot1x/MAB authentication and authentication open to log authentication details but allow a user access even if they fail authentication.  

 

The authentication order commands only specify which method of authentication to try first between mab, dot1x and webauth. If you are looking at a dot1x setup the authentication order commands don't provide authentication, it would be the mab and dot1x pae authenticator interface commands.

 

Hi,

 

Please take into account that authentication open is useful only if the authentication/authorization fails.

There is a common misconception that if you have authentication open your hosts can't be affected by any ISE policy change.

Still, even if you have authentication open but ISE sends a dACL with deny any or places you to a specific (blackhole) VLAN that authorization will apply.

Same applies if your last rule (before deny) is guest portal.  Everyone will be trapped in the guest portal authorization rule, and the authentication open command would be useless.

 

Authentication open is great only if your hosts that are not authenticated match a deny rule. (in this case in the authorization policy)

 

Thanks,

Octavian

This is very true. Indeed a big misconception that no Cisco doc clarifies anywhere.

Hi, 

 

1)Under monitor mode, If there is no dACL(no deny), will there be still blocking of MAB or 802.1x devices? considering authorization policy doesn't goes through (due to missing the device MAC address in Identity group)

IF there is a blocking, who and how it works?

 

2)Furthermore, how to ensure there is no blocking when runnning monitor mode?

 

3)I also heard tht there could be no blocking even during "closed mode". How possible is this?

For the most part devices will still attempt to authenticate MAB or 802.1x. But with monitor-mode, there will normally be a default dACL that allows all traffic at the end of the authorization policy. So devices will try to authenticate first, but even if they fail they are allowed through. If you added a default policy to your low-impact or closed policy set that also permits all traffic, then the behavior would be the same as monitor-mode (depending on the other rules in the authorization policy).

Any config example how the typical config involving "default dACL" will looks like for monitor & closed mode?

And how can i confirm those "default dACL" rules in Authorization policy?

Hi,

 

Thanks so much for yr given scenario.

Can you give some config examples based on 1) and 2) as compared to typical config(all allow or deny?).

1)Still, even if you have authentication open but ISE sends a dACL with deny any or places you to a specific (blackhole) VLAN that authorization will apply.

2)Same applies if your last rule (before deny) is guest portal.  Everyone will be trapped in the guest portal authorization rule, and the authentication open command would be useless.

But can I say, rule in the end shld be "all-deny" supposedly?  

andre.ortega
Spotlight
Spotlight

Hi Ibrahim,
those options are not opposite, they are complementary.
However, it is importante to notice that with authentication open you should use an ACL at interfaces to controll what can and what cant be accessed.
Look for ISE low impact mode.

Hello freinds

 

thanks for explaning

 

 

so the below is for better operation

so in the port conncted to mab pc  , the authentication order is mab

 

while port connected to dot1xpc , authentication order must be  dot1x

 

thanks all

Not necessary. You can configure all of the interfaces as:

authentication order mab dot1x
authentication priority dot1x mab