12-05-2023 02:11 AM
Hello everybody,
I'm looking into how to allow MAB for endpoints which had successful 802.1x authentication.
Is there a way to update some endpoint attribute based on a successful 802.1x authentication which then gets used whenever the client (for whatever reason) goes through MAB?
On another NAC solution you can set the endpoint to known through after an authentication.
How would I do that in ISE?
Thanks in advance!
BR
Jonatan
12-05-2023 02:53 AM
>...I'm looking into how to allow MAB for endpoints which had successful 802.1x authentication.
Inconsistent requirement , 802.1x supersedes MAB
>...s there a way to update some endpoint attribute based on a successful 802.1x authentication which then gets used whenever the client (for whatever reason) goes through MAB?
- The client doesn't go to anything ; what the client does is determined by the NAC (ISE) infrastructure (only)
M.
12-05-2023 03:18 AM
Thanks for the helpful response.
I know that 802.1x supersedes MAB. But as you might know, sometimes an endpoint fails to authenticate over 802.1x.
At that point the switch allows for MAB. I want ISE to authenticate/authorize an endpoint over MAB only if there has been a successful 802.1x authentication for example the day before.
We should be able to set endpoint attributes in the authorization process. Not only send radius attributes to the switch but also add custom attributes to the endpoint database.
12-05-2023 03:24 AM
First config ISE as MAB and as 802.1x
Then config your SW with
802.1x flexible auth
Where order and priority make big rule in make end point auth both or one of mab/802.1x
12-05-2023 03:25 AM
12-05-2023 06:56 AM
If 802.1x fails for whatever reason, do you really want to allow access? What if the device is stolen? The thief now has access to your network. Just because another solution allows an insecure workaround it should not be the norm.
12-05-2023 07:04 AM
What about PXE boot for example? In that case the PC/Laptop does not respond to 802.1x and needs to fall back to MAB. I want to only allow that if it has previously authenticated successfully and not just for any pxe device.
12-05-2023 07:09 AM
Move the endpoint MAC address to a PXE Endpoint Identity Group and reference that in your Authorization Policy
12-05-2023 07:12 AM
Can that be done automatically?
i.e. if authenticated successfully -> endpoint gets assigned a certain endpoint identity group which later can be referenced in MAB authz policy.
12-05-2023 07:20 AM
It can be, it depends on how you have your profiling and/or EIGs set up as to how you would determine which EIG the endpoints are assigned
12-06-2023 04:13 AM
Could you maybe give me some hints, what to look for?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide