cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
964
Views
0
Helpful
5
Replies

Restrict Authentication

mortezasadeghi
Level 1
Level 1

Hi

Can we Restrict a client to authenticate on just one physical port?

that's mean the client cannot change its own physical port on a switch.

 

1 Accepted Solution

Accepted Solutions

Mike.Cifelli
VIP Alumni
VIP Alumni
You have a couple of options. The easy thing would be to do port security on the physical interface. However, port security & 8021x typically are not the best when playing together and in my opinion most people would say not to use both together. You could have your policy server deploy policy as you would with ISE or ACS. I think in order to meet your requirement you could eliminate relying on ISE/ACS and statically configure your one port for you one host with whatever policy you want to include vlan etc. You could then configure the other ports on the switch to use policy from AAA server & ensure the one host you do not want to migrate is not a part of any groups on the AAA server so even if the host moved from one interface to another it would fail authentication/authorization and no longer be on the network.

View solution in original post

5 Replies 5

Dennis Mink
VIP Alumni
VIP Alumni

you would need to set up dot1x authentication, port based

Please remember to rate useful posts, by clicking on the stars below.


hi  Dennis Mink

I know.

But I'm asking how can I restrict the user. When they change their physical port, their device will not be authenticated.

balaji.bandi
Hall of Fame
Hall of Fame

We need to know your environement, Do you have ISE or any Authentication in your environment. then @Dennis Mink  suggested how you can do, 

 

If not only MAC Filter can help you.

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

We have Cisco ACS

Mike.Cifelli
VIP Alumni
VIP Alumni
You have a couple of options. The easy thing would be to do port security on the physical interface. However, port security & 8021x typically are not the best when playing together and in my opinion most people would say not to use both together. You could have your policy server deploy policy as you would with ISE or ACS. I think in order to meet your requirement you could eliminate relying on ISE/ACS and statically configure your one port for you one host with whatever policy you want to include vlan etc. You could then configure the other ports on the switch to use policy from AAA server & ensure the one host you do not want to migrate is not a part of any groups on the AAA server so even if the host moved from one interface to another it would fail authentication/authorization and no longer be on the network.