07-04-2025 05:24 AM
Consider the following scenario:
Is this scenario supported? I have tested it however I'm getting the following error in the CoA debug logs:
Jul 4 12:00:06.741: 07A9B834 0 00000002 error-cause(272) 4 Resource Unavailable
Config I have for the switch port is:
interface GigabitEthernet0/7 switchport access vlan 101 switchport mode access authentication control-direction in authentication event fail retry 0 action next-method authentication host-mode multi-auth authentication order dot1x mab authentication priority dot1x mab authentication port-control auto authentication timer restart 10 mab dot1x pae authenticator dot1x timeout tx-period 10 dot1x timeout supp-timeout 10 dot1x max-reauth-req 1 end
This seems to work fine when authentication host-mode is set to single-host, so I am guessing this is not possible. Sending an access-reject for one of the sessions seems to work fine in both modes, however, leaving one device able to communicate and one not.
Any thoughts would be appreciated!
07-04-2025 05:27 AM
You can not use 802.1x for interconnect SW and one of SW is unmanaged.
The 802.1x work only in SW which is directly connected to endpoint
Or if both SW is mgmt SW
MHM
07-04-2025 05:37 AM
Sorry but unless I've misunderstood your response, I'm not sure it's correct.
I have successfully tested 802.1X with a downstream unmanaged switch and two devices connected. Each device is authenticated separately. This is ultimately what 'multi-auth' mode is designed for.
My question relates to CoA VLAN moves specifically.
07-04-2025 05:40 AM
I am sure about what I mention above
Check this
You need to config SW as supplicant
MHM
07-04-2025 09:11 AM
Hello @eku1s,
according to the Security Configuration Guide for IOS-XE 16.12.x the 3560 switches do support multiple Vlans per access-port. There is, however, no explicit mentioning of CoA or MAB but more of a general description of what can be done on this platform.
Anyway, check out the Multi-auth Per User VLAN assignment section of this guide to see whether one of the outlined scenarios matches your needs. This document also mentions Cisco NEAT in case you can use some kind of basic managed switch instead.
There is also another thread in this forum with similar requirements that is worth reading.
HTH!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide