cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
204
Views
2
Helpful
9
Replies

Wireless dot1x order

hs08
VIP
VIP

For wired connection we can set authentication order to dot1x mab for example, can we do same thing in the wireless? So the wireless client will try connect using dot1x first and use mab if authentication failed.

9 Replies 9

@hs08 hi, as i know, cisco WLC cannot handle both (MAB and dot1x) same time. but this can do if you have ISE

Please rate this and mark as solution/answer, if this resolved your issue
Good luck
KB

Leo Laohoo
Hall of Fame
Hall of Fame

@hs08 wrote:
So the wireless client will try connect using dot1x first and use mab if authentication failed.

Why not use MAB so the wireless client does not waste any time trying to authenticate with the wrong credentials.

aleabrahao
Meraki Community All-Star
Meraki Community All-Star

😖

Just don't forget the detail that the network configured as MAB is L2, so the data will "travel" in plain text. If you don't care about the privacy of your users' data, then okay.

Yes, I know that only those with a registered MAC address will be able to use it, but this information can't be overlooked.

I am not a Cisco employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

@aleabrahao a MAB SSID (alone) can still use OWE or PSK so it can still be encrypted if desired.  The problem with that and the desired behaviour which @hs08 has asked about (802.1x with fallback to MAB) is that it expects users on the WLAN to be using 2 different encryption (or not) schemes which is the problem (802.1x + open / 802.1x + OWE / 802.1x + PSK).  It's not possible to accommodate both on the same WLAN.  That's the fundamental difference to LAN where 1x is only being used for authentication/authorisation.

------------------------------
Please click Helpful if this post helped you and Accept as Solution (drop down menu at top right of this reply) if this answered your query.
------------------------------
TAC recommended codes for AireOS WLC's   and   TAC recommended codes for 9800 WLC's
Best Practices for AireOS WLC's,   Best Practices for 9800 WLC's   and   Cisco Wireless compatibility matrix
Check your 9800 WLC config with Wireless Config Analyzer using "show tech wireless" output or "config paging disable" then "show run-config" output on AireOS and use Wireless Debug Analyzer to analyze your WLC client debugs
Field Notice: FN63942 APs and WLCs Fail to Create CAPWAP Connections Due to Certificate Expiration
Field Notice: FN72424 Later Versions of WiFi 6 APs Fail to Join WLC - Software Upgrade Required
Field Notice: FN72524 IOS APs stuck in downloading state after 4 Dec 2022 due to Certificate Expired
- Fixed in 8.10.196.0, latest 9800 releases, 8.5.182.12 (8.5.182.13 for 3504) and 8.5.182.109 (IRCM, 8.5.182.111 for 3504)
Field Notice: FN70479 AP Fails to Join or Joins with 1 Radio due to Country Mismatch, RMA needed
Field Notice: FN74383 APs Running 17.12.4/5/6/6a May Run Out of Flash Space Preventing Upgrades
How to avoid boot loop due to corrupted image on Wave 2 and Catalyst 11ax Access Points (CSCvx32806)
Field Notice: FN74035 - Wave2 APs DFS May Not Detect Radar After Channel Availability Check Time
Leo's list of bugs affecting 2800/3800/4800/1560 APs
Default AP console baud rate from 17.12.x is 115200 - introduced by CSCwe88390

aleabrahao
Meraki Community All-Star
Meraki Community All-Star

@Rich R False sense of security and control. 😉

I am not a Cisco employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

hs08
VIP
VIP

Hi All,

sory if i not have full detail in my initial post. Here my details.

I have requirement to use one SSID for employee and guest, the employee will use EAP-TLS for authenticate and if authentication failure because the client no have certificate then the endpoint will access to guest network.

This was done for wired connection (employee and guest) but on wireless connection only employee was work, if the wireless client not have certificate then the client is asked to enter the username and password.

The switch using C2960 abd the NAC we use forti nac.

hs08_0-1779408606626.png

 


@hs08 wrote:
because the client no have certificate then the endpoint will access to guest network.

Part of helpdesk troubleshooting unable to connect to WiFi is to "forget the network".  Once the username/password is accepted a new certificate gets downloaded.  

Going to "guest" SSID is not a solution nor a viable workaround because the old certificate is still present and this certificate needs to be manually downloaded.  

Singhaam
Level 3
Level 3

Employee PCs should have 802.1X configured so that when the EAPOL process starts, the device responds to the EAPOL packets and completes the 802.1X authentication successfully.

Guest PCs usually do not have 802.1X configured in their Wi-Fi settings, so the 802.1X authentication will fail and then fall back to MAB (MAC Authentication Bypass).

Have you allowed the guest PC MAC address? Because if both 802.1X and MAB fail, the PC may be temporarily blacklisted for some time.

hs08
VIP
VIP

Hi All,

Thanks you for your all information, i decided to build separate vlan for employee and guest.

Review Cisco Networking for a $25 gift card