it is talking to radius. I do not have problem with auth. Switch assigns ports to guest vlan if the PC or client is not dot1x enabled at WinXp and mac address auth fails. But during Pc startup, until welcome screen appears, switach asks PC if PC is dot1x enabled and PC says: no because winxp not loaded yet. So switch asks mac address and does not auth the mac address because it is no in list. So switch assigns PC to guest vlan. Then PC gets guest vlan ip and it does not change. My real question is how can i extend the time that switch bypass mac auth..
i think we are sailing on the same boat... if possible please have a look into the conversation titled " Configuring IEEE 802.1x Port-Based Configuration"....
am trying to enable dot1x auth on our LAN, and decided to use mac-auth-bypass... well i think the switch config is good... but the pc is not getting autheticated with acs.. i have added pc mac address on the local acs datatbase... and have also created a username/password with pc's mac addresss. I am getting an error log in ACS as " Auth Failed " .. hope you could help me with this...
am trying to get solution for ur problem... correct me if i m wrong... you wanted to extend the time period of switch bypass mac auth.... right
Check ACS logs. why auth fails, check user name at the log and you entered at ACS. Mac address types sometime mismatch. example: abcd.234f.123d or abcd234f123d or ABCD.234d.123D these are all same mac address but ACS recognize different.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...