<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: (Vendor) MAC Address Check before 802.1x Authentification in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508327#M20061</link>
    <description>from "2900 ASG" (access and  security guide): &lt;BR /&gt;Syntax: aaa port-access mac-based [e] &amp;lt; port-list &amp;gt; [addr-limit &amp;lt;1-32&amp;gt;]&lt;BR /&gt;Specifies the maximum number of authenticated&lt;BR /&gt;MACs to allow on the port. (Default: 1)&lt;BR /&gt;Note: On switches where MAC Auth and 802.1X can operate concurrently, this limit includes the total number of clients authenticated through both methods.&lt;BR /&gt;&lt;BR /&gt;So some switches can use mixed MAC Auth and 802.1x!&lt;BR /&gt;Look for the access and security guide for the model you use.&lt;BR /&gt;</description>
    <pubDate>Wed, 07 Oct 2009 07:13:09 GMT</pubDate>
    <dc:creator>Pieter 't Hart</dc:creator>
    <dc:date>2009-10-07T07:13:09Z</dc:date>
    <item>
      <title>(Vendor) MAC Address Check before 802.1x Authentification</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508326#M20060</link>
      <description>Hello everyone,&lt;BR /&gt;&lt;BR /&gt;is it possible to configure a list of MAC addresses (or even a regular expression for a whole vendor) for authentification on a port which also has RADIUS authentification ?&lt;BR /&gt;&lt;BR /&gt;So if the MAC address auth passed it doesn't try the radius authentification ?&lt;BR /&gt;&lt;BR /&gt;Problem is: I have IP phones and printers as well as many clients in one location. What i don't want to do is find out on which port every single ip phone or printer is located and disable the radius authentification on these ports.&lt;BR /&gt;&lt;BR /&gt;What would be the best solution (if possible):&lt;BR /&gt;The switches have a list of the allowed mac addresses (or the regular expression) and if a client connects with that mac address it automatically gets VLAN1 if not it tries to authenticate and then gets access or not.&lt;BR /&gt;&lt;BR /&gt;Backend RADIUS server is IAS from MS. Is there a possible solution to find for this problem ?&lt;BR /&gt;&lt;BR /&gt;Greets&lt;BR /&gt;Stephan</description>
      <pubDate>Tue, 06 Oct 2009 06:05:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508326#M20060</guid>
      <dc:creator>Stephan G</dc:creator>
      <dc:date>2009-10-06T06:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: (Vendor) MAC Address Check before 802.1x Authentification</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508327#M20061</link>
      <description>from "2900 ASG" (access and  security guide): &lt;BR /&gt;Syntax: aaa port-access mac-based [e] &amp;lt; port-list &amp;gt; [addr-limit &amp;lt;1-32&amp;gt;]&lt;BR /&gt;Specifies the maximum number of authenticated&lt;BR /&gt;MACs to allow on the port. (Default: 1)&lt;BR /&gt;Note: On switches where MAC Auth and 802.1X can operate concurrently, this limit includes the total number of clients authenticated through both methods.&lt;BR /&gt;&lt;BR /&gt;So some switches can use mixed MAC Auth and 802.1x!&lt;BR /&gt;Look for the access and security guide for the model you use.&lt;BR /&gt;</description>
      <pubDate>Wed, 07 Oct 2009 07:13:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508327#M20061</guid>
      <dc:creator>Pieter 't Hart</dc:creator>
      <dc:date>2009-10-07T07:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: (Vendor) MAC Address Check before 802.1x Authentification</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508328#M20062</link>
      <description>Thanks for the answer.&lt;BR /&gt;&lt;BR /&gt;But can you tell me what is best practice ? Separating Voice and Data is best practice afaik.&lt;BR /&gt;&lt;BR /&gt;But i also can configure username/password on the telephones so i could achieve the authentication part with IAS. (and also the VLAN assignment)&lt;BR /&gt;&lt;BR /&gt;In the end i want 3 VLANs. 1 for the employees.1 for the ip phones. 1 for the guest. (if this is best practice ;) )&lt;BR /&gt;&lt;BR /&gt;Problem at the moment is i'm working with  unauth-vid so that not authorized ip phones will end up in my guest VLAN.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 07 Oct 2009 10:49:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508328#M20062</guid>
      <dc:creator>Stephan G</dc:creator>
      <dc:date>2009-10-07T10:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: (Vendor) MAC Address Check before 802.1x Authentification</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508329#M20063</link>
      <description>Ok i configured it like you said.&lt;BR /&gt;&lt;BR /&gt;Problem is: although it can autenticate against the IAS it gets no ip or the incorrect vlan (unauth-vid).&lt;BR /&gt;&lt;BR /&gt;config:&lt;BR /&gt;Running configuration:&lt;BR /&gt;&lt;BR /&gt;; J4900A Configuration Editor; Created on release #H.10.74&lt;BR /&gt;&lt;BR /&gt;hostname "HUB-35"&lt;BR /&gt;snmp-server contact "gas"&lt;BR /&gt;time timezone 120&lt;BR /&gt;interface 4&lt;BR /&gt;   no lacp&lt;BR /&gt;exit&lt;BR /&gt;interface 5&lt;BR /&gt;   no lacp&lt;BR /&gt;exit&lt;BR /&gt;ip default-gateway 172.20.20.101&lt;BR /&gt;sntp server 172.20.20.1&lt;BR /&gt;timesync sntp&lt;BR /&gt;sntp unicast&lt;BR /&gt;snmp-server community "public" Unrestricted&lt;BR /&gt;vlan 1&lt;BR /&gt;   name "DEFAULT_VLAN"&lt;BR /&gt;   untagged 1-26&lt;BR /&gt;   ip address 172.20.20.127 255.255.252.0&lt;BR /&gt;   exit&lt;BR /&gt;vlan 99&lt;BR /&gt;   name "unauth"&lt;BR /&gt;   no ip address&lt;BR /&gt;   tagged 1&lt;BR /&gt;   exit&lt;BR /&gt;gvrp&lt;BR /&gt;aaa authentication port-access eap-radius authorized&lt;BR /&gt;radius-server key goh2hu9nowgfjiop$&lt;BR /&gt;radius-server host 172.20.20.1&lt;BR /&gt;aaa port-access authenticator 4&lt;BR /&gt;aaa port-access authenticator 4 unauth-vid 99&lt;BR /&gt;aaa port-access authenticator active&lt;BR /&gt;aaa port-access mac-based 4&lt;BR /&gt;spanning-tree&lt;BR /&gt;password manager&lt;BR /&gt;&lt;BR /&gt;IAS Config:&lt;BR /&gt;&lt;BR /&gt;3 RAS policies (in this order)&lt;BR /&gt;LAN Auth (against AD with domain computer/user)&lt;BR /&gt;Wired MD5 Auth (against AD with mac address)&lt;BR /&gt;WLAN Auth (against AD with domain computer/user)&lt;BR /&gt;&lt;BR /&gt;So i thought when i attach an ip phones it goes:&lt;BR /&gt;Rule 1 denied&lt;BR /&gt;Rule 2 allowed -&amp;gt; default_vlan&lt;BR /&gt;&lt;BR /&gt;I also can see in eventlog that the ip phone is authorized.&lt;BR /&gt;&lt;BR /&gt;But when i look at the vlan it either&lt;BR /&gt;Port              mode     unknown vlan status&lt;BR /&gt; 4                WEBMAC   Learn        Down&lt;BR /&gt;&lt;BR /&gt;or it's in my unauth-vid and only can connect to the internet ;)&lt;BR /&gt;&lt;BR /&gt;Why is the status down when it is authorized ?&lt;BR /&gt;&lt;BR /&gt;Greets&lt;BR /&gt;Stephan</description>
      <pubDate>Mon, 19 Oct 2009 12:32:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508329#M20063</guid>
      <dc:creator>Stephan G</dc:creator>
      <dc:date>2009-10-19T12:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: (Vendor) MAC Address Check before 802.1x Authentification</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508330#M20064</link>
      <description>I think you go wrong with the policies.&lt;BR /&gt;The policies must not "overlap".&lt;BR /&gt;eg policy-1 is for PAP and CHAP and policy-2 is for EAP.&lt;BR /&gt;The policy matching the request characteristics is applied, not all policies until "authorized".&lt;BR /&gt;So when rejected, no other policy is tried.&lt;BR /&gt;&lt;BR /&gt;In the eventlog does it really say "authenticated" (username matches password) or "authorized" (access allowed)?&lt;BR /&gt;&lt;BR /&gt;Pieter</description>
      <pubDate>Mon, 26 Oct 2009 08:41:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508330#M20064</guid>
      <dc:creator>Pieter 't Hart</dc:creator>
      <dc:date>2009-10-26T08:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: (Vendor) MAC Address Check before 802.1x Authentification</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508331#M20065</link>
      <description>If i understand it right:&lt;BR /&gt;&lt;BR /&gt;When one policy doesn't match the port is closed ? But that's a big problem when it comes to different clients.&lt;BR /&gt;&lt;BR /&gt;A notebook authenticates itself with the domain user.&lt;BR /&gt;&lt;BR /&gt;A ip phone authenticates with mac adress.&lt;BR /&gt;&lt;BR /&gt;I can't generate a mac user for every notebook.&lt;BR /&gt;&lt;BR /&gt;Policy 1 is PEAP&lt;BR /&gt;Policy 2 is CHAP&lt;BR /&gt;&lt;BR /&gt;So i thought when PEAP is rejected it tries CHAP. But it seems that it doesn't work that way.&lt;BR /&gt;I will have to work with certificates for the IP phones. But no experience with this here. &lt;BR /&gt;&lt;BR /&gt;In eventlog it says:&lt;BR /&gt;Benutzer "&lt;MAC address=""&gt;" wurde Zugriff gewÃ¤hrt.&lt;BR /&gt;&lt;BR /&gt;Which means that network access is allowed. Policy 1 isn't used because the IP phone doesn't deliver username/password.&lt;BR /&gt;&lt;BR /&gt;Greets&lt;BR /&gt;Stephan&lt;/MAC&gt;</description>
      <pubDate>Mon, 26 Oct 2009 08:58:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508331#M20065</guid>
      <dc:creator>Stephan G</dc:creator>
      <dc:date>2009-10-26T08:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: (Vendor) MAC Address Check before 802.1x Authentification</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508332#M20066</link>
      <description>&amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;Policy 1 is PEAP&lt;BR /&gt;Policy 2 is CHAP&lt;BR /&gt;&lt;BR /&gt;So i thought when PEAP is rejected it tries CHAP. But it seems that it doesn't work that way.&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;If you enable PEAP and disable CHAP in policy-1&lt;BR /&gt;and disable PEAP and enable CHAP in policy-2.&lt;BR /&gt;Then it works as you want, but not in the way you describe it.&lt;BR /&gt;&lt;BR /&gt;CHAP is not rejected in policy-1, but the request doesn't match the policy characteristics; so the policy is not applied and the next policy is checked for a match (of characteristics, not authentication/authorization).&lt;BR /&gt;&lt;BR /&gt;If policy-2 does apply then the authentication/authorization is verified &lt;BR /&gt;and acces is granted or denied.</description>
      <pubDate>Mon, 26 Oct 2009 10:00:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/vendor-mac-address-check-before-802-1x-authentification/m-p/4508332#M20066</guid>
      <dc:creator>Pieter 't Hart</dc:creator>
      <dc:date>2009-10-26T10:00:19Z</dc:date>
    </item>
  </channel>
</rss>

