<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Fail open port / user  authentication in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23357#M2268</link>
    <description>&lt;P&gt;Hate to resurrect a dead topic here, but I've got my netlogin configured for mac auth, no dot1x, and I'm struggling with authentication mode optional.&lt;BR /&gt;&lt;BR /&gt;I have mac auth working to the RADIUS server, and authentication mode optional configured. However, when testing with the RADIUS server unavailable, I get a &amp;lt;Warn:AAA.RADIUS.noServerResp&amp;gt; log for exceeding the number of retries, and a &amp;lt;Noti:nl.ClientAuthFailure&amp;gt; log for the mac auth actually failing since RADIUS server was unavailable.&lt;/P&gt;
&lt;P&gt;
&lt;/P&gt;&lt;P&gt;Could there be something else that I'm missing that actually makes the authentication optional? Am I not properly understanding how the optional authentication works?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Mar 2022 22:39:00 GMT</pubDate>
    <dc:creator>Jon11</dc:creator>
    <dc:date>2022-03-28T22:39:00Z</dc:date>
    <item>
      <title>Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23343#M2254</link>
      <description>Apologies in advance if this is an easy one...&lt;BR /&gt;
&lt;BR /&gt;
Basically the question is in EXOS, what would be the configuration to fail authentication open albeit MAC, PEAP, EAP-TLS etc if both RADIUS / NAC appliances become unavailable?&lt;BR /&gt;
&lt;BR /&gt;
With NAC / RADIUS not available I would either need to fail open, or do something else that would still grant access to the network.&lt;BR /&gt;
&lt;BR /&gt;
Appreciate anything already authenticated onto the network would stay connected. I believe there is a timer that can be configured to set the re-authentication time or turn off completely.&lt;BR /&gt;
&lt;BR /&gt;
An option could possibly move to local switch authentication using MAC addresses if all those are previous stored / configured on the switch?&lt;BR /&gt;
&lt;BR /&gt;
Possibly use something like the following:&lt;BR /&gt;
&lt;BR /&gt;
configure netlogin authentication failure vlan Default ports 1-22&lt;BR /&gt;
configure netlogin authentication service-unavailable vlan Default ports 1-22&lt;BR /&gt;
&lt;BR /&gt;
Although some ports like phones might have multiple VLAN's, so not sure how that would work.&lt;BR /&gt;
&lt;BR /&gt;
Possibly something else I haven't thought of or found?&lt;BR /&gt;
&lt;BR /&gt;
Many thanks in advance&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Sep 2018 20:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23343#M2254</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2018-09-28T20:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23344#M2255</link>
      <description>Hi Martin,&lt;BR /&gt;
&lt;BR /&gt;
I'm not sure if this is the question that you're asking--but what if you set the authentication to optional? That way if NAC/RADIUS are unavailable, users can still access the network. Is that an option?&lt;BR /&gt;
&lt;BR /&gt;
configure netlogin port  authentication mode optional&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
Brad&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Sep 2018 20:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23344#M2255</guid>
      <dc:creator>BradP</dc:creator>
      <dc:date>2018-09-28T20:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23345#M2256</link>
      <description>Hi Brad, thanks for posting back.&lt;BR /&gt;
&lt;BR /&gt;
The reason I haven't used that command is because I believed it would allow devices onto the network in normal operation even if they didn't authenticate. The only time I've really used it is when using NAC in monitoring mode i.e. MAC auth optional.&lt;BR /&gt;
&lt;BR /&gt;
So I'm thinking yes it would do the trick, but at the same time bypass the port authentication security in the process under normal operation - would that be right?&lt;BR /&gt;
&lt;BR /&gt;
The following GTAC article says the following:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/If-port-has-been-configured-for-authOptional-switch-stops-to-send-re-auth-to-the-radius" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/If-port-has-been-configured-for-authOptional-...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;UL&gt; With authentication optional mode, the traffic from the client will be allowed even when it is not authenticated. i.e. authentication is not mandatory. If the client failed to authenticate due to some reason (either server unreachable or wrong password or some other reason), then switch will still add the MAC in fdb table and stop initiating the re-auth request to the radius server. The next authentication will be triggered only when fdb ages out or “clear fdb” is executed. If the client gets successfully authenticated with this mode, then it will continue to send the re-auth request after every  policy session time-out. But since this customer scenario deals about failed client, session time-out does not apply. After aging time expires the failed entries will be deleted from netlogin however the FDB do not get cleared. &lt;/UL&gt;Many thanks,&lt;BR /&gt;
&lt;BR /&gt;
Martin</description>
      <pubDate>Fri, 28 Sep 2018 20:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23345#M2256</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2018-09-28T20:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23346#M2257</link>
      <description>Hey Martin,&lt;BR /&gt;
&lt;BR /&gt;
You are correct if the environment that you're running in is 802.1x only. 802.1x relies on a supplicant on the end system in order to complete authentication. If the supplicant doesn't exist the end system could connect to the switch port and gain access without performing any type of authentication. &lt;BR /&gt;
&lt;BR /&gt;
However, MAC authentication doesn't require any supplicant or configuration from the end system itself. As long as the end system sources a packet, MAC authentication WILL perform MAC authentication on that end system as long as the AAA infrastructure is operating normally. With X and MAC enabled there will be some level of authentication for every device unless AAA is not functional. &lt;BR /&gt;
&lt;BR /&gt;
We have customers that have MAC authentication provide a "Quarantine" role that restricts network access until 802.1x is completed. In this environment the client will connect, initially obtain a "Quarantine" role, and once 802.1x completes it can elevate the policy to one that provides the desired level of access.&lt;BR /&gt;
&lt;BR /&gt;
In this situation if a guest plugs in to the same port without a supplicant they will sit in "Quarantine" as MAC authentication will still complete. &lt;BR /&gt;
&lt;BR /&gt;
If AAA functionality is compromised the device will default to the static configuration on the port. You can set a default policy on the port as well that will be used if authentication fails.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
-Ryan&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Sun, 30 Sep 2018 21:35:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23346#M2257</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2018-09-30T21:35:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23347#M2258</link>
      <description>Hi Ryan,&lt;BR /&gt;
&lt;BR /&gt;
Thanks for taking the time to respond, very helpful.&lt;BR /&gt;
&lt;BR /&gt;
So I'll go away and play with this. Basically I'll need to enable MAC auth as well as 802.1x on all my ports, and define a default policy based on what I wont to do if AAA functionality fails.&lt;BR /&gt;
&lt;BR /&gt;
Once done, I'll post back my netlogin configuration for reference.&lt;BR /&gt;
&lt;BR /&gt;
Cheers.&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Oct 2018 15:54:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23347#M2258</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2018-10-01T15:54:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23348#M2259</link>
      <description>Hi Ryan,&lt;BR /&gt;
&lt;BR /&gt;
Just working on this now. So have set the authentication order to MAC, 802.1x and Web. Additionally configured a default role that contains the port to a specific VLAN - Guest VLAN in this case. Only currently testing this on one port, 1:4.&lt;BR /&gt;
&lt;BR /&gt;
Have disabled the NAC and testing if the end-system can still connect.&lt;BR /&gt;
&lt;BR /&gt;
Looking at the logs the device first tries MAC auth then 802.1x but fails both, and then cant connect to the network.&lt;BR /&gt;
&lt;BR /&gt;
Here is the log:&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;10/08/2018 10:30:35.07 &lt;I&gt; Slot-1: Authentication failed for Network Login 802.1x user host/CAN3079.domain.org.uk Mac B8:6B:23:82:06:85 port 1:4&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;10/08/2018 10:30:35.06 &lt;I&gt; Slot-1: Authentication failed for Network Login MAC user B86B23820685 Mac B8:6B:23:82:06:85 port 1:4&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
The configuration for Netlogin and Policy is shown below:&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;enable netlogin dot1x mac &lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;configure netlogin authentication protocol-order mac dot1x web-based&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;enable netlogin ports 1:4 dot1x &lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;enable netlogin ports 1:1-48,2:1-48,3:1-48 mac &lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48 encrypted "#$blVDSCrXyf9R/WdJIgkGS7+UVGf8Fg=="&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;configure policy profile 5 name "Guest Access" pvid-status "enable" pvid 4095 cos-status "enable" cos &lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;configure policy rule admin-profile port 1:4 mask 16 port-string 1:4 admin-pid 5&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
This is the output from show netlogin:&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;Floor_18-EDGE-STK-02.1 # show netlogin port 1:4&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Port                          : 1:4&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Authentication                : 802.1x, mac-based&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Port State                    : Enabled&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Authentication Mode           : Required (Policy Enabled only)&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Max Supported Users           : 1024 (Policy Enabled only)&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Allowed Users                 : 128 (Policy Enabled only)&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Current Users                 : 0 (Policy Enabled only)&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;        802.1x Port Configuration&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Quiet Period                  : 60&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Supplicant Response Timeout   : 30&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Re-authentication             : On&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Re-authentication period      : 3600&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Max Re-authentications        : 3&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;RADIUS server timeout         : 30&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;        MAC Mode Port Configuration&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Re-authentication period      : 3600&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Re-authentication             : Off&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;Authentication Delay          : 0 seconds (Default)&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;        Netlogin Clients&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;MAC                IP address       Authenticated     Type    ReAuth-Timer   User&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;b8:6b:23:82:06:85  0.0.0.0          No                802.1x  0&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;-----------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;(B) - Client entry Blackholed in FDB&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
So in this case, even though there is a default policy the client will not connect. What is odd is the type says 802.1x. So I decided to disable the supplicant on the client, clear the netlogin season for port 1:4 and reconnect.&lt;BR /&gt;
&lt;BR /&gt;
When the device connects the logs now just show is trying MAC auth, no entry for 802.1x:&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;10/08/2018 10:48:39.15 &lt;I&gt; Slot-1: Authentication failed for Network Login MAC user B86B23820685 Mac B8:6B:23:82:06:85 port 1:4&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;10/08/2018 10:48:39.15 &lt;AAA.RADIUS.NOSERVERRESP&gt; Slot-1: Attempted the configured number of retries (3) to each of the 1 authentication servers without a server response for B8-6B-23-82-06-85(username 'B86B23820685') on port 1:4.&lt;/AAA.RADIUS.NOSERVERRESP&gt;&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
When you look as the session information it still says the type is 802.1x, either way I can't get the port to fallback to the default role:&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;        Netlogin Clients&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;------------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;MAC                IP address       Authenticated     Type    ReAuth-Timer   User&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;b8:6b:23:82:06:85  0.0.0.0          No                802.1x  0&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;-----------------------------------------------&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
Just wondering if you can see anything wrong, maybe share the configuration in the example you have provided.&lt;BR /&gt;
&lt;BR /&gt;
Many thanks in advance&lt;/I&gt;&lt;/I&gt;&lt;/I&gt;</description>
      <pubDate>Mon, 08 Oct 2018 15:56:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23348#M2259</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2018-10-08T15:56:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23349#M2260</link>
      <description>Hey Martin,&lt;BR /&gt;
&lt;BR /&gt;
I think you still have the port in authentication mode "required" &lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;Authentication Mode           : Required (Policy Enabled only)&lt;BR /&gt;
&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
What happens if you use Brad's command:&lt;BR /&gt;
&lt;BR /&gt;
configure netlogin port  authentication mode optional&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
-Ryan</description>
      <pubDate>Mon, 08 Oct 2018 17:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23349#M2260</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2018-10-08T17:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23350#M2261</link>
      <description>Ah, there lies my misconception.... thinking that optional mode related to 802.1x as well!&lt;BR /&gt;
&lt;BR /&gt;
Set that the auth to optional, and now working as expected.&lt;BR /&gt;
&lt;BR /&gt;
Really appreciate you help Ryan.&lt;BR /&gt;
&lt;BR /&gt;
Thanks again &lt;BR /&gt;
&lt;BR /&gt;
Martin</description>
      <pubDate>Mon, 08 Oct 2018 17:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23350#M2261</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2018-10-08T17:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23351#M2262</link>
      <description>&lt;P&gt;Interesting discussion. Thank you all for this.&lt;/P&gt;&lt;P&gt;in ERS, there is a fail open config:&lt;/P&gt;&lt;P&gt;&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?an=000086929" target="_blank" rel="noreferrer noopener nofollow ugc"&gt;https://extremeportal.force.com/ExtrArticleDetail?an=000086929&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I was trying to find the same on EXOS and stumbled on this thread.&lt;/P&gt;&lt;P&gt;on exos 30.4, I guess the commands were removed:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;configure netlogin authentication failure ….&lt;BR /&gt;configure netlogin authentication service-unavailable ….&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I can’t find them. So I guess this thread is the only method to get something similar to ERS Failopen.&lt;/P&gt;&lt;P&gt;My only question here is that the protocol-order was changed to MAC first…&amp;nbsp;Wouldn’t that mean that MAC auth would be preferred over DOT1X? Wouldn’t we need to keep order as DOT1X then MAC so that if user has 802.1X, then it uses DOT1X first;&amp;nbsp;If not, MAC auth would kick in and use default policy?&lt;/P&gt;&lt;P&gt;Thanks for any clarification on what I missed.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 03:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23351#M2262</guid>
      <dc:creator>Chad5</dc:creator>
      <dc:date>2021-07-08T03:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23352#M2263</link>
      <description>&lt;P&gt;Hi Chad,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I understood the thread well, isn’t these two bundled together what you may need?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;conf netlogin port X authentication mode optional&lt;/LI&gt;	&lt;LI&gt;default policy role applied to a port (to keep our port config handled within the Policy framework)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;Tomasz&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 21:37:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23352#M2263</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2021-07-12T21:37:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23353#M2264</link>
      <description>&lt;P&gt;Hi Tomasz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, your comment is accurate. But I also noticed in thread that the protocol auth order needed&amp;nbsp;to change to MAC first, then dot1x? That part didn’t make too much sense to me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 02:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23353#M2264</guid>
      <dc:creator>Chad5</dc:creator>
      <dc:date>2021-07-13T02:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23354#M2265</link>
      <description>&lt;P&gt;Hi Chad,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally I didn’t consider that as a strong advice but some particular deployment example. I might be low on caffeine though. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;My favourite approach: dot1x &amp;gt; mac.&lt;/P&gt;&lt;P&gt;If something is dot1x capable, it will run through it.&lt;/P&gt;&lt;P&gt;If something is not dot1x capable, it will run solely through EAC authorization rules.&lt;/P&gt;&lt;P&gt;If something is to be treated well (e.g. a list of sanctioned printers’ MAC addresses), it will.&lt;/P&gt;&lt;P&gt;If something is falling down to default catch-all, I’d deny it. Have a list of devices that should be entitled to fail over with MAC-auth just above catch-all rule in case of backend issues (or use Failsafe Policy mapping within EAC profile).&lt;/P&gt;&lt;P&gt;If the switch is not even able to get to the NAC gateway and we still see such risk although multiple redundancy measures we could’ve already taken, I’d consider auth mode optional and some default VLAN+ACL or default Policy set to access ports. But please remember to span the least privilege approach over there as well. Otherwise, if dot1x and mac auth fails due to EAC communication issue, various kind of devices might end up in the same VLAN and so on. I strongly recommend to consider what is really needed for such devices and users. DHCP/DNS/ARP, HTTPS? What about surveillance cameras failover to such default role? Perhaps port isolation feature on EXOS or a rule that prevents the same subnet as destination is a must in the end.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Just some food for thoughts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;Tomasz&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 03:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23354#M2265</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2021-07-13T03:00:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23355#M2266</link>
      <description>&lt;P&gt;P.S. I saw the service-unavailable netlogin command in 31.2 User Guide but on my X440-G2 running 31.2 it doesn’t let the command thru currently...&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 20:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23355#M2266</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2021-07-13T20:38:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23356#M2267</link>
      <description>&lt;P&gt;Thanks &lt;USER-MENTION data-id="6884494"&gt;@Tomasz&lt;/USER-MENTION&gt;&amp;nbsp;…&amp;nbsp;food well digested &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I’ll check the new command in 31.2 at some point as it might have a good simpler option.&lt;/P&gt;&lt;P&gt;Thanks for the replies.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 02:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23356#M2267</guid>
      <dc:creator>Chad5</dc:creator>
      <dc:date>2021-07-14T02:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: Fail open port / user  authentication</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23357#M2268</link>
      <description>&lt;P&gt;Hate to resurrect a dead topic here, but I've got my netlogin configured for mac auth, no dot1x, and I'm struggling with authentication mode optional.&lt;BR /&gt;&lt;BR /&gt;I have mac auth working to the RADIUS server, and authentication mode optional configured. However, when testing with the RADIUS server unavailable, I get a &amp;lt;Warn:AAA.RADIUS.noServerResp&amp;gt; log for exceeding the number of retries, and a &amp;lt;Noti:nl.ClientAuthFailure&amp;gt; log for the mac auth actually failing since RADIUS server was unavailable.&lt;/P&gt;
&lt;P&gt;
&lt;/P&gt;&lt;P&gt;Could there be something else that I'm missing that actually makes the authentication optional? Am I not properly understanding how the optional authentication works?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2022 22:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/fail-open-port-user-authentication/m-p/23357#M2268</guid>
      <dc:creator>Jon11</dc:creator>
      <dc:date>2022-03-28T22:39:00Z</dc:date>
    </item>
  </channel>
</rss>

