{"id":2865,"date":"2026-01-15T21:38:00","date_gmt":"2026-01-15T21:38:00","guid":{"rendered":"https:\/\/www.balajibandi.com\/?p=2865"},"modified":"2026-02-05T18:51:44","modified_gmt":"2026-02-05T18:51:44","slug":"88-days-to-ccie-sec-v6-1-lab","status":"publish","type":"post","link":"https:\/\/www.balajibandi.com\/?p=2865","title":{"rendered":"88 Days to CCIE SEC v6.1 Lab"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">ISE  \u00a0Decoding MAC Authentication Bypass (MAB)<\/mark><\/h2>\n\n\n\n<p>In the real world, your network is haunted by &#8220;dumb&#8221; devices\u2014printers, IP cameras, and building controllers\u2014that can\u2019t perform 802.1X. For these, we use\u00a0<strong>MAC Authentication Bypass (MAB)<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">What is MAB?<\/mark><\/h2>\n\n\n\n<p>MAB is a fallback mechanism that uses the device&#8217;s&nbsp;<strong>MAC address<\/strong>&nbsp;as both the username and the password. It is considered &#8220;weak&#8221; authentication because MAC addresses are easily spoofed, but it is essential for operational continuity.<\/p>\n\n\n\n<p>How MAB &#8220;Tricks&#8221; the Switch<\/p>\n\n\n\n<p>MAB doesn&#8217;t start immediately. By default, a Cisco switchport prefers 802.1X. Here is the step-by-step flow:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Initial EAPOL Exchange:<\/strong>\u00a0The switch sends\u00a0<strong>EAP-Request\/Identity<\/strong>\u00a0frames. The &#8220;dumb&#8221; device ignores them because it doesn&#8217;t speak EAP.<\/li>\n\n\n\n<li><strong>The Timeout:<\/strong>\u00a0The switch waits for a response (governed by the\u00a0<code>dot1x timeout tx-period<\/code>\u00a0and\u00a0<code>dot1x max-reauth-req<\/code>\u00a0timers).<\/li>\n\n\n\n<li><strong>The Switch to MAB:<\/strong>\u00a0Once the 802.1X attempts fail, the switch &#8220;bypasses&#8221; 802.1X and creates a\u00a0<strong>RADIUS Access-Request<\/strong>.\n<ul class=\"wp-block-list\">\n<li><strong>User-Name (Attribute 1):<\/strong>\u00a0The MAC address (e.g.,\u00a0<code>001122334455<\/code>).<\/li>\n\n\n\n<li><strong>User-Password (Attribute 2):<\/strong>\u00a0The MAC address.<\/li>\n\n\n\n<li><strong>Service-Type (Attribute 6):<\/strong>\u00a0Set to\u00a0<code>10<\/code>\u00a0(Call Check), signaling to ISE that this is a MAB request.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>ISE Processing:<\/strong>\u00a0ISE looks up the MAC address in its\u00a0<strong>Internal Endpoints<\/strong>\u00a0database or an external identity store.<\/li>\n\n\n\n<li><strong>Authorization:<\/strong>\u00a0If found, ISE returns an\u00a0<strong>Access-Accept<\/strong>\u00a0with the appropriate VLAN or dACL.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Use Case: The Printer Problem<\/mark><\/h2>\n\n\n\n<p><strong>Scenario:<\/strong>&nbsp;A hospital has 500 legacy printers that don&#8217;t support certificates. They need to be on a specific VLAN and restricted from accessing the Internet.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Solution:<\/strong>\u00a0Use\u00a0<strong>ISE Profiling<\/strong>\u00a0with MAB.<\/li>\n\n\n\n<li><strong>The Logic:<\/strong>\u00a0Instead of just checking if the MAC exists, ISE uses\u00a0<strong>Device Profiling<\/strong>\u00a0(DHCP snooping or HTTP user-agents) to verify the device is actually a printer and not a laptop spoofing a printer&#8217;s MAC.<\/li>\n\n\n\n<li><strong>The Result:<\/strong>\u00a0If the device &#8220;looks and acts&#8221; like a HP LaserJet, ISE pushes a\u00a0<strong>dACL<\/strong>\u00a0allowing it to talk only to the Print Server.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Performance Tuning<\/mark><\/h2>\n\n\n\n<p>In a standard config, a MAB device might wait&nbsp;<strong>30+ seconds<\/strong>&nbsp;to get network access while 802.1X times out. To fix this in production, we use&nbsp;<strong>Cisco Common Classification Policy Language (C3PL)<\/strong>&nbsp;to trigger MAB and 802.1X simultaneously or shorten timers:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>! Shorten the gap for MAB devices\ninterface GigabitEthernet1\/0\/1\n authentication order dot1x mab\n authentication priority dot1x mab\n mab\n dot1x timeout tx-period 7  # Reduce from default 30s\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">The &#8220;Security vs. Usability&#8221; Trade-off<\/mark><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th class=\"has-text-align-left\" data-align=\"left\">Feature<\/th><th class=\"has-text-align-left\" data-align=\"left\">802.1X<\/th><th class=\"has-text-align-left\" data-align=\"left\">MAB<\/th><\/tr><tr><td><strong>Identity Basis<\/strong><\/td><td>Certificates\/Credentials<\/td><td>Hardware MAC Address<\/td><\/tr><tr><td><strong>Security Level<\/strong><\/td><td>High (Encrypted)<\/td><td>Low (Spoofable)<\/td><\/tr><tr><td><strong>Management<\/strong><\/td><td>Supplicant Required<\/td><td>Agentless<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Critical Action for Administrators<\/mark><\/h2>\n\n\n\n<p>Always combine MAB with&nbsp;<strong>ISE Profiling<\/strong>. This adds a layer of &#8220;behavioral&#8221; security\u2014if a &#8220;Printer&#8221; suddenly starts trying to SSH into a Core Switch, ISE can issue a&nbsp;<strong>Change of Authorization (CoA)<\/strong>&nbsp;to kill the port. Check out the&nbsp;Cisco ISE Profiling Design Guide&nbsp;for deep-dive logic.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"438\" src=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-8.png\" alt=\"\" class=\"wp-image-2866\" srcset=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-8.png 640w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-8-300x205.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p><strong>Happy Labinggggggggggggggggggg!<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISE \u00a0Decoding MAC Authentication Bypass (MAB) In the real world, your network is haunted by &#8220;dumb&#8221; devices\u2014printers, IP cameras, and building controllers\u2014that can\u2019t perform 802.1X. For these, we use\u00a0MAC Authentication Bypass (MAB). What is MAB? MAB is a fallback mechanism that uses the device&#8217;s&nbsp;MAC address&nbsp;as both the username and the password. It is considered &#8220;weak&#8221; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,2],"tags":[],"class_list":["post-2865","post","type-post","status-publish","format-standard","hentry","category-ccie-sec","category-cisco"],"_links":{"self":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2865"}],"version-history":[{"count":1,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2865\/revisions"}],"predecessor-version":[{"id":2867,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2865\/revisions\/2867"}],"wp:attachment":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}