MAC authentication bypass (MAB)
Devices such as network printers, cameras, and sensors might not support 802.1X authentication. If you enable the MAB option on the port, the system will use the device MAC address as the user name and password for authentication.
MAB retries authentication three times before the device is assigned to a guest VLAN for unauthorized users. By default, reauthentication is disabled. Use the following commands if you want to change the default behavior:
config switch global
config port-security
set mab-reauth enable
end
You must provision the RADIUS server to authenticate the devices that use MAB, either by adding the MAC addresses as regular users or by implementing additional logic to resolve the MAC addresses in a network inventory database.
The following flowchart shows the FortiSwitch 802.1X port-based authentication with MAB enabled and with an authentication priority of auth-priority legacy
:
The following flowchart shows the FortiSwitch 802.1X MAC-based authentication with MAB enabled and with an authentication priority of auth-priority legacy
:
You use the CLI to change the priority of MAB authentication and EAP 802.1X authentication.
NOTE: MAB authentication must be enabled before you can change the priority of MAB authentication and EAP 802.1X authentication.
-
Before FortiSwitchOS 7.2.1, the switch tried EAP 802.1X authentication and MAB authentication in the order that they were received with EAP 802.1X authentication having absolute priority. If authentication failed, users were assigned to the
auth-fail-vlanid
VLAN if it had been configured. There was no time delay. Starting in FortiSwitchOS 7.2.1, use theset auth-priority legacy
command to keep this priority. After an upgrade,auth-priority
is set tolegacy
by default. -
Starting in FortiSwitchOS 7.2.1, if you want the switch to try EAP 802.1X authentication first and then MAB authentication if EAP 802.1X fails, use the
set auth-priority dot1x-MAB
command. If MAB authentication also fails, users are assigned to theauth-fail-vlanid
VLAN if it is configured. -
Starting in FortiSwitchOS 7.2.1, if you want the switch to try MAB authentication first and then EAP 802.1X authentication if MAB authentication fails, use the
set auth-priority MAB-dot1x
command. If EAP 802.1X authentication also fails, users are assigned to theauth-fail-vlanid
VLAN if it is configured. -
Starting in FortiSwitchOS 7.2.3, MAB-only authentication is supported. In this mode, the FortiSwitch unit performs MAB authentication without performing EAP authentication. EAP packets are not sent. To enable MAB-only authentication:
config switch interface
edit interface_name
config port-security
set port-security-mode {802.1X | 802.1X-mac-based}
set mac-auth-bypass enable
set auth-order MAB
end
next
end
In the following flowchart, the authentication priority is dot1x-MAB
. If both EAP 802.1X authentication and MAB authentication fail, the user is assigned to the auth-fail-vlanid
VLAN. If an EAPoL-Start packet is received after MAB authentication, the switch changes to EAP 802.1X authentication.
In the following flowchart, the authentication priority is MAB-dot1x
. If MAB authentication fails, the switch attempts EAP 802.1X authentication. If an EAPoL-Start packet is received after MAB authentication, the switch attempts EAP 802.1X authentication without any time delay or processing impact.