[Day 36] Cisco ISE Mastery Training: Multi-Domain Authentication (Voice + Data VLAN)

Day 36 – Cisco ISE Mastery Training: Multi-Domain Authentication (Voice + Data VLAN)

Introduction

In modern enterprise environments, a single Ethernet port often serves two devices simultaneously:

  • An IP phone (using the Voice VLAN)
  • A user endpoint like a PC or laptop connected through the phone’s internal switch port (using the Data VLAN)

Multi-Domain Authentication (MDA) enables these two devices to authenticate independently using 802.1X or MAB, ensuring role-based access control while maintaining proper VLAN segmentation.

Without MDA, your security posture weakens — either the phone gets unauthenticated access or the PC rides on the same VLAN without compliance enforcement.

Cisco ISE integrates seamlessly with MDA to:

  • Authenticate both devices separately
  • Apply correct VLANs (voice/data) dynamically
  • Enforce posture/security policies for the data VLAN user without affecting voice traffic

Problem Statement

When a switchport connects to both an IP phone and a PC:

  • If authentication is per-port, the PC can bypass security using the phone’s session.
  • Voice devices may be blocked or delayed if strict NAC rules are applied to both.
  • Network segmentation for voice QoS and user security becomes impossible without per-device policies.

Result: Security gaps, VLAN leaks, compliance failures, and poor VoIP quality.


Solution Overview

Cisco ISE + Catalyst Switch MDA:

  • Per-domain authentication: Voice devices authenticate in the voice domain, PCs in the data domain.
  • VLANs are dynamically assigned per device based on ISE Authorization Profiles.
  • IP phones often use MAB (OUI-based), while PCs use 802.1X/EAP-TLS.
  • Ensures zero VLAN hopping and correct QoS tagging for voice traffic.

Sample Lab Topology

Lab Components:

  • Platform: VMware/EVE-NG
  • Cisco ISE: v3.x (Policy Node + Admin Node)
  • Switch: Catalyst 9300/3650 (IOS-XE 16.x) in EVE-NG or physical
  • Endpoints:
    • Cisco IP Phone 88xx/79xx series (or simulated via MAB MAC)
    • Windows 10 PC with AnyConnect NAM for 802.1X
  • AD Server for user authentication

Topology Diagram:


Step-by-Step GUI Configuration Guide

A. Switch CLI Configuration for MDA

! Enable AAA
aaa new-model
aaa authentication dot1x default group radius
aaa authorization network default group radius

! Define RADIUS Servers
radius server ISE1
 address ipv4 10.10.10.10 auth-port 1812 acct-port 1813
 key C1sc0ISE

! Interface MDA config
interface Gi1/0/10
 switchport mode access
 switchport voice vlan 20
 authentication host-mode multi-domain
 authentication order mab dot1x
 authentication priority mab dot1x
 authentication port-control auto
 mab
 dot1x pae authenticator
 spanning-tree portfast

B. ISE GUI Configuration

Step 1 – Add IP Phone OUI to Endpoint Identity Group

  1. Work Centers → Profiler → Endpoint Identity Groups
  2. Create group: IP_Phones
  3. Add condition: OUI CONTAINS 00:1B:54 (example Cisco phone OUI)
    [Screenshot: Endpoint Identity Group Creation]

Step 2 – Create Authorization Profiles

  • Voice AuthZ Profile:
    • Name: VOICE_VLAN_20
    • VLAN: 20
    • DACL: Permit voice services
    • QoS marking optional
  • Data AuthZ Profile:
    • Name: DATA_VLAN_30
    • VLAN: 30
    • Apply posture policy if needed

[Screenshot: AuthZ Profile Screen]


Step 3 – Create Policy Set

  1. Go to Policy → Policy Sets
  2. Create new Policy Set: MDA-Voice-Data
  3. Conditions:
    • Voice Domain: IF EndpointGroup == IP_Phones THEN VOICE_VLAN_20
    • Data Domain: IF Wired_802.1X_EAP-TLS THEN DATA_VLAN_30
      [Screenshot: Policy Set Screen]

Step 4 – Test Authentication

  • Connect IP phone → Should authenticate via MAB, get VLAN 20
  • Connect PC through phone → Should authenticate via 802.1X, get VLAN 30

FAQs – Multi-Domain Authentication

1. What is the main difference between MDA and Multi-Auth?

  • MDA allows exactly one voice device in the voice domain and one data device in the data domain on a single port.
  • Multi-Auth allows multiple authenticated devices in the data domain only — no separate voice domain.

2. Can an IP phone and PC use the same VLAN in MDA?

  • Technically yes, but it defeats the purpose of MDA. Best practice is to assign a dedicated voice VLAN for QoS and security, and a separate data VLAN for endpoints.

3. How does ISE differentiate between a phone and a PC?

  • Via profiling methods: OUI MAC database, CDP/LLDP info, DHCP fingerprinting. Most Cisco phones advertise device-type=IP Phone in CDP/LLDP packets.

4. What happens if the IP phone fails authentication?

  • If MAB for the voice domain fails, the phone won’t get the voice VLAN and calls will fail. The PC can still attempt authentication in the data domain independently.

5. Which authentication method should be used for IP phones?

  • Most deployments use MAB for phones (fast, low-touch). Some organizations enforce 802.1X EAP-TLS on newer phones for higher security.

6. Can I apply posture assessment to phones in MDA?

  • Not recommended — posture assessment is designed for user endpoints. Phones are usually exempted from posture to avoid call disruption.

7. How do I verify MDA is working on the switch?

Run:

show authentication sessions interface Gi1/0/10 details

You should see two sessions:

  • One with Domain: VOICE
  • One with Domain: DATA

8. How do I check in ISE that both domains are authenticated?

  • Go to Operations → RADIUS → Live Sessions and search for the switch port. You should see two separate RADIUS sessions tied to the same interface.

9. What VLAN is assigned if the PC fails authentication?

  • It depends on your policy:
    • Critical VLAN if configured (for failed auth but essential connectivity)
    • Guest VLAN if unauthenticated users are allowed
    • Or port remains blocked if strict NAC is enforced

10. Does MDA work with downloadable ACLs (dACLs)?

  • Yes. You can push separate dACLs for the voice and data domains from ISE. For example, voice domain may only allow SIP/RTP, while data domain follows corporate policy.

YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Closing Notes

Multi-Domain Authentication is critical in environments where IP phones and PCs share the same access port. With proper ISE policies, you can:

  • Maintain VLAN isolation
  • Enforce security per device
  • Preserve QoS for voice
  • Keep compliance posture checks intact for data users

Fast-Track to Cisco ISE Mastery Pro

Ready to master Cisco ISE in real-world deployments?
I run a focused 4-month, instructor-led CCIE Security Mastery Program that takes you from foundations to advanced production-grade designs — with live labs, 40+ hands-on scenarios, and 1:1 mentoring.

Seats are limited. Reserve yours now at course.networkjourney.com/ccie-security and start building the NAC skills that top network security engineers use daily

Enroll Now & Future‑Proof Your Career
Emailinfo@networkjourney.com
WhatsApp / Call: +91 97395 21088


Trainer Sagar Dhawan

Hi all,
Good to see you here.
I'm your Trainer for CCIE, CCNP, CCNA, Firewall batches and many more courses coming up!
Stay tuned for latest updates!
Keep me posted over Whatsapp/Email about your experience learning from us.
Thanks for being part of - "Network Journey - A journey towards packet-life!!!"