Skip to content

802.1X Authentication Host Modes: Single-Host, Multi-Host, Multi-Domain, Multi-Auth

J
802.1X Authentication Host Modes: Single-Host, Multi-Host, Multi-Domain, Multi-Auth

802.1X Host Modes: What They Control and Why It Matters

The authentication host-mode command on a Cisco IOS XE switchport is one of the most consequential 802.1X configuration decisions you make at the access layer. It determines how many MAC addresses can authenticate on a port, whether the switch treats voice and data domains independently, and what happens when a second device appears on the wire.

Get this wrong in a campus deployment and you end up with one of two failure patterns: either legitimate devices cannot authenticate because only one credential is allowed (too restrictive), or a single authenticated endpoint unlocks the port for any device connected through a hub or unmanaged switch (too permissive). Neither outcome is acceptable in a production environment.

The four modes available on the Cisco Catalyst 9300 running IOS XE 17.9.x are:

Mode Command keyword Simultaneous sessions Voice + Data separation
Single-Host single-host 1 No
Multi-Host multi-host 1 authenticated + unlimited unauthenticated No
Multi-Domain multi-domain 2 (1 data + 1 voice) Yes
Multi-Auth multi-auth Unlimited authenticated Yes (optional)

Each mode applies per physical port, not per VLAN.


Single-Host Mode

Configuration

interface GigabitEthernet1/0/1
 description Workstation - Single-Host
 switchport mode access
 switchport access vlan 10
 authentication host-mode single-host
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 dot1x pae authenticator
 spanning-tree portfast

How It Behaves

Single-host mode allows exactly one MAC address to authenticate on the port. Once that MAC address completes authentication — whether through 802.1X or MAB — the port is placed in the authorized state. If a second MAC address appears on the same port (for example, a user plugs a hub into the wall jack), the switch generates a security violation.

The behavior on violation depends on the authentication violation command. The default in IOS XE 17.9.x is restrict, which drops frames from the violating MAC and logs a syslog message. You can also configure shutdown to err-disable the port.

authentication violation restrict

or

authentication violation shutdown

Single-host is appropriate for conference room ports where you want strict enforcement: one device, one credential, full stop. It is also common in high-security areas such as finance departments or server access ports at the campus edge.

Single-host is not appropriate for ports connected to Cisco IP Phones. A phone presents two logical endpoints on one physical port — the phone itself and the PC connected through the phone's downstream switch port. Single-host mode will block the PC entirely.


Multi-Host Mode

Configuration

interface GigabitEthernet1/0/2
 description Open Area - Multi-Host
 switchport mode access
 switchport access vlan 10
 authentication host-mode multi-host
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 dot1x pae authenticator
 spanning-tree portfast

How It Behaves

Multi-host mode requires only one device to successfully authenticate. Once that first authentication succeeds, the port enters the authorized state and allows traffic from any MAC address learned on that port — without additional authentication.

This is a significant security trade-off. A user authenticates with their corporate laptop, and then plugs in a personal device through a hub. That personal device gets full network access in the same VLAN as the authenticated laptop, without ever presenting credentials.

Multi-host is occasionally used during 802.1X rollout phases or in legacy environments where endpoints cannot authenticate but must still reach the network. It is also used on ports connecting to IP phones where the organization has decided not to enforce phone authentication — the phone authenticates via MAB or 802.1X, and any PC behind the phone rides along.

In practice, multi-host is a stepping stone, not a destination. The security model is weak compared to multi-domain or multi-auth. If you are using multi-host in production for more than a transitional deployment phase, revisit the design. Article 27 (Phased 802.1X Deployment Strategy for Enterprise Networks) covers how multi-host fits into a progressive rollout.


Multi-Domain Authentication (MDA) Mode

Configuration

interface GigabitEthernet1/0/3
 description IP Phone + PC - Multi-Domain
 switchport mode access
 switchport access vlan 10
 switchport voice vlan 20
 authentication host-mode multi-domain
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 dot1x pae authenticator
 mab
 spanning-tree portfast

How It Behaves

Multi-domain authentication (MDA) is purpose-built for the most common access-layer topology in enterprise campus networks: a Cisco IP Phone with a PC connected to the phone's access port. The switch treats the port as having two independent authentication domains:

  • Data domain: handles the PC or other data endpoint
  • Voice domain: handles the IP phone (detected by CDP or LLDP)

Each domain authenticates independently. The voice domain typically authenticates the phone via MAB using the phone's MAC address, which ISE looks up against an endpoint database or Active Directory. The data domain authenticates the PC via 802.1X (PEAP or EAP-TLS) or MAB if 802.1X fails.

VLAN assignment also happens per domain. The voice endpoint is placed in Voice VLAN 20 based on the switchport voice vlan 20 configuration (and optionally ISE RADIUS attributes). The data endpoint is placed in Data VLAN 10 or whatever VLAN ISE returns in the Access-Accept.

If the voice domain authenticates but the data domain does not, the phone works normally and the PC remains in the unauthorized state (or drops into the Auth-Fail VLAN if configured — see Article 15). The two domains are completely independent.

One important constraint: multi-domain allows only one device per domain. You cannot authenticate two PCs in the data domain on an MDA port. If you need to support multiple data endpoints (a softphone client plus a physical phone, or a lab PC with a USB Ethernet adapter showing multiple MACs), you need multi-auth mode.

For full IP phone configuration details, see Article 17 (802.1X with IP Phones: Configuring Multi-Domain Authentication on Cisco IOS XE).


Multi-Auth Mode

Configuration

interface GigabitEthernet1/0/4
 description Lab Bench / Shared Workspace - Multi-Auth
 switchport mode access
 switchport access vlan 10
 switchport voice vlan 20
 authentication host-mode multi-auth
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 dot1x pae authenticator
 mab
 spanning-tree portfast

How It Behaves

Multi-auth mode authenticates each MAC address independently. Every device that appears on the port must go through its own authentication cycle — 802.1X or MAB — and receives its own authorization result. There is no concept of "if one authenticates, others ride along."

This is the most granular and most secure host mode for ports that legitimately need to serve multiple devices. Common use cases include:

  • Lab benches where multiple test devices connect through an unmanaged switch
  • Shared workspaces with docking stations that present multiple MAC addresses (the dock, the laptop, and a USB Ethernet adapter may each appear as distinct MACs)
  • Branch offices where a small unmanaged switch serves multiple workstations from a single switchport
  • Conference rooms wired for multiple participants who bring their own laptops

Each authenticated session in multi-auth mode can receive a different VLAN assignment from ISE. If MAC-A authenticates as an employee and gets VLAN 10, and MAC-B authenticates as a contractor and gets VLAN 30 (Guest VLAN), the switch handles both sessions on the same physical port. Under the hood, the switch uses 802.1Q tagging internally to maintain VLAN separation per session.

One constraint: multi-auth mode on a port with a voice VLAN still enforces a single authentication in the voice domain. Only one IP phone can be in the voice domain at a time. The data domain is unrestricted.


Verifying Host Mode with Show Commands

The most useful verification command is show authentication sessions:

SW1# show authentication sessions

Interface  MAC Address     Method   Domain   Status         Fg  Session ID
Gi1/0/1    a4c3.f047.1234  dot1x    DATA     Auth               0A00630A0000000A
Gi1/0/2    b8ac.6f22.5678  dot1x    DATA     Auth               0A00630A0000000B
Gi1/0/3    0025.b501.aabb  mab      VOICE    Auth               0A00630A0000000C
Gi1/0/3    c8d9.d2e1.ccdd  dot1x    DATA     Auth               0A00630A0000000D
Gi1/0/4    001c.5804.1122  mab      DATA     Auth               0A00630A0000000E
Gi1/0/4    0021.a0b3.3344  dot1x    DATA     Auth               0A00630A0000000F
Gi1/0/4    0050.56a1.5566  mab      DATA     Auth               0A00630A00000010

Note that GigabitEthernet1/0/3 shows two sessions — one in VOICE domain (the IP phone, authenticated via MAB) and one in DATA domain (the PC, authenticated via 802.1X). This is multi-domain mode working correctly.

GigabitEthernet1/0/4 shows three simultaneous authenticated sessions in the DATA domain — this is multi-auth mode with three independent devices, each with its own RADIUS authentication result.

For per-interface detail:

SW1# show authentication sessions interface GigabitEthernet1/0/3 detail

            Interface:  GigabitEthernet1/0/3
          MAC Address:  0025.b501.aabb
         IPv6 Address:  Unknown
         IPv4 Address:  10.0.20.45
           User-Name:  00-25-B5-01-AA-BB
              Status:  Authorized
              Domain:  VOICE
      Oper host mode:  multi-domain
    Oper control dir:  both
     Session timeout:  N/A
  Common Session ID:  0A00630A0000000C
    Acct Session ID:  0x0000000C
             Handle:  0x1C000006
     Current Policy:  POLICY_Gi1/0/3

Local Policies:
        Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)

Server Policies:
            Vlan Group:  Vlan: 20

Method status list:
       Method           State
       mab              Authc Success

            Interface:  GigabitEthernet1/0/3
          MAC Address:  c8d9.d2e1.ccdd
         IPv6 Address:  Unknown
         IPv4 Address:  10.0.10.112
           User-Name:  DOMAIN\jsmith
              Status:  Authorized
              Domain:  DATA
      Oper host mode:  multi-domain
    Oper control dir:  both
     Session timeout:  N/A
  Common Session ID:  0A00630A0000000D
    Acct Session ID:  0x0000000D
             Handle:  0x1C000007
     Current Policy:  POLICY_Gi1/0/3

Local Policies:
        Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)

Server Policies:
            Vlan Group:  Vlan: 10

Method status list:
       Method           State
       dot1x            Authc Success

This output confirms both domains on GigabitEthernet1/0/3 are authorized. The VOICE domain session shows MAB authentication and VLAN 20. The DATA domain session shows 802.1X authentication with username DOMAIN\jsmith and VLAN 10.


Host Mode Selection by Deployment Scenario

Scenario Recommended Mode Rationale
Executive office, one PC only single-host Strictest enforcement, one credential
Open office, PC only single-host or multi-auth multi-auth if docking stations are in use
IP Phone + PC (standard campus) multi-domain Industry standard for this topology
Lab bench with unmanaged switch multi-auth Each device authenticates independently
Branch office small switch multi-auth Multiple devices, each authenticated
Legacy printer or IoT (MAB only) single-host with MAB One device, MAC-based auth
Transitional deployment (no supplicant) multi-host Temporary — plan migration to multi-auth
Conference room, occasional use multi-auth Multiple guests with different credentials

Troubleshooting

Symptom: PC behind IP phone fails to authenticate, phone works fine

Cause: Host mode is configured as single-host. The phone authenticates first. When the PC appears on the downstream port of the phone, the switch sees a second MAC address and generates a violation.

Fix: Change the host mode to multi-domain.

interface GigabitEthernet1/0/3
 authentication host-mode multi-domain

Verify with show authentication sessions interface GigabitEthernet1/0/3 detail. You should see two separate domain entries (VOICE and DATA).


Symptom: Second device on multi-host port not reaching network even though first device authenticated

Cause: Although multi-host allows unauthenticated devices once one device authenticates, the authentication violation command may be set to shutdown, and the switch err-disabled on a MAC count threshold, or there is a port security configuration (switchport port-security) conflicting with the 802.1X session.

Fix: Check for port security conflicts:

show port-security interface GigabitEthernet1/0/2
show interfaces GigabitEthernet1/0/2 status

Port security and 802.1X should not be configured together on the same interface in IOS XE. Remove any switchport port-security commands from 802.1X-enabled ports.


Symptom: In multi-auth mode, all devices authenticate but only receive the same VLAN regardless of ISE policy

Cause: The port has a static switchport access vlan configured and either ISE is not returning a VLAN attribute, or the VLAN assignment is not being applied per-session. This happens when the 802.1X policy does not include RADIUS attributes Tunnel-Type, Tunnel-Medium-Type, and Tunnel-Private-Group-ID.

Fix: Verify the ISE authorization profile includes dynamic VLAN assignment. In ISE, navigate to Policy > Policy Elements > Results > Authorization > Authorization Profiles. Select the profile and confirm the VLAN field under the Common Tasks section is populated. Also verify:

SW1# show authentication sessions interface GigabitEthernet1/0/4 detail

Look for Vlan Group: Vlan: XX under Server Policies for each session. If the VLAN Group line is absent, ISE is not returning the VLAN attribute. Check ISE Live Logs (Operations > RADIUS > Live Logs) and inspect the Authentication Detail for the affected endpoint — confirm the authorization profile being applied includes the VLAN assignment. Dynamic VLAN assignment is covered in full in Article 14 (Dynamic VLAN Assignment with 802.1X and Cisco ISE).


Symptom: authentication host-mode multi-domain configured but ISE shows only one RADIUS request for the port

Cause: The IP phone is connected but not using CDP or LLDP to signal its presence. Without CDP/LLDP, the switch cannot classify the phone's traffic to the voice domain and the phone's MAB request is not sent. Alternatively, MAB is not enabled on the interface.

Fix: Ensure mab is configured on the interface alongside dot1x pae authenticator. Verify the phone is sending CDP:

SW1# show cdp neighbors GigabitEthernet1/0/3 detail

If the phone does not appear in CDP output, check whether CDP is enabled on the phone and on the switchport:

interface GigabitEthernet1/0/3
 cdp enable

Also confirm switchport voice vlan 20 is configured — the voice VLAN assignment is required for the switch to create the voice domain on the port.


What's Next

Article 14 — Dynamic VLAN Assignment with 802.1X and Cisco ISE: Once you have host modes configured correctly, the next step is having ISE push the right VLAN per endpoint at authentication time. Article 14 covers the full RADIUS attribute configuration on the switch and ISE authorization profile setup required to make dynamic VLAN assignment work reliably.

© 2025 Ping Labz. All rights reserved.