
Summary
This rule detects manual disablement of IEEE 802.1X (dot1x) on Cisco network devices by monitoring for specific Cisco CLI commands that bypass or weaken 802.1X enforcement. The detection focuses on interface- and system-level commands such as enabling port-control to force-authenticated states or disabling dot1x controls (e.g., dot1x port-control force-authorized, no access-session port-control, no authentication port-control, no dot1x system-auth-control). Observing these commands in Cisco IOS/NX-OS CLI logs or configuration-change events can indicate an attempt to bypass Network Access Control (NAC), potentially allowing unauthorized devices to connect and enabling persistence or lateral movement via rogue endpoints. The rule maps to defense-evasion and persistence objectives (attack.t1562.001) and credential-access implications (attack.credential-access) as per the provided tags. It is labeled experimental and uses a concise set of keywords to minimize noise. False positives can occur during legitimate maintenance or troubleshooting when administrators adjust 802.1X settings. Recommended validation includes cross-checking with change-management records, device config history, and complementary NAC/log data. For response, correlate with NAC policy events, port security, and VLAN assignment changes, and enforce strict change control on switch configurations. This rule is designed for integration into a centralized SIEM/SOAR pipeline to enable timely alerts and rapid containment actions.
Categories
- Network
Data Sources
- Command
Created: 2026-04-28