<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Only allowing authorized machines on ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/only-allowing-authorized-machines-on-ise/m-p/2240404#M160298</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you RikJonAtk,&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are rigth, that is how it worked. however, the customer don't have an active directory yet (its a new network), so we must use internal users. In my lab the auth profile used to accomplish the goal was like the shown in attached.&lt;/P&gt;&lt;P&gt;&lt;IMG height="51" width="892" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DispositivosPermitidos is an endpoint identity group where the allowed device mac address are listed. the trick was the string "User Identity Groups:Employee" instead of "Employee" in the auth profile.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 May 2013 17:07:12 GMT</pubDate>
    <dc:creator>Julio Coral Orbes</dc:creator>
    <dc:date>2013-05-29T17:07:12Z</dc:date>
    <item>
      <title>Only allowing authorized machines on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/only-allowing-authorized-machines-on-ise/m-p/2240402#M160295</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are implementing an ISE solution, and one of the customer requirements is create an internal endpoint identity group, and ONLY allow the mac address listed on that group to authenticate via 802.1x. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that in the authorization policy section, in the identity groups conditions, i only can create a rule that applies an OR operator, for example, "dot1xusers OR authorizedmachines", but i can't create the AND condition to enforce the customer requirement. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a way to accomplish this? or how can i implement this customer requierement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/only-allowing-authorized-machines-on-ise/m-p/2240402#M160295</guid>
      <dc:creator>Julio Coral Orbes</dc:creator>
      <dc:date>2019-03-11T03:26:16Z</dc:date>
    </item>
    <item>
      <title>Only allowing authorized machines on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/only-allowing-authorized-machines-on-ise/m-p/2240403#M160296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your ISE;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an Endpoint Identity Group and put your device MAC Addresses in&lt;/P&gt;&lt;P&gt;In your Authentication Profiles, enable 802.1x&lt;/P&gt;&lt;P&gt;In your Authorisation Profiles, create a rule whereby "Device Group = YourAuthzPCs AND AD Group Membership = Domain Computer"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should see you good, although I'd question the motives for your requirement. MAC Address lists are both boring / difficult to administer, and easily spoofed. You would be better off using another AD Security Group in most circumstances I'd have thought.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 05:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/only-allowing-authorized-machines-on-ise/m-p/2240403#M160296</guid>
      <dc:creator>Richard Atkin</dc:creator>
      <dc:date>2013-05-29T05:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Only allowing authorized machines on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/only-allowing-authorized-machines-on-ise/m-p/2240404#M160298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you RikJonAtk,&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are rigth, that is how it worked. however, the customer don't have an active directory yet (its a new network), so we must use internal users. In my lab the auth profile used to accomplish the goal was like the shown in attached.&lt;/P&gt;&lt;P&gt;&lt;IMG height="51" width="892" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DispositivosPermitidos is an endpoint identity group where the allowed device mac address are listed. the trick was the string "User Identity Groups:Employee" instead of "Employee" in the auth profile.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 17:07:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/only-allowing-authorized-machines-on-ise/m-p/2240404#M160298</guid>
      <dc:creator>Julio Coral Orbes</dc:creator>
      <dc:date>2013-05-29T17:07:12Z</dc:date>
    </item>
  </channel>
</rss>

